STEP BY STEP MODEL UNITED NATIONS CONFERENCE 2015 INTERPOL

Page created by Victoria Johnson
 
CONTINUE READING
STEP BY STEP MODEL UNITED NATIONS CONFERENCE 2015 INTERPOL
STEP BY STEP MODEL UNITED NATIONS CONFERENCE 2015
                                      INTERPOL

                                   BACKGROUND GUIDE

                                         AGENDA:

Strengthening Global Cyber Security Measures with Special Emphasis on Digital Data Theft and
                                        Espionage
STEP BY STEP MODEL UNITED NATIONS CONFERENCE 2015 INTERPOL
Letter from the Executive Board

Dear Representatives,

It gives us immense pleasure to invite you to the simulation of the Interpol’s General Assembly at
Step By Step Model United Nations Conference, 2015. As a committee which is not usually seen as
being simulated at conferences, we believe that it shall be an enriching and intellectually
stimulating platform for us as well as all participants to become acquainted with the functioning of
the organisation and developing an understanding of its various facilities.

The Interpol, being an intergovernmental organisation facilitating international police
co-operation, provides expertise and prowess in global information gathering and dissemination
by the means of its sophisticated break-through technologies and data storage & distribution
capacities. It is, therefore, extremely pertinent for all delegates to understand the functioning of
this organisation and apply comprehensive research as well as analysis to develop plausible
methods to address the agenda of global cyber security.

The issues of cyber theft and espionage have become extremely frequent with the ease of access
to technology and the global size of this free cyberspace by criminals and anti-state elements. This
committee will focus on the various existing mechanisms which the Interpol has developed to
address these concerns and the methods which can be adopted to strengthen these capacities. It
will also focus on the approach which can be developed by the Interpol to function as a global law
enforcement agency for all member states. As the General Assembly of the Interpol, our main
function is to look into the central decisions pertaining to policy, resources, working methods,
finances, activities and programmes concerning the agenda at hand.

We believe that this document will assist you in your research, and will guide you towards
understanding the functioning of this council. However, this is simply to give direction to your
preparation and does not in any way put a constraint on the various facets that might be
considered pertinent from the point of view of this particular agenda. We as the executive board
are hopeful that the delegates come well-armed with a thorough understanding of the committee
and its specific role in addressing the issue of cybercrime and look forward to a fruitful discussion
on the same, in this committee that we have planned for you. Kindly feel free to contact us in case
of any queries/ difficulties faced by you prior to the conference.

Regards,

Nirjhar Bhattacharya (President)
bhattacharya.nirjhar@gmail.com

Abhilasha Banerji (Vice- President)
abhilashabanerji995@gmail.com
ABOUT THE INTERPOL

INTERPOL is the world’s largest international police organization, with 190 ​
                                                                            member countries​
                                                                                            .

Their role is to enable police around the world to work together to make the world a safer place.
Our high-tech infrastructure of technical and operational support helps meet the growing
challenges of fighting crime in the 21st century.

They work to ensure that police around the world have access to the tools and services necessary
to do their jobs effectively. At the same time, the INTERPOL provides targeted training, expert
investigative support, and relevant data and secure communications channels. This combined
framework helps police on the ground understand crime trends, analyse information, conduct
operations and, ultimately, arrest as many criminals as possible.

The General Secretariat is located in Lyon, France, and operates 24 hours a day, 365 days a year.
INTERPOL also has seven regional offices across the world and a representative office at the
United Nations in New York and at the European Union in Brussels. Each of our 190 member
countries maintains a National Central Bureau staffed by its own highly trained law enforcement
officials.

AREAS OF EXPERTISE

INTERPOL’s Strategic Framework sets the Organization’s priorities and objectives for a given
period of time (three years). It provides a focused and effective structure to guide INTERPOL
programmes and activities during this period and to report progress and successes. These
priorities are in line with the organization's ​
                                               vision and mission​
                                                                 and reflect the dynamic
                                                                 st​
environment and challenges of international policing in the 21​century.

Strategic priorities

1: Secure global police information system: ​
                                            They run a secure global police information and
support system that connects all 190 National Central Bureaus (NCBs), along with other authorized
law enforcement agencies and strategic partners, allowing them to instantly access, request and
submit vital data.

