UN Cyber Warfare Talks Collapse

Thirteen years of negotiations at the United Nations aimed at restricting cyber-warfare collapsed in June, it has just emerged, due to an acrimonious dispute that pitted Russia, China and Cuba against western countries.

The split among legal and military experts at the UN, along old cold war lines, has reinforced distrust at a time of mounting diplomatic tension over cyber-attacks, such as the 2016 hacking of the US Democratic National Committee’s (DNC) computers. 

That break-in was allegedly coordinated by Russian intelligence and intended to assist Donald Trump’s presidential campaign.

Negotiations aimed at forging an international legal framework governing cybersecurity began in 2004. Experts from 25 countries, including the UK and all the other members of the UN security council, participated in the discussions.
But in June, diplomats at the UN abandoned any hope of making further progress, amid a row centred on the right of self-defence in the face of cyber-attacks.

At previous sessions, officials accepted that the principles of international law should apply to cyber-space, including the UN charter itself. Article 51 of the charter states that nothing shall “impair the right of individual or collective self-defence” in the face of an armed attack. 

The Cuban representative, Miguel Rodríguez, told the final meeting of negotiators that recognising self-defence rights in cyber-space would lead to militarisation of cyberspace and “legitimise … unilateral punitive force actions, including the application of sanctions and even military action by states claiming to be victims” of hacking attacks. 
Without naming Russia or China, Michele Markoff, who led the US delegation to the UN’s Group of Governmental Experts (GGE), released a statement in the aftermath of the collapse of negotiations attacking “those who are unwilling to affirm the applicability of these international legal rules and principles”. 

Such countries “believe their states are free to act in or through cyberspace to achieve their political ends with no limits or constraints on their actions”, Markoff said. “That is a dangerous and unsupportable view.”

Speaking at a cyber-security conference in Israel after the breakdown of the UN process, a senior Russian official, Oleg Khramov, blamed western countries for the impasse. “Talks about the need to adopt rules of behaviour in the information space remained mere talk. We all were thrown years back,” he said.

Mike Schmitt, professor of international law at Exeter University and a former US air force lawyer, has been monitoring the UN GGE discussions. He said he feared a calculated decision has been made by Moscow and Beijing that the west has more to lose if there is no guaranteed right to retaliate against cyber-attacks.
“Perhaps [Russia, China and Cuba] … want to avoid the perception that ‘the west’ gets to dictate the rules of the game for cyber-space,” he wrote on the Just Security blog. 
“Or perhaps the answer is legal-operational in the sense that they want to deprive the west of a legal justification for responding to hostile cyber operations that they themselves launch.”

Part of the dispute was over the difficulty of establishing who is responsible for a foreign cyber-attack. Proving whether hackers had state backing is extremely difficult, particularly for countries that do not possess adequate technological resources. 

The legal row over cyber-warfare echoes international concerns over the deployment of drones. Both technologies permit the application of force by remote control, effectively lowering the threshold for future conflicts.

Schmitt, who is also the editor of the Tallinn Manual on International Law Applicable to Cyber Warfare, said: “From the western perspective, Russia and China are the two countries they are most concerned about. I’m comfortable with the US intelligence conclusion that the Russians [were responsible for hacking into the DNC].
“There are a number of states that like legal ambiguity because it gives them flexibility. They can operate without risking any collective [punishment] for being a lawbreaker … It may not be in their national interest to clarify the law. There are no more sessions planned for the GGE but there are discussions about what to do next.”

The UK foreign office said: “Existing international law applies in cyberspace as it does in other domains. The UN GGE’s inability to agree a consensus in June does not undo previous work. The government is committed to maintaining a free, open, peaceful and secure cyber-space.”

Guardian

You Might Also Read:

Nation State Hacking Has A Big Commercial Impact:

Cyberwars Between Nations Are Difficult to Prove:

Can the United Nations Improve Cybersecurity?:

Mass Surveillance: Cuba Filters Text Messages:


 

 

 

« Tech Giants Put Big Data To Work
Driverless Truck Fleet Gets UK Trial »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

BugRaptors

BugRaptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Superus Careers - Cyber Career Exchange

Superus Careers - Cyber Career Exchange

The Cyber Career Exchange is a specialized recruiting platform focused specifically on cybersecurity.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

Hicomply

Hicomply

Hicomply simplifies compliance management with smart, user-friendly tools, helping you scale your processes and stay in control - no matter how complex.

Secher Security

Secher Security

Secher Security is a professional and secure partner with a high level of professional expertise in simplifying and optimizing complex IT infrastructures.

Fable Security

Fable Security

We’re reimagining human risk management. Fable brings together the best of engineering, behavioral science, and AI to solve one of security’s hardest problems.