US Changes Policy On International Cyber Regime

The US delegate now says a UN cybersecurity group should pause hashing out new rules for online behavior and instead try to get governments to adhere to the ones we have.

A United Nations cybersecurity experts group meeting recently in Geneva should focus on encouraging UN member states to adopt existing cyber rules of the road and confidence-building measures rather than developing new ones, the US delegate said.

That’s a significant shift from a 2015 series of Group of Governmental Experts, or GGE, meeting, during which the US pushed vigorously for a set of peacetime cyber norms, including that nations should not attack each other’s critical infrastructure such as energy plants and electrical grids.

During a round of GGE meetings in 2013, the experts group concluded the international laws that govern armed conflict should apply in cyber-space just as they do on land or at sea.

“We don’t need a continual norms machine ramping out a lot of norms,” State Department Deputy Coordinator for Cyber Issues Michele Markoff told an audience at the Carnegie Endowment for International Peace.

“What we need to do is consolidate what we’ve done and get states to implement,” she said, “both in the internalisation of the norms but also in the operationalization of [confidence-building measures] which will help the norms.”

Confidence-building measures include nations sharing information about transnational cyber threats and about national cyber-security strategies.

The experts group, which is composed of diplomats from 25 nations including Russia and China, has functioned something like an advisory committee on international cyber-security. Principles endorsed by the group remain voluntary and nonbinding for UN member states but generally form a line of accepted behavior that nations don’t want to be seen openly crossing.

Other peacetime cyber “norms” endorsed by the 2015 experts’ group include commitments that nations should not attack each other’s cyber emergency responders and should assist other nations in investigating cyber-attacks launched from their territory.

The US has often faced resistance in the expert’s group from Russian and Chinese delegates who are concerned the US wants to leverage cyber norms to ensure its own hegemony in cyber-space.

Markoff expressed optimism that the US and Russia can cooperate on some international cyber priorities despite tension created by non-cyber conflicts such as the Russian occupation of Crimea.

That work may be aided by the Trump administration’s efforts to repair relations with its former Cold War adversary, she said.

“Despite the decline in US-Russian relations over the last several years, US-Russia cyber relations have been, in fact, a bright spot. I say that with all sincerity,” she said, listing several international forums in which the nations have reached agreement on cyber issues. “As a long-time arms controller … I find that talking to [Russian officials] is much better than not talking to them.”

Markoff added while the U.S. and Russia can be “fellow travelers on a road which is designed to prevent conflict from escalating into open warfare,” the two will often have different broader goals.

Markoff did not address the Russian government-backed hacking of Democratic political organisations during the 2016 election, which US intelligence officials say was designed to aid the electoral chances of President Donald Trump.  

That influence operation did not specifically violate any of the cyber norms endorsed by the 2015 GGE because the US government did not, at that point, consider electoral systems critical infrastructure.

However, the Obama administration repeatedly described the Russian electoral meddling as outside larger bounds of appropriate state behavior and President Barack Obama termed the meddling an “unusual and extraordinary threat to the national security, foreign policy, and economy of the United States” when imposing additional sanctions on Russia.

The US Homeland Security Department added electoral systems to its list of critical infrastructure categories during the final weeks of the Obama administration, despite protests from some state-level officials. The Trump administration has done nothing so far to reverse that decision.

A Russia-linked attack on Ukraine’s power grid last year also did not violate the GGE norm prohibiting critical infrastructure attacks, Markoff said, because the norms apply only in peacetime and the US considers Russia and Ukraine to be in a state of open conflict.

“You can say Russia violated a whole lot of other things, I mean, killing people, but they are not violating this norm,” Markoff said.

DefenseOne

No US Cyber Peace Agreement with China:        Cyber War and Peace:

 

« Teaching Kids Cyber Skills
Tech Companies Oppose Trump’s Travel Ban »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Sophos

Sophos

Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

Q6 Cyber

Q6 Cyber

Q6 Cyber is an innovative threat intelligence company collecting targeted and actionable threat intelligence related to cyber attacks, fraud activity, and existing data breaches.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Ridge Canada Cyber Solutions

Ridge Canada Cyber Solutions

Ridge Canada helps insurance brokers and insurance buyers understand, evaluate, and secure cyber coverage that is tailored to their business.

PT Prima Cyber Solusi

PT Prima Cyber Solusi

PT Prima Cyber Solusi is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.