The INTERPOL is committed to making these tools and services more efficient and effective over
the next three years. In particular, they maintain and reinforce the infrastructure serving all
member countries (INTERPOL Secure Cloud) while ensuring the widest access possible to its
products. They also focus on the sharing of data and interoperability between INTERPOL and other
systems.

2: 24/7 support to policing and law enforcement: ​ The INTERPOL provides round-the-clock
support and a wide range of operational assistance to their member countries, including
emergency and crisis response. The organisation is committed to further improve response times,
follow-up and integrate the nature of their response.

Objectives and activities are focused around supporting the development and capacities of their
NCBs, the services provided by their Command and Coordination Centre, the development of new
investigative expertise, and the deployment of teams specialized in incident response, security
issues at major events and the identification of disaster victims.

3: Innovation, capacity building and research​  : They also concentrate on enhancing the tools and
services that they provide for in the area of law enforcement training and to raising standards in
international policing and security infrastructures. They remain committed to delivering high-level
training and technical assistance, leveraging on law enforcement expertise and resources.

They have developed certification, accreditation and standards on policing and security matters,
and support law enforcement in addressing new forms of crimes by providing cybercrime training
and digital forensic assistance. In addition, They also seek to increase partnerships, research and
innovation on security and give increased focus to capacity building efforts in post-conflict and/or
risk areas.

4: Assisting in the identification of crimes and criminals: ​The INTERPOL provides the highest
quality database services, analytical capabilities and other innovative tools to assist in preventing
crime as well as assisting in the identification, location and arrest of fugitives and cross-border
criminals. They aim to further improve their criminal information databases and better support
their integration, along with analytical/investigative methods and mechanisms. Objectives and
activities will centre on improving the quality and quantity of information in their databases,
providing operational and specialized investigative support to member countries, developing a
global approach to integrated border management, and providing a platform on technologically
enabled threats, including cybercrime.

Corporate priorities

5: Ensure organizational health and sustainability: ​This will be ensured by the implementation of
a new INTERPOL Global Complex for Innovation in Singapore from September 2014. They are also
committed to improving our human resources strategy in order to best attract and retain talent
while promoting diversity as one of INTERPOL’s key strengths. In line with their evolving funding
model, the organisation will continue to associate with relevant partners – whether private or
public – while ensuring safeguards are in place for the Organization to preserve both its
transparency and independence.

6: Consolidate the institutional framework: ​   There is a growing need for efficient governance
mechanisms, the need to develop the strategic and geographical outreach for the Organization,
and to find innovative solutions to complement INTERPOL’s funding. In this context, a
comprehensive communication strategy plays a significant role in raising INTERPOL’s public profile
and awareness of the Organization. This institutional effort needs to be supported by solid legal
foundations. INTERPOL will continue to focus efforts on enhancing the legal stability and
foundation for its international activities. Finally, INTERPOL gives further emphasis to the
importance of establishing networks of cooperation with other international organizations.
​
GOVERNANCE & STRUCTURE

The governance structure has been devised through three broad operations; namely strategy,
implementation and oversight.

Strategy: ​
          The General Assembly and Executive Committee form the Organization's governance.

General Assembly​   – INTERPOL’s supreme governing body, the General Assembly is composed of
delegates appointed by each member country. It meets annually to take all important decisions
related to policy, resources, working methods, ​
                                               finances​
                                                       , activities and programmes.

Executive Committee​  – Elected by the General Assembly, the Executive Committee is headed by
the ​
    President​of the Organization. It provides guidance and direction to the Organization and
oversees the implementation of decisions made at the annual General Assembly.

Implementation: ​Day-to-day implementation of the Organization's strategic decisions is carried
out by the General Secretariat and National Central Bureaus.

General Secretariat​ – located in Lyon, France, the General Secretariat operates 24 hours a day, 365
days a year and is run by the ​
                              Secretary General​ . The Secretariat has seven regional offices across
the world along with Special Representatives at the ​ United Nations​ in New York and at the
European Union​  in Brussels.

National Central Bureaus​ (NCBs) – Each INTERPOL member country maintains a National Central
Bureau linking national police with our global network. Staffed by highly trained national law
enforcement officers, NCBs are the lifeblood of INTERPOL, contributing to our criminal databases
and cooperating together on cross-border investigations, operations and arrests.

Oversight: ​Oversight is carried out by the advisers as well as the CCF or the Commission for
Control of the Interpol’s File

Advisers – these are experts in a purely advisory capacity, who may be appointed by the Executive
Committee and confirmed by the General Assembly.

