Internet Safety


Published on

Presentation by Edmon Chung of IT Voice on Internet Safety
Seminar on 2009.03.28

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Internet Safety

  1. 1. Internet Safety An International Perspective Edmon Chung
  2. 2. 2 Aspects of Internet Safety <ul><li>Information Security </li></ul><ul><ul><li>Computer Virus, Phishing, Cyber crime, etc. </li></ul></ul><ul><ul><li>Privacy, Identity theft, Cyber bullying, etc. </li></ul></ul><ul><li>Content </li></ul><ul><ul><li>Obscene and Indecent Content, etc. </li></ul></ul><ul><ul><li>False information, rumor milling, etc. </li></ul></ul>
  3. 3. Internet Governance <ul><li>Broad Term: </li></ul><ul><ul><li>coordination of technical standards </li></ul></ul><ul><ul><li>operation of critical infrastructure </li></ul></ul><ul><ul><li>ICT development / digital divide (inclusion) </li></ul></ul><ul><ul><li>regulation, and legislation </li></ul></ul><ul><ul><li>And others </li></ul></ul><ul><li>Internet governance is not restricted to the activities of governments. </li></ul>
  4. 4. Internet Governance (United Nations) <ul><li>UN Millennium Declaration (and Development Goals) </li></ul><ul><li>World Summit on the Information Society (WSIS) </li></ul><ul><ul><li>Geneva 2003 and Tunis 2005 </li></ul></ul><ul><ul><li>Geneva Declaration of Principles </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><ul><li>Geneva Plan of Action </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><ul><li>Tunis Commitment </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><ul><li>Tunis Agenda for the Information Society </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><li>Internet Governance Forum (IGF) </li></ul><ul><li>Multi-Stakeholder Approach </li></ul><ul><ul><li>Tripartite: Government, Industry and Civil Society </li></ul></ul>
  5. 5. World Summit (WSIS) <ul><li>Building confidence and security in the use of ICTs </li></ul><ul><ul><li>Strengthening the trust framework, including information security and network security, authentication, privacy and consumer protection, is a prerequisite for the development of the Information Society and for building confidence among users of ICTs. </li></ul></ul><ul><ul><li>It is necessary to prevent the use of information resources and technologies for criminal and terrorist purposes, while respecting human rights. </li></ul></ul><ul><ul><li>Spam and cyber-security should be dealt with at appropriate national and international levels. </li></ul></ul>
  6. 6. Confidence, Security & Stability
  7. 7. Perception is Reality
  8. 8. Cyber Criminals <ul><li>Criminals are investing in infrastructure </li></ul><ul><ul><li>They are building scalability </li></ul></ul><ul><ul><li>They are increasing security </li></ul></ul><ul><li>Distributed systems </li></ul><ul><li>Strong measurements </li></ul><ul><li>Good monitoring </li></ul><ul><li>Robust data collection </li></ul>
  9. 9. Distributed Infrastructure <ul><li>Global spam infrastructure </li></ul><ul><li>Spam Hosting Servers </li></ul>
  10. 10. Economies of Scale <ul><li>40% of scams were hosted on the same infrastructure as spam </li></ul>
  11. 11. High Speed & High Performance <ul><li>Spam and phishing sites </li></ul><ul><ul><li>come up within minutes </li></ul></ul><ul><ul><li>and go down within days </li></ul></ul><ul><li>Avg. time online for phishing site: 3.8 days </li></ul><ul><li>Max. time online for phishing site: 30 days </li></ul>
  12. 12. Phishing vs. Crime Ware Sites
  13. 13. The ROI on Phishing <ul><li>The average Revenue per user (RPU) </li></ul><ul><ul><li>2005: $257 </li></ul></ul><ul><ul><li>2006: $1,244 </li></ul></ul><ul><ul><li>380% increase in revenue </li></ul></ul><ul><li>Global Phishing Revenues </li></ul><ul><ul><li>~$2.8 billion in 2006 (Gartner) </li></ul></ul><ul><ul><li>~$3.2 billion in 2007 (Gartner) </li></ul></ul><ul><ul><li>~$61 million per year (Microsoft) </li></ul></ul><ul><li>Strong business model combined with first-mover technology resulted in largest group making at least $150 million in 2006 </li></ul>
  14. 14. Perception is Reality
  15. 15. Internet Safety (overdrive) <ul><li>Obscene & Indecent content </li></ul><ul><li>False information </li></ul><ul><li>Rumor milling </li></ul><ul><li>Flaming </li></ul><ul><li>Protecting Children </li></ul>
  16. 16. Recent Wave of Legislative Activities <ul><li>2008.09.29 – UK Council for Child Internet Safety (UKCCIS) established </li></ul><ul><li>2009.02.19 – US Internet Safety Act: ISPs, Wi-Fi to keep logs for police </li></ul><ul><li>2009.03.24 – Bill in Maryland to allow ISPs to charge fee for households that opt to use parental control features. </li></ul><ul><li>2009.03.13 – Illinois schools grades 3-12 (=P3-F6) required to develop Internet safety curriculum </li></ul><ul><li>2009.03.16 – New Jersey passed package of bills targeting online sexual harassment and related electronic crimes. </li></ul>
