STEP BY STEP MODEL UNITED NATIONS CONFERENCE 2015 INTERPOL
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
STEP BY STEP MODEL UNITED NATIONS CONFERENCE 2015 INTERPOL BACKGROUND GUIDE AGENDA: Strengthening Global Cyber Security Measures with Special Emphasis on Digital Data Theft and Espionage
Letter from the Executive Board Dear Representatives, It gives us immense pleasure to invite you to the simulation of the Interpol’s General Assembly at Step By Step Model United Nations Conference, 2015. As a committee which is not usually seen as being simulated at conferences, we believe that it shall be an enriching and intellectually stimulating platform for us as well as all participants to become acquainted with the functioning of the organisation and developing an understanding of its various facilities. The Interpol, being an intergovernmental organisation facilitating international police co-operation, provides expertise and prowess in global information gathering and dissemination by the means of its sophisticated break-through technologies and data storage & distribution capacities. It is, therefore, extremely pertinent for all delegates to understand the functioning of this organisation and apply comprehensive research as well as analysis to develop plausible methods to address the agenda of global cyber security. The issues of cyber theft and espionage have become extremely frequent with the ease of access to technology and the global size of this free cyberspace by criminals and anti-state elements. This committee will focus on the various existing mechanisms which the Interpol has developed to address these concerns and the methods which can be adopted to strengthen these capacities. It will also focus on the approach which can be developed by the Interpol to function as a global law enforcement agency for all member states. As the General Assembly of the Interpol, our main function is to look into the central decisions pertaining to policy, resources, working methods, finances, activities and programmes concerning the agenda at hand. We believe that this document will assist you in your research, and will guide you towards understanding the functioning of this council. However, this is simply to give direction to your preparation and does not in any way put a constraint on the various facets that might be considered pertinent from the point of view of this particular agenda. We as the executive board are hopeful that the delegates come well-armed with a thorough understanding of the committee and its specific role in addressing the issue of cybercrime and look forward to a fruitful discussion on the same, in this committee that we have planned for you. Kindly feel free to contact us in case of any queries/ difficulties faced by you prior to the conference. Regards, Nirjhar Bhattacharya (President) bhattacharya.nirjhar@gmail.com Abhilasha Banerji (Vice- President) abhilashabanerji995@gmail.com
ABOUT THE INTERPOL INTERPOL is the world’s largest international police organization, with 190 member countries . Their role is to enable police around the world to work together to make the world a safer place. Our high-tech infrastructure of technical and operational support helps meet the growing challenges of fighting crime in the 21st century. They work to ensure that police around the world have access to the tools and services necessary to do their jobs effectively. At the same time, the INTERPOL provides targeted training, expert investigative support, and relevant data and secure communications channels. This combined framework helps police on the ground understand crime trends, analyse information, conduct operations and, ultimately, arrest as many criminals as possible. The General Secretariat is located in Lyon, France, and operates 24 hours a day, 365 days a year. INTERPOL also has seven regional offices across the world and a representative office at the United Nations in New York and at the European Union in Brussels. Each of our 190 member countries maintains a National Central Bureau staffed by its own highly trained law enforcement officials. AREAS OF EXPERTISE INTERPOL’s Strategic Framework sets the Organization’s priorities and objectives for a given period of time (three years). It provides a focused and effective structure to guide INTERPOL programmes and activities during this period and to report progress and successes. These priorities are in line with the organization's vision and mission and reflect the dynamic st environment and challenges of international policing in the 21century. Strategic priorities 1: Secure global police information system: They run a secure global police information and support system that connects all 190 National Central Bureaus (NCBs), along with other authorized law enforcement agencies and strategic partners, allowing them to instantly access, request and submit vital data. The INTERPOL is committed to making these tools and services more efficient and effective over the next three years. In particular, they maintain and reinforce the infrastructure serving all member countries (INTERPOL Secure Cloud) while ensuring the widest access possible to its products. They also focus on the sharing of data and interoperability between INTERPOL and other systems. 2: 24/7 support to policing and law enforcement: The INTERPOL provides round-the-clock support and a wide range of operational assistance to their member countries, including emergency and crisis response. The organisation is committed to further improve response times, follow-up and integrate the nature of their response. Objectives and activities are focused around supporting the development and capacities of their NCBs, the services provided by their Command and Coordination Centre, the development of new
