Russia And US Offer Competing Visions Of Cyber Normality

It’s October and the United Nations General Assembly and subsidiary committees have started their work in earnest. 

As expected, Russia tabled a draft resolution seeking the General Assembly’s endorsement of an “international code of conduct for international information security,” and a resumption of the UN Group of Governmental Experts (GGE) process next year. 

Somewhat less expected, however, is that the United States tabled a competing resolution, setting up a clash between Russia, China, and their largely autocratic friends on one side, and the United States, the European Union, Canada, Japan, and Australia on the other. 

First, some Background 

Almost every year since 1998, Russia has sponsored a General Assembly resolution called “Developments in the field of information and telecommunications in the context of international security.” It’s the mechanism through which UN member states express concern that malicious activity in cyberspace can undermine international peace and security. 

It’s also the resolution that created the GGEs on cybersecurity. Three of those GGEs led to consensus reports that recommended states abide by a set of norms, including the applicability of international law to cyberspace, participate in confidence building measures, and support capacity building initiatives to reduce the risk that state actions in cyberspace threaten international peace and security.

The text of the resolution has not been made public, but it is likely to be a combination of existing cyber norms the GGE agreed to in 2013 and 2015 and previous iterations of another code of conduct members of the Shanghai Cooperation Organisation (SCO) proposed in 2011 and 2015. 

The inclusion of the SCO language will make the United States and like-minded countries balk given its negative human rights implications. 

Nevertheless, the proposed Russian resolution could probably be salvaged through negotiation that strips it of the SCO code’s worst elements, keeps the consensus GGE language, and mandates the creation of a new GGE to pick up where the last one fell apart.

The text of the proposed Russian resolution is now public, and it’s about as expected. It cherry picks some of the worst elements from the previous Codes (e.g. promotes concepts of “cyber sovereignty,” sidelines the role of the private sector, etc.), un-ironically bemoans the spread of disinformation online, and mis-characterises previous consensus GGE text. 

It also calls for a new GGE with the mandate of identifying ways to implement the new code of conduct, make changes as necessary, and to study the possibility of establishing an “institutional dialogue” on cyber issues within the United Nations. 

The United States must have deemed the Russian text unsalvageable because it proposed its own competing resolution, backed by EU countries, Canada, Australia, and a few others. It applauds the work of the previous GGEs, calls on member states to abide by the previous reports’ recommendations, and requests a new GGE be established with largely the same mandate as previous ones.

Contrary to previous iterations, however, the United States asks that whatever report comes from the new GGE should include an annex “containing national contributions of participating governmental experts on the subject of how international law applies to the use of information and communication technologies by States.” 

The United States started laying out its understanding of how international law applies online in the Obama administration (here and here), and has encouraged countries to do the same. Earlier this year, the UK Attorney General laid out his country’s views on the matter. 

By pushing for an annex in the GGE report, the United States is trying to get Russia, China, and others on the record, particularly salient for China as it has remained silent on whether international humanitarian law applies online. 

I’m not a UN process expert, so it’s hard to say how this will play out. But if I were a betting man, I’d put my money on the US approach coming out on top. As an institution, the United Nations prefers incrementalism over radical change. 

That makes it much harder for Russia, China and the rest of the SCO members to drum up support for a twenty-five paragraph code of conduct that contains vague language mostly unfamiliar to many states. 

By contrast, the US resolution has more similarities to Russia’s previous resolutions, an advantage given that they will be familiar to diplomats at the UN who prefer sticking to previously agreed text. 

No matter what happens as diplomats haggle over the particulars of the resolution, expect a new GGE next year. The only open question at this point is its mandate, and that should be made clear in the next few weeks. 

Defense One:

You Might Also Read:

Cyberattack Revelations Appear To Undercut Russia's UN Efforts:

Russia Will Build A Separate Internet Directory:

The US Is Losing the Information War To Russia

« IBM Spends $34B To Buy Red Hat
British Refuse To Co-operate With Belgian Hacking Inquiry »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Certes

Certes

Certes is a pioneer in delivering cutting-edge security technology solutions, with a specific focus on Data Protection Risk Mitigation (DPRM).

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

AngelList

AngelList

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.