SlideShare a Scribd company logo
A Framework
of Responsible
State
Behaviour in
Cyberspace
Benjamin Ang
Senior Fellow,
Cyber and Homeland Defence
Deputy Head,
Centre of Excellence for
National Security
(CENS), RSIS, NTU
Twitter @benjaminang
The 11 UNGGE 2015 Norms
Good practices
• cooperate to increase stability
and security
• consider all relevant
information in incidents;
• assist each other to prosecute
terrorists and criminals
• protect own critical
infrastructure;
• respond to requests for
assistance
• encourage responsible
reporting of ICT vulnerabilities
Limiting norms
• not damage others’ critical
infrastructure;
• not harm another state’s
CERT/CSIRTS;
• not allow territory to be used to
attack;
• ensure supply chain security,
prevent proliferation of
malware;
• respect human rights / right to
privacy
Other international initiatives
• All of these entities
also participated in
the UN OEWG
Intersessional Multi-
stakeholder Meeting
and
proposed their views
there
Private sector initiatives -
Microsoft: Digital Geneva Convention
Private Sector initiatives
–Charter of Trust
• Calls for binding rules and
standards to build trust in
cybersecurity
• 16 members: Munich Security
Conference, NTT, AES,
Airbus, Allianz, Atos, Cisco,
Daimler, Dell Technologies,
Deutsche Telekom, IBM, NXP,
SGS, Total and TÜV Süd
• Already implementing projects
for cyber threat info sharing
and supply chain security
Multi-stakeholder initiatives –
Global Commission on the Stability of
Cyberspace (GCSC)
• 26 Commissioners
from government,
industry, technical
and civil society
• Initiated by think
tanks Hague Centre
for Strategic Studies
(HCSS) and
EastWest Institute
(EWI)
• Funded and
supported by
governments,
corporations,
universities, and the
United Nations
Institute for
Disarmament
GCSC Calls (Norms)
• Protect the public core of the Internet
• Protect electoral infrastructure
• Avoid tampering
• No botnets
GCSC Calls (Norms)
• Report vulnerabilities
• Reduce vulnerabilities
• Ensure basic cyber hygiene
• No offensive actions by non-state
actors
Paris Call for Trust and Security in
Cyberspace
• Non-binding declaration for development of
common principles for securing cyberspace
• Launched in November 2018 at the Internet
Governance Forum by President Emmanuel
Macron of France
– Neither the “Californian Internet” (all corporate) nor
the “Chinese Internet” (all government)
• 564 official supporters: 67 States, 139
international and civil society organizations, and
358 private sector
Paris Call – 9 Principles to limit
hacking and destabilising activities
1. Protect individuals and infrastructure
2. Protect the Internet
3. Defend electoral processes
4. Defend intellectual property
5. Non-proliferation of malware
6. Lifecycle security
7. Cyber hygiene
8. No private hack back
9. International norms
Cyber Tech Accord
• Protect all of our users and
customers
• Oppose cyberattacks on
innocent citizens and
enterprises
• Help empower users,
customers and developers
to strengthen cybersecurity
protection
• Partner with each other and
with likeminded groups to
enhance cybersecurity
International Code of
Conduct for Information
Security (the “Code”)
• International
effort to develop
norms of
behaviour in the
digital space
• Proposed by
member states
of the Shanghai
Cooperation
Organization
(SCO)
• Submitted to the
UN General
Assembly in
2011 and 2015
SCO and UN
• “Bears in mind” the recommendations of the UN
Group of Governmental Experts on
Developments in the Field of Information and
Telecommunications in the Context of
International Security (UN GGE)
• Proposes that “additional norms could be
developed”
• Members of SCO are also participating in the
United Nations Open Ended Working Group (UN
OEWG)
L.27
OEWG
UNGGE 2013
A/68/98
International law,
and in particular
the Charter of
the United
Nations, is
applicable
UNGA A/RES/71/28
adopts Norms and
International Law
UNGGE 2015
A/70/174
Offered non-
exhaustive views
on how
international law
applies to the
use of ICTs by
States
ASEAN AMCC 2018
Agreed in principle
that international
law is essential
CSCAP Study Group
on International Law
and Cyberspace
identified areas for
study
The EU recalls that
International law
and in particular
the UN Charter, is
applicable
Regional
Consultations
ASEAN Regional
Forum (1-3 Oct)
Organization of
American States
(15-16 Aug 2019)
African Union
(11 Oct 2019)
ASEAN/US Leaders
Statement 2018
reaffirmed that
international law is
essential
OAS International
Law Department
circulated in 2019 a
Questionnaire on
international law
ICRC international
humanitarian law
applies to cyber
operations during
armed conflict
Singapore funds,
establishes ASEAN
Singapore Cyber
Security Centre of
Excellence
Context of the OEWG
WHAT DO THE 11 NORMS
MEAN?
13(a)
Cooperation to
increase stability
and security
States should cooperate
in developing and
applying measures to
increase stability and
security in the use of
ICTs and to prevent ICT
practices that are
acknowledged to be
harmful or that may pose
threats to international
peace and security;
Let’s
cooperate!
13(b)
Information
for Attribution
In case of ICT incidents,
States should consider
all relevant information,
including the larger
context of the event, the
challenges of attribution
in the ICT environment
and the nature and
extent of the
consequences;
Let me check
before I
blame…
FIRELAND
Wrongful attribution
WATERLAND
(not aware)
AIRLAND
INFECTED
INFECTED
We’ve been cyber-
attacked! Where
did it come from?
The malware
must have
come from
WATERLAND!
FIRELAND
Dangers of Wrong Attribution
WATERLAND
(not aware)
AIRLAND
INFECTED
INFECTED
WATERLAND, we will
take countermeasures
against you!
We’re
innocent!
Ha ha ha
(evil
laughter)
Is AIRLAND in breach
of International Law?
13(c) Do not allow
Territory to be
used for
Wrongful Acts
States should not
knowingly allow their
territory to be used for
internationally wrongful
