Getting Beyond Norms: New Approaches to International Cyber Security Challenges
Total Page:16
File Type:pdf, Size:1020Kb
Getting beyond Norms New Approaches to International Cyber Security Challenges SPECIAL REPORT Getting beyond Norms New Approaches to International Cyber Security Challenges SPECIAL REPORT Edited by Fen Osler Hampson and Michael Sulmeyer CIGI Masthead Executive President Rohinton P. Medhora Director of Finance Shelley Boettger Director of the International Law Research Program Oonagh Fitzgerald Director of the Global Security & Politics Program Fen Osler Hampson Director of Human Resources Susan Hirst Interim Director of the Global Economy Program Paul Jenkins Chief Operating Officer and General Counsel Aaron Shull Director of Communications and Digital Media Spencer Tripp Publications Publisher Carol Bonnett Senior Publications Editor Jennifer Goyder Publications Editor Susan Bubak Publications Editor Patricia Holmes Publications Editor Nicole Langlois Publications Editor Lynn Schellenberg Graphic Designer Melodie Wakefield For publications enquiries, please contact [email protected]. Communications For media enquiries, please contact [email protected]. Copyright © 2017 by the Centre for International Governance Innovation The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this license, visit (www.creativecommons.org/licenses/by-nc-nd/3.0/). For re-use or distribution, please include this copyright notice. Centre for International Governance Innovation and CIGI are registered trademarks. 67 Erb Street West Waterloo, ON, Canada N2L 6C2 www.cigionline.org Contents vii Acronyms and Initialisms 23 Norms à la Carte Eneken Tikk 1 Introduction Fen Osler Hampson and Michael Sulmeyer 27 How Should We Tackle the Challenges of Today’s Cyber Security Environment? 5 When Violating the Agreement Paul Twomey Becomes Customary Practice Melissa Hathaway 31 The Need for a Paradigm Shift on Digital Security 13 Revitalizing Progress in International Eileen Donahoe Negotiations on Cyber Security James Andrew Lewis 35 Acknowledgements 19 Normative Constraints on Cyber Arms Joseph S. Nye, Jr. Acronyms and Initialisms CBMs confidence-building measures ICTs information and communications technologies CD Conference on Disarmament IEEE Institute of Electrical and Electronics Engineers CIGI Centre for International Governance Innovation IETF Internet Engineering Task Force CWC Convention on Conventional Weapons IoT Internet of Things DDoS distributed denial of service ISPs internet service providers DNS Domain Name System IX Internet Exchange GGE UN Group of Governmental Experts LOAC law of armed conflict on Developments in the Field of SWIFT Society for Worldwide Interbank Information and Telecommunications in Financial Telecommunication the Context of International Security W3C World Wide Web Consortium ICANN Internet Corporation for Assigned Names and Numbers vii Introduction Fen Osler Hampson and Michael Sulmeyer Preamble supply, telecommunications and financial services. The IoT represents a massive and growing security risk. The international cyber security community has not Given the global interconnections of the internet and been immune to the global political trend of diminished supply chains, any reasonable response will require public trust in globalism and establishment institutions. broad international cooperation — something that is The ideal of a universally accessible “open internet” is becoming more and more difficult to achieve. increasingly under stress. China is striving to assert more control of the internet by buying up international With this in mind, the Centre for International data centres, while Russia is more determined than ever Governance Innovation (CIGI) and the Belfer Center to foster instability in the global system. Meanwhile, for Science and International Affairs at the Harvard smaller and developing countries are growing skeptical Kennedy School brought together 28 academics, that the vision of the open internet promoted by liberal diplomats and other specialists for a one-day democracies is in their interest. workshop in Cambridge, Massachusetts, in March 2017. Called “Getting Beyond Norms: New Approaches to At the same time, billions of consumer devices with International Cyber Security Challenges,” the workshop questionable security are being connected to the fostered a frank discussion about matters such as the internet. This Internet of Things (IoT) is posing risks to rapidly shifting geopolitical state of play; whether the network infrastructure, and to everything attached to UN Group of Governmental Experts on Developments it — including critical infrastructure that increasingly in the Field of Information and Telecommunications in relies on the internet, such as the power grid, water the Context of International Security (GGE) remains the 1 Getting beyond Norms: New Approaches to International Cyber Security Challenges best venue for addressing cyber security concerns; and Upholding norms is not just a challenge for cyber how the ongoing challenges may be most effectively security: we are living in an age where other norms discussed going forward. The essays gathered in this that have been established for decades are also being special report were either presented by the authors challenged. For example, the Syrian government at the workshop or based on the discussions that has violated international norms by using chemical emerged. weapons against its citizens, and the UN Security Council has failed to reach an agreement that would punish it for those actions. The Rise of Cyber Security Norms Besides the direct harms that result from norm The GGE was established in 2004, comprised of violations — such as the deaths of Syrians by chemical independent experts representing 15 states, to advise attacks, or the privations Ukrainians experienced when the United Nations on how member states should hackers attacked their power centres, leaving them promote peace and stability in cyberspace. The first without heat in the winter — there are other, indirect GGE did not agree on a report, but the second GGE consequences for global security. If the international convened five years later was more successful, releasing community’s norms are no longer considered reliable a report in 2010. In 2013, the third GGE agreed on a or legitimate, states may come to believe that their best set of foundational norms: in short, that international option when targeted is to act unilaterally, which could law, state sovereignty and human rights apply to lead to escalation that has serious consequences. cyberspace. It also stipulated that states must not use proxies to commit cyber attacks on other states, nor should they allow non-state actors to launch attacks Questions of Enforcement from their territory. The next GGE, with 20 members, expanded and elaborated on those concepts with its As the 2015 GGE wrapped up, there were questions 2015 report. It noted, among other things, the principle about whether its process still offered any utility, but of non-intervention in other states’ internal affairs; that no clear alternatives emerged. When a fifth GGE was states should not conduct or support cyber attacks that convened, it was partly due to “the inability of the damage critical infrastructure; and that states should international community to identify a different way protect their own critical infrastructure from threats to forward in its discussion of cyber security,” James information and communications technologies (ICTs). Lewis writes in his essay, “Revitalizing Progress in International Negotiations on Cyber Security.” The But as Melissa Hathaway explains in her essay, “When group began meeting in August 2016, this time with 25 Violating the Agreement Becomes Customary Practice,” members, and failed to reach a consensus by the time it the consensus around these norms hasn’t stopped concluded its final meeting in June 2017. them from being violated. For example, a suspected state-sponsored cyber attack in December 2015 The biggest question is how the GGE can expect to targeted Ukraine’s power grid — just months after the succeed, given how little heed has been paid to the GGE released its report putting critical infrastructure norms it has already identified. In her essay, Hathaway off limits to attackers. Other attacks in the past year calls for states to not just enforce the norms, but to have targeted a Swedish radio tower used for rescue speak out when they are violated. Joseph S. Nye, Jr., communications and Saudi government agencies, notes in his essay, “Normative Constraints on Cyber including the transportation sector. “Even worse,” Arms,” that the GGE must also raise awareness of its Hathaway writes, “...none of the [GGE] signatories norms and their violations, or else it will be “just a have publicly objected to the wrongful use of ICTs and group meeting in the basement of the United Nations.” harm caused to nations. This silence is contributing to a new de facto norm — ‘anything goes’ — and this is But if it is determined that the current GGE model is dangerous because it increases the risks to international not the best way to proceed, what would replace it? peace, security and stability.” Alternatives could include a more regular diplomatic process, creating a specific UN office, or establishing At the same time, the continued proliferation of