+ All Categories
Home > Documents > OrganizedbytheUnitedNaonsInstuteforDisarmament! … ·...

OrganizedbytheUnitedNaonsInstuteforDisarmament! … ·...

Date post: 11-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
22
Cyber Stability 2015 “Regime Coherence” The Future of Cyber Stability: A Civil Society PerspecCve 9 July 2015 Room IX, Palais des NaCons, United NaCons Office at Geneva Organized by the United NaCons InsCtute for Disarmament Research (UNIDIR) Dr. Daniel Stauffacher President, ICT4Peace Founda;on www.ict4peace.org
Transcript
Page 1: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

                   

Cyber  Stability  2015    

“Regime  Coherence”  The  Future  of  Cyber  Stability:  A  Civil  Society  PerspecCve  

 9  July  2015  

Room  IX,  Palais  des  NaCons,  United  NaCons  Office  at  Geneva    

Organized  by  the  United  NaCons  InsCtute  for  Disarmament  

Research  (UNIDIR)    

Dr.  Daniel  Stauffacher  President,  ICT4Peace  Founda;on  www.ict4peace.org  

     

Page 2: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information
Page 3: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

3

The Role of ICTs in

Preventing, Responding to and Recovering from

Conflict

WSIS Tunis 2005 ICT4Peace/UN ICT Task Force

(http://bit.ly/1bR0yPI)

Page 4: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

The UN World Summit on the Information Society (WSIS) in Tunis 2005"

WSIS plus 10 Review Ongoing

• Paragraph 36 of the World Summit on the Information Society (WSIS) Tunis Declaration (2005):

• “36. We value the potential of ICTs to promote peace and to prevent conflict which, inter alia, negatively affects achieving development goals. ICTs can be used for identifying conflict situations through early-warning systems preventing conflicts, promoting their peaceful resolution, supporting humanitarian action, including protection of civilians in armed conflicts, facilitating peacekeeping missions, and assisting post conflict peace-building and reconstruction.”between peoples, communities and stakeholders involved in crisis management, humanitarian aid and peacebuilding.

Page 5: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

Report  of  the  UN  Secretary-­‐General  (A/65/491)  Status  of  implementa8on  of  the  informa8on  and  communica8ons  

technology  strategy  for  the  United  Na8ons  Secretariat.  

•  Crisis information management strategy. The Crisis Information Management Strategy is based on the recognition that the United Nations, its Member States, constituent agencies and non-governmental organizations need to improve such information management capacity in the identification, prevention, mitigation, response and recovery of all types of crises, natural as well as man- made. The strategy will leverage and enhance this capacity and provide mechanisms to integrate and share information across the United Nations system.

•  The Office of Information and Communications Technology (CITO), together with the

Office for the Coordination of Humanitarian Affairs (OCHA), the Department of Peacekeeping Operations and the Department of Field Suppor (DPKO and DFS), has worked closely with United Nations organizations such as the Office of the United Nations High Commissioner for Refugees (UNHCR), the United Nations Children’s Fund (UNICEF), the United Nations Development Programme (UNDP) and WFP and other entities such as the ICT for Peace Foundation in developing and implementing this strategy. It is envisaged that membership will be expanded to include other United Nations organizations in the near future.

Page 6: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

 ICTs  For  Peaceful  Purposes  

 Since  WSIS  2005   in  Tunis,  a  vibrant  community  of  state  and  non-­‐state   actors   has   emerged.   This   community   has  developed   a   broad   range   of   new   ICT   tools   for   peaceful  purposes  and  in  support  of  humanitarian  opera;ons.      These   include   tools   such   as   crowdsourcing   like   Ushahidi,  crisis   mapping,   two-­‐way   communica;ons   with   vic;ms   of  disasters  and  so  forth.    In   par;cular   informal   communi;es   of   exper;se   have  contributed  significantly  to  developing  and  deploying  ICTs  in  support   of   crisis   informa;on   management   systems   and  peace-­‐building  efforts.  But  more  work  is  needed.  

Page 7: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

ICTs  Detrimental  to  Peace  and  Security      However,  over  the  past  decade  we  have  also  witnessed  how  ICTs  are  increasingly  used  for  purposes  detrimental  to  peace  and  security,  including  hacking  and  other  aOacks  on  digital  networks  and  systems,  use  of  ICT  for  terrorist  purposes.    Tradi;onal  and  social  media  are  also  being  used  to  promote  disharmony  and  conflict  between  and  within  countries  and  increasingly,  to  incite  violence.      The  step  from  common  crime  to  poli;cally  mo;vated  acts,  even  terrorism,  is  not  far.      

