300 likes | 309 Views
This seminar discusses the new ways to empower Indonesia with the internet and ICTs, while addressing the risks and challenges of cybercrime. It explores the importance of protecting the country's reputation and outlines a two-pronged approach to combating cybercrime through legal action and public advocacy. The seminar concludes with a manifesto calling for ethics in the use of information and information technology.
E N D
Actions against Cybercrime By: Vivienne K. Tan Thames International Business School 'NEW WAYS TO EMPOWER INDONESIA WITH INTERNET AND ICTs' Seminar, Indonesia
Thames International Business School • Established in 1999 as the first international college in the Philippines • Fastest growing educational institution • Catalyst for the globalization of Philippines Higher Education
Suspected Hacking Incident • Suspected that system was hacked into • Sensitive proprietary information copied • Possibility of conspiracy among the employees
Choices • Proceed with investigation and file a case in court • Remain silent, do damage control, and hope it will not happen again
Risks • Generating media curiosity as first case under the new E-commerce law • Damage to Thames’ reputation • “Free advertisement” for hackers
Protecting the Country’s Reputation • Time Magazine portrayed Philippines as a “Hacker Paradise” • Thames’ Cyber-crime case could backfire against Philippines
Challenges of Pursuing the Investigation • In 2001, National Bureau of Investigation (NBI) had no equipment • Deployment of British computer forensic experts • Technical training for NBI agents and lawyers
Thames’ Two-Pronged Approach • File the case in court • Public Relations and Advocacy Campaign
Advocacy Campaign • Public Relations to safeguard Thames’ reputation • Cushion Philippines’ image • Advocacy against cyber-crime and Intellectual Property Rights violators
Manifesto • A call for Ethics on the Use of Information and Information Technology • Supported by industry, academic, and political leaders
A Call for Ethics on the Use of Information and Information Technology The local and international newsbytes of the last few weeks speak volumes of the dilemma we have brought upon ourselves in this emerging information age. Some weeks ago, articles came out in the major dailies revealing the continuing deterioration of intellectual property rights protection in the country. The news spoke of a lack of resolve from the private sector to pursue intellectual property rights cases in court; evidently, companies would rather settle cases out-of-court than go through the trouble of pursuing cases to their conclusion. More recently, a TIME Magazine article portrayed the Philippines as a "Hackers' Paradise." While TIME's portrayal is still to be substantiated in full, such releases speak of the dubious reputation we have earned for ourselves after the Philippine-made Love Bug virus cost the world some $10 billion worth of lost time and data in 2000 alone. Certainly, the time has come for changes in the way we think about the issue of ethics in the use of information and information technology. We believe that we must not, in any manner, show leniency to the perpetrators of intellectual property crimes if we are to partake fully of the benefits of the new economy. The unauthorized use of intellectual property, which has become so pervasive in our society, costs us untold millions in terms of potential investment and trade. More importantly, our lack of respect for intellectual property rights continues to stunt the growth of our information and knowledge pool, something that we cannot do without. Indeed, we have created a situation which requires a new statement regarding our values and beliefs given the changes wrought by the information age. Such a vital, fearless, and frank statement is necessary if we are to make changes that will allow us to chart the course of society and economy in this new landscape. We therefore affirm and commit to implement the following basic principles: First: We believe that information technologies such as computers are powerful tools that must be used prudently and with consideration to those who might be affected by it. Three main tenets are operative here: (1) We will not interfere with other people's computer work. (2) We will not access other people's computer files without authorization. (3) We will not use information technologies to commit any crime. Second: The generation of useful information requires human effort that must be compensated adequately. We are convinced of the intrinsic and independent value of intellectual property and we therefore affirm that the unauthorized copying and use of proprietary material is tantamount to theft. Third: A strong intellectual property rights protection system is in the interest of the nation. We should not believe that enforcing intellectual property rights means conceding power to the large, faceless, uncaring organization. Where intellectual property is protected, opportunities will soon arise for all. So stand these tenets of the information age. We must now set intelligence and will to the task. Who are we? WE AFFIRM:
Results of the Advocacy • Increased awareness about cyber-crime • More support for law enforcers • New organizations formed
The Youth Sector • Formation of I.T. Ethics movement among the university students • “10 Rules of I.T. Ethics” developed
Disappointments and Frustrations • Slow judicial system • Stronger cyber-crime law delayed in congress • New cyber-crime victims remain silent
The Reasons Why… • No sense of urgency regarding dangers of cyber-crime • Asian perspective of “saving face” as a victim
Point of View as: • As a cyber-crime victim • As an educator
As Cyber-crime victim • Government’s failure to provide conducive environment for reporting cyber-crime violations
INFRAGARD • Formed in the US in 1996 • Partnership between private industry and government (FBI) • Developed to encourage exchange of information between government and private sector
Quote from INFRAGARD strategic plan for 2003 Creating Trust Networks “Information sharing begins with human relationships-people talking with people whom they trust. The public-private partnership is based on trust, generated by people getting to know one another in business as well as more casual setting such as conferences.”
INFRAGARD ASIA • Creating an Asian model and working with INFRAGARD U.S. • Headed by an Asia Pacific Executive Council through a network of INFRAGARD chapters in all APEC member countries
As an Educator • Advances in Information Communication Technology (ICT) provide access to the general public • Potential good or destructive use • Youth being confused and disoriented regarding cyber-crime
Pro-active Solutions • Youth orientation awareness and information campaign on the responsible use of ICT • Helping the youth distinguish right from wrong in the use of ICT
“Philippines and Indonesia were rated in the same category, in terms of ICT readiness. According to the audit, both our countries have similar infrastructure in place and more or less the same level of highly skilled I.T. workers. “ audit done by IBM on the e-ASEAN effort
Both Philippines and Indonesia are paralyzed by the heinous and ruthless crimes of a small group of terrorists.
“ …among the terrorist states, the most active in cyber related attacks are Iran, Pakistan, Egypt, and Indonesia.” Stated in the Internet Security Report last July 2002:
Indonesia and Philippines must : • ensure our laws and policies are in place, • must build the capacity of their cybercrime law enforcers to international standards • make certain that our judiciary is ready.
People must be educated and made aware on what it is to be responsible and ethical citizens of technology
Thank You Vivienne K.Tan Thames Int’l Business School Philippines vktan@thames.edu.ph