Abstract

The Internet is changing the world by bringing new ways to communicate to people and supporting open society and economic growth. The decrease in connection costs means accessing the Internet will become cheaper and easier, allowing more people around the world to use it. Increasing our dependency on the digital world brings new opportunities but also new threats. The more we open information and support digital mediums, the less guarded we become against the people and groups aiming to attack our digital intimacy. This openness also has certain effects on the soundness of the digital information of governments. Governments also have started to make effective use of digital technology over the last three decades. Hackers, leakers, international intelligence units and illegal groups target strategic digital networks, Internet sites and the infrastructures of governmental organizations as well as individual and private companies. Governments have started to develop strategies against these cyber-attacks, including legislative measures to protect themselves. Events in cyberspace happen at high speed and answering to these attacks and developing protections immediately are crucial points of cyber security. As the nature of the technology requires high speed development, governments need to adopt dynamic strategies against these attacks. Moreover, the cross-border nature of threats makes it essential to improve international cooperation.

Highlights

  • At the international level, there is no harmonized definition for cyber security[2] and the definition of cyber security varies from country to country[3]

  • There are hybrid models of MLATs; such as the European Union (EU)-United States of America (US) MLAT that applies to the relationship of each EU Member State with the US, and the United Nations (UN) Model Treaty[11] for Mutual Assistance in Criminal Matters (“UN Model Treaty”), which is a multilateral model for bilateral MLATs.[12]

  • US-Turkey, Extradition and Mutual Assistance in Criminal Matters (1979), http://photos.state.gov/libraries/turkey/461177/pdf/32t3111.pdf 11 Article 15 of the UN Model Treaty on Mutual Assistance in Criminal Matters (“UN Model MLAT”), http://www.un.org/documents/ga/res/45/a45r117.htm 12 The main MLAT providing a right to direct interception across borders is the Convention on Mutual Assistance in Criminal Matters between the Member States of the European Union (2000) Art. 20; (Interception of Telecommunications without the technical assistance of Another Member State). http://www.official-documents.gov.uk/document/cm70/7054/7054.pdf

Read more

Summary

Introduction

There is no harmonized definition for cyber security[2] and the definition of cyber security varies from country to country[3]. For the purposes of this article, we define a cyber-security strategy as “long and short term governmental efforts such as policy making, international cooperation and technical support for the actors of cyber space for maintaining to improving security of information infrastructures and services”. Cyber security is an important challenge that requires dynamic and cooperative national and international policies. Such requirements mostly arise from the borderless nature of cyber-attacks. The Anglosphere[6] on the other hand emphasizes a leading private sector role, an educated workforce, outreach and diplomacy for maintaining national cyber security This includes the United States of America (US) which underlines the freedom of information in its cyber security legislation and emphasizes the role of the private sector. Background of Unilateral, Bilateral and Multilateral Approaches on Cyber Security

Background of Unilateral Cyber Security Approaches
Background of Bilateral Cyber Security Approaches
10 Below please find some examples of MLATs
Background of Multilateral Cyber Security Approaches
The European Policy of Cyber Security
National Cyber Security Strategy of the United States
National Cyber Security Strategy of Turkey
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.