investigative expertise, and the deployment of teams specialized in incident response, security issues at major events and the identification of disaster victims. 3: Innovation, capacity building and research : They also concentrate on enhancing the tools and services that they provide for in the area of law enforcement training and to raising standards in international policing and security infrastructures. They remain committed to delivering high-level training and technical assistance, leveraging on law enforcement expertise and resources. They have developed certification, accreditation and standards on policing and security matters, and support law enforcement in addressing new forms of crimes by providing cybercrime training and digital forensic assistance. In addition, They also seek to increase partnerships, research and innovation on security and give increased focus to capacity building efforts in post-conflict and/or risk areas. 4: Assisting in the identification of crimes and criminals: The INTERPOL provides the highest quality database services, analytical capabilities and other innovative tools to assist in preventing crime as well as assisting in the identification, location and arrest of fugitives and cross-border criminals. They aim to further improve their criminal information databases and better support their integration, along with analytical/investigative methods and mechanisms. Objectives and activities will centre on improving the quality and quantity of information in their databases, providing operational and specialized investigative support to member countries, developing a global approach to integrated border management, and providing a platform on technologically enabled threats, including cybercrime. Corporate priorities 5: Ensure organizational health and sustainability: This will be ensured by the implementation of a new INTERPOL Global Complex for Innovation in Singapore from September 2014. They are also committed to improving our human resources strategy in order to best attract and retain talent while promoting diversity as one of INTERPOL’s key strengths. In line with their evolving funding model, the organisation will continue to associate with relevant partners – whether private or public – while ensuring safeguards are in place for the Organization to preserve both its transparency and independence. 6: Consolidate the institutional framework: There is a growing need for efficient governance mechanisms, the need to develop the strategic and geographical outreach for the Organization, and to find innovative solutions to complement INTERPOL’s funding. In this context, a comprehensive communication strategy plays a significant role in raising INTERPOL’s public profile and awareness of the Organization. This institutional effort needs to be supported by solid legal foundations. INTERPOL will continue to focus efforts on enhancing the legal stability and foundation for its international activities. Finally, INTERPOL gives further emphasis to the importance of establishing networks of cooperation with other international organizations.
GOVERNANCE & STRUCTURE The governance structure has been devised through three broad operations; namely strategy, implementation and oversight. Strategy: The General Assembly and Executive Committee form the Organization's governance. General Assembly – INTERPOL’s supreme governing body, the General Assembly is composed of delegates appointed by each member country. It meets annually to take all important decisions related to policy, resources, working methods, finances , activities and programmes. Executive Committee – Elected by the General Assembly, the Executive Committee is headed by the Presidentof the Organization. It provides guidance and direction to the Organization and oversees the implementation of decisions made at the annual General Assembly. Implementation: Day-to-day implementation of the Organization's strategic decisions is carried out by the General Secretariat and National Central Bureaus. General Secretariat – located in Lyon, France, the General Secretariat operates 24 hours a day, 365 days a year and is run by the Secretary General . The Secretariat has seven regional offices across the world along with Special Representatives at the United Nations in New York and at the European Union in Brussels. National Central Bureaus (NCBs) – Each INTERPOL member country maintains a National Central Bureau linking national police with our global network. Staffed by highly trained national law enforcement officers, NCBs are the lifeblood of INTERPOL, contributing to our criminal databases and cooperating together on cross-border investigations, operations and arrests. Oversight: Oversight is carried out by the advisers as well as the CCF or the Commission for Control of the Interpol’s File Advisers – these are experts in a purely advisory capacity, who may be appointed by the Executive Committee and confirmed by the General Assembly. Commission for the Control of INTERPOL’s Files(CCF) – The CCF ensures that the processing of personal data – such as names and fingerprints – is in line with INTERPOL's rules, in order to protect both the fundamental rights of individuals and the cooperation among police internationally. THE INTERPOL GENERAL ASSEMBLY The General Assembly is composed of delegates appointed by the governments of member countries. As INTERPOL's supreme governing body, it meets once a year and takes all the major decisions affecting general policy, the resources needed for international cooperation, working methods, finances and programmes of activities.
