republic of namibia - ieee internet init....republic of namibia, ieee etap forum 30 may 2017...
TRANSCRIPT
MINISTRYOFINFORMATIONANDCOMMUNICATIONTECHNOLOGY
REPUBLIC OF NAMIBIA
MsElizabethUjaruraKamutuezuDeputyDirector:MinistryofICT
RepublicofNamibia,
IEEEETAPForum
30May2017
InternetGovernanceandCybersecurityinNamibia
Background
§ NamibiabecameIndependentonthe21stMarch1990fromSouthAfricancolonialregime.
§ Thecountrytotalspaceis824,000sqkmandWindhoekisthecapitalcity.
§ Thetotalpopulationis2.1millionwhilefemalepopulationis50.7%andmajorityofthepopulationresidesinruralareas.
§ NamibiaissharingborderswithSouthAfrica,Angola,Zambia,BotswanaandZimbabwe.
§ NamibiahaseleventribesandEnglishistheofficiallanguagewhileAfrikaansisalsospokenbymajority.
Introduction It is evident that Internet is most connected and least protectedand the expansion of cyberspace becomes salience feature of ourdaily life. Namibia enjoys over 100% mobile phone penetration;about 72.12% access to internet and 53% population has access tobroadband. Cybersecurity plays a pivotal role in the continuingdevelopment of information technology and Internet services. Inorder to safeguard Namibia’s security and economic wellbeing, itis vital that the Country enhance cyber security and to protectinformation infrastructure and equally important is ensuring thatthe Internet is safe and that the growing numbers of Internetusers are protected. This call for government intervention todevelop appropriate legal responses as a result the Namibiangovernment has drafted Electronic Transaction and CybercrimeBill to address problems pertaining to safety and security of digitalcommunications of any mode.
Namibia ICT Legal framework
NamibiahasasoundICTlegalframeworkthatfacilitateinvestmentintheICTsector.Afterindependencesince1990,NamibiadevelopedaseriesoflawsandpoliciesthataimedatpromotingICTinNamibiaandtheseare:1. NamibianCommunicationsAct,20092. OverarchingICTPolicy,20093. TelecommunicationsPolicy,4. BroadcastingAct19905. PostalPolicyandNewLicensingFramework6. UniversalAccessPolicy7. DigitalTerrestrialTelevisionPolicyGuidelines
Namibia ICT at Glance § West Africa Cable System (WACS) connectivity in 2011 and in 2012 Telecom Namibia (100%
state owned company) inaugurated the West Africa Cable System (WACS) submarine cablethat links 14 countries (International);
§ 143 Post Offices countrywide;§ Telecom Namibia has laid about 7755 Km fiber optic cable across the country;§ The Ministry of ICT has established 26 Multi-Sectoral Community Centres (MSCC) across
the country;§ There are 342 FM radio transmitters, 57 TV transmitters and 36 studios;§ Telecom Namibia has established 193 base stations / PoPs for Broadband coverage§ MTC has established 661 active base stations / PoPs for Voice and Data connections, of which
221 are providing broadband (>1mbps) data services;§ Direct Marine Cable Connectivity: SAT-3; WACS; SEACOM; 4 International PoPs;§ National Backbone Network: 100% Digital; 9,025 km fibre; 295 PoPs; 228 Digital
Destinations; 178 Towers;§ The are four Telecoms Operators: GSM-Based; 2 x Mobile, 2 x Fixed§ There are six Internet Service Providers ;§ The National IXP was commissioned in 2014;§ Broadband Access: 3G and 4G/ LTE networks ;§ Access and Penetration: 7% fixed line; +120% mobile and 13% Internet;§ On the 17 June , 2015 The Namibia Broadcasting Corporation NBC (parastatal) has migrated
from Analogue Television Broadcasting to Digital Terrestrial Television (DTT) broadcastingDTT Migration: +70% DTT population coverage
IGF Objectives q Serves as a forum for multistakeholders policy dialogue to
discuss public policy issues related to key elements of Internetgovernance
q Discuss public policy issues related to key elements of Internetgovernance in order to foster the sustainability, robustness,security, stability and development of the Internet
q Support international and regional coordination andcollaboration
q Discuss, inter alia, issues relating to critical Internet resources;q Help to find solutions to the issues arising from the use and
misuse of the Internet, of particular concern to everydayusers.
