ࡱ> :<9qw'bjbjt+t+8@AAm# ]82< zd f f f f f f $  ~  &(d d :>:. ,d nP4Z PRESS RELEASE (May 24th 2001) G8 Officials and the Private Sector Meet to Discuss Combating Computer Crime G8 Government/Private Sector High-level Meeting on High-tech Crime Tokyo - Senior representatives of the governments and the private sector from all G8 countries, and the European Commission, met here this week to continue discussions on combating high-tech crime and the criminal exploitation of the Internet by exploring possible solutions that enhance the public interest, including the protection of public safety, privacy and other social values and the encouragement of the growth of the information society and e-commerce. The G8 Government/Private Sector High level Meeting on High-tech Crime was held from 22 to 24 May and was sponsored by the G8's Senior Experts Group on Transnational Organized Crime, known as the Lyon Group. 1. Information and communication technology (IT) is one of the most potent forces shaping the Twenty First century. The economic, social and cultural transformation we are witnessing promises to be profound. However, constant advancement of IT also provides criminals with opportunities to abuse such new technologies. High-tech crime can be committed through several telecommunications/computer networks in different countries in an instant, and directly affects private individuals as well as companies and countries around the world. It poses a serious global threat. International cooperation is indispensable in effectively combating high-tech crime. The G8 has been addressing this daunting challenge within the framework of the Lyon Group. Cooperation among governments alone is not sufficient. The partnership between governments and the private sector is critical and has been emphasized by G8 Heads of State and Government since their Summit in Birmingham in 1998. It is against this background that the Lyon Group convened the first conference of G8 government and private sector representatives in May 2000 in Paris. At the Paris Conference, G8 government officials engaged in a dialogue with representatives from 130 major companies associated with communications and new technologies. Delegates discussed the ways in which criminal use of new technologies threatens the security of communication and computer systems, and explored possible solutions. At the Kyushu-Okinawa Summit in July 2000, G8 Heads of State and Government welcomed the results and the momentum created by the Paris Conference and stressed the need to promote dialogue with the private sector. The Lyon Group thus convened the Berlin Meeting in October 2000 to advance the dialogue. The majority of the work in Berlin was undertaken in workshops, and emphasis was placed on reducing impediments to cooperation between governments and private sector and developing practical solutions to prevent, detect and investigate high-tech crime. 2. This week's Tokyo Conference was convened to further promote dialogue with the private sector, following the commitment of the Heads of G8 State and Government at the Kyushu-Okinawa Summit, with a view to producing substantive results. To achieve this, senior representatives of the governments and the private sector from all G8 countries (about 200 participants) met in small project groups to exchange views and opinions on the key topics and met in plenary to explore cross-cutting issues and future cooperation between governments and the private sector. Continuing the workshop discussions started in Berlin and capitalizing on the work done both at the national and international levels, five project groups examined the issues of i) data retention, ii) data preservation, iii) threat assessment and prevention iv) protection of e-commerce and user authentication and v) training: Data Retention The following issues were discussed or examined: Discussion of costs and priorities in terms of resources and business opportunity; Examination of the variety of services, business models and service providers currently in existence; Discussion of practices for data retention taking into consideration legal technical, financial and privacy issues. Data Preservation The following documents were created and issues discussed: Development of a checklist for law enforcement to use when making requests for preservation of data; Development of a list of issues to be considered in a legal framework for data preservation; Discussion of conflicts of laws and jurisdictional issues that can hinder provider cooperation with a preservation request; Development of best practices for law enforcement and industry concerning data preservation. Threat assessment and prevention The following recommendations were made: Prevention of computer-assisted crimes and computer network attacks requires close cooperation between private and public sectors; Prevention of content related threats can be handled only at end-user level, due to technical and legal reasons; Governments have to be involved more in raising awareness of all users in Information Technology security; Common practices in the G8 and non-G8 countries too, should be identified, and domestic taxonomies of threats be interoperable; Countries should establish mechanisms to aggregate statistics and bring out an accurate picture of high-tech crimes and their impact on the different areas of society. Protection of E-commerce and user authentication The following areas were discussed