Russia And US Offer Competing Visions Of Cyber Normality

It’s October and the United Nations General Assembly and subsidiary committees have started their work in earnest. 

As expected, Russia tabled a draft resolution seeking the General Assembly’s endorsement of an “international code of conduct for international information security,” and a resumption of the UN Group of Governmental Experts (GGE) process next year. 

Somewhat less expected, however, is that the United States tabled a competing resolution, setting up a clash between Russia, China, and their largely autocratic friends on one side, and the United States, the European Union, Canada, Japan, and Australia on the other. 

First, some Background 

Almost every year since 1998, Russia has sponsored a General Assembly resolution called “Developments in the field of information and telecommunications in the context of international security.” It’s the mechanism through which UN member states express concern that malicious activity in cyberspace can undermine international peace and security. 

It’s also the resolution that created the GGEs on cybersecurity. Three of those GGEs led to consensus reports that recommended states abide by a set of norms, including the applicability of international law to cyberspace, participate in confidence building measures, and support capacity building initiatives to reduce the risk that state actions in cyberspace threaten international peace and security.

The text of the resolution has not been made public, but it is likely to be a combination of existing cyber norms the GGE agreed to in 2013 and 2015 and previous iterations of another code of conduct members of the Shanghai Cooperation Organisation (SCO) proposed in 2011 and 2015. 

The inclusion of the SCO language will make the United States and like-minded countries balk given its negative human rights implications. 

Nevertheless, the proposed Russian resolution could probably be salvaged through negotiation that strips it of the SCO code’s worst elements, keeps the consensus GGE language, and mandates the creation of a new GGE to pick up where the last one fell apart.

The text of the proposed Russian resolution is now public, and it’s about as expected. It cherry picks some of the worst elements from the previous Codes (e.g. promotes concepts of “cyber sovereignty,” sidelines the role of the private sector, etc.), un-ironically bemoans the spread of disinformation online, and mis-characterises previous consensus GGE text. 

It also calls for a new GGE with the mandate of identifying ways to implement the new code of conduct, make changes as necessary, and to study the possibility of establishing an “institutional dialogue” on cyber issues within the United Nations. 

The United States must have deemed the Russian text unsalvageable because it proposed its own competing resolution, backed by EU countries, Canada, Australia, and a few others. It applauds the work of the previous GGEs, calls on member states to abide by the previous reports’ recommendations, and requests a new GGE be established with largely the same mandate as previous ones.

Contrary to previous iterations, however, the United States asks that whatever report comes from the new GGE should include an annex “containing national contributions of participating governmental experts on the subject of how international law applies to the use of information and communication technologies by States.” 

The United States started laying out its understanding of how international law applies online in the Obama administration (here and here), and has encouraged countries to do the same. Earlier this year, the UK Attorney General laid out his country’s views on the matter. 

By pushing for an annex in the GGE report, the United States is trying to get Russia, China, and others on the record, particularly salient for China as it has remained silent on whether international humanitarian law applies online. 

I’m not a UN process expert, so it’s hard to say how this will play out. But if I were a betting man, I’d put my money on the US approach coming out on top. As an institution, the United Nations prefers incrementalism over radical change. 

That makes it much harder for Russia, China and the rest of the SCO members to drum up support for a twenty-five paragraph code of conduct that contains vague language mostly unfamiliar to many states. 

By contrast, the US resolution has more similarities to Russia’s previous resolutions, an advantage given that they will be familiar to diplomats at the UN who prefer sticking to previously agreed text. 

No matter what happens as diplomats haggle over the particulars of the resolution, expect a new GGE next year. The only open question at this point is its mandate, and that should be made clear in the next few weeks. 

Defense One:

You Might Also Read:

Cyberattack Revelations Appear To Undercut Russia's UN Efforts:

Russia Will Build A Separate Internet Directory:

The US Is Losing the Information War To Russia

« IBM Spends $34B To Buy Red Hat
British Refuse To Co-operate With Belgian Hacking Inquiry »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.