• Research
  • Emissary
  • About
  • Experts
Carnegie Global logoCarnegie lettermark logo
DemocracyIran
  • Donate
{
  "authors": [
    "Tim Maurer"
  ],
  "type": "other",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "U.S. Nuclear Policy",
    "Cyber and Digital Policy"
  ],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "NPP",
  "programs": [
    "Nuclear Policy",
    "Technology and International Affairs"
  ],
  "projects": [
    "International Cybersecurity Norms"
  ],
  "regions": [
    "North America",
    "United States",
    "East Asia",
    "China",
    "Russia",
    "Iran"
  ],
  "topics": [
    "Global Governance",
    "Foreign Policy",
    "Technology"
  ]
}

Source: Getty

Other

UN Body Considers International Cyber Norms

Following the September meeting of the UN Group of Governmental Experts and latest events, cybersecurity norms are at a crossroads.

Link Copied
By Tim Maurer
Published on Dec 1, 2016
Program mobile hero image

Program

Nuclear Policy

The Nuclear Policy Program aims to reduce the risk of nuclear war. Our experts diagnose acute risks stemming from technical and geopolitical developments, generate pragmatic solutions, and use our global network to advance risk-reduction policies. Our work covers deterrence, disarmament, arms control, nonproliferation, and nuclear energy.

Learn More
Program mobile hero image

Program

Technology and International Affairs

The Technology and International Affairs Program develops insights to address the governance challenges and large-scale risks of new technologies. Our experts identify actionable best practices and incentives for industry and government leaders on artificial intelligence, cyber threats, cloud security, countering influence operations, reducing the risk of biotechnologies, and ensuring global digital inclusion.

Learn More
 International Cybersecurity Norms

Project

International Cybersecurity Norms

Carnegie’s Cyber Policy Initiative aims to contribute to international cybersecurity norms. This includes our Cyber Norms Index and Timeline in partnership with the United Nations and additional related research and policy papers available on this website. We also engage with governments and commercial actors to shape and promote feasible norms.

Learn More

Source: IHS Jane’s Intelligence Review

The Democratic National Committee (DNC) was hacked and confidential data leaked in July 2016, in a highly publicised event that caused serious concern in the United States and around the world. The deliberate leaking of confidential data in an apparent attempt to influence the US election was unprecedented and targeted the core of the US political system.

This was not the first time an election has been the target of hackers, however. In 2014, Ukrainian officials found and removed malware designed to influence the Ukrainian presidential election. Nevertheless, the possibility that somebody would dare to target the United States in a similar fashion seemed unlikely until the July attack. The highest-ranking Democrat in Congress, House Minority Leader Nancy Pelosi, called it an “electronic Watergate”.

The cyber attack against the electrical grid in Western Ukraine in December 2015; the destructive malware targeting Sony Pictures Entertainment in December 2014; Stuxnet manipulating the control systems at the Natanz nuclear facility in Iran, discovered in 2010; and the use of Distributed Denial of Service attacks to disrupt the Georgian government’s websites during the Russia-Georgia war in 2008 and to target Estonia in 2007 are all examples of an increasing sophistication of cyber-attack methodology.

The DNC hack was only the latest, albeit a particularly powerful, reminder of how cyberspace can be used for political and military purposes.

Taking stock of cyber security

The international community has been discussing what rules do and should apply to cyberspace since the late 1990s. Through a series of groups of governmental experts meeting under the auspices of the United Nations Group of Governmental Experts (UNGGE), major players such as China, Russia, and the US have agreed that international law, including the UN Charter, applies to cyberspace. They have also developed a set of voluntary norms.

The UN Charter matters because it outlines the right to war and when it is legitimate for states to use force. Another important aspect of this discussion was the application of international humanitarian law and its guidance on the conduct of war. Initially, some states such as China contested this notion, calling for a new law to be developed instead. This agreement paved the way for states to discuss not whether, but how international law applies to cyberspace and how to interpret and translate existing provisions as they affect this new area of activity.

In early September, a new UNGGE convened, which is expected to produce another consensus report by mid-2017. To support this development and the internalisation of norms for cyberspace, states have also tried to increase confidence among themselves and provide positive incentives.

Building on the experience of the Cold War, the 57 states participating in the Organisation for Security and Co-operation in Europe (OSCE) agreed to a first set of confidencebuilding measures in December 2013, followed by a second set announced in March 2016. The list included the establishment of a crisis-management hotline and a commitment that “participating States will, on a voluntary basis, encourage responsible reporting of vulnerabilities affecting the security of and in the use of ICTs and share associated information on available remedies to such vulnerabilities, including with relevant segments of the ICT business and industry”.

The goal of these measures was to increase co-operation and transparency within the OSCE region. Meanwhile, as with all trustbuilding exercises, the process – in this case discussions leading to agreements – matters as much as, if not more than, the substance of the agreements themselves.

Cyber espionage, for both political and economic purposes, has not been discussed in the context of the UNGGE. Instead, the US government came to a bilateral agreement with China in September 2015, with both sides agreeing that neither “will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.” This agreement set the stage for very similar language to be adopted by the G20 group, widening its scope substantially.

What all of these agreements have in common is that they are political agreements and therefore are not legally binding. That is why great effort has gone into widening the number of countries committing to this language by inserting it into head-of-state-level communiqués. The international discussion about the rules for cyberspace really started to make progress in 2015, after a decade of inertia.

