Russia And US Offer Competing Visions Of Cyber Normality

It’s October and the United Nations General Assembly and subsidiary committees have started their work in earnest. 

As expected, Russia tabled a draft resolution seeking the General Assembly’s endorsement of an “international code of conduct for international information security,” and a resumption of the UN Group of Governmental Experts (GGE) process next year. 

Somewhat less expected, however, is that the United States tabled a competing resolution, setting up a clash between Russia, China, and their largely autocratic friends on one side, and the United States, the European Union, Canada, Japan, and Australia on the other. 

First, some Background 

Almost every year since 1998, Russia has sponsored a General Assembly resolution called “Developments in the field of information and telecommunications in the context of international security.” It’s the mechanism through which UN member states express concern that malicious activity in cyberspace can undermine international peace and security. 

It’s also the resolution that created the GGEs on cybersecurity. Three of those GGEs led to consensus reports that recommended states abide by a set of norms, including the applicability of international law to cyberspace, participate in confidence building measures, and support capacity building initiatives to reduce the risk that state actions in cyberspace threaten international peace and security.

The text of the resolution has not been made public, but it is likely to be a combination of existing cyber norms the GGE agreed to in 2013 and 2015 and previous iterations of another code of conduct members of the Shanghai Cooperation Organisation (SCO) proposed in 2011 and 2015. 

The inclusion of the SCO language will make the United States and like-minded countries balk given its negative human rights implications. 

Nevertheless, the proposed Russian resolution could probably be salvaged through negotiation that strips it of the SCO code’s worst elements, keeps the consensus GGE language, and mandates the creation of a new GGE to pick up where the last one fell apart.

The text of the proposed Russian resolution is now public, and it’s about as expected. It cherry picks some of the worst elements from the previous Codes (e.g. promotes concepts of “cyber sovereignty,” sidelines the role of the private sector, etc.), un-ironically bemoans the spread of disinformation online, and mis-characterises previous consensus GGE text. 

It also calls for a new GGE with the mandate of identifying ways to implement the new code of conduct, make changes as necessary, and to study the possibility of establishing an “institutional dialogue” on cyber issues within the United Nations. 

The United States must have deemed the Russian text unsalvageable because it proposed its own competing resolution, backed by EU countries, Canada, Australia, and a few others. It applauds the work of the previous GGEs, calls on member states to abide by the previous reports’ recommendations, and requests a new GGE be established with largely the same mandate as previous ones.

Contrary to previous iterations, however, the United States asks that whatever report comes from the new GGE should include an annex “containing national contributions of participating governmental experts on the subject of how international law applies to the use of information and communication technologies by States.” 

The United States started laying out its understanding of how international law applies online in the Obama administration (here and here), and has encouraged countries to do the same. Earlier this year, the UK Attorney General laid out his country’s views on the matter. 

By pushing for an annex in the GGE report, the United States is trying to get Russia, China, and others on the record, particularly salient for China as it has remained silent on whether international humanitarian law applies online. 

I’m not a UN process expert, so it’s hard to say how this will play out. But if I were a betting man, I’d put my money on the US approach coming out on top. As an institution, the United Nations prefers incrementalism over radical change. 

That makes it much harder for Russia, China and the rest of the SCO members to drum up support for a twenty-five paragraph code of conduct that contains vague language mostly unfamiliar to many states. 

By contrast, the US resolution has more similarities to Russia’s previous resolutions, an advantage given that they will be familiar to diplomats at the UN who prefer sticking to previously agreed text. 

No matter what happens as diplomats haggle over the particulars of the resolution, expect a new GGE next year. The only open question at this point is its mandate, and that should be made clear in the next few weeks. 

Defense One:

You Might Also Read:

Cyberattack Revelations Appear To Undercut Russia's UN Efforts:

Russia Will Build A Separate Internet Directory:

The US Is Losing the Information War To Russia

« IBM Spends $34B To Buy Red Hat
British Refuse To Co-operate With Belgian Hacking Inquiry »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Nuix

Nuix

Nuix specialise in extracting knowledge from unstructured data. Applications include Digital Forensics, Cybersecurity Intelligence, Information Governance, eDiscovery.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.

nWebbed

nWebbed

nWebbed is a Cybersecurity company that detects and verifies exposed credentials, helping organizations stop breaches before they begin.