Commission for the Control of INTERPOL’s Files​(CCF) – The CCF ensures that the processing of
personal data – such as names and fingerprints – is in line with INTERPOL's rules, in order to
protect both the fundamental rights of individuals and the cooperation among police
internationally.

THE INTERPOL GENERAL ASSEMBLY

The General Assembly is composed of delegates appointed by the governments of member
countries. As INTERPOL's supreme governing body, it meets once a year and takes all the major
decisions affecting general policy, the resources needed for international cooperation, working
methods, finances and programmes of activities.
The General Assembly also elects the Organization's Executive Committee. Generally speaking, the
Assembly takes decisions by a simple majority in the form of ​
                                                             Resolutions​
                                                                        . Each member country
represented has one vote.

CYBER SECURITY

Threats to Cyber Security

Advancements in modern technology have helped countries develop and expand their
communication networks, enabling faster and easier networking and information exchange.
Currently, there are nearly 2 billion internet users and over 5 billion mobile phone connections
worldwide. Every day, 294 billion emails and 5 billion phone messages are exchanged. Most
people around the world now depend on consistent access and accuracy of these communication
channels. The growing popularity and convenience of digital networks, however, come at a cost.
As businesses and societies in general increasingly rely on computers and internet-based
networking, cybercrime and digital attack incidents have increased around the world. These
attacks — generally classified as any crime that involves the use of a computer network — include
financial scams, computer hacking, downloading pornographic images from the internet, virus
attacks, e-mail stalking and creating websites that promote racial hatred. The first major instance
of cyber crime was reported in 2000, when a mass-mailed computer virus affected nearly 45
million computer users worldwide.
Scope of Cyber Crime

Cybercrime is a fast-growing area of crime. More and more criminals are exploiting the speed,
convenience and anonymity of the Internet to commit a diverse range of criminal activities that
know no borders, either physical or virtual.

These crimes can be divided into three broad areas:

   ●   Attacks against computer hardware and software​     , for example, botnets, malware and
       network intrusion;
   ●   Financial crimes​ and ​
                             corruption​
                                       , such as online fraud, penetration of online financial
       services and phishing;
   ●   Abuse​, in the form of grooming or ‘sexploitation', especially ​
                                                                      crimes against children​
                                                                                             .

The changing nature of cybercrime

New trends in cybercrime are emerging all the time, with costs to the global economy running to
billions of dollars.
In the past, cybercrime was committed mainly by individuals or small groups. Today, we are seeing
criminal organizations working with criminally minded technology professionals to commit
cybercrime, often to fund other illegal activities. Highly complex, these cybercriminal networks
bring together individuals from across the globe in real time to commit crimes on an
unprecedented scale.

Criminal organizations are turning increasingly to the Internet to facilitate their activities and
maximize their profit in the shortest time. The crimes themselves are not necessarily new – such
as theft, fraud, illegal gambling, and sale of fake medicines – but they are evolving in line with the
opportunities presented online and therefore becoming more widespread and damaging.

INTERPOL’s Role

INTERPOL is committed to becoming a global coordination body on the detection and prevention
of digital crimes through its INTERPOL ​
                                       Global Complex for Innovation (IGCI)​
                                                                           , currently being
constructed in Singapore.

The ​INTERPOL Global Complex for Innovation (IGCI)​       is a cutting-edge research and development
facility for the identification of crimes and criminals, innovative training, operational support and
partnerships. Located in Singapore, the IGCI complements our General Secretariat in Lyon, France,
and enhances the Organization's presence in Asia.

A key component of this new cutting-edge research and development facility is the ​INTERPOL
Digital Crime Centre​. This new centre provides proactive research into new areas and latest
training techniques, and coordinates ​operations in the field​
                                      ​                      .

Two of the core elements of the Centre, and the subject of this Call for Interest, are the ​
                                                                                           Digital
Forensic Lab​and the ​
                     Cyber Fusion Centre​.

    1) Digital Forensic Lab: The lab is expected to be a centre of excellence for forensic
       technology in the law enforcement community. The Lab has been allocated approximately
       60-80m² in the Complex and is expected to be staffed by approximately 5 IT experts and
       investigators seconded from member countries and other external entities. It does not,
       however, aim to centre on academic research on cybercrime and cyber security; rather it
       will focus on practical technology that provides investigators with the capacity to better
       coordinate and conduct national and regional investigations.
    2) Cyber Fusion Centre: The Fusion Centre will provide essential assistance to the
       Cybercrime Investigative Support (CIS) sub-directorate so that INTERPOL’s member
       countries receive the intelligence and expertise required to effectively investigate cases of
       cybercrime.