The General Assembly also elects the Organization's Executive Committee. Generally speaking, the Assembly takes decisions by a simple majority in the form of Resolutions . Each member country represented has one vote. CYBER SECURITY Threats to Cyber Security Advancements in modern technology have helped countries develop and expand their communication networks, enabling faster and easier networking and information exchange. Currently, there are nearly 2 billion internet users and over 5 billion mobile phone connections worldwide. Every day, 294 billion emails and 5 billion phone messages are exchanged. Most people around the world now depend on consistent access and accuracy of these communication channels. The growing popularity and convenience of digital networks, however, come at a cost. As businesses and societies in general increasingly rely on computers and internet-based networking, cybercrime and digital attack incidents have increased around the world. These attacks — generally classified as any crime that involves the use of a computer network — include financial scams, computer hacking, downloading pornographic images from the internet, virus attacks, e-mail stalking and creating websites that promote racial hatred. The first major instance of cyber crime was reported in 2000, when a mass-mailed computer virus affected nearly 45 million computer users worldwide.
Scope of Cyber Crime Cybercrime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual. These crimes can be divided into three broad areas: ● Attacks against computer hardware and software , for example, botnets, malware and network intrusion; ● Financial crimes and corruption , such as online fraud, penetration of online financial services and phishing; ● Abuse, in the form of grooming or ‘sexploitation', especially crimes against children . The changing nature of cybercrime New trends in cybercrime are emerging all the time, with costs to the global economy running to billions of dollars.
In the past, cybercrime was committed mainly by individuals or small groups. Today, we are seeing criminal organizations working with criminally minded technology professionals to commit cybercrime, often to fund other illegal activities. Highly complex, these cybercriminal networks bring together individuals from across the globe in real time to commit crimes on an unprecedented scale. Criminal organizations are turning increasingly to the Internet to facilitate their activities and maximize their profit in the shortest time. The crimes themselves are not necessarily new – such as theft, fraud, illegal gambling, and sale of fake medicines – but they are evolving in line with the opportunities presented online and therefore becoming more widespread and damaging. INTERPOL’s Role INTERPOL is committed to becoming a global coordination body on the detection and prevention of digital crimes through its INTERPOL Global Complex for Innovation (IGCI) , currently being constructed in Singapore. The INTERPOL Global Complex for Innovation (IGCI) is a cutting-edge research and development facility for the identification of crimes and criminals, innovative training, operational support and partnerships. Located in Singapore, the IGCI complements our General Secretariat in Lyon, France, and enhances the Organization's presence in Asia. A key component of this new cutting-edge research and development facility is the INTERPOL Digital Crime Centre. This new centre provides proactive research into new areas and latest training techniques, and coordinates operations in the field . Two of the core elements of the Centre, and the subject of this Call for Interest, are the Digital Forensic Laband the Cyber Fusion Centre. 1) Digital Forensic Lab: The lab is expected to be a centre of excellence for forensic technology in the law enforcement community. The Lab has been allocated approximately 60-80m² in the Complex and is expected to be staffed by approximately 5 IT experts and investigators seconded from member countries and other external entities. It does not, however, aim to centre on academic research on cybercrime and cyber security; rather it will focus on practical technology that provides investigators with the capacity to better coordinate and conduct national and regional investigations. 2) Cyber Fusion Centre: The Fusion Centre will provide essential assistance to the Cybercrime Investigative Support (CIS) sub-directorate so that INTERPOL’s member countries receive the intelligence and expertise required to effectively investigate cases of cybercrime. DIGITAL DATA THEFT Vulnerable Information Practically any piece of data stored in a company is potentially of use to somebody. If it weren’t of some potential value, it would not be stored in the first place. Over the years, our investigators
investigated thefts of almost any kind of data you would care to imagine. However, the following are most at risk: ● customer contact and financial data, including credit card numbers and bank account details; ● software source code and algorithms; ● marketing information including plans, contact lists and media; ● system and user network credentials, such as passwords and certificates; ● proprietary process descriptions and operating methodologies; ● personnel records and private employee data; ● legal data concerning ongoing or planned litigation or contract actions; ● other user’s private documents stored on company computers; and ● Company strategic data, including the communications of managerial and executive staff. Modes of Data Theft ‘Thumb-sucking’: Thumb-sucking, similar to podslurping, is the intentional or undeliberate use of a portable USB mass storage device, such as a USB flash drive(or "thumbdrive"), to illicitly download confidential data from a network endpoint. A USB flash drive was allegedly used to remove without authorization highly classified documents about the design of U.S. nuclear weapons from a vault at Los Alamos. The threat of thumb-sucking has been amplified for a number of reasons, including the following: ● The storage capacity of portable USB storage devices has increased. ● The cost of high-capacity portable USB storage devices has decreased. ● Networks have grown more dispersed, the number of remote network access points has increased and methods of network connection have expanded, increasing the number of vectors for network infiltration. Portable hard drive: While USB pens can store several gigabytes of data (i.e. hundreds of documents) it is possible to purchase small portable hard drives that can store hundreds of gigabytes (tens of thousands of documents.) These devices are often not much larger than an iPod, and can be powered from the USB ports of the computers they are connected to. MP3 players, digital cameras, memory cards or PDAs : Many modern devices now have substantial onboard memory capacities, all of which can be used for removing data. Some of these devices have the additional advantage that their use is more easily explainable by the data thief, and more difficult for an investigator to follow. CD/DVD : Again, using a CD or DVD has the advantage of being more apparently legitimate. Also writable DVD’s now have capacities of nearly 9 gigabytes, comparable to the larger USB thumbs. E-mail : Some data thieves simply use e-mail to transfer files out. Often this is done over a long period of time, so organisation IT staff do not notice large messages passing through their servers. It is also common to see such mails sent to private or web-based e-mail addresses, on the pretence that the sender is preparing to work on the data “at home”.
