SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Adopted Norms
Support development of cyber
norms, referring to 2015
UNGGE
Propose
mechanism
Singapore would propose
a mechanism to enhance
ASEAN cyber coordination
Agree to move
Agreed to move forward
on a formal cybersecurity
coordination mechanism
Checklist
Singapore + United
Nations to draw up a
checklist of steps to
implement cyber norms
Design by PresentationGo
4
Capacity building for international cyber norms in southeast asia
NO.
NORMS ACTION PLANS
ACTION ITEMS/
ACTIVITIES
EXISTING ASEAN-
RELATED
DOCUMENTS/
INITIATIVES
CHALLENGES
CAPACITIES
REQUIRED
TIME FRAME
LEAD ASEAN
COUNTRY
INTERESTED
PARTNERS
(state,
organisation
etc.)
(a) (b) (c) (d) (e) (f) (g) (h) (i)
1. Cooperate in
developing and
applying measures
to increase stability
and security in the
use of ICTs and to
prevent ICT
practices that are
acknowledged to be
harmful or that
may pose threats to
international peace
and security.
Example:
Active
participation in
regional and
international
fora in security
in the use of
ICTs.
Example:
Conduct training
and exercises
concerning the
security in the
use of ICTs
among AMS.
Encourage
bilateral
agreements
/MoUs on ICTs
security among
AMS.
Example:
Annual ASEAN-
Japan Table Top
Exercise
ARF Work Plan on
Security of and in
the use of ICTs
ASEAN Charter
Treaty of Amity
and Cooperation
Example:
Funding
Expertise to
develop the
scenario.
Identifying
partners.
Different level
of capabilities
between
states.
Example:
Fund to host the
training
Fund to fund
participants
Expert trainers
Equivalent
legislations,
infrastructure
and expertise
No.
Supports
Norms
Initiative Area Outcome
Existing ASEAN
Initiatives
Sectoral Bodies (Lead
Country)
1. 1 Policy-level table-top
simulation exercise on cyber
incident responses.
Awareness of situations
where cyber-incidents can
lead to international
conflicts is improved.
Output:
ASEAN table-top
simulation exercises on
responding to cyberattacks.
 ARF table-top exercise
on cybersecurity
incidents.
 ADMM Plus table-top
exercise on
cybersecurity incidents.
 ARF ISM on ICTs
Security
(Singapore)
 ADMM Plus EWG
on CS (Malaysia)
ACICE (ASEAN Cyber Information Centre of Excellence)
ACICE (ASEAN Cyber Information Centre of Excellence)
to “promote cooperation
on cybersecurity and
information within the
defense sector,
to “promote cooperation
on cybersecurity and
information within the
defense sector,
enhance multilateral
cooperation amongst
ASEAN defense
establishments
enhance multilateral
cooperation amongst
ASEAN defense
establishments
against cyber attacks,
disinformation, and
misinformation.”
against cyber attacks,
disinformation, and
misinformation.”
8
Capacity building for international cyber norms in southeast asia
ASEAN
leaders
Value the principles of “mutual
respect” and “non-interference”
View sovereignty as sacrosanct
principle among ASEAN member states
Do not define ‘sovereignty’ – this
provides flexibility in foreign and
domestic policy
Cooperation among members and with external
partners (UN, SCO, GCC)
Economic Political Security
Potential
• Business
• Information Exchange
• Culture
Risks
• Cybercrime
• Terrorists
• Disinformation
Confidentiality
Integrity
CIA Triad
Availability
Confidentiality
- Data breach (SingHealth)
- Trade secrets
Integrity
- Software (Solarwinds)
- Nuclear power plant
(Stuxnet)
Availability
- Ransomware or wiperware
(NotPetya)
- DDOS
https://carnegieendowment.org/2023/01/04/no-water-s-edge-russia-s-information-war-and-regime-security-pub-88644
Cannot use
force
Except self
defence
• Only target military objectives, not civilian objects
Principle of Distinction
• Collateral damage to civilian objects should not be in
excess to the concrete and direct military advantage
Principle of Military Necessity
and Proportionality
• The commander should (reasonably) determine the
effects of the attack
Principle of Precautions in
Attack
US China European Union
States have right of self-defence
in cyberspace
Will not define application of
self-defence and IHL, in the
absence of international
consensus
Addressing questions of
applicability of IHL is necessary
for accountability
Applying LOAC in cyber does
not endorse cyber conflict but
reminds states to protect
Applying LOAC to cyber =
legitimises cyber conflict
Applying LOAC in cyber does
not endorse cyber conflict
No new international legal
instrument needed, can
interpret existing law
States must reach international
consensus, new international
legal instruments
No new international legal
instrument needed, can
interpret existing law
Source: EU Cyber Direct
APT Target countries Target entities
FunnyDream
(C)
Malaysia, Philippines,
Thailand, Vietnam
High-level government
organisations; political parties
Platinum Indonesia, Malaysia,
Vietnam
Diplomatic and government
entities
Cycldek (C) Laos, Philippines, Thailand,
Vietnam
Government, defence, and energy
sectors
HoneyMyte Myanmar, Singapore,
Vietnam
Government organisations
Finspy Indonesia, Myanmar,
Vietnam
Individuals
PhantomLance Indonesia, Malaysia,
Vietnam
Entities
Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky]
Economic
and
Geopolitical
intelligence
gathering
Digitisation growing faster than
cyber awareness
• Growth of cybercrime during the pandemic
Need for strategy / policy /
institutions to own it
• Cyber Strategy? Cyber Agency?
Lack of resources
• R&D
• Cyber Expertise
Priorities
• Cybercrime?
• Fake news?
Some states have offensive cyber
capability
Language and Culture
Concept Perception
Cyber Security
or Information Security?
Threat Perception:
Who are the most serious
Cyber Threats to me?
Priority Perception
What Cyber problem do I fix
first?
• Promote
cyber
hygiene
• R&D
• Build
awareness
• Secure the
data
• Policies
• Strategies
• Laws
Government Businesses
Public
Civil
society
and
Academi
a

