Commonwealth Secretariat, Rule of Law Division response to Consultation on Proposal for a Cyber Resilience Strategy for Scotland INTRODUCTION The Rule of Law Division of the Commonwealth Secretariat (the ‘Secretariat’) welcomes the opportunity to respond to the Proposal for a Cyber Resilience Strategy for Scotland (the ‘Consultation Paper’). Since 2011 the Secretariat has been working in furtherance of a mandate from Commonwealth Heads of Government to develop responses to cybercrime across Commonwealth jurisdictions for the purposes of “improving legislation and capacity in tackling cybercrime and other cyber space security threats”.1 At their most recent meeting in 2013 Heads reaffirmed this mandate. This work is rooted in the resolution of the 2011 meeting of Commonwealth Law Ministers, attended by the Lord Advocate, to “recognise the significant threat cybercrime poses to national security and law enforcement in all countries of the Commonwealth”. This provides the basis for the Rule of Law Division’s ongoing programme of works in relation to cybercrime. BASIS FOR SUBMISSION Under the UK’s devolved constitution, the agencies responsible for law enforcement and criminal justice within Scotland play a key role in facilitating international cooperation. For example, the Crown Office is designated Central Authority for receiving, acceding to and ensuring the execution of Mutual Legal Assistance (‘MLA’) requests within the Scottish jurisdiction.2 This is a critical component for effectively combating cybercrime and it is in recognition of this role that the Rule of Law Division makes this submission. The Rule of Law division has undertaken some significant activities in relation to the development of cyber security strategies for Commonwealth member states. As such considerable expertise in the development of effective strategies has been accrued. UNDERLYING OBSERVATIONS In addition to making specific points pertaining to the role of Scottish agencies and authorities in a law enforcement context, certain limited observations are also made regarding other aspects of the Consultation Paper. These are aimed ensuring that the 1 Commonwealth Heads of Government Meeting Communique 2011 at 7(i) Requests for Mutual Legal Assistance in Criminal Matters Guidelines for Authorities Outside of the United Kingdom – 12th Edition at 4, available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/415038/MLA_Guideline s_2015.pdf 2 1 proposed strategy is grounded in a clear and firm relationship with two other publications. These are the: UK Cyber Security Strategy Protecting and promoting the UK in a digital world (the ‘UK Cyber Security Strategy’); and Commonwealth approach for developing National Cybersecurity Strategies (the ‘Commonwealth Approach’) The combating of cybercrime takes place in a resource constrained environment. As such a critical aspect of the emphasis placed on the development of counter-cybercrime capacity by Commonwealth Heads of Government has be the avoidance of duplication. It is critical that there is clarity on the linkages between the proposed strategy and the pre-existing UK strategy. This is particularly pronounced where the stakeholders will be embraced by both strategies. Further it is of critical importance that due deference is paid to existing international commitments made by the UK government at the international level but being actioned through the proposed strategy. In particular this would include the explicit recognition of the values contained within the Commonwealth Charter, and specifically applied to a cyber context by the Commonwealth Cybergovernance Principles3. Assistance in developing a strategy in furtherance of these Principles is provided by the Commonwealth Approach. This was developed by the Secretariat’s sister organisation the Commonwealth Telecommunications Organisation (‘CTO’). While it is aimed at Commonwealth member states, it provides effective guidance on the development of cyber security strategies generally. 3 As adopted by Commonwealth ICT Ministers at their meeting in March 2014 2 RESPONSE TO CONSULTATION QUESTIONS National leadership; Shared responsibilities; Working together; Protecting Scotland’s values Q1 Yes Are the guiding principles right for this strategy? No Are there any other principles that should be considered when continuing to develop the strategy? Broadly these guiding principles appear appropriate. In relation to guiding principle 4 (Protecting Scotland’s values), it is entirely appropriate to make reference to Scottish values, however, there should also be reference to pre-existing commitments the UK has made in relation to internet governance, human rights and the rule of law4. In particular reference should be made to the Commonwealth Charter and Cybergovernance Principles. Consideration should also be given to whether or not the section should outline further principles for the strategy’s design and delivery. It may be useful to have regard to the Commonwealth Approach. Our vision is for a cyber resilient Scotland that is safe, secure and prosperous Q2 Yes Do you agree with the vision? No This is a powerful aid in communicating the strategy, describing the end-state of the activities called for by the strategy. Strategic Outcomes: 1. Our citizens are informed, empowered, safe and confident in using online technologies The UK Cyber Security Strategy Protecting and promoting the UK in a digital world (November 2011) at 2.16 4 3 2. Our businesses are resilient and can trade and prosper securely online 3. We all have confidence in the resilience of our digital public services Q3 Yes Do you agree with the strategic outcomes? No Are there additional outcomes that should be considered? There should be a clearer linkage as to how these outcomes relate to and support the broader UK National Strategy. This is critical to ensuring (i) the prevention of duplication and (ii) reducing conflict. While reference is made to this relationship on page 10 of the Consultation Paper it is not explicit that this will be recognised in the proposed strategy. Additionally, the UK Strategy makes express reference to upholding the Rule of Law within cyber space5. Consideration