• Commentary
  • Research
  • Experts
  • Events
Carnegie China logoCarnegie lettermark logo
{
  "authors": [
    "Tim Maurer"
  ],
  "type": "other",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "U.S. Nuclear Policy",
    "Cyber and Digital Policy"
  ],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "NPP",
  "programs": [
    "Nuclear Policy",
    "Technology and International Affairs"
  ],
  "projects": [
    "International Cybersecurity Norms"
  ],
  "regions": [
    "North America",
    "United States",
    "East Asia",
    "China",
    "Russia",
    "Iran"
  ],
  "topics": [
    "Global Governance",
    "Foreign Policy",
    "Technology"
  ]
}

Source: Getty

Other

UN Body Considers International Cyber Norms

Following the September meeting of the UN Group of Governmental Experts and latest events, cybersecurity norms are at a crossroads.

Link Copied
By Tim Maurer
Published on Dec 1, 2016
 International Cybersecurity Norms

Project

International Cybersecurity Norms

Carnegie’s Cyber Policy Initiative aims to contribute to international cybersecurity norms. This includes our Cyber Norms Index and Timeline in partnership with the United Nations and additional related research and policy papers available on this website. We also engage with governments and commercial actors to shape and promote feasible norms.

Learn More

Source: IHS Jane’s Intelligence Review

The Democratic National Committee (DNC) was hacked and confidential data leaked in July 2016, in a highly publicised event that caused serious concern in the United States and around the world. The deliberate leaking of confidential data in an apparent attempt to influence the US election was unprecedented and targeted the core of the US political system.

This was not the first time an election has been the target of hackers, however. In 2014, Ukrainian officials found and removed malware designed to influence the Ukrainian presidential election. Nevertheless, the possibility that somebody would dare to target the United States in a similar fashion seemed unlikely until the July attack. The highest-ranking Democrat in Congress, House Minority Leader Nancy Pelosi, called it an “electronic Watergate”.

The cyber attack against the electrical grid in Western Ukraine in December 2015; the destructive malware targeting Sony Pictures Entertainment in December 2014; Stuxnet manipulating the control systems at the Natanz nuclear facility in Iran, discovered in 2010; and the use of Distributed Denial of Service attacks to disrupt the Georgian government’s websites during the Russia-Georgia war in 2008 and to target Estonia in 2007 are all examples of an increasing sophistication of cyber-attack methodology.

The DNC hack was only the latest, albeit a particularly powerful, reminder of how cyberspace can be used for political and military purposes.

Taking stock of cyber security

The international community has been discussing what rules do and should apply to cyberspace since the late 1990s. Through a series of groups of governmental experts meeting under the auspices of the United Nations Group of Governmental Experts (UNGGE), major players such as China, Russia, and the US have agreed that international law, including the UN Charter, applies to cyberspace. They have also developed a set of voluntary norms.

The UN Charter matters because it outlines the right to war and when it is legitimate for states to use force. Another important aspect of this discussion was the application of international humanitarian law and its guidance on the conduct of war. Initially, some states such as China contested this notion, calling for a new law to be developed instead. This agreement paved the way for states to discuss not whether, but how international law applies to cyberspace and how to interpret and translate existing provisions as they affect this new area of activity.

In early September, a new UNGGE convened, which is expected to produce another consensus report by mid-2017. To support this development and the internalisation of norms for cyberspace, states have also tried to increase confidence among themselves and provide positive incentives.

Building on the experience of the Cold War, the 57 states participating in the Organisation for Security and Co-operation in Europe (OSCE) agreed to a first set of confidencebuilding measures in December 2013, followed by a second set announced in March 2016. The list included the establishment of a crisis-management hotline and a commitment that “participating States will, on a voluntary basis, encourage responsible reporting of vulnerabilities affecting the security of and in the use of ICTs and share associated information on available remedies to such vulnerabilities, including with relevant segments of the ICT business and industry”.

The goal of these measures was to increase co-operation and transparency within the OSCE region. Meanwhile, as with all trustbuilding exercises, the process – in this case discussions leading to agreements – matters as much as, if not more than, the substance of the agreements themselves.

Cyber espionage, for both political and economic purposes, has not been discussed in the context of the UNGGE. Instead, the US government came to a bilateral agreement with China in September 2015, with both sides agreeing that neither “will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.” This agreement set the stage for very similar language to be adopted by the G20 group, widening its scope substantially.

What all of these agreements have in common is that they are political agreements and therefore are not legally binding. That is why great effort has gone into widening the number of countries committing to this language by inserting it into head-of-state-level communiqués. The international discussion about the rules for cyberspace really started to make progress in 2015, after a decade of inertia.

However, even as the fifth UNGGE is taking up its work, with the September meeting consisting of 25 instead of 20 member states, there is still no guarantee that the recommendations will be taken forward.