acts using ICTs;
FIRELAND
Do NOT do this
WATERLAND
AIRLAND
I shall attack
AIRLAND
INFECTED
INFECTED
Hey FIRELAND,
you can use our
servers
FIRELAND
Does it apply to this case? (2)
WATERLAND
AIRLAND
I shall
attack
AIRLAND
INFECTED
INFECTED
We are not
aware of
anything
FIRELAND
Does it apply to this case? (3)
WATERLAND
AIRLAND
I shall
attack
AIRLAND
infected
infected
We are not
aware of
anything
Hey WATERLAND,
your servers are
attacking us!
Oh No! We
don’t have
capacity!
13(d) Cooperation
in exchanging
info,prosecuting
terrorists, crime
States should consider
how best to cooperate to
exchange information,
assist each other,
prosecute terrorist and
criminal use of ICTs and
implement other
cooperative measures to
address such threats.
WATERLAND
Please help us to
catch the Evil
Clown Hacker
AIRLAND
We caught him
for you!
13(e) Respect for
Human Rights
States, in ensuring the
secure use of ICTs,
should respect Human
Rights Council resolutions
20/8 and 26/13 on the
promotion, protection and
enjoyment of human
rights on the Internet, as
well as General Assembly
resolutions 68/167 and
69/166 on the right to
privacy in the digital age,
to guarantee full respect
for human rights,
including the right to
freedom of expression;
A State should not
conduct or knowingly
support ICT activity
contrary to its obligations
under international law
that intentionally
damages critical
infrastructure or
otherwise impairs the
use and operation of
critical infrastructure to
provide services to the
public;
13(f) Not damage
Critical
Infrastructure
FIRELAND
WATERLAND
We know you
hacked our
power stations
AIRLAND
That’s not
acceptable
13(g) Protection
of Critical
Infrastructure
States should take
appropriate measures to
protect their critical
infrastructure from ICT
threats, taking into
account General
Assembly resolution
58/199 on the creation of
a global culture of
cybersecurity and the
protection of critical
information
infrastructures, and other
relevant resolutions;
13(h) Help others
to protect
Critical
Infrastructure
States should respond to
appropriate requests for
assistance by another
State whose critical
infrastructure is subject to
malicious ICT acts. States
should also respond to
appropriate requests to
mitigate malicious ICT
activity aimed at the
critical infrastructure of
another State emanating
from their territory, taking
into account due regard
for sovereignty
My hospitals and
power stations are
getting hacked!
Help!
WATERLAND
Okay, we’re on the
way!
AIRLAND
13(i) Supply Chain
Integrity /
Non-
Proliferation
States should take
reasonable steps to
ensure the integrity of
the supply chain so that
end users can have
confidence in the
security of ICT products.
States should seek to
prevent the proliferation
of malicious ICT tools
and techniques and the
use of harmful hidden
functions;
Let’s put a Back
Door in this network
product before we
export it
No, we
shouldn’t do
that!
13(j) Report
Vulnerabilities
States should encourage
responsible reporting of
ICT vulnerabilities and
share associated
information on available
remedies to such
vulnerabilities to limit
and possibly eliminate
potential threats to ICTs
and ICT-dependent
infrastructure;
We discovered a
Back Door in this
popular software
Thank you for
telling the public
13(k) CERTS
States should not
conduct or knowingly
support activity to harm
the information systems
of the authorized
emergency response
teams (sometimes
known as computer
emergency response
teams or cybersecurity
incident response
teams) of another State.
We’re supposed to
protect people!
Don’t attack us!
13(k) CERTS
A State should not use
authorized emergency
response teams to
engage in malicious
international activity.
We’re
supposed to
protect people,
not hack them!
I want you to
hack the
WATERLAND
hospitals
Observations from Cyber Norms
capacity building activities
(Manila, KL, Sydney)
• Different countries (and different ministries within
countries) have different interpretations: Scams?
Cyber pornography? Fake news? Hacking?
• Many countries have no cyber agency
• Very senior officials across different sectors are
interested, and should be included
• There is still a need for clarity on what cyber
norms can achieve
• Track II has a key role in cyber capacity building
Case Study: ASEAN
• ASEAN needs Cyberspace, because Digital
Transformation can bring economic progress for all
Member States
• BUT Member States have different levels of cyber
maturity – see the ASPI and EU Cyber Direct reports
on Cyber Maturity in Asia Pacific region
• AND cyber attackers will attack ASEAN through the
weakest Member States e.g. through the ASEAN
Smart City Network
• So Capacity Building is needed
ASEAN Ministers Cybersecurity
Conference (AMCC) agreed …
• 2016: Agreed on value of
practical cybersecurity norms
of behaviour in ASEAN
• 2017: Supported development
of basic, operational and
voluntary norms
• 2018: Singapore would
propose a mechanism to
enhance ASEAN cyber
coordination
• 2019: Agreed to move forward
on a formal cybersecurity
coordination mechanism
2020 AMCC announced:
• Singapore + United
Nations will draw up a
checklist of steps to
implement cyber norms
• e.g. legal frameworks
and sharing networks
• ASEAN will share its
experience and
knowledge with the UN
What next for ASEAN?
Capacity Building
Programmes
• ASEAN-Singapore Cyber
Centre of Excellence
• ASEAN-Japan
Cybersecurity Capacity
Building Centre in
Thailand
• Singapore/US State Dept
Third Country Training
Program (TCTP)
• UN-Singapore Cyber
Diplomacy Course
Confidence Building
Measures
• Joint training between
Member States to
improve communication
• Sharing cyber threat
information (between
CERTS)
• Contact list
A Framework for
Responsible State Behaviour
Norms
• Agree on
what is
acceptable
state
behaviour
Laws
• Interpret
existing
laws
• Possibly
create new
ones
Rules
• Responsible
states
follow
rules-
based
order in
cyberspace

