ITU High-Level Segment (HLS) of Council 2008 Geneva, 12-13 November 2008 Binali YILDIRIM Minister of Transport and Communications Republic of TURKEY 1 Development of ICT Market 70,0 60,0 million 50,0 40,0 30,0 20,0 10,0 0,0 2002 2003 2004 Fixed Subscribers Broadband Subscribers (million) Mobile Subscribers Internet Users Broadband Subscribers PCs 2005 2006 MobileYEARS Subscribers Personal Computers 2002 2007 Internet Users 2008 Penetration(%) 2008 2008 GROWTH rate (%) 23,0 65,0 92 183 4,3 26,5 37 516 0,005 6,0 8,5 119900 10,0 14 233 3,0 2 2 Development of ICT Market ICT Market is US$ 31 billion (2008), IT (2008 exp.): US$ 8 billion ICT Market (Billion US$) Comm.Tech.(2008 exp): US$ 23 billion. 35 ICT Market was US$ 20.951 billion (2006), US$ 24 billion (2007) The growth in ICTs is assumed to be 20% in 2008 compared to 2007. Turkey’s software market increased up to US$ 1 billion in 2007 compared to US$ 880 million in 2006. 30 TV channels at the national level, 250 at the local level 260 Licences in ICT sector, 31,0 30 25 21,0 20 15 15 11 10 5 0 22 Turkish companies in the global list of 500 fastest growing ICT companies 2002 3 2004 YEARS 2006 2008 Some activities realized in Turkey LAW NO GSM900 GSM1800 4502, LICENCES ISP, LICENCES IN FORCE RIGTH TOSATELLITE, APR-98 GMPCS TÜRKINFORMATION JAN-2000 OCT-2000 LAW LICENCES TELEKOM MARCH-2002 LONG MONOPOLY OCT-2003 DISTANCE ENDED, E-SIGN.LAW TELEPHONE SERVICE’S JAN-2004 LICENCES MAY-2004 UNIVERSAL SERVICE’S LAW, LOCAL LOOP IN FORCE UNBUNDLING LAW ON JUNE-2005 COMMUNIQUE, PRIVATIZATIONINFRASTR. NUMBER REGULATION OFRESEARCH IN FORCE, OF TÜRK PROVIDER’S PORTABILITY PUBLICATION AND FIGTHING AGAINSTDEVELOP. JULY-2005 TELEKOM LICENCES ORDINANCE, NOV-2005 MARCH-2006 IN FORCECRIME COMMITTED FEB-2007 4 VIA INTERNET MAY-2007 (R&D) LAW APR-2008 IT Crimes – Internet Computer and IT systems despite all their benefits to society help criminals to commit more sophisticated crimes. Crimes take place crossborders. The technology edge contributes to the cyber wars globally. 5 Fighting with IT Crimes The methods used in fighting classical crimes become ineffective when used to fight against IT crimes. To fight against IT crimes; new legislation arrangement has to be made; furnishing technical substructure, qualified personnel and extensive training are needed. To trace and collect evidence in IT crimes gets difficult. They are intentionally erased, lost or destroyed by criminals. New methods and strategies next to classical methods are needed. Law enforcement and juristicion need to be equipped with new technologies and their personnel trained about all new crime types. 6 Public Awareness Public awareness is important to keep track of new IT crimes. What “you don’t know” can hurt you. IT crimes uprise in the societies with lack of security awareness. It is even problem for countries taken precautions. To increase awareness, international cooperation events, studies, conferanses, publications need to emphasised. Our New website http://www.guvenliweb.org.tr describes the internet security. 7 8 Internet Content Regulation - Daily visits to Secure Internet Website are around 50.000. - Website’s internet usage ranking, according to FOSI (Family Online Safety Organization – http://www.fosi.org) is higher than other websites with similar content (clicksafe.de, childnet.int.org, iwf.co.uk, netzsmartz.org, saferinternet.org, cybermartkids.com.au) 9 Internet Content Regulation IT crimes are committed on Internet. Illegal contents are increasing on internet portals. Based on the report, published on January 2008 by BMI called “ IBM Internet Security 2007 Trend Statistics”; %8 of internet in the world contains unwanted contents. The unwanted contents in 3 category : Adult contents ( %7,4) ( Pornography, erotic) Social Extreme content ( %0,003) ( Extreme fanatism / Racism) Criminal Offense Content ( Criminal) ( %0,23) ( IT Crimes, harmful softwares, Violance, illegal softwares ext.) 10 Internet Content Regulation Unwanted contents like adult contents are usually produced by developed countries. Turkey’s undesirable content production level is less than %0,9. To fight against unwanted content and siber threats need more emphesis. We also comply with the advices of Council of Europe in internet regulation and safer internet media, called Safer Internet Action Plan – SIAP. 11 Internet Content Regulation Council’s