Fork in the road

The international community stands at a fork in the road, and with the fifth UNGGE underway, one of the decisions the group will need to find agreement on is whether the work will transition to an open-ended working group, an existing body, or an entirely new mechanism. The expansion of the UNGGE also reflects the group’s effort to broaden and deepen the legitimacy of the work developed by its predecessors.

One possibility is that the agreements achieved so far could be taken up by the full UN General Assembly and included in a resolution, although the timeline for this, should it happen, is unknown.

However, the UNGGE system has been criticised. For example, the head of the Israeli National Cyber Bureau, Eviatar Matania, criticised the US Department of State’s strategy for developing international cyber-security norms, calling the plans “overly broad.” According to Matania, speaking at the Billington Cybersecurity Summit in Washington, DC, “The norm of ‘do not attack critical infrastructures’ sounds great, but can you define for me what critical infrastructures are … The definition in every nation is different. Some will define everything as critical.”

In other words, the success of the agreements reached so far depends largely on their implementation. The 2015 cyber attack against the electrical grid in western Ukraine, which took its power offline for several hours, was arguably surprising given the agreement earlier that year in which UNGGE states committed to the voluntary norm not to target critical infrastructure in peacetime.

Another hurdle to overcome is information sharing. States can only know if the norms are voluntarily adhered to if they know what kinds of incidents are taking place. If critical infrastructure operators, for example, are unaware of the norm and do not report relevant incidents, it is difficult to assess the norm’s effectiveness.

Outlook

Cyber-security company FireEye in June 2016 published a report stating that “since mid- 2014, we have observed an overall decrease in successful network compromises by Chinabased groups against organisations in the United States and 25 other countries”. The 2015 agreement may have contributed to this reduction and the change in behaviour by the Chinese government.

Some states are also advancing more far-reaching proposals as part of the norms discussion. The Dutch government, for example, is focusing specifically on the protection of the core and backbone of the internet. This was championed during its hosting of the fourth Global Governance on Cyberspace conference in 2015, which set out to define the internet’s key protocols and infrastructure that could be considered a global public good and to address growing state interference.

The latest iteration of the UNGGE is due to publish its report in June 2017. It appears that the Chinese and US governments will be able to work together and come to an agreement, even on sensitive issues, and that the agreement will subsequently be honoured. The Russian government’s actions in Ukraine and elsewhere, however, have raised doubts about its intentions and sincerity, which is particularly relevant in the context of the UNGGE, given that the group itself dates back to a Russian initiative.

This article was originally published by IHS Jane’s Intelligence Review.

About the Author

Tim Maurer

Former Senior Fellow, Technology and International Affairs Program

Dr. Tim Maurer was a senior fellow in Carnegie’s Technology and International Affairs program.

Tim Maurer
Former Senior Fellow, Technology and International Affairs Program
Tim Maurer
Global GovernanceForeign PolicyTechnologyNorth AmericaUnited StatesEast AsiaChinaRussiaIran

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie China

  • Commentary
    China Sells Stability Amid American Volatility

    U.S. unpredictability has allowed China to capitalize on its positioning as the “responsible great power”. Paradoxically, the more China wins the perception game, the more likely expectations will rise for Beijing to deliver not just words but to demonstrate with its deeds.

      Chong Ja Ian

  • Vietnam's Top Leader To Lam meets with young representatives from China and Vietnam participating in the "Red Study Tours" at the Great Hall of the People on April 15, 2026 in Beijing, China. T
    Commentary
    Why Vietnam Is Swinging in China’s Direction

    Hanoi and Beijing have long treated each other as distant cousins rather than comrades in arms. That might be changing as both sides draw closer to hedge against uncertainty and America’s erratic behavior.

      • Nguyen-khac-giang

      Nguyễn Khắc Giang

  • Commentary
    China’s Energy Security Doesn’t Run Through Hormuz but Through the Electrification of Everything

    Across Asia, China is better positioned to withstand energy shocks from the fallout of the Iran war. Its abundant coal capacity can ensure stability in the near term. Yet at the same time, the country’s energy transition away from coal will make it even less vulnerable during the next shock.


      • Damien Ma

      Damien Ma

  • Xi walking into a room with people standing and applauding around him
    Commentary
    Emissary
    The Xi Doctrine Zeros in on “High-Quality Development” for China’s Economic Future

    In the latest Five-Year Plan, the Chinese president cements the shift to an innovation-driven economy over a consumption-driven one.

      • Damien Ma

      Damien Ma

  • Commentary
    Malaysia’s Year as ASEAN Chair: Managing Disorder

    Malaysia’s chairmanship sought to fend off short-term challenges while laying the groundwork for minimizing ASEAN’s longer-term exposure to external stresses.

      Elina Noor

Get more news and analysis from
Carnegie China
Carnegie China logo, white
Keck Seng Tower133 Cecil Street #10-01ASingapore, 069535Phone: +65 9650 7648
  • Research
  • About
  • Experts
  • Events
  • Contact
  • Careers
  • Privacy
  • For Media
Get more news and analysis from
Carnegie China
© 2026 Carnegie Endowment for International Peace. All rights reserved.