DIGITAL DATA THEFT

Vulnerable Information

Practically any piece of data stored in a company is potentially of use to somebody. If it weren’t of
some potential value, it would not be stored in the first place. Over the years, our investigators
investigated thefts of almost any kind of data you would care to imagine. However, the following
are most at risk:

    ●   customer contact and financial data, including credit card numbers and bank account
        details;
    ●   software source code and algorithms;
    ●   marketing information including plans, contact lists and media;
    ●   system and user network credentials, such as passwords and certificates;
    ●   proprietary process descriptions and operating methodologies;
    ●   personnel records and private employee data;
    ●   legal data concerning ongoing or planned litigation or contract actions;
    ●   other user’s private documents stored on company computers; and
    ●   Company strategic data, including the communications of managerial and executive staff.

Modes of Data Theft

‘Thumb-sucking’:​  Thumb-sucking, similar to podslurping, is the intentional or undeliberate use of a
portable ​USB mass storage device​, such as a ​
                                              USB flash drive​(or "thumbdrive"), to illicitly download
confidential data from a network endpoint. A USB flash drive was allegedly used to remove
without authorization highly classified documents about the design of U.S. nuclear weapons from
a vault at Los Alamos. The threat of thumb-sucking has been amplified for a number of reasons,
including the following:

●   The storage capacity of portable USB storage devices has increased.

●   The cost of high-capacity portable USB storage devices has decreased.

●   Networks have grown more dispersed, the number of remote network access points has
    increased and methods of network connection have expanded, increasing the number of
    vectors for network infiltration.

Portable hard drive​: While USB pens can store several gigabytes of data (i.e. hundreds of
documents) it is possible to purchase small portable hard drives that can store hundreds of
gigabytes (tens of thousands of documents.) These devices are often not much larger than an
iPod, and can be powered from the USB ports of the computers they are connected to.

MP3 players, digital cameras, memory cards or PDAs​ : Many modern devices now have substantial
onboard memory capacities, all of which can be used for removing data. Some of these devices
have the additional advantage that their use is more easily explainable by the data thief, and more
difficult for an investigator to follow.

CD/DVD​ : Again, using a CD or DVD has the advantage of being more apparently legitimate. Also
writable DVD’s now have capacities of nearly 9 gigabytes, comparable to the larger USB thumbs.

E-mail​ : Some data thieves simply use e-mail to transfer files out. Often this is done over a long
period of time, so organisation IT staff do not notice large messages passing through their servers.
It is also common to see such mails sent to private or web-based e-mail addresses, on the
pretence that the sender is preparing to work on the data “at home”.
Web-mail​ : Similarly, so data thieves use web-mail to send data from their organisation. This has
the advantage of greater apparent privacy than conventional e-mails, and often allows for larger
attachments to be sent. Fortunately, web mail often leaves significant forensic traces that a skilled
investigator can recover.

Printing: ​
          Some careful data thieves will not make any electronic copies at all, but will print out key
documents and steal them in hard-copy form. This, of course, limits the amount of material that
can be stolen, but it does not prevent the stolen material being quickly transferred back into
electronic form later, through techniques like scanning and Optical Character Recognition.
Remote Access​  : Some organisations make data theft even easier by allowing remote access to
their systems from employee’s private computers. This makes data theft difficult to trace, and
makes it very difficult for investigators to identify the computers and other devices to which the
stolen data has been transferred.

Methods of Investigating Data Theft

Some of the commonly used methodologies for investigating digital data theft are as follows:

