Finland Could Reshape Cyber Law

CGA2jiIWIAAEs4u.jpg

The future of cyberspace does not look encouraging. Nation-states are developing increasingly sophisticated cyber capabilities, a source of significant tension given their destructive potential. Some of the powerful cyber actors are already sniping accusations at each other and forming defensive alliances. For example, China and the United States have been accusing each other for years, and China recently signed a cybersecurity agreement with Russia.

We are at a critical juncture. We are developing cyber capabilities faster than policies and doctrines can control them. The Tallinn Manual on the International Law Applicable to Cyber Warfare sponsored by NATO’s Co-operative Cyber Defence Centre of Excellence was an encouraging step forward in the pursuit of international norms and laws regulating the cyber domain. But implementing and enforcing the norms the manual promotes has been poor. The world needs a fluid and frank dialogue among states, the private sector, and civil society in order to guarantee the security of cyberspace. There seems to be a desire for new normative and institutional orders in cyberspace, but what they might be, how they will be established, and how broadly they will be accepted are open questions.

Would it be more desirable to negotiate an international cyber treaty or to extend agreements that cover other issue-areas in the digital sphere? The first option is unlikely to happen. States conceptualize cyberspace in many different ways and their interests are so widespread that finding a common starting point for treaty making is difficult. The second option, the inclusion of cyber issues in the existing regulation that covers international trade or law enforcement seems more promising.
There may be instances, however, where integrating cyber issues into existing rule-making bodies or improving international cooperation is not feasible. Therefore, there is a need for a forum where cyber-related quarrels could be mediated. The International Telecommunication Union has often been suggested as possibility, but its current authority and mandate would need to be changed and that is likely to encounter some stiff resistance.

The creation of international norms for cyberspace is a necessity and the world needs peace negotiators. Someone must take the lead in shaping shared cyber norms. Finland is a perfect candidate. It has a thriving tech sector and an official policy of neutrality. As a middle-power, it may be easier for Finland to help parties find a middle ground on the development of cyber norms given that it lacks great power ambitions. Finland is also recognized as a reliable, constructive and credible partner, and has a track record when it comes to international mediation. Finland played an important role in the peace processes in Northern Ireland, the Western Balkans, the Horn of Africa and the South Caucasus, giving its foreign ministry considerable experience handling delicate negotiations.

Finland already has good relationships with the United States and China, and has a long experience working with Russia, given their shared history and common border. Former Finnish President Martti Ahtisaari won the Nobel Peace Prize for his peace building efforts and his Crisis Management Initiative (CMI) is an important actor in the prevention and resolution of violent conflicts. CMI has experience bringing parties together in the Aceh peace process and is currently trying to do the same in the Middle East. It is also skilled at working with various actors, from foreign ministries to civil society groups, at finding common ground and implementing agreements. These skills are what the world needs to develop and implement the shared cyber norms that will help prevent cyber conflict.

Finland’s reputation, lack of great power ambition, and track record can attract others to come together and discuss shared global cyber norms. If the world wants to grasp the opportunity—and contribute remarkably to international stability—now would be the right time to contact Finland.
DefenseOne: http://bit.ly/1J8YdBc

 

« North Korean Hackers 'could kill', Warns Defector
"Torus" Reveals an Expansion in 5 Eyes Surveillance. »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Baffle

Baffle

Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

PriorityZero

PriorityZero

PriorityZero is a European company focused on remote security assessments and consulting services that operates on a global scale.

Charm Security

Charm Security

Charm Security is an AI-powered customer security platform that protects organizations and their customers from scams, social engineering, and human-centric fraud.