SlideShare une entreprise Scribd logo
1  sur  10
Chatham House,
London, 07.05.2013

Oleg Demidov,
Program Coordinator, PIR Center
Chatham House,
London, 07.05.2013
Conflicting Understanding of Cyberspace:
An Obstacle for Common Norms

USA: Cyberspace

Russia, SCO:
Information Space

A global domain within the information
environment consisting of the interdependent
network of information technology
infrastructures, including the
Internet, telecommunications
networks, computer systems, and embedded
processes and controllers
U.S. Department of Defense (latest
edition 2012)

O.V. Demidov
Program Coordinator
PIR Center

Information space - the sphere of activity
connected with the
formation, creation, conversion, transfer, use, an
d storage of information and which has an effect
on individual and social consciousness, the
information infrastructure, and information itself.
Inf. space

Convention on International
Information Security (concept);
SCO Yekaterinburg Agreement
June 16, 2009

Cyber
Space

Germany: Cyberspace
The virtual space of all IT systems linked at data
level on a global scale. The basis for cyberspace is
the Internet as a universal and publicly accessible
connection and transport network which can be
complemented and further expanded by any
number of additional data networks. IT systems in
an isolated virtual space are not part of
cyberspace.
Cyber Security Strategy
for Germany, 2011

Russia – U.S. Bilateral on Cybersecurity.
Critical Terminology Foundations. EastWest Institute, 2011

An electronic domain through which
information is created, transmitted, received,
stored, processed and deleted

U.S-Russian Study Group: Cyberspace
Threats in Cyberspace: Classification

Malicious Activities in Cyberspace: Actor-Object
Classification
Object

Citizens

States and Proxy
Actors

Actor

O.V. Demidov
Program Coordinator
PIR Center

Russia: the Triad of threats in the
information space

Military and Political
Threats

Citizens

Cyber Crime
(Сitizens vs Citizens)
States and Proxy
Actors

Cyber Terrorism
(Сitizens vs States)

(States vs Citizens)

Cyber war
(States vs States)

?

Any universal classification?

Terrorism

Cybercrime

 Formulated by UN GA Resolution
A/RES/54/49 on December 1, 1998
(adopted under Russia’s initiative)
 Elements are interrelated and inseparable
 Includes the issues of content
 Does not provide understanding of technical
nature of threats
Soft Law Mechanisms and
Codes of Conduct for Cyberspace

Proposals

O.V. Demidov
Program Coordinator
PIR Center

Soft Law Mechanisms

Authors
1. Russia

2. The SCO and its
states

 Russia supports the idea of a Code of Conduct for cyberspace as a
global UN-backed document with strong emphasis on content issues
1. Code of Conduct in the field of International Information Security
(drafted by Russia, Tajikistan, Uzbekistan and China on September 12,
2011)
2. In March 2013 China called for creating some code of conduct for
cyberspace in order to tackle the threat of cyberwar

3. USA

4. UN and the ITU

Since the end of 2012 actively support elaboration of “norms of
responsible behavior” in cyberspace.
 Adaptation of the existing international law (jus in bello, jus ad bellum)
 Support of the Tallinn Manual approach
 Statement by the Secretary of State Hillary Clinton at the international
Conference on Cyberspace in Budapest on November 5, 2012
 International private-state cooperation mechanisms: IMPACT-ITU
Alliance since 2011
(Russia refused, Group-IB and Kaspersky Lab participate)
 The ITU: National Cybersecurity Strategy Guide: is not in demand in
Russia, as well as the ITU cybersecurity standards
 Global Cybersecurity Culture: UN GA Resolution A/RES/64/211,
A/RES/58/199, A/RES/57/239 (just recommendations)
Legally Binding Mechanisms for Cyberspace
Proposals