Web-mail : Similarly, so data thieves use web-mail to send data from their organisation. This has the advantage of greater apparent privacy than conventional e-mails, and often allows for larger attachments to be sent. Fortunately, web mail often leaves significant forensic traces that a skilled investigator can recover. Printing: Some careful data thieves will not make any electronic copies at all, but will print out key documents and steal them in hard-copy form. This, of course, limits the amount of material that can be stolen, but it does not prevent the stolen material being quickly transferred back into electronic form later, through techniques like scanning and Optical Character Recognition. Remote Access : Some organisations make data theft even easier by allowing remote access to their systems from employee’s private computers. This makes data theft difficult to trace, and makes it very difficult for investigators to identify the computers and other devices to which the stolen data has been transferred. Methods of Investigating Data Theft Some of the commonly used methodologies for investigating digital data theft are as follows: 1) Stochastic forensics : Stochastic forensics is a method to forensically reconstruct digital activity lacking artifacts, by analyzing emergent properties resulting from the stochastic nature of modern computers.[1] [2] [3] Unlike traditional computer forensics , which relies on digital artifacts , stochastic forensics does not require artifacts and can therefore recreate activity which would otherwise be invisible.[3] Its chief application is the investigation of insider data theft . 2) Computer forensics: Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic sciencepertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. Although it is most often associated with the investigation of a wide variety of computer crime , computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery , but with additional guidelines and practices designed to create a legal audit trail . Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted as reliable within U.S. and European court systems. 3) Digital Artifact Analysis: A digital artifact is any undesired or unintended alteration in data introduced in a digital process by an involved technique and/or technology. Various methologies can used to analyse such artifacts or alterations and can act as an early warning signal/ preventive against cyber crime. CYBER ESPIONAGE Cyber spying, or cyber espionage , is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware . It may wholly be perpetrated online from computer desks of professionals on
bases in far away countries or may involve infiltration at home by computer trained conventional spiesand moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers . Cyber spying typically involves the use of such access to secrets and classified information or control of individual computers or whole networks for a strategicadvantage and for psychological, political and physical subversion activities and sabotage . More recently, cyber spying involves analysis of public activity on social networking sites like Facebookand Twitter . A Case for Cyber Espionage: The US-China Blame Game U.S. officials and cybersecurity experts have accused China of engaging in economic cyber espionage. In October 2011, the Office of the National Counterintelligence Executive (ONCIX) labelled China a "persistent collector" of U.S. economic secrets accomplished through cyber means. However, attributing cyber intrusions to the Chinese government has proved difficult. The ONCIX admitted that "the [Intelligence Community] has not been able to attribute many of these private sector data breaches to a state sponsor." New York Times In late January 2013, the reported it had been hacked from China, and allegations followed that other newspapers had similarly been hacked. On February 10, 2013, a National Intelligence Estimate concluded that the United States is the target of a cyber-espionage campaign that is threatening the country’s economic competitiveness with China, identified as the country most aggressively seeking to penetrate the computer systems of American businesses and institutions to gain access to data that could be used for economic gain. On February 19, 2013, Mandiant, a cybersecurity company, released a report in which it claimed to have evidence linking Unit 61398 of the People's Liberation Army in Shanghai to a global cyber espionage campaign against nearly 150 companies from 20 economic sectors "designed to steal large volumes of valuable intellectual property." Mandiant's report garnered widespread press coverage, prompted angry responses from China, and catalyzed the Obama administration's release of a new strategy to combat theft of U.S. trade secrets on February 20, 2013. Lack of Existing Legal Mechanisms to Combat Espionage The desire to combat economic cyber espionage confronts a lack of international law on espionage and economic espionage. Although a victim country could assert that spying violates the principles of sovereignty and non-intervention, state practice has accepted state-sponsored espionage such that these appeals are not serious claims. Although cyber espionage is sometimes described as "cyber attacks" and "cyber war", no government regards cyber espionage of any kind as a prohibited use