Finland Could Reshape Cyber Law

CGA2jiIWIAAEs4u.jpg

The future of cyberspace does not look encouraging. Nation-states are developing increasingly sophisticated cyber capabilities, a source of significant tension given their destructive potential. Some of the powerful cyber actors are already sniping accusations at each other and forming defensive alliances. For example, China and the United States have been accusing each other for years, and China recently signed a cybersecurity agreement with Russia.

We are at a critical juncture. We are developing cyber capabilities faster than policies and doctrines can control them. The Tallinn Manual on the International Law Applicable to Cyber Warfare sponsored by NATO’s Co-operative Cyber Defence Centre of Excellence was an encouraging step forward in the pursuit of international norms and laws regulating the cyber domain. But implementing and enforcing the norms the manual promotes has been poor. The world needs a fluid and frank dialogue among states, the private sector, and civil society in order to guarantee the security of cyberspace. There seems to be a desire for new normative and institutional orders in cyberspace, but what they might be, how they will be established, and how broadly they will be accepted are open questions.

Would it be more desirable to negotiate an international cyber treaty or to extend agreements that cover other issue-areas in the digital sphere? The first option is unlikely to happen. States conceptualize cyberspace in many different ways and their interests are so widespread that finding a common starting point for treaty making is difficult. The second option, the inclusion of cyber issues in the existing regulation that covers international trade or law enforcement seems more promising.
There may be instances, however, where integrating cyber issues into existing rule-making bodies or improving international cooperation is not feasible. Therefore, there is a need for a forum where cyber-related quarrels could be mediated. The International Telecommunication Union has often been suggested as possibility, but its current authority and mandate would need to be changed and that is likely to encounter some stiff resistance.

The creation of international norms for cyberspace is a necessity and the world needs peace negotiators. Someone must take the lead in shaping shared cyber norms. Finland is a perfect candidate. It has a thriving tech sector and an official policy of neutrality. As a middle-power, it may be easier for Finland to help parties find a middle ground on the development of cyber norms given that it lacks great power ambitions. Finland is also recognized as a reliable, constructive and credible partner, and has a track record when it comes to international mediation. Finland played an important role in the peace processes in Northern Ireland, the Western Balkans, the Horn of Africa and the South Caucasus, giving its foreign ministry considerable experience handling delicate negotiations.

Finland already has good relationships with the United States and China, and has a long experience working with Russia, given their shared history and common border. Former Finnish President Martti Ahtisaari won the Nobel Peace Prize for his peace building efforts and his Crisis Management Initiative (CMI) is an important actor in the prevention and resolution of violent conflicts. CMI has experience bringing parties together in the Aceh peace process and is currently trying to do the same in the Middle East. It is also skilled at working with various actors, from foreign ministries to civil society groups, at finding common ground and implementing agreements. These skills are what the world needs to develop and implement the shared cyber norms that will help prevent cyber conflict.

Finland’s reputation, lack of great power ambition, and track record can attract others to come together and discuss shared global cyber norms. If the world wants to grasp the opportunity—and contribute remarkably to international stability—now would be the right time to contact Finland.
DefenseOne: http://bit.ly/1J8YdBc

 

« North Korean Hackers 'could kill', Warns Defector
"Torus" Reveals an Expansion in 5 Eyes Surveillance. »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Softtek

Softtek

Softtek helps its clients to gain a competitive edge by implementing digital solutions that propel their business strategies.

AVG Technologies

AVG Technologies

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Gordian Networks

Gordian Networks

Gordian Networks offers complete managed IT services and IT support for small to large businesses.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.

Dedge Security

Dedge Security

Dedge Security is on a mission to help organizations to create secure Web3 applications and accelerate their businesses with confidence.