International Efforts to Combat Cyberterrorism
Combined International Efforts
International efforts to combat terrorism, much less cyberterrorism, started back around calendar year (CY) 2000. In a speech given on February 10, 2000, Ambassador Michael A. Sheehan, the State Department’s coordinator for Counterterrorism said at the Brookings Institute, “We must ‘drain the swamp’ in which terrorism operates. What does that mean? We seek to limit the room [in] which terrorists have to operate, plan, move, and work. We work to show terrorists that there is no room – both physically and politically – for them to use terrorism as their means of expression…. When we drain the swamp – or limit the area that terrorists have to move – we expose the terrorists. Draining the swamp also means making clear to governments that they will be held accountable for controlling these areas” (Sheehan, 2000).
Coordinated International Effort
Ambassador Sheehan went further to say, “This requires a coordinated international effort to pressure those regimes, such as the Taliban in Afghanistan, which harbor terrorists, to police these swamps, expel the terrorists, and shut down areas of operation…. This also means putting pressure on other states – many of whom are our allies – to cut off terrorists trafficking of fighters, money, weapons, or equipment through these countries…. Finally, draining the swamp also means promoting a shift in public rhetoric around the world. Too often terrorism – a criminal act – is put in the light of religious expression, freedom fighting, or political statement. The international community already offers groups legitimate means of expression, and violence and terrorism are not among those legitimate forms of expression” (Sheehan, 2000).
Role of CCIPS in International Negotiations
Attorney General Janet Reno testified before the United States Senate Committee on Appropriations on February 16, 2000. Ms. Reno said, “The borderless nature of computer crime requires a large role for the Computer Crime and Intellectual Property Section (CCIPS) in international negotiations. CCIPS chairs the G-8 Subgroup on High-tech Crime, which has established a 24 hours a day/7 days a week point of contact with 15 countries for mutual assistance in computer crime. The CCIPS also plays a leadership role in the Council of Europe Experts’ Committee on Cybercrime, and in a new cybercrime project at the Organization of American States” (Anonymous, 2004).
The CCIPS attorney staff consists of about 40 lawyers who focus exclusively on the issues raised by computer and intellectual property crime. Section attorneys advise federal prosecutors and law enforcement agents, comment upon and propose legislation, coordinate international efforts to combat computer crime, litigate cases, and train all law enforcement groups. Other areas of expertise possessed by CCIPS attorneys include encryption, electronic privacy laws, search-and-seizure of computers, e-commerce, hacker investigations, and intellectual property crimes (Anonymous, 2004).
DoJ Involvement at the International Level
Attorney General John Ashcroft said, “At the international level, the Department [of Justice (DoJ)] is also involved, under the leadership of the State Department, in counterterrorism coordination with other governments on a number of levels. For example, the Department represents U.S. law enforcement and prosecutorial interests in multilateral groups such as the G-8 Counterterrorism Experts Group and in bilateral meetings with counterterrorism officials of other nations. The Department has also played a key role in developing and negotiating UN conventions relating to terrorist bombings and terrorist fund raising, both of which the United States have signed. The FBI’s Legal Attachés, assigned to U.S. embassies throughout the world, assist in their response to counterterrorism issues that arise in the nations or regions they cover” (Ashcroft, 2001).
Organization of American States (OAS)
In remarks made to the Inter-American Committee Against Terrorism, Organization of American States, in Washington, DC, on January 28, 2002, Attorney General John Ashcroft said, “In addition, on October 29 [2001] the United States created the Foreign Terrorist Tracking Task Force. The goals of this task force are to deny entry into the United States of persons suspected of being terrorists and to locate, detain, prosecute, and deport terrorists already in the United States. We also have designed a new tamper-resistant visa and upgraded U.S. passports to prevent photo substitution. And we have intensified discussions with our friends in Canada and Mexico to improve border security. It goes without saying that, through these efforts, the United States has worked in concert with many multilateral and regional organizations. I am heartened and encouraged by the cooperation we have received from the Organization of American States, which has been supportive not only in word, but in deed” (Ashcroft, 2002). It is obvious that after 9/11 had occurred, things started picking up in anti-cyber attacks.
Foreign Counterparts
Mr. John Malcolm, deputy assistant attorney general, DoJ, said, “Because cyber-attacks frequently transcend geographic boundaries, the Department’s cybercrime initiatives have not been confined to the United States. It is vitally important to have foreign counterparts who are technologically capable, who are accessible and responsive, and who have the necessary legal authority to cooperate with us and assist in our investigations and prosecutions in the event of a trans-border cyber incident” (Malcolm, 2004).
