May 11th 2015

International Norms in Cyberspace

by Joseph S. Nye

Joseph S. Nye is aprofessor at Harvard University and the author of the forthcoming book Presidential Leadership and the Creation of the American Era.

CAMBRIDGE – Last month, the Netherlands hosted the Global Conference on Cyberspace 2015, which brought together nearly 2,000 government officials, academics, industry representatives, and others. I chaired a panel on cyber peace and security that included a Microsoft vice president and two foreign ministers. This “multi-stakeholder” conference was the latest in a series of efforts to establish rules of the road to avoid cyber conflict.

The capacity to use the Internet to inflict damage is now well established. Many observers believe the American and Israeli governments were behind an earlier attack that destroyed centrifuges at an Iranian nuclear facility. Some say an Iranian government attack destroyed thousands of Saudi Aramco computers. Russia is blamed for denial-of-service attacks on Estonia and Georgia. And just last December, US President Barack Obama attributed an attack on Sony Pictures to the North Korean government.

Until recently, cyber security was largely the domain of a small community of computer experts. When the Internet was created in the 1970s, its members formed a virtual village; everyone knew one another, and together they designed an open system, paying little attention to security.

Then, in the early 1990s, the World Wide Web emerged, growing from a few million users then to more than three billion today. In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the “Internet of Things”).

All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control.

The term “cyber war” is used very loosely for a wide range of behaviors, ranging from simple probes, website defacement, and denial of service to espionage and destruction. In this, it reflects dictionary definitions of “war,” which include any organized effort to “stop or defeat something that is viewed as dangerous or bad” (for example, “war on drugs”).

A more useful definition of cyber war is any hostile action in cyberspace that amplifies or is equivalent in effect to major physical violence. Determining whether an action meets that criterion is a decision that only a country’s political leaders can make.

There are four major categories of cyber threats to national security, each with a different time horizon and (in principle) different solutions: cyber war and economic espionage, which are largely associated with states, and cyber crime and cyber terrorism, which are mostly associated with non-state actors. The highest costs currently stem from espionage and crime, but the other two may become greater threats over the next decade than they are today. Moreover, as alliances and tactics evolve, the categories may increasingly overlap.

During the Cold War, ideological competition limited US-Soviet cooperation, but both sides’ awareness of nuclear destructiveness led them to develop a crude code of conduct to avoid military confrontation. These basic rules of prudence included no direct fighting, no first use of nuclear weapons, and crisis communication, such as the Moscow-Washington hotline and the Accidents Measures and Incidents at Sea agreements.

The first formal arms-control agreement was the 1963 Limited Test Ban Treaty, which can be considered mainly an environmental treaty. The second major agreement was the 1968 Nuclear Non-Proliferation Treaty, which aimed at limiting the spread of nuclear weapons. The US and the Soviet Union perceived both agreements as positive-sum games, because they involved nature or third parties.

Similarly, the most promising areas for early international cooperation on securing cyberspace are problems posed by third parties such as criminals and terrorists. Russia and China have sought a treaty for broad United Nations oversight of the Internet. Though their vision of “information security” could legitimize authoritarian governments’ censorship, and is therefore unacceptable to democratic governments, it may be possible to identify and target behaviors that are illegal everywhere. Limiting all intrusions would be impossible, but one could start with cyber crime and cyber terrorism. Major states would have an interest in limiting damage by agreeing to cooperate on forensics and controls.

Of course, historical analogies are imperfect. Obviously, cyber technology is very different from nuclear technology, particularly because non-governmental actors can exploit it much more easily.

Nonetheless, some institutions, both formal and informal, already govern the basic functioning of the Internet. The US wisely plans to strengthen the non-governmental Internet Corporation for Assigned Names and Numbers (ICANN) by having it supervise the Internet “address book.” There is also the Council of Europe’s 2001 Convention on Cybercrime, with Interpol and Europol facilitating cooperation among national police forces. And a UN Group of Government Experts has been analyzing how international law relates to cyber security.

It is likely to take longer to conclude agreements on contentious issues such as cyber intrusions for purposes like espionage and preparing the battlefield. Nonetheless, the inability to envisage an overall cyber arms-control agreement need not prevent progress on some issues now. International norms tend to develop slowly. It took two decades in the case of nuclear technology. The most important message of the recent Dutch conference was that massive cyber vulnerability is now nearing that point.



Copyright: Project Syndicate, 2015.
www.project-syndicate.org


Buy the book:



 


This article is brought to you by Project Syndicate that is a not for profit organization.