More Related Content

What's hot

Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
Amy McMullin
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
Dr David Probert
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
Benjamin Ang
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
kaouthermejri
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
OECD
OECDOECD
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
Gamentortc
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
MuhammadAwaisQureshi6
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
IAPP certification programs overview
IAPP certification programs overviewIAPP certification programs overview
IAPP certification programs overview
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
RIPE NCC
 
Blue Team
Blue TeamBlue Team
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
KharimMchatta
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
Shujun Li
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Play,Learn and Hack- CTF Training
Play,Learn and Hack- CTF TrainingPlay,Learn and Hack- CTF Training
Play,Learn and Hack- CTF Training
Heba Hamdy Farahat
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
Amy McMullin
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
Vishni Ganepola
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection Bill
TrustArc
 

What's hot (20)

Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Singapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
OECD
OECDOECD
OECD
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Lesson 2 - IDPS
Lesson 2 - IDPSLesson 2 - IDPS
Lesson 2 - IDPS
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
IAPP certification programs overview
IAPP certification programs overviewIAPP certification programs overview
IAPP certification programs overview
 
Internet Governance
Internet GovernanceInternet Governance
Internet Governance
 
Blue Team
Blue TeamBlue Team
Blue Team
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Play,Learn and Hack- CTF Training
Play,Learn and Hack- CTF TrainingPlay,Learn and Hack- CTF Training
Play,Learn and Hack- CTF Training
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection Bill
 

