IGF 2025 Lightning Talk #219 Global Collaboration in the Disruption of Cybercrime

    NetBeacon Institute / PIR
    Graeme Bunton, NetBeacon Institute / PIR, WEOG Rowena Schoo, NetBeacon Institute / PIR, WEOG
    Speakers
    Graeme Bunton, NetBeacon Institute / PIR, WEOG Rowena Schoo, NetBeacon Institute / PIR, WEOG Christian Dawson, Internet Infrastructure Coalition, WEOG Bertrand de la Chapelle, Internet & Jurisdiction Policy Network, WEOG
    Onsite Moderator
    Graeme Bunton
    Rapporteur
    Rowena Schoo
    SDGs
    9. Industry, Innovation and Infrastructure
    9.1
    16. Peace, Justice and Strong Institutions
    16.2


    Targets: The work of the NetBeacon Institute, Secure Hosting Alliance, and the Internet Infrastructure Forum aligns to the theme of Building Digital Trust and Resilience. In particular, it creates freely available tools to build the capacity of the Internet infrastructure ecosystem to cooperatively mitigate threats to security and safety, including CSAM, online. This approach provides inclusive tools that aim to connect all infrastructure operators, including transborder cooperation. These tools provide improved access to high quality reports of cybercrime and enhance the ability of the infrastructure providers to mitigate cybercrime and other digital harms. Through this cooperation we work towards creating an internet that is trusted and safe, while respecting the complexities of operating in a global system with the intersection of sovereign nations, norms and laws. This work is contributing to C5 of the WSIS action lines: Building confidence and security in the use of ICTs. As we build capacity through free tools and a more interconnected reporting environment, we’re creating a more reliable and trustworthy Internet that users can have confidence in. In particular, through our work with a variety of stakeholders inside ICANN and around the wider community, law enforcement, government, civil society and industry stakeholders.
    Format
    The lightning talk will use multiple speakers to build a coherent narrative, following a single phishing campaign from creation to mitigation. We’ll use slides and Menti polls along the way to ensure the audience is engaged and informed. Participants will have the ability to ask questions both online and in person.
    Duration (minutes)
    30
    Description
    Cybercrime leverages the services of Internet infrastructure providers from multiple layers of the Internet. Effective disruption of cybercrime requires coordination and communication between these layers. In this lightning talk, members of the NetBeacon Institute, the Secure Hosting Alliance, and the Internet Infrastructure Forum discuss why this coordination is crucial, how it’s being implemented by NetBeacon Reporter, and what work remains to be done. In order to illuminate this complexity, we follow a phishing website from creation to mitigation. Looking at how cybercrime uses Internet infrastructure, and how differing organizations with differing capabilities can help make the Internet safer for everyone. The content of this talk will touch on a number of IGF issue areas, themes, and SDGs, including: 1) Digital Trust and Resilience (a. Managing cybersecurity threats, b. Fighting cybercrime) 2) Sustainable and Responsible Innovation (a. Data governance, b. Geopolitical influence, c. Privacy and accountability) 4) Digital Cooperation (a. Integrating principles of good Internet and digital governance to strengthen the multistakeholder approach and foster inclusive digital governance, b. Promoting capacity building and knowledge sharing to better shape the future of the digital ecosystem and ensure more efficiency)

    1) We will alternate between questions from the audience and virtual—starting with virtual questions. We will have an onsite and virtual moderator. Polls will be virtual and presented on the screen so all participants can see and engage in real time. Slides will be used so all participants can see the same information at the same time. 2) We intend to use Menti to ask engaging questions of the audience throughout the presentation and take questions at the end from both in person and virtual attendees. For example, testing the audience’s views and opinions on trust and security of Internet infrastructure. 3) Online and in person meeting with slides, menti polls.