24/7 Network
John Malcolm further said, “We are working hard to build strong relationships with foreign counterparts so that the framework will be in place to quickly respond to cybercrimes, including large-scale cyber incidents. For example, CCIPS chairs (and has chaired since its inception in 1997) the G-8 Subgroup on High-tech Crime. One of the most significant achievements of this Subgroup is the creation of the ‘24/7 Network,’ which allows law enforcement in the participating countries to reach out ‘24 hours a day, 7 days a week’ to counterparts in other countries for rapid assistance in investigating computer crime and preserving electronic evidence. Often, cyber-criminals can be identified only if evidence of their conduct is preserved within minutes, a time-frame that is way too short for us to rely on traditional international assistance options” (Malcolm, 2004).
A Chain is as Strong as Its Weakest Link
Malcolm further said, “Currently, 35 countries participate in the 24/7 Network. This network has been used successfully in many instances to investigate threats and other crimes in a number of countries, including the United States. Because terrorists operate throughout the world, it is critical that we continue our efforts to expand the Network in order to ensure that our law enforcement capabilities are coexistensive (sic). When it comes to combating cybercrime across international boundaries, the chain is truly only as strong as its weakest link” (Malcolm, 2004).
Pacific Rim Countries
Looking at the Pacific Rim countries, Singapore actively participated in counterterrorism efforts through various international forums, including the ASEAN Regional Forum. In March 2005, Singapore and the United States co-hosted an ASEAN Regional Forum confidence-building measure conference on maritime security. In June 2005, Singapore hosted the first Asia-Middle East Dialogue, with government and non-government representatives from 50 countries. Senior Minister Goh Chok Tong proposed the dialogue as a “platform for progressive Muslim voices” (Anonymous, 2006). Contrary to what some left-leaning liberal politicians say, the United States is cooperating and gathering support from other nations in fighting terrorism.
Council of Europe Parliamentary Assembly
The Council of Europe Parliamentary Assembly notes that the fight against cybercrime requires urgent international cooperation among governments, the private sector, and non-governmental organizations (NGOs) as cybercriminals rely on their ability to operate across borders and to exploit differences in national laws. The lack of cooperation by the member states exposes them to considerable danger. In this context, the Parliamentary Assembly welcomes the various initiatives taken in order to enhance international cooperation and coordination in the fight against cybercrime, the 24/7 points of contact, and the “Check the Web” program. Additionally, it strongly encourages member states to continue to reinforce their efforts, to strengthen international cooperation, and to support concrete, coordinated measures for more efficient protection. Furthermore, the relevant laws need to be standardized, or at least be compatible with one another, to permit the required level of international cooperation (Anonymous, 2007). Europe is working together to fight cybercrime and cyberterrorism.
Summary
In summary, as can be seen from the above discussion, the United States is making combined international efforts to combat cyberterrorism. This approach is an important and sure way to beat cybercriminals and cyberterrorists.
References
Anonymous (2004, June 22). Computer crime and intellectual property section (CCIPS). Retrieved from http://permanent.access.gpo.gov/lps12/ccips.html.
Anonymous (2006, April 26). Singapore – Excerpt DoS Country Report on Terrorism. Retrieved from http://asiasecurity.org/issue-papers/singapore-excerpt-dos-country-report-on-terrorism-26-april-2006.
Anonymous (2007, June 28). How to prevent cybercrime against state institutions in member and observer states? Parliamentary Assembly Resolution 1565 (2007). Retrieved from http://assembly.coe/int/Documents/AdoptedText/ta07/ERES1565.htm.
Ashcroft, J. (2001, May 9). The Avalon project: Statement of Attorney General John Ashcroft before the United States Committee on Appropriations Subcommittee on Commerce, Justice, and State, The Judiciary, and Related Agencies Joint Hearing on US Federal Efforts to Combat Terrorism. Retrieved from http://www.yale.edu/lawweb/avalon/terrorism/t_0016.htm.
Ashcroft, J. (2002, January 29). Western hemisphere efforts to combat terrorism. US Department of State website. Retrieved from http://www.state.gov/p/wha/rls/rm/7667.htm.
Malcolm, J. (2004, February 24). Virtual threat, real terror: Cyberterrorism in the 21st century. Testimony Before the United States Senate Committee on the Judiciary. Retrieved from http://www.globalsecurity/org/security/library/congress/2004_h/040224-malcolm.htm.
Sheehan, M. A. (2000, February 10). Counterterrorism chief seeks more international cooperation. Retrieved from http://www.usembassy.it/file2000_02/alia/a0021020.htm.
###
Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.
"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.
Please Help Support BeforeitsNews by trying our Natural Health Products below!
Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST
Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST
Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST
Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!
HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.
Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.
MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)
Oxy Powder - Natural Colon Cleanser! Cleans out toxic buildup with oxygen!
Nascent Iodine - Promotes detoxification, mental focus and thyroid health.
Smart Meter Cover - Reduces Smart Meter radiation by 96%! (See Video).