Similar to Framework of responsible state behaviour in cyberspace - for Marshall Center PCSS 2020

WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsAllan Cytryn
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
Mark Johnson
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
sabrangsabrang
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
Genti79
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
Commonwealth Telecommunications Organisation
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
Knowledge Group
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
Fahmi Albaheth
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
Benjamin Ang
 
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Directorate of Information Security | Ditjen Aptika
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
GrittyCC
 
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
IGF Indonesia
 

Similar to Framework of responsible state behaviour in cyberspace - for Marshall Center PCSS 2020 (20)

WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Un security-resolution 57 239
Un security-resolution 57 239 Un security-resolution 57 239
Un security-resolution 57 239
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
 

More from Benjamin Ang

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Benjamin Ang
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
Benjamin Ang
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Benjamin Ang
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
Benjamin Ang
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
Benjamin Ang
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Benjamin Ang
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Benjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
Benjamin Ang
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
Benjamin Ang
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
Benjamin Ang
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Benjamin Ang
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Benjamin Ang
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Benjamin Ang
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
Benjamin Ang
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
 

More from Benjamin Ang (20)

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 

Recently uploaded

Mizzima Weekly Analysis & Insight Issue 1
Mizzima Weekly Analysis & Insight Issue 1Mizzima Weekly Analysis & Insight Issue 1
Mizzima Weekly Analysis & Insight Issue 1
Mizzima Media
 
Short history indo pak 1965 war 1st pd.ppt
Short history indo pak 1965 war 1st pd.pptShort history indo pak 1965 war 1st pd.ppt
Short history indo pak 1965 war 1st pd.ppt
pawan543822
 
Future Of Fintech In India | Evolution Of Fintech In India
Future Of Fintech In India | Evolution Of Fintech In IndiaFuture Of Fintech In India | Evolution Of Fintech In India
Future Of Fintech In India | Evolution Of Fintech In India
TheUnitedIndian
 
ys jagan mohan reddy political career, Biography.pdf
ys jagan mohan reddy political career, Biography.pdfys jagan mohan reddy political career, Biography.pdf
ys jagan mohan reddy political career, Biography.pdf
VoterMood
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Slator- Language Industry Intelligence
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 
27052024_First India Newspaper Jaipur.pdf
27052024_First India Newspaper Jaipur.pdf27052024_First India Newspaper Jaipur.pdf
27052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
sadiakorobi2
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
bhavenpr
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Chapter-8th-Recent Developments in Indian Politics-PPT.pptx
Chapter-8th-Recent Developments in Indian Politics-PPT.pptxChapter-8th-Recent Developments in Indian Politics-PPT.pptx
Chapter-8th-Recent Developments in Indian Politics-PPT.pptx
ssuserec98a3
 
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptxHISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
aditiyad2020
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 

Recently uploaded (20)

Mizzima Weekly Analysis & Insight Issue 1
Mizzima Weekly Analysis & Insight Issue 1Mizzima Weekly Analysis & Insight Issue 1
Mizzima Weekly Analysis & Insight Issue 1
 
Short history indo pak 1965 war 1st pd.ppt
Short history indo pak 1965 war 1st pd.pptShort history indo pak 1965 war 1st pd.ppt
Short history indo pak 1965 war 1st pd.ppt
 
Future Of Fintech In India | Evolution Of Fintech In India
Future Of Fintech In India | Evolution Of Fintech In IndiaFuture Of Fintech In India | Evolution Of Fintech In India
Future Of Fintech In India | Evolution Of Fintech In India
 
ys jagan mohan reddy political career, Biography.pdf
ys jagan mohan reddy political career, Biography.pdfys jagan mohan reddy political career, Biography.pdf
ys jagan mohan reddy political career, Biography.pdf
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 
27052024_First India Newspaper Jaipur.pdf
27052024_First India Newspaper Jaipur.pdf27052024_First India Newspaper Jaipur.pdf
27052024_First India Newspaper Jaipur.pdf
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
Chapter-8th-Recent Developments in Indian Politics-PPT.pptx
Chapter-8th-Recent Developments in Indian Politics-PPT.pptxChapter-8th-Recent Developments in Indian Politics-PPT.pptx
Chapter-8th-Recent Developments in Indian Politics-PPT.pptx
 
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptxHISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 

Framework of responsible state behaviour in cyberspace - for Marshall Center PCSS 2020

