UN Cyber Warfare Talks Collapse

Thirteen years of negotiations at the United Nations aimed at restricting cyber-warfare collapsed in June, it has just emerged, due to an acrimonious dispute that pitted Russia, China and Cuba against western countries.

The split among legal and military experts at the UN, along old cold war lines, has reinforced distrust at a time of mounting diplomatic tension over cyber-attacks, such as the 2016 hacking of the US Democratic National Committee’s (DNC) computers. 

That break-in was allegedly coordinated by Russian intelligence and intended to assist Donald Trump’s presidential campaign.

Negotiations aimed at forging an international legal framework governing cybersecurity began in 2004. Experts from 25 countries, including the UK and all the other members of the UN security council, participated in the discussions.
But in June, diplomats at the UN abandoned any hope of making further progress, amid a row centred on the right of self-defence in the face of cyber-attacks.

At previous sessions, officials accepted that the principles of international law should apply to cyber-space, including the UN charter itself. Article 51 of the charter states that nothing shall “impair the right of individual or collective self-defence” in the face of an armed attack. 

The Cuban representative, Miguel Rodríguez, told the final meeting of negotiators that recognising self-defence rights in cyber-space would lead to militarisation of cyberspace and “legitimise … unilateral punitive force actions, including the application of sanctions and even military action by states claiming to be victims” of hacking attacks. 
Without naming Russia or China, Michele Markoff, who led the US delegation to the UN’s Group of Governmental Experts (GGE), released a statement in the aftermath of the collapse of negotiations attacking “those who are unwilling to affirm the applicability of these international legal rules and principles”. 

Such countries “believe their states are free to act in or through cyberspace to achieve their political ends with no limits or constraints on their actions”, Markoff said. “That is a dangerous and unsupportable view.”

Speaking at a cyber-security conference in Israel after the breakdown of the UN process, a senior Russian official, Oleg Khramov, blamed western countries for the impasse. “Talks about the need to adopt rules of behaviour in the information space remained mere talk. We all were thrown years back,” he said.

Mike Schmitt, professor of international law at Exeter University and a former US air force lawyer, has been monitoring the UN GGE discussions. He said he feared a calculated decision has been made by Moscow and Beijing that the west has more to lose if there is no guaranteed right to retaliate against cyber-attacks.
“Perhaps [Russia, China and Cuba] … want to avoid the perception that ‘the west’ gets to dictate the rules of the game for cyber-space,” he wrote on the Just Security blog. 
“Or perhaps the answer is legal-operational in the sense that they want to deprive the west of a legal justification for responding to hostile cyber operations that they themselves launch.”

Part of the dispute was over the difficulty of establishing who is responsible for a foreign cyber-attack. Proving whether hackers had state backing is extremely difficult, particularly for countries that do not possess adequate technological resources. 

The legal row over cyber-warfare echoes international concerns over the deployment of drones. Both technologies permit the application of force by remote control, effectively lowering the threshold for future conflicts.

Schmitt, who is also the editor of the Tallinn Manual on International Law Applicable to Cyber Warfare, said: “From the western perspective, Russia and China are the two countries they are most concerned about. I’m comfortable with the US intelligence conclusion that the Russians [were responsible for hacking into the DNC].
“There are a number of states that like legal ambiguity because it gives them flexibility. They can operate without risking any collective [punishment] for being a lawbreaker … It may not be in their national interest to clarify the law. There are no more sessions planned for the GGE but there are discussions about what to do next.”

The UK foreign office said: “Existing international law applies in cyberspace as it does in other domains. The UN GGE’s inability to agree a consensus in June does not undo previous work. The government is committed to maintaining a free, open, peaceful and secure cyber-space.”

Guardian

You Might Also Read:

Nation State Hacking Has A Big Commercial Impact:

Cyberwars Between Nations Are Difficult to Prove:

Can the United Nations Improve Cybersecurity?:

Mass Surveillance: Cuba Filters Text Messages:


 

 

 

« Tech Giants Put Big Data To Work
Driverless Truck Fleet Gets UK Trial »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Comiq

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

SCS Technology Solutions

SCS Technology Solutions

SCS Technology Solutions has become the preferred partner for top performing organisations across Lincolnshire for IT support and consultancy.