should be given to how the Scottish strategy supports this aim. Key Objectives: 1. Provide effective leadership and promote collaboration 2. Raise awareness and ensure effective communication 3. Develop education and skills in cyber resilience 4. Strengthen research and innovation Q4 Yes Do you think these are the right objectives to focus on? No Are there additional key objectives that should be considered? Consideration should be given to whether or not a specific Key Objective relating to international partnerships should be included. There are two modes by which Scottish authorities could participate in international efforts to combat cybercrimeparticularly cross-border investigations. These are through formal requests and through informal networks. As noted previously, the Crown Office (specifically the International Co-operation Unit) is a UK central authority for the purposes of MLA requests, there should be recognition of the role as a partner in cross-border investigations of cybercrime involving the Scottish jurisdiction. 5 The UK Cyber Security Strategy Protecting and promoting the UK in a digital world (November 2011) at 2.16 4 In addition to formal modes of international cooperation, the UK is a participant in a number of informal international partnership networks Commonwealth Network of Contact Persons, Council of Europe Budapest Convention’s Article 35 24/7 Network, G8 24/7 Hi-tech Crime Network, Interpol 24/7 which can assist in combating cybercrime. Through these networks requests could be transmitted to or from Scottish law enforcement and Prosecutorial authorities for participation in cross-border investigation. The key importance of such mechanisms to law enforcement in Scotland was demonstrated by the action of the National Crime Agency in effecting arrests in Scotland tied to the international investigation of the Darkode dark marketplace- Operation Shrouded Horizon. These opportunities for international partnership should be recognised and encapsulated within the proposed strategy. However, it is critical that the linkages between the UK Cyber Security Strategy- and the roles played by Scottish agencies within that context- are clearly delineated and understood. So too must be relationships with organisations such as the National Crime Agency and the Interpol Bureau in Manchester who may well act as a conduit for requests for cooperation to Scottish authorities. Objective 1: Provide effective leadership and promote collaboration Main areas of focus: The Scottish Government to set up and lead a national strategic implementation group to implement, monitor and evaluate the impact of this strategy The Scottish Government to be at the forefront of providing safe and secure services, and sharing their knowledge with other organisations Collaborating with partners, the Scottish Government will lead and coordinate efforts to develop national cyber resilience Ministers and their officials continue to raise the profile of the importance of cyber resilience across a range of policy areas Ministers report on the Government’s progress in building a culture of cyber resilience and good practice across the Scottish Government and its agencies The standards of cyber resilience adopted by the Scottish Government’s online services – and those of other public agencies - will be available to service users. Q5 Do you agree with the main areas of focus for effective leadership and collaboration? Yes No Are there other areas that should be considered? It is appropriate that the Scottish Government should adopt standards of cyber 5 resilience for online services, however, the Scottish Government should not seek to develop its own standards where possible. To do so increases costs and risks. Instead internationally recognised standards such as ISO-27000 series, augmented by more detailed controls, such as the Information Security Forum’s Standard of Good Practice, should be employed. Objective 2: Raise awareness and ensure effective communication Main areas of focus: The Scottish Government alongside its partners to co-ordinate general awareness raising activity to promote a culture of cyber resilience among all Scottish citizens, including promoting the national online safety websites Get Safe Online and E-crime Scotland across Scotland Stakeholders and partners to implement audience-specific awareness raising activity - targeted at employees, educators, leaders and board members Working alongside the UK Government, the Scottish Government and partners from across the business world to form a network to share information about online threats and vulnerabilities Industry professionals develop and promote best practice in cyber resilience Q6 Do you agree with the main areas of focus for raising awareness and ensure effective communication? Yes No Are there other areas that should be considered? None. Objective 3: Develop education and skills in cyber resilience Main areas of focus: The Scottish Government and its partners promote the development and delivery of cyber resilience education in early learning and childcare settings, schools, colleges, universities and other learning settings Business partners build cyber resilience capabilities within workforces Scottish Enterprise and other business partners help develop the cyber security and resilience goods and services industry in Scotland Q7 Do you agree with the main areas of focus for developing education and skills in cyber resilience? 