  • 1. A Framework of Responsible State Behaviour in Cyberspace Benjamin Ang Senior Fellow, Cyber and Homeland Defence Deputy Head, Centre of Excellence for National Security (CENS), RSIS, NTU Twitter @benjaminang
  • 2. The 11 UNGGE 2015 Norms Good practices • cooperate to increase stability and security • consider all relevant information in incidents; • assist each other to prosecute terrorists and criminals • protect own critical infrastructure; • respond to requests for assistance • encourage responsible reporting of ICT vulnerabilities Limiting norms • not damage others’ critical infrastructure; • not harm another state’s CERT/CSIRTS; • not allow territory to be used to attack; • ensure supply chain security, prevent proliferation of malware; • respect human rights / right to privacy
  • 3. Other international initiatives • All of these entities also participated in the UN OEWG Intersessional Multi- stakeholder Meeting and proposed their views there
  • 4. Private sector initiatives - Microsoft: Digital Geneva Convention
  • 5. Private Sector initiatives –Charter of Trust • Calls for binding rules and standards to build trust in cybersecurity • 16 members: Munich Security Conference, NTT, AES, Airbus, Allianz, Atos, Cisco, Daimler, Dell Technologies, Deutsche Telekom, IBM, NXP, SGS, Total and TÜV Süd • Already implementing projects for cyber threat info sharing and supply chain security
  • 6. Multi-stakeholder initiatives – Global Commission on the Stability of Cyberspace (GCSC) • 26 Commissioners from government, industry, technical and civil society • Initiated by think tanks Hague Centre for Strategic Studies (HCSS) and EastWest Institute (EWI) • Funded and supported by governments, corporations, universities, and the United Nations Institute for Disarmament
  • 7. GCSC Calls (Norms) • Protect the public core of the Internet • Protect electoral infrastructure • Avoid tampering • No botnets
  • 8. GCSC Calls (Norms) • Report vulnerabilities • Reduce vulnerabilities • Ensure basic cyber hygiene • No offensive actions by non-state actors
  • 9. Paris Call for Trust and Security in Cyberspace • Non-binding declaration for development of common principles for securing cyberspace • Launched in November 2018 at the Internet Governance Forum by President Emmanuel Macron of France – Neither the “Californian Internet” (all corporate) nor the “Chinese Internet” (all government) • 564 official supporters: 67 States, 139 international and civil society organizations, and 358 private sector
  • 10. Paris Call – 9 Principles to limit hacking and destabilising activities 1. Protect individuals and infrastructure 2. Protect the Internet 3. Defend electoral processes 4. Defend intellectual property 5. Non-proliferation of malware 6. Lifecycle security 7. Cyber hygiene 8. No private hack back 9. International norms
  • 11. Cyber Tech Accord • Protect all of our users and customers • Oppose cyberattacks on innocent citizens and enterprises • Help empower users, customers and developers to strengthen cybersecurity protection • Partner with each other and with likeminded groups to enhance cybersecurity
  • 12. International Code of Conduct for Information Security (the “Code”) • International effort to develop norms of behaviour in the digital space • Proposed by member states of the Shanghai Cooperation Organization (SCO) • Submitted to the UN General Assembly in 2011 and 2015
  • 13. SCO and UN • “Bears in mind” the recommendations of the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (UN GGE) • Proposes that “additional norms could be developed” • Members of SCO are also participating in the United Nations Open Ended Working Group (UN OEWG)
  • 14. L.27 OEWG UNGGE 2013 A/68/98 International law, and in particular the Charter of the United Nations, is applicable UNGA A/RES/71/28 adopts Norms and International Law UNGGE 2015 A/70/174 Offered non- exhaustive views on how international law applies to the use of ICTs by States ASEAN AMCC 2018 Agreed in principle that international law is essential CSCAP Study Group on International Law and Cyberspace identified areas for study The EU recalls that International law and in particular the UN Charter, is applicable Regional Consultations ASEAN Regional Forum (1-3 Oct) Organization of American States (15-16 Aug 2019) African Union (11 Oct 2019) ASEAN/US Leaders Statement 2018 reaffirmed that international law is essential OAS International Law Department circulated in 2019 a Questionnaire on international law ICRC international humanitarian law applies to cyber operations during armed conflict Singapore funds, establishes ASEAN Singapore Cyber Security Centre of Excellence Context of the OEWG
  • 15. WHAT DO THE 11 NORMS MEAN?
  • 16. 13(a) Cooperation to increase stability and security States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security; Let’s cooperate!