of force. Other bodies of international law under which espionage issues such as rules on armed conflict and on diplomatic relations in peacetime arise, do not prohibit or seriously constrain espionage or economic espionage. Thus, participation in, and tolerance of, spying indicates that espionage and economic espionage do not constitute wrongful acts triggering state responsibility under international law. Persons caught and accused of being spies can be punished, but international law contains protections for spies captured during armed conflict or covered by diplomatic immunity. For instance, the United States could not prosecute a Chinese diplomat caught engaging in economic cyber espionage unless China waived the immunity and, absent a waiver, could only declare the Chinese persona non grata, triggering national that person's return to China. Many countries prohibit economic espionage under national law. However, enforcement confronts difficulties because the offenses elements include foreign government participation.
Using extradition or mutual legal assistance treaties proves ineffective when the requested state is accused of sponsoring criminal acts. Example: The United States adopted the Economic Espionage Act (EEA) in 1996, before the Internet became a global means of communication to deal with a wide range of issues, including protection of a company’s valuable intellectual property by prosecuting dishonest competitors who steal a company’s trade secrets, or it can also be used against a company that finds itself with trade secrets belonging to a competitor. However, The U.S.-China mutual legal assistance treaty is unlikely to be helpful to U.S. efforts to apply the EEA to perpetrators of economic cyber espionage linked to the Chinese government. Sometimes, in trade and investment agreements, states have used international law to protect intellectual property rights of private-sector enterprises. The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) of the World Trade Organization (WTO) requires each WTO member to protect certain types of intellectual property rights, including trade secrets, within its territory. However, WTO members have, to date, shown no interest in addressing economic espionage within the WTO despite mounting worries about this practice. One reason why WTO members have not used the WTO is the difficulty of formulating claims that economic espionage violates WTO agreements. WTO rules create obligations for WTO members to fulfil within their territories and do not generally impose duties that apply outside those limits. WTO members that covertly obtain intellectual property of nationals of other WTO members operating in their territories could violate WTO obligations to protect such property. However, the economic espionage of greatest concern and especially acts of remotely conducted economic cyber espionage involves governments obtaining information from private-sector companies located outside their territories. Even if a WTO member could construct a claim that economic cyber espionage violates a WTO rule, it would have to establish that another WTO member's government is responsible for the infringing acts. Usually, establishing governmental responsibility for challenged acts is not difficult, but WTO cases have not involved accusations against government-sponsored espionage. It is not clear that a WTO member could satisfy this burden by relying on evidence from private-sector entities (e.g., Mandiant's report) and without revealing counter-intelligence means and methods. The Obama Administration has therefore devised a new strategy to strengthen the fight against economic cyber espionage. Under these new domestic laws have been developed to protect U.S. companies from a cyber attack. The U.S. government will impose counteracting duties if it finds companies using technologies derived from those stolen from U.S. companies or from their allies, and will refuse the right of entry for any executive of an organization found to be engaged in trade espionage, either directly or tangibly enjoying the fruits of stolen U.S. information. The plan also focuses on stronger implementation through refusal to grant visas to their executives and families and pursue criminal cases against them, with the support of the INTERPOL. They also focus on INTERPOL co-operation to blacklist such a company from government contracts or don't even allow their company's imports into any like-minded nation. The INTERPOL’s Existing Mechanism against Cyber Crime The INTERPOL has the following tools and existing mechanisms in place, in order to facilitate effective cyber crime control and reduce the proliferation of cyber criminals into the global cyberspace:
The INTERPOL has additionally also adopted a 3-pronged approach to address issues pertaining to the cyberspace. The key focus areas are as follows: ● Harmonization ● Capacity building ● Operational and forensic support Harmonization While effective law enforcement is an essential component to fighting cyber threats, engaging all stakeholders is also pertinent – from the private sector, academia and public institutions –who are working towards the common goal of a safer cyberspace. It is important to harmonize efforts across different sectors in order to share expertise while avoiding duplication of activities already in progress. In this way, police may efficiently focus their resources on fighting cybercrime, as the INTERPOL work with other stakeholders to develop a holistic and coordinated response. By encouraging the creation of dedicated cybercrime investigation units, and updating legal frameworks, INTERPOL will build a proactive facilitation role in fighting cybercrime. The main services of the harmonization include: 1. National cyber review – a comprehensive audit of national legislation, police infrastructure and technical capacity, with accompanying recommendations; 2. Cyber security strategy development – working with regulatory bodies to develop global strategies as well as advising individual countries on their national approach; 3. International advocacy on cyber legislation and governance – representing the law enforcement perspective in the development of new and updated legislation; 4. Research and innovation – combining police research with similar activities in other sectors. Capacity Building
At INTERPOL, the organisation works to ensure that police keep pace with technological developments and have the required expertise and skills to deal with evolving digital crime at the national and international levels. They provide a range of training courses, targeted to the needs of participants, covering topics such as emerging trends in cybercrime, investigation techniques, digital forensics and more. Training takes the form of e-learning modules, classroom-based sessions and workshops and can lead to professional certification. ‘Train-the-trainer’ courses are particularly valuable as they enable participants to pass on their new skills and knowledge to their colleagues. Increasingly, INTERPOL’s cybercrime training portfolio is developed and delivered with input from academia, computer emergency response teams (CERT), national police and the private sector. Operational and Forensic Under this, the INTERPOL largely supports member countries during cyber investigations and help coordinate joint operations through the following: 1. Cyber Fusion Centre This provides essential assistance to INTERPOL’s member countries during all stages of an investigation. Functioning in a similar manner to INTERPOL’s Command and Coordination Centre , the Cyber Fusion Centre provides real-time monitoring and analysis of malicious internet activity, giving member countries the intelligence and expertise required to be more effectively investigate digital crimes. 2. Digital Forensics Laboratory This laboratory works to build national digital forensic capacity through training, while at the same time providing practical forensic support to member countries during investigation. 3. Regional coordination Working Groups have been created to facilitate the development of regional strategies, technologies and information on the latest crime trends and methods. There are regional working parties for: ● Africa ● Americas ● Europe and Asia ● Middle East and North Africa. The main activities of the working parties are based around operations, training and finding solutions to emerging threats. Questions to Consider 1. How can governments, IGOs, NGOs and private companies work together in order to address cybercrime? What are the main difficulties faced during this process? 2. How can the existing legal mechanisms in place be made more effective in order to address cyber crime, with special emphasis on cyber espionage? 3. How is it possible to regulate cybercrime without harming the population’s access to the network and to information?
4. How can the INTERPOL’s existing constitution be applied in order to address issues related to cyber crime and cyber security? 5. With the rise in cyber terrorism, does the INTERPOL also face the risk of cyber espionage or any other cyber attack? Is there a need to devise newer methods to protect the information shared amongst all members of the INTERPOL? Are there ways by which the INTERPOL can make its existing global network of data sharing more secure? 6. How can the INTERPOL’s existing mechanism to address issues pertaining to security and transfer of data over the internet be strengthened and made more effective for all nations and stakeholders? Note: For the benefit of all delegates, to keep Interpol as politically neutral as possible, its charterforbids it, at least in theory , from undertaking interventions or activities of a political, military, religious, or racial nature or involving itself in disputes over such matters. Its work focuses primarily on public safety and battling terrorism, crimes against humanity , environmental crime,genocide , war crimes , organized crime , piracy, illicit traffic in works of art , illicit drug production, drug trafficking , weapons smuggling ,human trafficking , money laundering , child pornography , white-collar crime ,computer crime,intellectual property crime and corruption . The focus of this committee will be on the actions which can be taken by the Interpol as an organisation, acting within its mandate, to make crime prevention better in all member states. Kindly focus on these actions and not the actions which can only be taken by the international law enforcement agencies or the United Nations and its affiliated bodies. The actions which are not mandated to be undertaken by the INTERPOL can act as suggestions or guidelines but cannot be enforced by the council.
You can also read