Page 8: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

     

Erosion  of  Trust      

Trust   between   states   and   between   state   and   ciCzens   is  increasingly   eroding   by   a   range   of   state   pracCces,   including  with   regard   to   the   negaCve   uses   of   informaCon  communicaCons   technologies   and   related   capabiliCes   to  advance  poliCcal,  military  and  economic  goals.      Despite  a  range  of  domesCc  and  diplomaCc  efforts  iniCated  to  curb  such  pracCces,  many  states  have  rushed  to  develop  these  same   capabiliCes   to   use   not   only   against   other   states   but  against   their   own   ciCzens,   which   further   undermined  confidence  and  trust  between  states,  and  between  states  and  ciCzens.        

Page 9: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

“The  Cyber  Security  Challenge:  What  Can  be  Done?”      

•   These  scenarios  show  that  Civil  Society  and  Private  Sector  need,  inter  alia:    

–  to  engage  in  an  interna;onal  discussion  on  the  norms  and  principles  of  responsible  state  behavior  in  cyber  space,    

 –  To  engage  in  developing    Confidence  Building  Measures  CBMs    (e.g.  

Bilateral  Agreements,  OSCE,  ARF,  UN  GGE  

–   to  engage  in  the  development  of  cooperaCon  pracCses  between  Governments,  Private  Sector,  Civil  society  to  adress  cybersecurity  challenges  and  develop  cooperaCon  models  

 –  Reach  out  and  include  all  Regions  of  the  world  and  in  parCcular  

Developing  Countries  and  include  them  in  the  reflecCon  of,  consultaCons  and  nego;a;ons  on  norms,  CBMs  through  CapaciltyBuilding  

 

Page 10: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

       

 Where  are  we  at  today  regarding  business  and    Civil  Society    

ParCcipaCon?      

   To  date,  business  and  civil  society  parCcipaCon  (whether  direct  or  indirect  in  regional  and  internaConal  cybersecurity  processes  has  been  minimal,  despite  the  fact  that  ciCzens,  civil  society  organisaCons,  as  well  as  business  and  academia  are  a  core  link  in  the  ICT    and  cybersecurity  value  chain.          However    it  is  important  to  acknowledge  also,  that  to  a  large  extent,  civil  society  organisaCons  came  into  the  game  rather  late,  only  making  links  between  the  internaConal  security  dimensions  of  ICTs,  and  human  rights,  development  and  governance  issues  in  recent  years.        Need  to  clarify:    MulC-­‐stakeholder  arrangements  in  security  related  decision  making  (monopoly  of  the  state)    vs  mulCstakeholder  engagement  for  becer  understanding  of  the  challenges  and  opportuniCes,  threats  but  also  potenCal  responses    e.g.  norms  confidence  building  measures  (CBMs)  and  the  respecCve  roles  all  stake-­‐holders  in  the  cybersecurity  value  chain.            

Page 11: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

       

   However,  we  have  some  interesCng  provisions,  but  not  

implemented  enough            In  2013,  the  role  of    Civil  Society  and  Industry    was  officially  recognised  in  the  UN    GGE  Report  in  the  area  of  building  coopera;on  for  a  peaceful,  secure,  resilient,  and  open  ICT  environment.  More  specifically:    Art.  11  acknowledges  that  ‘while  States  must  lead  in  addressing  these  challenges,  effecCve  cooperaCon  would  benefit  from  the  appropriate  parCcipaCon  of  the  private  sector  and  civil  society’.      Moreover,  the  report’s  secCon  on  CBMs  and  Exchange  of  InformaCon  also  acknowledges  a  role  for  civil  society,  specifically  no;ng  in  Art.  27  that  ‘while  States  must  lead  in  the  development  of  confidence  building  measures,  their  work  would  benefit  from  the  appropriate  involvement  of  the  private  sector  and  civil  society’.      But  then,  when  we  look  at  the  OSCE’s  Decision  1106  on  an  ‘IniCal  Set  of  CBMs  to  Reduce  the  Risks  of  Conflict  Stemming  from  the  Use  of  ICTs’  adopted    in  December  2013,  no  menCon  of  civil  society  is  made  throughout  the  document.  However,  this  does  not  necessarily  mean  that  civil  society  should  not  play  a  role  in  implemen;ng  the  ini;al  set  of  CBMs.  Indeed,  the  OSCE’s  own  Guide  on  CBMs  stresses  how  CBMs  should  ideally  involve  both  government  structures  and  civil  society,  with  the  lacer  also  reaching  out  to  broader  society.        