request to build internet hotlines, develop internet filtering - rating systems and increase awareness is followed closely. Turkey implemented these actions even before Council of Europe’s recommandations. The Law number 5651 “ To arrange the publications in internet media and fighting the crimes that are committed using these publications” took effect on 23.May.2007. Legal infrastructure in fighting with some crimes, committed on internet was developed with this law. 12 Law No:5651 With this law in effect; rules for content, location, access and usage providers, and their responsibility and obligations are arranged in order to fight against internet crimes. Content providers are responsible for all their content. Similar enforcements are in effect in Germany, France, Italy and USA. Important to protect social and community values. To prevent youth and children from reaching harmful content such as pornography. To prevent adults reaching child pornography. 13 Law No:5651 The catagory of crimes, listed as; Provocation to commit suicide Sexual harassment of children To ease the usage of drugs Supplying drugs which are dangerous for health Obscenity Prostitution To provide place and opportunity for gambling Crimes committed against our founder of the republic, “Atatürk”. 14 Internet Hotline Notices via web form, email or telephone to Internet hotlines get evaluate; if determined, its access is prevented. http://www.ihbarweb.org.tr website has been opened for this purpose. 15 16 Internet Hotline The hotline will become a member of international internet Hotline Centers Association INHOPE (http://www.inhope.org) in near future. As a consulting body - “Internet Board” was formed contains public officers and representatives of non-governmental organizations (NGOs). Number of NGO representatives is higher than Government representatives. 17 Conclusion and Suggestions We all need to develop new legislations in fighting against IT crimes and unsecure internet contents. Countries need to strengthen their law enforcement, by training judges, public prosecutors and supply the necessary equipment in fighting IT crimes. Internet users need to be educated to be more conscious of the threats. 18 Conclusion and Suggestions Code of conducts need to be developed internationally to handle the ones coming through internet. The providers must be sensitive for notice and takedowns. Takedown of the content about aspertions to a famous person in one country in another country’s service provider must be done based on these conducts. 19 Conclusion and Suggestions Organizations like INHOPE (http://www.inhope.org) and INACH (http://www.inach.net) that are fighting with harmful contents must be strenghtened. Also an international method about fighting with malicious code and spam on internet also must be adopted and an international organization must be formed. According to some international statistics, countries in higher internet usage are the ones that produce most unwanted content. Countries benefiting from Internet economy must play effective role towards Internet related problems. 20 e_Signature In order to solve the trust and security concern in the cyberspace and to enable individuals to use the internet for all kinds of transactions we have enacted Electronic Signature Law in year 2004 Government Certification Authority distributed 21,000 Qualified Certificates up to May 2008 . 13,000 of them was distributed to the Ministry of Justice. Totally 30,000 civil servants and 40,000 lawyers are planned to use e-signature within the project. 21 E_Government One of our important “on-going project” is called “e-Government Gateway (Portal)”. It will enable the citizens to access public services, over a single portal. It will be effective, transparent, safe and fast manner. First application will be started on 12 December 2008. 22 Mobile e_Signature Mobile e- signature is an important application to stimulate its usage. The mobile e-signature application was launched in year 2007. 23 e_ID We will replace ID cards with an electronic citizenship cards with embedded biometric data. e-ID will provide secure ID verification and eliminate the risk of ID theft in electronic environment. Our Electronic Identity Authentication and Management System was announced in May 2006. 24 THANK YOU Binali YILDIRIM Minister of Transport and Communications Republic Of Turkey 25