and led to recommendations: Data/Network Security Policy; Initiative on elements of Model Data/Network Security Policy; Initiative on Guides to Safer E-Commerce; Common G8 E-Commerce Website; Mutual recognition of certification; Information sharing; Future discussions. Training The following documents were produced: A training strategy schematic; A logic model for training and awareness; An Industry strategy schematic; A Government /Industry Cooperation template; A skills set and audience template. All the groups engaged in free, frank and practical discussions with active involvement of participants both from the government and private sector. Capitalizing on the work done at the Paris Conference and the Berlin Meeting, the groups sought practical solutions and concrete results. Some of the products of their discussions are attached, and, moreover, the dialogue itself proved valuable. 3. After the project group sessions, all the participants met in plenary. The participants discussed the areas taken up in the project groups from a wider perspective, and also explored broader issues, including, inter alia, future cooperation among the relevant actors, public awareness and outreach to non-G8 countries. While binding commitments or development of any formal agreement or agreements was not sought, all parties recognized the value of this dialogue and the need for it to continue in appropriate fora. 4. The government delegates attending the Workshop, after consultation with private sector representatives, shared the following views: While IT offers unprecedented opportunities for accessing, sharing and exchanging information and for economic development, its abuse is a source of increasing concern for the international community. The more IT becomes an essential foundation of the global society, the more crucial it will become to ensure safety and confidence in cyberspace. Lack of confidence therein may well endanger the very foundation of the IT-driven society. In this sense, governments, the private sector, and individual users all share a joint interest in the fight against high-tech crime. Moreover, protection of IT can in certain respects enhance the privacy and security of individuals. In order to secure safety and confidence in cyberspace, it is necessary that threats are identified and prevented and law enforcements ability to locate and identify high-tech criminals is maintained, while respecting privacy, sound development of industry, and other social values. Solutions to these challenges call for further development and cooperation between government and the private sector. Improvement in education and training opportunities dealing with high-tech crime issues is critical for both public and private sector parties. The Tokyo Conference represents another significant step in the deepening dialogue between G8 governments and private sector representatives in these areas. We seek, at the turn of century, the promotion of the prosperity, opportunity, and civil rights of our citizens in cyberspace. The results of the Conference reaffirmed the need to strengthen further the cooperative relationship between government and the private sector, and to improve international cooperation worldwide, in order to combat high-tech crime. The outcome of this Conference is expected to enhance discussions among the G8 Heads of State and Government who will meet in Genoa, Italy in July 2001. [ end ] klmn24ei67      D H 9 = Z f ;BNRV]ln5h{~Vanp/=BFnHo(nH5>* 5H*nHo( 5nHo(5ZlnY_ C D 5 9 kv ) p@ P ! ,p@ P ! ,p@ P !7 ,p@ P !$lnY_ C D 5 9 kvkl #T 6lm:>?pǾxr      i      T      H      d      =          X   ,vkl #T  & F & F ) p@ P ! ,p@ P !W ,Wp@ P !W ,Wp@ P ! ?@C"#ST  $Xa9:*-=>?op  45RSwx:;gh)*ovo( 56nH 56o(56 56nHo(nHnHo(X6lm:rmmm & F ) hp@ P ! & F ) hp@ P ! & F ,Wp@ P ! ) Wp@ P ! & F ) Wp@ P ! >?p 5Sx ) hp@ P ! & F ) hp@ P ! ) hp@ P ! & Fp 5Sx;h"%*vwFG""$$%%&&b'c'm'u'v'w'ɾtrr               -      r          2   P(;h"%*veW ,Wp@ P !W ,Wp@ P ! & F] ) hp@ P !EƀU *,/3*.tv|1@DFILP 8!9!!!"6":"b"o"""""" # # ##$$$&$($N$~$$$M%N%O%t%%%%u&v&w&&&&&'6'L'S'l'p'r't'v'w'CJ7cHdhUgHnHo(56 5nHo(5nHnHo(OvwFG""$$%%&&b'c'm'n'o'p'd$$ ) p@ P !W ,Wp@ P !W ,Wp@ P !p'q'r's't'u'v'w'$ ) p@ P !d6 001F2PP/ =!"#S$%S [@@@ Standard1$CJ_HhmH sH tH BA@B Absatz-Standardschriftart.&@. Funotenzeichen44 KopfzeileG$ 8!2 2 FuzeileG$ 8!zC@"z Textkrper-Einzug9 ,hp@ P !h^h 56\]w# @ w'vvp'w'pw'UnknownBMWiJ1 l#m#u#x#\ i d#i#l#m#u#x#33J1A:\Draft23rdnighrev,.docJ1 A:\Final.docJ1 A:\Final.docJ1 A:\Final.docYRw A:\Final.docJ1 A:\Final.docJ1 A:\Final.docJ1C:\WINDOWS\}xo\Final.docJ1C:\WINDOWS\}xo\Final.docBMWiU\\FileSRV01\VIB3$\Soquat\TEXTE\G8-Gruppe Lyon\Tokio Mai 2001\press release- Final.docMJ!ڷ>}Xڷh 88^8`OJQJo(h ^`OJQJo(oh   ^ `OJQJo(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(h 0^`0OJQJo(h ^`OJQJo(oh   ^ `OJQJo(h   ^ `OJQJo(h xx^x`OJQJo(oh HH^H`OJQJo(h ^`OJQJo(h ^`OJQJo(oh ^`OJQJo(MJ!>}X@-w#@GTimes New Roman5Symbol3& ArialG h-3 fgMS Mincho?5 Courier New;Wingdings"A hUUU6>$ Qx2d#DRAFT PRESS RELEASEMichael A. SussmannBMWiOh+'0p  , 8 DPX`hDRAFT PRESS RELEASERAFMichael A. Sussmannich normal.dotSBMWil.d2WiMicrosoft Word 8.0@!9@j@j6՜.+,D՜.+,X hp  U.S. Department of Justice>#1 DRAFT PRESS RELEASE Titel 6> _PID_GUIDAN{63C8848E-559B-11D5-88E6-00204840ABC6}  "#$%&'(*+,-./02345678;Root Entry F/׭11=1Table!WordDocument8@SummaryInformation()DocumentSummaryInformation8\\FileSRV01\1$CompObjjObjectPool1111  FMicrosoft Word-Dokument MSWordDocWord.Document.89q