Page 12: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

       

       WHAT  ROLE  FOR  CIVIL  SOCIETY  AND  INDUSTRY  IN  FURTHERING  CYBERSECURITY-­‐RELATED  NORMS  AND  CBMS,  PARTICULARLY  GIVEN  THE  UN  GGE  AND  OSCE  BREAKTHROUGHS  ?        Proposed  areas  of  engagement  for  think  tanks,  academia,  business  and    civil  society:    i)  Transparency  and  Accountability;  ii)  ParCcipaCon;  iii)  Deepening  the  Knowledge  Base.      

Page 13: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

       

 WHAT  ROLE  FOR  CIVIL  SOCIETY  AND  INDUSTRY  IN  FURTHERING  CYBERSECURITY-­‐RELATED  CBMS,  PARTICULARLY  GIVEN  THE  UN  GGE  AND  OSCE  BREAKTHROUGHS  ?          i)  Transparency  and  Accountability  Un;l  very  recently,  very  licle  informaCon  regarding  internaConal,  regional  and  bi-­‐lateral  processes  on  cybersecurity  was  in  the  public  domain.  To  a  large  degree,  many  of  these  discussions  have  received  limited  scruCny  from  tradiConal  sources  of  checks  and  balances,  including  business  and  civil  society.      In  this  regard,  business  and  civil  society  organisaCons  can:      -­‐Develop  tools  to  monitor  their  own  government’s  role  in  internaConal,  regional  and  bi-­‐lateral  CBM  and  norm  discussions.  -­‐Make  knowledge  regarding  progress  or  setbacks  in  internaConal  and  regional  CBM  and  norms  processes  readily  available  to  the  public  and  organise  public  discussions  around  them.    -­‐Monitor  budgetary  expenditure  in  the  field  of  cybersecurity  to  ensure  an  adequate  balance  of  investment  between  security,  governance,  development  and  human  rights).        For  example,  in  2014,  ICT4  Peace  published  its  first  annual  Baseline    Review  of  ICT-­‐related  events  and  processes  that  have  implica;ons  for  interna;onal  peace  and  security  -­‐    

Page 14: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information
Page 15: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

                 

Role  for  Civil  Society  and  Industry  (conCnued)  ii)  ParCcipaCon    While  legiCmate  naConal  security  concerns  have  been  raised  concerning  the  non-­‐public  aspect  of  CBMs,  norms  and  other  related  processes,  there  are  sufficient  examples  of  how  governments  and  internaConal  and  regional  organisaCons  have  taken  steps  to  make  them  more  inclusive.      Business  and  Civil  Society  organisa;ons  can  and  should  therefore:    -­‐  Lobby  for  their  direct  of  indirect  parCcipaCon  in  CBMs,  norms  and  other  cybersecurity-­‐related  processes  as  per  the  related  provisions  in  the  2013  GGE  report.  For  instance,  civil  society  representaCon  can  and  should    be  included  in  government  delegaCons  to  CBM  and  norm  discussions.        -­‐  Where  the  lacer  is  not  possible,  hearings  with  governments  and    civil  society  organisaCons  should  be  organised,  before  and  aaer  government  par;cipa;on  in  CBMs,  norms  and  other  cyber-­‐security-­‐related  processes.  This  is  done  in  other  areas  pertaining  to  interna;onal  peace  and  security,  and  there  is  no  reason  it  cannot  be  done  with  regard  to  cybersecurity.        -­‐  ParCcipate  in  Conferences  such  as  the  Hague  Conference  GCCS  2015  and  present  research  and  and  soluCons:  E.G.  on  Norms  of  responsible  behaviour:  A    Comprehensive  Approach  to  Cybersecurity      

Page 16: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

International Processes: Council of Europe, OSCE, UN GGE, London, ARF

Example CBMs

Cybersecurity and Resilient Internet

Report  on  Ict4Peace    Workshop  and  Statement  to  Seoul  Conference  Plenary:    hcp://ict4peace.org/seoul-­‐conference-­‐on-­‐cyberspace-­‐2013-­‐statement-­‐on-­‐ict4peace-­‐special-­‐session/    