O.V. Demidov
Program Coordinator
PIR Center

Proposals of legally binding acts

Authors

1. Russia

1. Convention on International Information Security (concept)
 Presented on 11.2011 (Conference on Cyberspace)
 Global scale as a UN act
 Comprehensive nature (the triad of threats + the issues of cyber sovereignty)
2. Project of a universal UN Convention on international cybercrime (to be presented
probably in Seoul in October 2013)
 To provide new level of cooperation and to avoid the flaws of the Budapest
Convention of CoE
 Embraces only criminal segment of the Triad of threats

2. SCO and its separate
states

3. USA

4. UN and the ITU

1. The agreement of SCO on cooperation in the field of ensuring the international
information security signed on June 16, 2009
 Laid terminological foundation in the field of IIS
 First legally binding international document
 No any particular mechanism of intergovernmental cooperation on countering
cyberthreats
 Participate in CoE Convention and promote it as a potentially global mechanism
 Oppose the initiatives of Russia and the SCO because of cyber sovereignty
component
2010: The ITU Secretary General Hamadoun Toure called to elaboration of a global treaty
on prevention of cyberwars
 Concept of a “peace treaty before war”
 Never promoted at the UN GA level
 Political disputes between Russia, China, USA make the idea hardly feasible
Chatham House,
London, 07.05.2013

The International Law Applicable to Cyber Warfare
Issued by CCD COE International Group of Experts on March 28, 2013

Adaptation or a new vision of the international law of armed conflict?
 States may not knowingly allow cyber infrastructure located in their territory
to be used for acts that adversely affect other States
 The State itself is responsible for proxy actors acting under its direction
 The prohibition on the use of force in international law applies fully to cyber
operations. Any cyber operation that caused harm to individuals or damage
to objects qualified as a use of force
 An attack is a cyber operation that causes injury or death to individuals or
damage or destruction to objects or which interferes with the functionality of
cyber infrastructure in a manner that requires repair
 Civilian hacktivists conducting cyber operations during an armed conflict
can become legitimate targets under certain circumstances
Chatham House,
London, 07.05.2013

An International Criminal Court or Tribunal for Cyberspace (ICTC)
Stein Schjolberg, Norwegian Judge, High Level Experts Group (HLEG), ITU, Geneva, Chairman
(2007-2008)
 A United Nations court of law, established through a Resolution by the Security Council in
accordance with Chapter VII of the United Nations Charter
 The idea of international criminal jurisdiction over individuals committing massive and wellcoordinated cyber attacks, which effectively equals to criminal jurisdiction over proxy actors in
cyber conflicts (including state vs state cyber wars with the use of proxy actors)

 Two areas of jurisdiction:
1. “Core cybercrimes” (fraud, data interception, forgery, illegal access, etc.)
2. Massive and coordinated global cyber attacks against critical information
Infrastructures
“To prosecute … whoever by destroying, damaging, or rendering unusable critical communications
and information infrastructures, causes substantial and comprehensive disturbance to the
national security, civil defense, public administration and services, public health or safety, or
banking and financial services”.
 No room for responsibility of a state actor for malicious activities in cyberspace – because of
the attribution problem
Chatham House,
London, 07.05.2013
Chatham House,
London, 07.05.2013

 Information on PIR Center program
“International Information Security and Global
Internet Governance”
net.pircenter.org
 Contacts (Oleg Demidov)
demidov@pircenter.org

Contenu connexe

Tendances

Ostrom’s crypto-principles? Towards a commons-based approach for the use of B...
Ostrom’s crypto-principles? Towards a commons-based approach for the use of B...Ostrom’s crypto-principles? Towards a commons-based approach for the use of B...
Ostrom’s crypto-principles? Towards a commons-based approach for the use of B...David Rozas
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
Network Neutrality: Potential impact on free speech and the right to information
Network Neutrality: Potential impact on free speech and the right to informationNetwork Neutrality: Potential impact on free speech and the right to information
Network Neutrality: Potential impact on free speech and the right to informationŚrodkowoeuropejskie Studia Polityczne
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
Graft Borders onto the Internet: Chinese Internet Sovereignty
Graft Borders onto the Internet: Chinese Internet SovereigntyGraft Borders onto the Internet: Chinese Internet Sovereignty
Graft Borders onto the Internet: Chinese Internet SovereigntyMin Jiang
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberIGF Indonesia
 