Project Syndicate brings original, engaging, and thought-provoking commentaries by esteemed leaders and thinkers from around the world to readers everywhere. By offering incisive perspectives on our changing world from those who are shaping its economics, politics, science, and culture, Project Syndicate has created an unrivalled venue for informed public debate. Please see: www.project-syndicate.org.

Should you want to support Project Syndicate you can do it by using the PayPal icon below. Your donation is paid to Project Syndicate in full after PayPal has deducted its transaction fee. Facts & Arts neither receives information about your donation nor a commission.

 

 

Browse articles by author

More Current Affairs

Feb 1st 2009

BANGKOK - A friend recently asked a seemingly naïve question: "What is money? How do I know I can trust that it is worth what it says it is worth?" We learn in introductory economics that money is a medium of exchange. But why do we accept that?

Jan 30th 2009

Watching President Obama's interview on Al-Arabiya this week was striking in multiple respects, not the least of which, of course, was that an American president actually did an interview with an Arab network with a largely Muslim viewing audience -- and did it in the f

Jan 30th 2009

The recent appointment of George Mitchell as special envoy to the Middle East is
no doubt a positive sign of President Obama's commitment to the region,
signalling that there will be immediate and direct American involvement in the

Jan 30th 2009

According to James Wolcott in last month's London Review of Books, Norman Mailer exerted telepathic powers over the future, while the Beats hot-wired 'the American psyche (at the risk of frying their own circuits).

Jan 29th 2009

Hisman Melhem, Washington Bureau Chief for Al Arabiya, was trying to chase down an interview with former U.S. Senator and new presidential envoy to the Middle East George Mitchell.

Jan 28th 2009

PARIS - Hollywood history is often nonsensical, but filmmakers usually have the good sense not to whitewash killers and sadists. Steven Soderbergh's new film about Che Guevara, however, does that, and more.

Jan 27th 2009

In appointing former Senator George Mitchell as Special Envoy for the Middle East, President Barack Obama made clear his determination to pursue Arab-Israeli peace. Mitchell, an Arab American, was former Majority Leader of the U.S.

Jan 27th 2009

For decades the prices of gold and oil have closely paralleled one another. In 2003 an ounce of gold would have bought you 12 barrels of oil. Today that ounce will buy you about 20 barrels, even though the nominal price of oil is up about 50% from what it was in 2003.

Jan 23rd 2009

French President Nicolas Sarkozy is not a happy man. All evidence indicates that his ascendancy as the world's leading peacemaker and problem-solver is over.

Jan 23rd 2009

Of course, I agree with my passionate friend, Bernard-Henri Levy, who

Jan 23rd 2009

LONDON - I spent the New Year in Sydney, watching the fireworks above the iconic bridge welcome in 2009. The explosions over Gaza that night were not intended to entertain, but rather to break Hamas and discredit it in the eyes of Palestinians.

Jan 22nd 2009

Now that Israel has unilaterally declared an end to the hostilities it appears
that Hamas, which has been badly crippled, will eventually sign on to the
ceasefire. Having achieved its war objectives, Israel must demonstrate that the

Jan 21st 2009

NEW YORK - Today's world hunger crisis is unprecedentedly severe and requires urgent measures. Nearly one billion people are trapped in chronic hunger - perhaps 100 million more than two years ago.

Jan 20th 2009

LONDON - Testifying recently before a United States congressional committee, former Federal Reserve Chairman Alan Greenspan said that the recent financial meltdown had shattered his "intellectual structure." I am keen to understand what he meant.

Jan 18th 2009

COPENHAGEN- As Barack Obama prepares for his inauguration, it is worth contemplating a passage from his book Dreams from My Father. It reveals a lot about the way we view the world's problems.

Jan 18th 2009

It has been 94 years since the right leg of the great actress Sarah Bernhardt was sawed off by a Bordeaux surgeon. Still preserved in formaldehyde, it remains an object of great - if somewhat morbid - curiosity despite the passage of time.

Jan 18th 2009

With Guantánamo Bay losing its patriotic luster and purpose, US authorities are willing to offload some of the carceral baggage to recipient states. In truth, they have been in the business of doing so for years.

Jan 18th 2009

MELBOURNE - Louise Brown, the first person to be conceived outside a human body, turned 30 last year. The birth of a "test-tube baby," as the headlines described in vitro fertilization was highly controversial at the time.