Weitere ähnliche Inhalte

Ähnlich wie Why Application of International Law Applies to ASEAN.pdf

WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
Dominic Karunesudas
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
Benjamin Ang
 
Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620
MatthewTennant613
 
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION 2 .docx
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION  2 .docxINITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION  2 .docx
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION 2 .docx
maoanderton
 

Ähnlich wie Why Application of International Law Applies to ASEAN.pdf (20)

OECD
OECDOECD
OECD
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION 2 .docx
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION  2 .docxINITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION  2 .docx
INITIATIVES TO ENHANCE CRITICAL INFRASTRUCTURE PROTECTION 2 .docx
 
ENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident responseENISA - EU strategies for cyber incident response
ENISA - EU strategies for cyber incident response
 

Mehr von Benjamin Ang

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
Benjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
Benjamin Ang
 

Mehr von Benjamin Ang (20)

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 

Kürzlich hochgeladen

一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
SS A
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
SS A
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
mayurchatre90
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 

Kürzlich hochgeladen (20)

Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 

Why Application of International Law Applies to ASEAN.pdf

  • 1.
  • 2.
  • 3. Adopted Norms Support development of cyber norms, referring to 2015 UNGGE Propose mechanism Singapore would propose a mechanism to enhance ASEAN cyber coordination Agree to move Agreed to move forward on a formal cybersecurity coordination mechanism Checklist Singapore + United Nations to draw up a checklist of steps to implement cyber norms Design by PresentationGo
  • 4. 4 Capacity building for international cyber norms in southeast asia
  • 5. NO. NORMS ACTION PLANS ACTION ITEMS/ ACTIVITIES EXISTING ASEAN- RELATED DOCUMENTS/ INITIATIVES CHALLENGES CAPACITIES REQUIRED TIME FRAME LEAD ASEAN COUNTRY INTERESTED PARTNERS (state, organisation etc.) (a) (b) (c) (d) (e) (f) (g) (h) (i) 1. Cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security. Example: Active participation in regional and international fora in security in the use of ICTs. Example: Conduct training and exercises concerning the security in the use of ICTs among AMS. Encourage bilateral agreements /MoUs on ICTs security among AMS. Example: Annual ASEAN- Japan Table Top Exercise ARF Work Plan on Security of and in the use of ICTs ASEAN Charter Treaty of Amity and Cooperation Example: Funding Expertise to develop the scenario. Identifying partners. Different level of capabilities between states. Example: Fund to host the training Fund to fund participants Expert trainers Equivalent legislations, infrastructure and expertise
  • 6. No. Supports Norms Initiative Area Outcome Existing ASEAN Initiatives Sectoral Bodies (Lead Country) 1. 1 Policy-level table-top simulation exercise on cyber incident responses. Awareness of situations where cyber-incidents can lead to international conflicts is improved. Output: ASEAN table-top simulation exercises on responding to cyberattacks.  ARF table-top exercise on cybersecurity incidents.  ADMM Plus table-top exercise on cybersecurity incidents.  ARF ISM on ICTs Security (Singapore)  ADMM Plus EWG on CS (Malaysia)