UNESCO’S INTERNET UNIVERSALITY INDICATORS: A Framework for Assessing Internet...
UNESCO’S INTERNET UNIVERSALITY INDICATORS: A Framework for Assessing Internet...UNESCO’S INTERNET UNIVERSALITY INDICATORS: A Framework for Assessing Internet...
UNESCO’S INTERNET UNIVERSALITY INDICATORS: A Framework for Assessing Internet...Fola Odufuwa
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 
NETWORK ANALYSIS AND «PREDICTIVE POLICING»: TOWARDS A «PROFILING SOCIETY»?
NETWORK ANALYSIS AND «PREDICTIVE POLICING»: TOWARDS A «PROFILING SOCIETY»?NETWORK ANALYSIS AND «PREDICTIVE POLICING»: TOWARDS A «PROFILING SOCIETY»?
NETWORK ANALYSIS AND «PREDICTIVE POLICING»: TOWARDS A «PROFILING SOCIETY»?Federico Costantini
 

Tendances (12)

Ostrom’s crypto-principles? Towards a commons-based approach for the use of B...
Ostrom’s crypto-principles? Towards a commons-based approach for the use of B...Ostrom’s crypto-principles? Towards a commons-based approach for the use of B...
Ostrom’s crypto-principles? Towards a commons-based approach for the use of B...
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Network Neutrality: Potential impact on free speech and the right to information
Network Neutrality: Potential impact on free speech and the right to informationNetwork Neutrality: Potential impact on free speech and the right to information
Network Neutrality: Potential impact on free speech and the right to information
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Graft Borders onto the Internet: Chinese Internet Sovereignty
Graft Borders onto the Internet: Chinese Internet SovereigntyGraft Borders onto the Internet: Chinese Internet Sovereignty
Graft Borders onto the Internet: Chinese Internet Sovereignty
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
 
Isa12b
Isa12bIsa12b
Isa12b
 
UNESCO’S INTERNET UNIVERSALITY INDICATORS: A Framework for Assessing Internet...
UNESCO’S INTERNET UNIVERSALITY INDICATORS: A Framework for Assessing Internet...UNESCO’S INTERNET UNIVERSALITY INDICATORS: A Framework for Assessing Internet...
UNESCO’S INTERNET UNIVERSALITY INDICATORS: A Framework for Assessing Internet...
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
NETWORK ANALYSIS AND «PREDICTIVE POLICING»: TOWARDS A «PROFILING SOCIETY»?
NETWORK ANALYSIS AND «PREDICTIVE POLICING»: TOWARDS A «PROFILING SOCIETY»?NETWORK ANALYSIS AND «PREDICTIVE POLICING»: TOWARDS A «PROFILING SOCIETY»?
NETWORK ANALYSIS AND «PREDICTIVE POLICING»: TOWARDS A «PROFILING SOCIETY»?
 

En vedette

Cyberwar
CyberwarCyberwar
Cyberwarzapp0
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for CyberwarfareAurin Sheikh
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian lawFAROUQ
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...ClubHack
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 

En vedette (8)

Ankush 2
Ankush 2Ankush 2
Ankush 2
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
Are we ready for Cyberwarfare
Are we ready for CyberwarfareAre we ready for Cyberwarfare
Are we ready for Cyberwarfare
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian law
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 

Similaire à Chatham House Cyber+Space Conference June 2013 - International Norms for Cyberspace: Deadlocks to Resolve, Lessons to Learn

CYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxCYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxalanrgibson41217
 
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docxalinainglis
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
UNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperUNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperAkshay Sinha
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Public Policy
Public PolicyPublic Policy
Public Policybrisso99
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docxcharlottej5
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Developments in the field of information and telecommunications in the contex...
Developments in the field of information and telecommunications in the contex...Developments in the field of information and telecommunications in the contex...
Developments in the field of information and telecommunications in the contex...Yahya CyberCloud
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismIJECEIAES
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 