IGF Benefits
qFree flow of ideas, knowledge and information over theinternet-It allows participants to discuss freely, tovoice their opinions, to think aloud, to think out of the box.qResolve issues related to security of user or networkqEstablish standards of exchange of information to avoidpiracyqDeveloping methods to keep personal and confidentialdata secrecyqExplore methods and policies for better internetperformance and governance
Stakeholders
NIGF
GRN
PrivateSector
DomainName
Regulator
CivilSociety
SeverOperatorsNGOs
ServerOperators
Consumers
Academics
ISP
AnyonewhohasastakeinthefutureoftheInternet
WorkingCommittee
qMulti-Stakeholder Coordinating TeamqDisseminate all relevant information pertaining toNamIGF to all relevant stakeholders through theNamIGF website and emailing list
q Collaborate with partners to mobilise resources tosupport the Nam IGF programme
qOrganise NamIGF every year
DefiningCyberCrime
CyberCrime- anycriminalactdealingwithcomputersandnetworks,wherethecomputerisatool,target,orboth
TypesofOffencesq Offences against confidentiality, integrity and availability of computer Data
and Systems• Illegal access (hacking) – unlawful access to a computer system.• Illegal data acquisition (data espionage) – internet used to obtain trade
secrets/personal information such as bank account or credit card numbers.• Illegal Interception: offenders can intercept communications between users
to record information exchanged.• Data interference: users depend on the availability of data and interference
can result in financial losses.q Content related offences• This category covers content that is considered illegal such as child
pornography and xenophobic material, libel and false information, spam,copyright and related offences, trademark related offences etc.
TypesofOffencesqComputer related offences• Computer-related Fraud: it enables the offender to use automation and software tools
to mask criminals identities.
• Computer related forgery: refers to the manipulation of digital documents e.g. Alteringtext documents.
• Phishing: acts that are carried out to make victims disclose personal information.
• identity theft: criminal act of fraudulently obtaining and using another persons identity.
• misuse of devices: specially designed software tools used to attack other computers.
qCombination offencesThis category covers various terms used to describe complex scams thatcombine a number of different offences. For example: phishing and cyberlaundering.
DriversofCybercrimeqWeaktechnology
qVulnerable/unauthorisedsoftware
qLimitedaccountability
qInconsistentandincompletelegislation/regulations
qDifficultytrackingandprosecutingcriminals
qLimitedjurisdiction
qUninformed,misguidedandmalicioususers- weakpasswords,divulgingpasswords,openingunknownemails
WhoareCyberCriminals?qHackersqMalicious insidersqIndustrial espionageqBored, disgruntled, or overburdened employeesqNaïve/uninformed computer usersqOrganized crimeqTerroristsqPaedophiles and molestersqPetty criminalsqForeign governments
Achievements
q EstablishedNIGFWorkingCommitteeq NIGFwillbehostedinOctober2017q InprocessofEstablishingCIRTq ElectronicTransactionandcybercrimeBill
underpublicconsultation
Challenges
q TheIGFisnotadecision-makingbodyq Cybercrimeisborderlessq ThecommonchallengesareLackofalegal
andregulatoryframeworktoensurecybersecurity
q Thereislackofinformation,statisticsandrecordsofcybercrimecommittedinNamibiaduetoabsenceoflaws,lackofcapacityandgeneralawarenessofcybercrime.
Challenges
q Lackofpublicprivateinstitutionalcollaboration
q LowtechnicalcapacityandhumancapacityITskills.Systemspoorlydesignedandpoorlymanaged
q Socialnetworkingisontheriseandincreasinglycybercrimesareperpetratedthroughthesocialnetworks(Facebook,twitteretc.)
What can be done
q PublicAdvocacy/Awarenessq Conducivelegalenvironmentq InstitutionalCapacityBuildingq Harmonisationoflaws(Nationaland
International
ConclusionqThegovernmentneedstoworkcloselywiththecorporateentities;privatesectortoensuretheeffectiveimplementationcybersecuritystrategylawsonceisenacted.
qTheprivatesectorisakeystakeholdertocombatcybercrime,sincetheysupplymostoftherelevanttechnology,operatesmostofthesystemsandnetworks.Theprivateoperatorsarealsovictimsofcybercrimeandsomeattackscanleadtomassivefinanciallossthatwillnegativelyaffecttheeconomy.
qBalancingSecurityvsPrivacy
Thank You