    1) Stochastic forensics​  : Stochastic forensics is a method to ​  forensically​ reconstruct digital
       activity lacking ​
                        artifacts​, by analyzing ​
                                                 emergent properties​    resulting from
       the ​
           stochastic​ nature of modern computers.[1]   ​​[2]​
                                                             [3]​
                                                                Unlike traditional ​computer forensics​  ,
       which relies on ​digital artifacts​
                                         , stochastic forensics does not require artifacts and can
       therefore recreate activity which would otherwise be invisible.[3]     ​​Its chief application is the
       investigation of ​insider​ data theft​
                                  ​          .
    2) Computer forensics:​
                          ​
                          Computer forensics (sometimes known as computer forensic science)
        is a branch of ​
                       digital forensic science​pertaining to legal evidence found in computers and
        digital storage media. The goal of computer forensics is to examine digital media in a
        forensically sound manner with the aim of identifying, preserving, recovering, analyzing
        and presenting facts and opinions about the digital information. Although it is most often
        associated with the investigation of a wide variety of ​ computer crime​ , computer forensics
        may also be used in civil proceedings. The discipline involves similar techniques and
        principles to ​
                      data recovery​ , but with additional guidelines and practices designed to create
        a legal ​
                audit trail​
                           . Evidence from computer forensics investigations is usually subjected to
        the same guidelines and practices of other digital evidence. It has been used in a number
        of high-profile cases and is becoming widely accepted as reliable within U.S. and European
        court systems.
    3) Digital Artifact Analysis:​
                                 A digital ​
                                 ​         artifact​
                                                   is any undesired or unintended alteration in data
       introduced in a digital process by an involved technique and/or technology. Various
       methologies can used to analyse such artifacts or alterations and can act as an early
       warning signal/ preventive against cyber crime.

CYBER ESPIONAGE
Cyber spying, or cyber ​   espionage​
                                    , is the act or practice of obtaining secrets without the permission
of the holder of the information (personal, sensitive, proprietary or of classified nature), from
individuals, competitors, rivals, groups, governments and enemies for personal, economic,
political or military advantage using methods on the Internet, networks or individual computers
through the use of ​  cracking​ techniques and ​ malicious software​ including ​
                                                                               Trojan
horses​ and ​spyware​  . It may wholly be perpetrated online from computer desks of professionals on
bases in far away countries or may involve infiltration at home by computer trained
conventional ​spies​and ​
                        moles​ or in other cases may be the ​ criminal​
                                                                      handiwork
of ​
   amateur​  malicious hackers and ​software programmers​   .
Cyber spying typically involves the use of such access to secrets and classified information or
control of individual computers or whole networks for a ​  strategic​advantage and
                                                                              ​
for​
   psychological​,​
                  political​
                           and physical subversion activities and ​sabotage​ .​
                                                                              More recently, cyber
spying involves analysis of public activity on social networking sites like ​
                                                                            Facebook​and ​
                                                                                         Twitter​
                                                                                                .
A Case for Cyber Espionage: The US-China Blame Game
U.S. officials and cybersecurity experts have accused China of engaging in economic cyber
espionage. In October 2011, the Office of the National Counterintelligence Executive (ONCIX)
labelled China a "persistent collector" of U.S. economic secrets accomplished through cyber
means. However, attributing cyber intrusions to the Chinese government has proved difficult. The
ONCIX admitted that "the [Intelligence Community] has not been able to attribute many of these
private sector data breaches to a state sponsor."
                          New York Times​
In late January 2013, the ​                reported it had been hacked from China, and allegations
followed that other newspapers had similarly been hacked. On February 10, 2013, a National
Intelligence Estimate concluded that the United States is the target of a cyber-espionage campaign
that is threatening the country’s economic competitiveness with China, identified as the country
most aggressively seeking to penetrate the computer systems of American businesses and
institutions to gain access to data that could be used for economic gain.
On February 19, 2013, Mandiant, a cybersecurity company, released a report in which it claimed
to have evidence linking Unit 61398 of the People's Liberation Army in Shanghai to a global cyber
espionage campaign against nearly 150 companies from 20 economic sectors "designed to steal
large volumes of valuable intellectual property." Mandiant's report garnered widespread press
coverage, prompted angry responses from China, and catalyzed the Obama administration's
release of a new strategy to combat theft of U.S. trade secrets on February 20, 2013.

