US Changes Policy On International Cyber Regime

The US delegate now says a UN cybersecurity group should pause hashing out new rules for online behavior and instead try to get governments to adhere to the ones we have.

A United Nations cybersecurity experts group meeting recently in Geneva should focus on encouraging UN member states to adopt existing cyber rules of the road and confidence-building measures rather than developing new ones, the US delegate said.

That’s a significant shift from a 2015 series of Group of Governmental Experts, or GGE, meeting, during which the US pushed vigorously for a set of peacetime cyber norms, including that nations should not attack each other’s critical infrastructure such as energy plants and electrical grids.

During a round of GGE meetings in 2013, the experts group concluded the international laws that govern armed conflict should apply in cyber-space just as they do on land or at sea.

“We don’t need a continual norms machine ramping out a lot of norms,” State Department Deputy Coordinator for Cyber Issues Michele Markoff told an audience at the Carnegie Endowment for International Peace.

“What we need to do is consolidate what we’ve done and get states to implement,” she said, “both in the internalisation of the norms but also in the operationalization of [confidence-building measures] which will help the norms.”

Confidence-building measures include nations sharing information about transnational cyber threats and about national cyber-security strategies.

The experts group, which is composed of diplomats from 25 nations including Russia and China, has functioned something like an advisory committee on international cyber-security. Principles endorsed by the group remain voluntary and nonbinding for UN member states but generally form a line of accepted behavior that nations don’t want to be seen openly crossing.

Other peacetime cyber “norms” endorsed by the 2015 experts’ group include commitments that nations should not attack each other’s cyber emergency responders and should assist other nations in investigating cyber-attacks launched from their territory.

The US has often faced resistance in the expert’s group from Russian and Chinese delegates who are concerned the US wants to leverage cyber norms to ensure its own hegemony in cyber-space.

Markoff expressed optimism that the US and Russia can cooperate on some international cyber priorities despite tension created by non-cyber conflicts such as the Russian occupation of Crimea.

That work may be aided by the Trump administration’s efforts to repair relations with its former Cold War adversary, she said.

“Despite the decline in US-Russian relations over the last several years, US-Russia cyber relations have been, in fact, a bright spot. I say that with all sincerity,” she said, listing several international forums in which the nations have reached agreement on cyber issues. “As a long-time arms controller … I find that talking to [Russian officials] is much better than not talking to them.”

Markoff added while the U.S. and Russia can be “fellow travelers on a road which is designed to prevent conflict from escalating into open warfare,” the two will often have different broader goals.

Markoff did not address the Russian government-backed hacking of Democratic political organisations during the 2016 election, which US intelligence officials say was designed to aid the electoral chances of President Donald Trump.  

That influence operation did not specifically violate any of the cyber norms endorsed by the 2015 GGE because the US government did not, at that point, consider electoral systems critical infrastructure.

However, the Obama administration repeatedly described the Russian electoral meddling as outside larger bounds of appropriate state behavior and President Barack Obama termed the meddling an “unusual and extraordinary threat to the national security, foreign policy, and economy of the United States” when imposing additional sanctions on Russia.

The US Homeland Security Department added electoral systems to its list of critical infrastructure categories during the final weeks of the Obama administration, despite protests from some state-level officials. The Trump administration has done nothing so far to reverse that decision.

A Russia-linked attack on Ukraine’s power grid last year also did not violate the GGE norm prohibiting critical infrastructure attacks, Markoff said, because the norms apply only in peacetime and the US considers Russia and Ukraine to be in a state of open conflict.

“You can say Russia violated a whole lot of other things, I mean, killing people, but they are not violating this norm,” Markoff said.

DefenseOne

No US Cyber Peace Agreement with China:        Cyber War and Peace:

 

« Teaching Kids Cyber Skills
Tech Companies Oppose Trump’s Travel Ban »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Codezero Technologies

Codezero Technologies

Codezero is at the forefront of microservices development, employing an identity-aware overlay network that delivers zero-trust security to DevOps.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.