6 Yes No Are there other areas that should be considered? No comments. Objective 4: Strengthen research and innovation Main areas of focus: The Scottish Government, Police Scotland and partners progress with research to baseline the cost of cybercrime to Scotland Partners undertake and share research on understanding “what works” in preventing cybercrime, using knowledge from local, national and international angles Partners work together to target funding for cyber resilience research Enterprise funding is targeted at innovative methods to support the cyber resilience of individual or groups of enterprises Q8 Do you agree with the main areas of focus for strengthening research and innovation? Yes No Are there other areas that should be considered? At their meeting in Gaborone, Botswana in May 2014, Commonwealth Law Ministers endorsed the Commonwealth Working Group of Experts on Cybercrime report. The report stressed the global nature of cybercrime and that “any weak link provided opportunities for criminals.” As such even jurisdictions with the capacity to respond to cybercrime within their own borders will only be secure when other, developing and small jurisdictions, are also able to respond to cybercrime. The Consultation Paper notes that Scotland possesses “working bearing university research”. This significant capability represents an opportunity not only for the UK but all of the Commonwealth. As such consideration should be given to the role that Scottish Higher Education institutions could play in assisting other Commonwealth member states- and their own higher education institutions- to develop the capacity to combat cybercrime. For example, this could be achieved by adopting partnership models already being deployed by other UK institutions, including the Open University and University of Oxford, in partnering with institutions in small and developing Commonwealth jurisdictions to develop syllabuses, teaching materials, joint courses and other capacity building tools. This is based upon the recognition that the development of cybercrime safe havens presents a significant risk to even the most developed jurisdiction. The Secretariat notes that Higher Education policy is a devolved matter. 7 How will we use the strategy to achieve real change? For each of the outcomes, the Scottish Government and its partners are developing a detailed action plan setting out the short, medium and long term activities. These specific measures will be published in early 2016. Within this action plan there will be practical activities, projects and improvements to support individuals and organisations to become more cyber resilient, as well as steps to build up the cyber security goods and services sector in Scotland. Q9 Are there additional actions that will help us achieve making Scotland and its people more cyber resilient? Review Commonwealth approach for developing national cybersecurity strategies. As this makes clear the objectives outlined by the proposed strategy should be routed in a risk-based assessment. Appropriate evaluation mechanisms are required to monitor and validate progress towards implementation. This will rely upon the careful selection of key performance indicators (‘KPI’). This is made easier where quantitative measures are used in the evaluation process. For example, in relation to Child Online Protection awareness raising, teachers who have been provided with lesson plans and curricula can be surveyed after capacity building events to find out how many lessons they have used the materials for and the number of children in each class over a given period. This has been a useful metric employed my some Commonwealth members in undertaking capacity building activities. A single agency with responsibility for the development and implementation of the strategy is extremely useful. In particular this provides a clear point of contact for partners, both nationally and internationally. Further it assists in mitigating the potential for fragmentation between persons tasked with implementation of the strategy. This may additionally be assisted by the clear identification of persons or departments responsible for driving delivery of particular aspects of the strategy. Managing relations between the multi-stakeholder group implementing the strategy will be the task of the lead agency but should also be conditioned by local values (as outlined by the proposed strategy) and the commitments made by the UK to the values of the Commonwealth and other international regimes. How will we know if we are succeeding? The Scottish Government will be asking stakeholders to share their action plans and keep track of milestones and progress on an annual basis. This will help to provide regular annual updates to the national strategic implementation group. Q10 Yes Do you think the monitoring and evaluation arrangements are sufficient? No If not, what arrangements would you like to see? 8 There is a critical requirement for the regular review of the proposed strategy. Cybercrime and Security represent a fast moving, dynamic area of public policy. The key feature this being the phenomenal rate of technical progress, the result being the considerable likelihood that gaps in the provision of any proposed strategy will arise and become pronounced over time. This is particularly the case where strategies or associated legislation make reference to specific types of technology. This can undermine the effectiveness of the strategy. In order to counter this strategies, as a whole, should be reviewed at a minimum every 3-4 years (this is the practice in relation to the UK strategy and is also recommended in the Commonwealth approach for developing national cybersecurity strategies). However, it may also be necessary to designate some items within the strategy as necessitating review at more frequent intervals- perhaps even quarterly. As such it may be more effective to adopt a flexible approach to reporting on progress from stakeholders- with some parties reporting more frequently that every year and some less, depending upon criteria including: urgency of the task the stakeholder is responsible for; rapid rate of development of threats; and developing skills and knowledge of the participants. Additionally, the necessary reporting periods may change over-time as circumstances change. There should also be clarity regarding the reporting obligations which are being placed on any parties who are responsible for elements of both the UK Cyber Security Strategy and the proposed strategy for Scotland. Without a clear understanding of existing reporting requirements this could result in duplication of reporting and an undue burden on implementers. Q11 Yes Have you ever experienced cyber crime (see examples on page 16)? No If so, did you report it? Please provide details. Not applicable. Q12 Yes Would you be willing to share your experiences with us? No 9
© Copyright 2026 Paperzz