Lack of Existing Legal Mechanisms to Combat Espionage
The desire to combat economic cyber espionage confronts a lack of international law on
espionage and economic espionage. Although a victim country could assert that spying violates
the principles of sovereignty and non-intervention, state practice has accepted state-sponsored
espionage such that these appeals are not serious claims. Although cyber espionage is sometimes
described as "cyber attacks" and "cyber war", no government regards cyber espionage of any kind
as a prohibited use of force. Other bodies of international law under which espionage issues such
as rules on armed conflict and on diplomatic relations in peacetime arise, do not prohibit or
seriously constrain espionage or economic espionage.
Thus, participation in, and tolerance of, spying indicates that espionage and economic espionage
do not constitute wrongful acts triggering state responsibility under international law. Persons
caught and accused of being spies can be punished, but international law contains protections for
spies captured during armed conflict or covered by diplomatic immunity. For instance, the United
States could not prosecute a Chinese diplomat caught engaging in economic cyber espionage
unless China waived the immunity and, absent a waiver, could only declare the Chinese
         persona non grata, triggering​
national ​                              that person's return to China.
Many countries prohibit economic espionage under national law. However, enforcement
confronts difficulties because the offenses elements include foreign government participation.
Using extradition or mutual legal assistance treaties proves ineffective when the requested state is
accused of sponsoring criminal acts.
Example: The United States adopted the Economic Espionage Act (EEA) in 1996, before the
Internet became a global means of communication to deal with a wide range of issues, including
protection of a company’s valuable intellectual property by prosecuting dishonest competitors
who steal a company’s trade secrets, or it can also be used against a company that finds itself with
trade secrets belonging to a competitor. However, The U.S.-China mutual legal assistance treaty is
unlikely to be helpful to U.S. efforts to apply the EEA to perpetrators of economic cyber espionage
linked to the Chinese government.
Sometimes, ​ in trade and investment agreements, states have used international law to protect
intellectual property rights of private-sector enterprises. The Agreement on Trade-Related Aspects
of Intellectual Property Rights (TRIPS) of the World Trade Organization (WTO) requires each WTO
member to protect certain types of intellectual property rights, including trade secrets, within its
territory. ​
           However, WTO members have, to date, shown no interest in addressing economic
espionage within the WTO despite mounting worries about this practice.
One reason why WTO members have not used the WTO is the difficulty of formulating claims that
economic espionage violates WTO agreements. WTO rules create obligations for WTO members to
fulfil within their territories and do not generally impose duties that apply outside those limits.
WTO members that covertly obtain intellectual property of nationals of other WTO members
operating in their territories could violate WTO obligations to protect such property. However, the
economic espionage of greatest concern and especially acts of remotely conducted economic
cyber espionage involves governments obtaining information from private-sector companies
located outside their territories.
Even if a WTO member could construct a claim that economic cyber espionage violates a WTO
rule, it would have to establish that another WTO member's government is responsible for the
infringing acts. Usually, establishing governmental responsibility for challenged acts is not difficult,
but WTO cases have not involved accusations against government-sponsored espionage. It is not
clear that a WTO member could satisfy this burden by relying on evidence from private-sector
entities (e.g., Mandiant's report) and without revealing counter-intelligence means and methods.
The Obama Administration has therefore devised a new strategy to strengthen the fight against
economic cyber espionage. Under these new domestic laws have been developed to protect U.S.
companies from a cyber attack. ​  The U.S. government will impose counteracting duties if it finds
companies using technologies derived from those stolen from U.S. companies or from their allies,
and will refuse the right of entry for any executive of an organization found to be engaged in trade
espionage, either directly or tangibly enjoying the fruits of stolen U.S. information. The plan also
focuses on stronger implementation through refusal to grant visas to their executives and families
and pursue criminal cases against them, with the support of the INTERPOL. They also focus on
INTERPOL co-operation to blacklist such a company from government contracts or don't even
allow their company's imports into any like-minded nation.

The INTERPOL’s Existing Mechanism against Cyber Crime
The INTERPOL has the following tools and existing mechanisms in place, in order to facilitate
effective cyber crime control and reduce the proliferation of cyber criminals into the global
cyberspace:
The INTERPOL has additionally also adopted a 3-pronged approach to address issues pertaining to
the cyberspace. The key focus areas are as follows:
    ●   Harmonization
    ●   Capacity building
    ●   Operational and forensic support

Harmonization
While effective law enforcement is an essential component to fighting cyber threats, engaging all
stakeholders is also pertinent – from the private sector, academia and public institutions –who are
working towards the common goal of a safer cyberspace.
It is important to harmonize efforts across different sectors in order to share expertise while
avoiding duplication of activities already in progress. In this way, police may efficiently focus their
resources on fighting cybercrime, as the INTERPOL work with other stakeholders to develop a
holistic and coordinated response.
By encouraging the creation of dedicated cybercrime investigation units, and updating legal
frameworks, INTERPOL will build a proactive facilitation role in fighting cybercrime.