Similaire à Chatham House Cyber+Space Conference June 2013 - International Norms for Cyberspace: Deadlocks to Resolve, Lessons to Learn (20)

Russia and cybercrime
Russia and cybercrimeRussia and cybercrime
Russia and cybercrime
 
CYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxCYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docx
 
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
UNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paperUNICEF Russian digital landscape exploratory paper
UNICEF Russian digital landscape exploratory paper
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Public Policy
Public PolicyPublic Policy
Public Policy
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docx
 
The RuNet generation
The RuNet generationThe RuNet generation
The RuNet generation
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Developments in the field of information and telecommunications in the contex...
Developments in the field of information and telecommunications in the contex...Developments in the field of information and telecommunications in the contex...
Developments in the field of information and telecommunications in the contex...
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 

Dernier

05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...srinuseo15
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...Andy (Avraham) Blumenthal
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...IT Industry
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfssuser5750e1
 
The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdomlunadelior
 
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In DubaiDubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In Dubaikojalkojal131
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdflambardar420420
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptxYasinAhmad20
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...anjanibaddipudi1
 
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Insiger
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...Faga1939
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsVoterMood
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...hyt3577
 
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...tewhimanshu23
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Dernier (20)

05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdom
 
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In DubaiDubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
 
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
 
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf
 

Chatham House Cyber+Space Conference June 2013 - International Norms for Cyberspace: Deadlocks to Resolve, Lessons to Learn