  • 7. ACICE (ASEAN Cyber Information Centre of Excellence) ACICE (ASEAN Cyber Information Centre of Excellence) to “promote cooperation on cybersecurity and information within the defense sector, to “promote cooperation on cybersecurity and information within the defense sector, enhance multilateral cooperation amongst ASEAN defense establishments enhance multilateral cooperation amongst ASEAN defense establishments against cyber attacks, disinformation, and misinformation.” against cyber attacks, disinformation, and misinformation.”
  • 8. 8 Capacity building for international cyber norms in southeast asia
  • 9. ASEAN leaders Value the principles of “mutual respect” and “non-interference” View sovereignty as sacrosanct principle among ASEAN member states Do not define ‘sovereignty’ – this provides flexibility in foreign and domestic policy
  • 10. Cooperation among members and with external partners (UN, SCO, GCC) Economic Political Security
  • 11. Potential • Business • Information Exchange • Culture Risks • Cybercrime • Terrorists • Disinformation
  • 12.
  • 13.
  • 14. Confidentiality Integrity CIA Triad Availability Confidentiality - Data breach (SingHealth) - Trade secrets Integrity - Software (Solarwinds) - Nuclear power plant (Stuxnet) Availability - Ransomware or wiperware (NotPetya) - DDOS
  • 16.
  • 17.
  • 19.
  • 20. • Only target military objectives, not civilian objects Principle of Distinction • Collateral damage to civilian objects should not be in excess to the concrete and direct military advantage Principle of Military Necessity and Proportionality • The commander should (reasonably) determine the effects of the attack Principle of Precautions in Attack
  • 21.
  • 22.
  • 23. US China European Union States have right of self-defence in cyberspace Will not define application of self-defence and IHL, in the absence of international consensus Addressing questions of applicability of IHL is necessary for accountability Applying LOAC in cyber does not endorse cyber conflict but reminds states to protect Applying LOAC to cyber = legitimises cyber conflict Applying LOAC in cyber does not endorse cyber conflict No new international legal instrument needed, can interpret existing law States must reach international consensus, new international legal instruments No new international legal instrument needed, can interpret existing law Source: EU Cyber Direct
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. APT Target countries Target entities FunnyDream (C) Malaysia, Philippines, Thailand, Vietnam High-level government organisations; political parties Platinum Indonesia, Malaysia, Vietnam Diplomatic and government entities Cycldek (C) Laos, Philippines, Thailand, Vietnam Government, defence, and energy sectors HoneyMyte Myanmar, Singapore, Vietnam Government organisations Finspy Indonesia, Myanmar, Vietnam Individuals PhantomLance Indonesia, Malaysia, Vietnam Entities Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky] Economic and Geopolitical intelligence gathering
  • 31. Digitisation growing faster than cyber awareness • Growth of cybercrime during the pandemic Need for strategy / policy / institutions to own it • Cyber Strategy? Cyber Agency? Lack of resources • R&D • Cyber Expertise Priorities • Cybercrime? • Fake news? Some states have offensive cyber capability Language and Culture
  • 32. Concept Perception Cyber Security or Information Security? Threat Perception: Who are the most serious Cyber Threats to me? Priority Perception What Cyber problem do I fix first?
  • 33.
  • 34.
  • 35.
  • 36. • Promote cyber hygiene • R&D • Build awareness • Secure the data • Policies • Strategies • Laws Government Businesses Public Civil society and Academi a