  17. 17. ICANN (Domain Names) <ul><li>ICANN </li></ul><ul><ul><li>Internet Corporation for Assigned Names & Numbers </li></ul></ul><ul><ul><li>International body on Domain Name system (DNS) </li></ul></ul><ul><ul><li>Overseeing governance of DNS </li></ul></ul><ul><li>Cyber Security Constituency (Recently Proposed) </li></ul><ul><ul><li>as Internet policies are developed at ICANN, the interests of families, children, consumers, victims of cybercrime, religions and cultures become better represented. For the new technology society, we need carefully to craft mechanisms involving law and industry that balance unfettered free speech and anonymity with some protections against exploitation of the most vulnerable, the ability to address and reduce criminal activity, and . . . the right of Internet users to have choices in the nature of their access. </li></ul></ul>
  18. 18. European Court of Human Rights <ul><li>Freedom of expression constitutes one of the essential foundations of [a democratic] society, one of the basic conditions for its progress and for the development of every man.... [I]t is applicable not only to ‘information’ or ‘ideas’ that are favourably received or regarded as inoffensive or as a matter of indifference, but also to those which offend, shock or disturb the State or any other sector of the population. Such are the demands of pluralism, tolerance and broadmindedness without which there is no ‘democratic society’.(10) </li></ul>
  19. 19. 3 Waves of Obscenity Obsession <ul><li>The printing press </li></ul><ul><li>Movies and video </li></ul><ul><li>The Internet </li></ul><ul><li>I t was often difficult to draw a sharp distinction between the suppression of published materials for moral reasons and for reasons of political control or repression </li></ul><ul><ul><li>Encyclop æ dia Britannica </li></ul></ul>
  20. 20. Moral Ethics OR Political Repression?
  21. 21. How bad is the Internet?
  22. 22. Internet Threat to Minors Overblown <ul><li>&quot;The risks minors face online are complex and multifaceted and are in most cases not significantly different than those they face offline, and ... as they get older, minors themselves contribute to some of the problems&quot; </li></ul><ul><li>The biggest threats to children's safety online may come from other children, and that their own behavior could contribute to the trouble they encounter. </li></ul><ul><li>&quot;Minors are not equally at risk online,&quot; the report said. &quot;Those who are most at risk often engage in risky behaviors and have difficulties in other parts of their lives.&quot; </li></ul>
  23. 23. Internet Safety Act Would Make Us Less Safe (ABC News) <ul><li>US Internet Safety Act (Proposed) </li></ul><ul><ul><li>ISPs and Wifi providers to be required to store information about your online activities for at least 2 years to enable law enforcement to use legal process to identify and track you down </li></ul></ul><ul><li>That stockpile [of data] would be a goldmine for exploitation </li></ul><ul><li>Private Parties, Marketers Could Clamor for Access </li></ul><ul><li>Dangerous Global precedence for repressive regimes </li></ul><ul><li>Enforcing the Laws Already on the Books is sufficient </li></ul><ul><li>What’s next? </li></ul><ul><li>We must not let an emotional issue potentially jeopardize the liberties of the citizenry and the privacy of their electronic communications. </li></ul>
  24. 24. Creative & Knowledge Economy <ul><li>Richard Florida 3Ts: </li></ul><ul><ul><li>Talent </li></ul></ul><ul><ul><li>Technology </li></ul></ul><ul><ul><li>Tolerance </li></ul></ul><ul><li>Canadian Law: </li></ul><ul><ul><li>&quot;it is a standard of tolerance, not taste … not what Canadians think is right for themselves to see [but] what the community would [not] tolerate others being exposed to on the basis of the degree of harm that may flow from such exposure.” </li></ul></ul>
  25. 25. Vint Cerf (Father of the Internet): Truth and the Internet <ul><li>The Internet… exposes truth to those who wish to see it. [But some] fear the Internet and its ability to make the truth known. </li></ul><ul><li>… the power of the Internet is like a two-edged sword. It can also deliver misinformation and uncorroborated opinion with equal ease. The thoughtful and the thoughtless co-exist side by side in the Internet's electronic universe… </li></ul><ul><li>There are no electronic filters that separate truth from fiction... We have but one tool to apply: critical thinking... We truly must think about what we see and hear. We must evaluate and select. We must choose our guides. What better lesson than this to teach our young children to prepare them for a new century of social, economic and technological change? </li></ul><ul><li>Let us make a new Century resolution to teach our children to think more deeply about what they see and hear. That, more than any electronic filter, will build a foundation upon which truth can stand. </li></ul>
  26. 26. THANK YOU <ul><li>Edmon Chung [email_address] </li></ul>