The main services of the harmonization include:
    1. National cyber review – a comprehensive audit of national legislation, police infrastructure
       and technical capacity, with accompanying recommendations;
    2. Cyber security strategy development – working with regulatory bodies to develop global
       strategies as well as advising individual countries on their national approach;
    3. International advocacy on cyber legislation and governance – representing the law
       enforcement perspective in the development of new and updated legislation;
    4. Research and innovation – combining police research with similar activities in other
       sectors.

Capacity Building
At INTERPOL, the organisation works to ensure that police keep pace with technological
developments and have the required expertise and skills to deal with evolving digital crime at the
national and international levels.

They provide a range of training courses, targeted to the needs of participants, covering topics
such as emerging trends in cybercrime, investigation techniques, digital forensics and more.
Training takes the form of e-learning modules, classroom-based sessions and workshops and can
lead to professional certification. ‘Train-the-trainer’ courses are particularly valuable as they
enable participants to pass on their new skills and knowledge to their colleagues.

Increasingly, INTERPOL’s cybercrime training portfolio is developed and delivered with input from
academia, computer emergency response teams (CERT), national police and the private sector.

Operational and Forensic
Under this, the INTERPOL largely supports member countries during cyber investigations and help
coordinate joint operations through the following:
    1. Cyber Fusion Centre
This provides essential assistance to INTERPOL’s member countries during all stages of an
investigation. Functioning in a similar manner to INTERPOL’s ​ Command and Coordination Centre​     ,
the Cyber Fusion Centre provides real-time monitoring and analysis of malicious internet activity,
giving member countries the intelligence and expertise required to be more effectively investigate
digital crimes.
    2. Digital Forensics Laboratory
This laboratory works to build national digital forensic capacity through training, while at the same
time providing practical forensic support to member countries during investigation.
    3. Regional coordination
Working Groups have been created to facilitate the development of regional strategies,
technologies and information on the latest crime trends and methods. There are regional working
parties for:
    ● Africa
    ● Americas
    ● Europe and Asia
    ● Middle East and North Africa.
The main activities of the working parties are based around operations, training and finding
solutions to emerging threats.
Questions to Consider

    1. How can governments, IGOs, NGOs and private companies work together in order to
       address cybercrime? What are the main difficulties faced during this process?
    2. How can the existing legal mechanisms in place be made more effective in order to
       address cyber crime, with special emphasis on cyber espionage?
    3. How is it possible to regulate cybercrime without harming the population’s access to the
       network and to information?
4. How can the INTERPOL’s existing constitution be applied in order to address issues related
       to cyber crime and cyber security?
    5. With the rise in cyber terrorism, does the INTERPOL also face the risk of cyber espionage
       or any other cyber attack? Is there a need to devise newer methods to protect the
       information shared amongst all members of the INTERPOL? Are there ways by which the
       INTERPOL can make its existing global network of data sharing more secure?
    6. How can the INTERPOL’s existing mechanism to address issues pertaining to security and
       transfer of data over the internet be strengthened and made more effective for all nations
       and stakeholders?

Note: ​For the benefit of all delegates, ​to keep Interpol as politically neutral as possible,
its ​
    charter​forbids it, at least ​
                                 in theory​
                                          , from undertaking interventions or activities of a political,
military, religious, or racial nature or involving itself in disputes over such matters. Its work focuses
primarily on public safety and battling ​  terrorism​,​
                                                      crimes against humanity​     ,​
                                                                                    environmental
                                 ​
crime​,​genocide​ ,​
                   war crimes​  ,​
                                 organized crime​ ,​
                                                   piracy​, illicit ​
                                                                    traffic​
                                                                           in ​
                                                                              works of art​
                                                                                          ,​
                                                                                           illicit
drug​ production, ​drug trafficking​  ,​
                                       weapons smuggling​   ,​human trafficking​  ,​
                                                                                   money laundering​  ,​
                                                                                                       child
pornography​   ,​
                white-collar crime​  ,​computer crime​,​intellectual property crime​    and ​corruption​
                                                                                                       .​
                                                                                                        The
focus of this committee will be on the actions which can be taken by the Interpol as an
organisation, acting within its mandate, to make crime prevention better in all member states.
Kindly focus on these actions and not the actions which can only be taken by the international law
enforcement agencies or the United Nations and its affiliated bodies. The actions which are not
mandated to be undertaken by the INTERPOL can act as suggestions or guidelines but cannot be
enforced by the council.
You can also read