Page 17: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

A Comprehensive Normative Approach to Cyber Security Presented at GCCS 2015

Political (non-binding) norms Legal (binding) norms

Hard law

Soft law

Non-legal norms

Binding norms with a soft dimension*

Non-binding norms of legal relevance*

International norms

Binding norms

(treaties, custom, general principles)

Non-binding or voluntary norms

(e.g. CBMs)

* See Fabien Terpan, Soft Law in the European Union—The Changing Nature of EU Law, European Law Journal, Volume 21, Issue 1, pages 68–96, January 2015

Page 18: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

                 

Role  for  Civil  Society  and  Industry  (conCnued)    iii)  Deepening  the  Knowledge  Base      Enhancing  knowledge  and  sharing  informaCon  is  core  to  building  a  secure  and  resilient  ICT  environment,  and  for  strengthening  trust  and  confidence.    To  this  end    civil  society  can:    Work  more  closely  with  the  private  sector  and  academia  to  ensure  that  evidence-­‐based  research  is  made  available  to  government  representaCves  in  CBMs  and  norm  discussions  on  the  one  hand;  and  made  accessible  to  the  broader  public  on  the  other.        For  example,  in  June  2013,  ICT4Peace  organised  a  workshop  ETH  Zurich  on  CBMs  and  op;ons  for  interna;onal  and  regional  cybersecurity.        The  workshop  par;cipants  drew  up  an  exhaus;ve  list  of  poten;al  CBMs  across  core  areas:  transparency  measures;  cooperaCve  measures;  communicaCon  and  collaboraCve  mechanisms;  restraint  measures;  and  compliance  and  monitoring  measures  for  dealing  with  today’s  ICT-­‐related  challenges.        All  of  this  informa;on  and  analysis  was  pulled  together  in  the  ICT4Peace  report  on  the  workshop  proceedings,  copies  of  which  I  have  with  me  here  today,  in  case  you  are  interested.    

Page 19: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

ICT4Peace  Report  on  Transparency  and  Confidence  Building  Measures  (TCBMs)**  

 

**  see  Report  by    Camino  Kavanagh,  Senior  Advisor  ICT4Peace:      hcp://ict4peace.org/what-­‐next-­‐building-­‐confidence-­‐measures-­‐for-­‐the-­‐cyberspace/    ICT4Peace  workshop  at  ETH  Zurich  June  2013  with  the  Support  of  the  Swiss  Ministry  of  Foreign  Affairs    

Page 20: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

           

 Role  for  Civil  Society  and  Industry  (conCnued)  

 iii)  Deepening  the  knowledge  base    Civil  Society  and  industry    should  also  develop  stronger  Ces  with  academia  and  policy  think  tanks  to  idenCfy  knowledge  gaps  or  deepen  the  knowledge  base  supporCng  Track  1.5    consultaCons  in  this  field  (i.e.  consulta;on  between  Governments  on  Cybersecurity  issues  with  the  inclusion  of  academia,  think  tanks).      Civil  Society  should  work  with  government,  academia  and  industry  to  ensure  the  inter-­‐linkages  between  different  policy  areas,  namely  security,  governance,  development  and  human  rights  are  understood  and  taken  into  account  in  negoCaCons.  As  noted  above,  the  ICT4  Peace  Review  of  ICT-­‐Related  Processes  and  Events  has  played  an  important  role  in  this  regard.        Finally,  civil  society  and  business  can  help  deepening  understanding  of  regional  and  cultural  dynamics  and  differences  as  a  means  to  build  trust  in  cyberspace  and  with  regard  to  different  cybersecurity  challenges.  Indeed,  significant  misunderstandings  (many  of  them  cultural)  sCll  remain  in  the  area  of  cybersecurity,  which  can  lead  to  heightening  of  tensions  between  states,  and  between  states  and  ciCzens  if  leq  unresolved.              

Page 21: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

ICT4Peace  has  launched  a  new  Cybersecurity  policy  and  diplomacy  capacity  building  project  with  different  Governments  and  regional  

organisaCons  for  LaCn  America,  Africa,  Asia  and  CIS  Countries  

Page 22: OrganizedbytheUnitedNaonsInstuteforDisarmament! … · technology’strategy’for’the’United’Na8onsSecretariat. • Crisis information management strategy. The Crisis Information

THANK  YOU  [email protected]  

 


Recommended