Preventing cyber-terrorism demands an effective international legal infrastructure and strong national and cross-border law enforcement mechanisms. To build the infrastructure, countries must be able and willing to negotiate viable settlements. Yet, as criminal and terrorist organizations adeptly operate across borders, governments flounder in their attempts at cross-border collaboration. The problem deepens when they do not share borders. Worse yet, developing countries are often left out of these negotiations altogether.
As governments grow more determined to fight cyber-crime and cyber-terrorism, new issues arise. Governments and citizens struggle to distinguish between legitimate anti-terrorism efforts and illegitimate invasion of privacy. Take international terrorist lists of US government agencies and Interpol, for example. Some consider them essential, while others question their fairness and accuracy. Long-standing suspicion and mistrust also hobbles collaboration between key players in cyber-security: developing countries and industrialized countries, businesses and civil society. Key questions: 1) How can international and regional organizations build effective international legal frameworks that address cyber-crime and cyber-terrorism? What role should civil society play? 2) How can we ensure that developing countries participate equitably in creating international legal frameworks? 3) Are there developing countries with model legal frameworks that foster global collaboration to thwart cyber-crime and cyber-terrorism? 4) What dangers arise in creating an international legal infrastructure to prevent cyber-crime and cyber-terrorism? What checks and balances are needed? 5) What is needed to build trust and collaboration between the private sector and civil society? Are there concrete examples of "success stories"? 6) What tools and techniques are effective and appropriate for developing countries, e.g., collective knowledge management linked to security measures? 7) What consequences do developing countries face if they -- or donor organizations -- ignore the threat of cyber-crime and cyber-terrorism? ------------ This DOT-COM Discussion is funded by the dot-ORG USAID Cooperative Agreement, and hosted by GKD. http://www.dot-com-alliance.org provides more information. To post a message, send it to: <[EMAIL PROTECTED]> To subscribe or unsubscribe, send a message to: <[EMAIL PROTECTED]>. In the 1st line of the message type: subscribe gkd OR type: unsubscribe gkd For the GKD database, with past messages: http://www.GKDknowledge.org