  • 1. Chatham House, London, 07.05.2013 Oleg Demidov, Program Coordinator, PIR Center
  • 3. Conflicting Understanding of Cyberspace: An Obstacle for Common Norms USA: Cyberspace Russia, SCO: Information Space A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processes and controllers U.S. Department of Defense (latest edition 2012) O.V. Demidov Program Coordinator PIR Center Information space - the sphere of activity connected with the formation, creation, conversion, transfer, use, an d storage of information and which has an effect on individual and social consciousness, the information infrastructure, and information itself. Inf. space Convention on International Information Security (concept); SCO Yekaterinburg Agreement June 16, 2009 Cyber Space Germany: Cyberspace The virtual space of all IT systems linked at data level on a global scale. The basis for cyberspace is the Internet as a universal and publicly accessible connection and transport network which can be complemented and further expanded by any number of additional data networks. IT systems in an isolated virtual space are not part of cyberspace. Cyber Security Strategy for Germany, 2011 Russia – U.S. Bilateral on Cybersecurity. Critical Terminology Foundations. EastWest Institute, 2011 An electronic domain through which information is created, transmitted, received, stored, processed and deleted U.S-Russian Study Group: Cyberspace
  • 4. Threats in Cyberspace: Classification Malicious Activities in Cyberspace: Actor-Object Classification Object Citizens States and Proxy Actors Actor O.V. Demidov Program Coordinator PIR Center Russia: the Triad of threats in the information space Military and Political Threats Citizens Cyber Crime (Сitizens vs Citizens) States and Proxy Actors Cyber Terrorism (Сitizens vs States) (States vs Citizens) Cyber war (States vs States) ? Any universal classification? Terrorism Cybercrime  Formulated by UN GA Resolution A/RES/54/49 on December 1, 1998 (adopted under Russia’s initiative)  Elements are interrelated and inseparable  Includes the issues of content  Does not provide understanding of technical nature of threats
  • 5. Soft Law Mechanisms and Codes of Conduct for Cyberspace Proposals O.V. Demidov Program Coordinator PIR Center Soft Law Mechanisms Authors 1. Russia 2. The SCO and its states  Russia supports the idea of a Code of Conduct for cyberspace as a global UN-backed document with strong emphasis on content issues 1. Code of Conduct in the field of International Information Security (drafted by Russia, Tajikistan, Uzbekistan and China on September 12, 2011) 2. In March 2013 China called for creating some code of conduct for cyberspace in order to tackle the threat of cyberwar 3. USA 4. UN and the ITU Since the end of 2012 actively support elaboration of “norms of responsible behavior” in cyberspace.  Adaptation of the existing international law (jus in bello, jus ad bellum)  Support of the Tallinn Manual approach  Statement by the Secretary of State Hillary Clinton at the international Conference on Cyberspace in Budapest on November 5, 2012  International private-state cooperation mechanisms: IMPACT-ITU Alliance since 2011 (Russia refused, Group-IB and Kaspersky Lab participate)  The ITU: National Cybersecurity Strategy Guide: is not in demand in Russia, as well as the ITU cybersecurity standards  Global Cybersecurity Culture: UN GA Resolution A/RES/64/211, A/RES/58/199, A/RES/57/239 (just recommendations)
  • 6. Legally Binding Mechanisms for Cyberspace Proposals O.V. Demidov Program Coordinator PIR Center Proposals of legally binding acts Authors 1. Russia 1. Convention on International Information Security (concept)  Presented on 11.2011 (Conference on Cyberspace)  Global scale as a UN act  Comprehensive nature (the triad of threats + the issues of cyber sovereignty) 2. Project of a universal UN Convention on international cybercrime (to be presented probably in Seoul in October 2013)  To provide new level of cooperation and to avoid the flaws of the Budapest Convention of CoE  Embraces only criminal segment of the Triad of threats 2. SCO and its separate states 3. USA 4. UN and the ITU 1. The agreement of SCO on cooperation in the field of ensuring the international information security signed on June 16, 2009  Laid terminological foundation in the field of IIS  First legally binding international document  No any particular mechanism of intergovernmental cooperation on countering cyberthreats  Participate in CoE Convention and promote it as a potentially global mechanism  Oppose the initiatives of Russia and the SCO because of cyber sovereignty component 2010: The ITU Secretary General Hamadoun Toure called to elaboration of a global treaty on prevention of cyberwars  Concept of a “peace treaty before war”  Never promoted at the UN GA level  Political disputes between Russia, China, USA make the idea hardly feasible
  • 7. Chatham House, London, 07.05.2013 The International Law Applicable to Cyber Warfare Issued by CCD COE International Group of Experts on March 28, 2013 Adaptation or a new vision of the international law of armed conflict?  States may not knowingly allow cyber infrastructure located in their territory to be used for acts that adversely affect other States  The State itself is responsible for proxy actors acting under its direction  The prohibition on the use of force in international law applies fully to cyber operations. Any cyber operation that caused harm to individuals or damage to objects qualified as a use of force  An attack is a cyber operation that causes injury or death to individuals or damage or destruction to objects or which interferes with the functionality of cyber infrastructure in a manner that requires repair  Civilian hacktivists conducting cyber operations during an armed conflict can become legitimate targets under certain circumstances
  • 8. Chatham House, London, 07.05.2013 An International Criminal Court or Tribunal for Cyberspace (ICTC) Stein Schjolberg, Norwegian Judge, High Level Experts Group (HLEG), ITU, Geneva, Chairman (2007-2008)  A United Nations court of law, established through a Resolution by the Security Council in accordance with Chapter VII of the United Nations Charter  The idea of international criminal jurisdiction over individuals committing massive and wellcoordinated cyber attacks, which effectively equals to criminal jurisdiction over proxy actors in cyber conflicts (including state vs state cyber wars with the use of proxy actors)  Two areas of jurisdiction: 1. “Core cybercrimes” (fraud, data interception, forgery, illegal access, etc.) 2. Massive and coordinated global cyber attacks against critical information Infrastructures “To prosecute … whoever by destroying, damaging, or rendering unusable critical communications and information infrastructures, causes substantial and comprehensive disturbance to the national security, civil defense, public administration and services, public health or safety, or banking and financial services”.  No room for responsibility of a state actor for malicious activities in cyberspace – because of the attribution problem
  • 10. Chatham House, London, 07.05.2013  Information on PIR Center program “International Information Security and Global Internet Governance” net.pircenter.org  Contacts (Oleg Demidov) demidov@pircenter.org