  • 17. 13(b) Information for Attribution In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences; Let me check before I blame…
  • 18. FIRELAND Wrongful attribution WATERLAND (not aware) AIRLAND INFECTED INFECTED We’ve been cyber- attacked! Where did it come from? The malware must have come from WATERLAND!
  • 19. FIRELAND Dangers of Wrong Attribution WATERLAND (not aware) AIRLAND INFECTED INFECTED WATERLAND, we will take countermeasures against you! We’re innocent! Ha ha ha (evil laughter) Is AIRLAND in breach of International Law?
  • 20. 13(c) Do not allow Territory to be used for Wrongful Acts States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs;
  • 21. FIRELAND Do NOT do this WATERLAND AIRLAND I shall attack AIRLAND INFECTED INFECTED Hey FIRELAND, you can use our servers
  • 22. FIRELAND Does it apply to this case? (2) WATERLAND AIRLAND I shall attack AIRLAND INFECTED INFECTED We are not aware of anything
  • 23. FIRELAND Does it apply to this case? (3) WATERLAND AIRLAND I shall attack AIRLAND infected infected We are not aware of anything Hey WATERLAND, your servers are attacking us! Oh No! We don’t have capacity!
  • 24. 13(d) Cooperation in exchanging info,prosecuting terrorists, crime States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. WATERLAND Please help us to catch the Evil Clown Hacker AIRLAND We caught him for you!
  • 25. 13(e) Respect for Human Rights States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression;
  • 26. A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public; 13(f) Not damage Critical Infrastructure FIRELAND WATERLAND We know you hacked our power stations AIRLAND That’s not acceptable
  • 27. 13(g) Protection of Critical Infrastructure States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions;
  • 28. 13(h) Help others to protect Critical Infrastructure States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty My hospitals and power stations are getting hacked! Help! WATERLAND Okay, we’re on the way! AIRLAND
  • 29. 13(i) Supply Chain Integrity / Non- Proliferation States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions; Let’s put a Back Door in this network product before we export it No, we shouldn’t do that!
  • 30. 13(j) Report Vulnerabilities States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure; We discovered a Back Door in this popular software Thank you for telling the public
  • 31. 13(k) CERTS States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cybersecurity incident response teams) of another State. We’re supposed to protect people! Don’t attack us!
  • 32. 13(k) CERTS A State should not use authorized emergency response teams to engage in malicious international activity. We’re supposed to protect people, not hack them! I want you to hack the WATERLAND hospitals
  • 33. Observations from Cyber Norms capacity building activities (Manila, KL, Sydney) • Different countries (and different ministries within countries) have different interpretations: Scams? Cyber pornography? Fake news? Hacking? • Many countries have no cyber agency • Very senior officials across different sectors are interested, and should be included • There is still a need for clarity on what cyber norms can achieve • Track II has a key role in cyber capacity building
  • 34. Case Study: ASEAN • ASEAN needs Cyberspace, because Digital Transformation can bring economic progress for all Member States • BUT Member States have different levels of cyber maturity – see the ASPI and EU Cyber Direct reports on Cyber Maturity in Asia Pacific region • AND cyber attackers will attack ASEAN through the weakest Member States e.g. through the ASEAN Smart City Network • So Capacity Building is needed
  • 35. ASEAN Ministers Cybersecurity Conference (AMCC) agreed … • 2016: Agreed on value of practical cybersecurity norms of behaviour in ASEAN • 2017: Supported development of basic, operational and voluntary norms • 2018: Singapore would propose a mechanism to enhance ASEAN cyber coordination • 2019: Agreed to move forward on a formal cybersecurity coordination mechanism
  • 36. 2020 AMCC announced: • Singapore + United Nations will draw up a checklist of steps to implement cyber norms • e.g. legal frameworks and sharing networks • ASEAN will share its experience and knowledge with the UN
  • 37. What next for ASEAN? Capacity Building Programmes • ASEAN-Singapore Cyber Centre of Excellence • ASEAN-Japan Cybersecurity Capacity Building Centre in Thailand • Singapore/US State Dept Third Country Training Program (TCTP) • UN-Singapore Cyber Diplomacy Course Confidence Building Measures • Joint training between Member States to improve communication • Sharing cyber threat information (between CERTS) • Contact list
  • 38. A Framework for Responsible State Behaviour Norms • Agree on what is acceptable state behaviour Laws • Interpret existing laws • Possibly create new ones Rules • Responsible states follow rules- based order in cyberspace