However, even as the fifth UNGGE is taking up its work, with the September meeting consisting of 25 instead of 20 member states, there is still no guarantee that the recommendations will be taken forward.

Fork in the road

The international community stands at a fork in the road, and with the fifth UNGGE underway, one of the decisions the group will need to find agreement on is whether the work will transition to an open-ended working group, an existing body, or an entirely new mechanism. The expansion of the UNGGE also reflects the group’s effort to broaden and deepen the legitimacy of the work developed by its predecessors.

One possibility is that the agreements achieved so far could be taken up by the full UN General Assembly and included in a resolution, although the timeline for this, should it happen, is unknown.

However, the UNGGE system has been criticised. For example, the head of the Israeli National Cyber Bureau, Eviatar Matania, criticised the US Department of State’s strategy for developing international cyber-security norms, calling the plans “overly broad.” According to Matania, speaking at the Billington Cybersecurity Summit in Washington, DC, “The norm of ‘do not attack critical infrastructures’ sounds great, but can you define for me what critical infrastructures are … The definition in every nation is different. Some will define everything as critical.”

In other words, the success of the agreements reached so far depends largely on their implementation. The 2015 cyber attack against the electrical grid in western Ukraine, which took its power offline for several hours, was arguably surprising given the agreement earlier that year in which UNGGE states committed to the voluntary norm not to target critical infrastructure in peacetime.

Another hurdle to overcome is information sharing. States can only know if the norms are voluntarily adhered to if they know what kinds of incidents are taking place. If critical infrastructure operators, for example, are unaware of the norm and do not report relevant incidents, it is difficult to assess the norm’s effectiveness.

Outlook

Cyber-security company FireEye in June 2016 published a report stating that “since mid- 2014, we have observed an overall decrease in successful network compromises by Chinabased groups against organisations in the United States and 25 other countries”. The 2015 agreement may have contributed to this reduction and the change in behaviour by the Chinese government.

Some states are also advancing more far-reaching proposals as part of the norms discussion. The Dutch government, for example, is focusing specifically on the protection of the core and backbone of the internet. This was championed during its hosting of the fourth Global Governance on Cyberspace conference in 2015, which set out to define the internet’s key protocols and infrastructure that could be considered a global public good and to address growing state interference.

The latest iteration of the UNGGE is due to publish its report in June 2017. It appears that the Chinese and US governments will be able to work together and come to an agreement, even on sensitive issues, and that the agreement will subsequently be honoured. The Russian government’s actions in Ukraine and elsewhere, however, have raised doubts about its intentions and sincerity, which is particularly relevant in the context of the UNGGE, given that the group itself dates back to a Russian initiative.

This article was originally published by IHS Jane’s Intelligence Review.

About the Author

Tim Maurer

Former Senior Fellow, Technology and International Affairs Program

Dr. Tim Maurer was a senior fellow in Carnegie’s Technology and International Affairs program.

Tim Maurer
Former Senior Fellow, Technology and International Affairs Program
Tim Maurer
Global GovernanceForeign PolicyTechnologyNorth AmericaUnited StatesEast AsiaChinaRussiaIran

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie Endowment for International Peace

  • The tops of people's heads. Raised above their heads are "No Kings" signs, an upside-down American flag, and a rainbow flag.
    Commentary
    Emissary
    Protests Like No Kings Can Only Go So Far to Stem Authoritarianism

    Lessons from other backsliding democracies show that mass mobilization needs to feed into an electoral strategy. 

      Saskia Brechenmacher, Shreya Joshi

  • Commentary
    Southeast Asia’s Agency Amid the New Oil Crisis

    There is no better time for the countries of Southeast Asia to reconsider their energy security than during this latest crisis.

      Gita Wirjawan

  • Commentary
    Fuel Crisis Forces Politically Perilous Trade-Offs in Indonesia

    As conflict in the Middle East drives up fuel costs across Asia, Indonesia faces difficult policy trade-offs over subsidies, inflation, and fiscal credibility. President Prabowo’s personalized governance style may make these hard choices even harder to navigate.

      Sana Jaffrey

  • Commentary
    Europe Doesn’t Like War—for Good Reasons

    The wars in Ukraine and the Middle East are existential threats to Europe as a peace project. Leaders and citizens alike must reaffirm their solidarity to face up to today’s multifaceted challenges.

      Marc Pierini

  • Commentary
    Emissary
    In Its Iran War Debate, Washington Has Lost the Plot in Asia

    The United States ignores the region’s lived experience—and the tough political and social trade-offs the war has produced—at its peril.

      Evan A. Feigenbaum

Get more news and analysis from
Carnegie Endowment for International Peace
Carnegie global logo, stacked
1779 Massachusetts Avenue NWWashington, DC, 20036-2103Phone: 202 483 7600Fax: 202 483 1840
  • Research
  • Emissary
  • About
  • Experts
  • Donate
  • Programs
  • Events
  • Blogs
  • Podcasts
  • Contact
  • Annual Reports
  • Careers
  • Privacy
  • For Media
  • Government Resources
Get more news and analysis from
Carnegie Endowment for International Peace
© 2026 Carnegie Endowment for International Peace. All rights reserved.