A table of cumulative recommendations in the UN GGE Reports (2010-2015).
Courtesy of Liisi Adamson/Cyber Policy Institute (CPI, www.cpi.ee). When text is turquoise blue this is to indicate that the wording is not a reiteration of statements from previous reports, but added in the respective year of each report. You can also download a pdf of the recommendations below.
To study both threats in the sphere of information security and relevant international concepts and to suggest possible cooperative measures that could strengthen the security of global information and communication systems.
To offer recommendations to promote peace and stability in State use of ICTs.
To consider the application of international law to the State use of ICTs. To continue to study, with a view towards promoting common understandings, norms of responsible State behaviour; determine where existing norms may be elaborated for application to the ICT environment; encourage greater acceptance of norms; and identify where additional norms that take into account the complexity and unique attributes of ICTs may need to be developed.
Motives for disruption emanate from:
Sources of threats:
Objectives: ICT can be used to damage information resources and infrastructures
Dual-use of ICTs and growing sophistication
Examples of threats:
ICTs as dual-use technologies that can be used for legitimate (1) and malicious (2) purposes.
The combination of
Threats have grown more acute and incidents more damaging.
Sources of threats:
Threats:
Sources of threats:
Misuse of ICTs may harm international peace and security
Threats:
-
GGE noted the International Code of Conduct proposed by SCO.
Intensified cooperation against criminal or terrorist use of ICTs was called for.
States should harmonise legal approaches and strengthen practical collaboration between law enforcement and prosecutorial agencies.
GGE called for encouraging the private sector and civil society to play a role to improve security of and in the use of ICTs, including supply chain security.
Voluntary, non-binding norms of responsible State behaviour:
GGE noted the International Code of Conduct proposed by SCO.
Proposed voluntary, non-binding norms, rules, or principles for the responsible behaviour of States aimed at promoting an open, secure, stable, accessible and peaceful ICT environment:
While such measures may be essential in promoting an open, secure, stable, accessible and peaceful ICT environment, their implementation may not immediately be possible, particularly for developing countries.
-
International law and the UN Charter applies and is essential to maintaining peace and stability and promoting an open, secure, peaceful and accessible ICT environment.
State sovereignty and international norms and principles that flow from sovereignty apply to State conduct of ICT-related activities.
States have jurisdiction over ICT infrastructure within their territory.
Addressing the security of ICTs must go hand-in-hand with respect for human rights and fundamental freedoms set forth in the Universal Declaration of Human Rights and other international instruments.
States must meet their international obligations arising from internationally wrongful acts attributable to them.
States must not use proxies to commit internationally wrongful acts and should seek to ensure that their territories are not used by non-state actors for unlawful use of ICTs
State sovereignty and international norms and principles that flow from sovereignty apply to State conduct of ICT-related activities and to their jurisdiction over ICT infrastructure within their territory.
GGE proposed non-exhaustive list of principles of international law that apply to the use of ICTs by States:
However, the indication that an ICT activity was launched or otherwise originates from a State’s territory or from its ICT infrastructure may be insufficient in itself to attribute the activity to that State. The Group noted that the accusations of organizing and implementing wrongful acts brought against States should be substantiated.
-
Voluntary confidence-building measures (CBM) can promote trust and assurance among States and help reduce the risk of conflict by increasing predictability and reducing misperception. CBM-s help increase:
Proposed CBMs:
States should promote complementarity of measures and facilitate the dissemination of best practices. There’s a need to enhance common understandings and intensify practical cooperation.
CBMs strengthen international peace and security and can increase interstate cooperation, transparency, predictability and stability.
Proposed voluntary CBMs:
Additional voluntary CBMs could include voluntary agreement by States to:
Risks require concerted responses in order to:
International efforts to combat the threat of cybercrime have been conducted.
Importance of minimising the misperception resulting from a lack of shared understanding regarding international norms pertaining to State use of ICTs. Calls for elaboration of measures designed to enhance cooperation where possible. E.g.:
Collective action needed to address the threats.
Collaboration among and between the States, the private sector and civil society is held important.
Need for cooperative action to promote a peaceful, secure, open and cooperative ICT environment. Cooperative measures should be considered, which could enhance international peace, stability and security (including the common understandings on the application of relevant international law and derived norms, rules, and principles of responsible State behaviour).
States must lead in addressing the challenges, but effective cooperation would benefit from the appropriate participation of the private sector and civil society.
The UN should play a leading role in promoting the dialogue. Efforts made by international organisations and regional entities must be taken into account (wider than just cybercrime as was stated in GGE 2010 report).
Effective international cooperation would benefit from private sector, academia and civil society organisation’s participation.
The UN should play a leading role in promoting the dialogue.
Capacity building needed to bridge the current divide in ICT security and appropriate assistance where needed. States need to identify measures to support capacity-building in less developed countries.
Some States may require assistance to:
Assistance means technical and other assistance.
Measures to be considered:
Capacity building involves more than a transfer of knowledge and skills from developed to developing States, as all States can learn from each other about the threats and effective responses to them.
Measures to be considered:
Development of regional approaches would be beneficial to capacity-building. States may consider forming bilateral and multilateral cooperation initiatives that would build on established partnership relations.
(i) Further dialogue among States to discuss norms pertaining to State use of ICTs, to reduce collective risk and protect critical national and international infrastructure;
(ii) Confidence-building, stability and risk reduction measures to address the implications of State use of ICTs, including exchanges of national views on the use of ICTs in conflict;
(iii) Information exchanges on national legislation and national information and communications technologies security strategies and technologies, policies and best practices.
(iv) Identification of measures to support capacity-building in less developed countries;
(v) Finding possibilities to elaborate common terms and definitions relevant to General Assembly resolution 64/25.
-
Recommendations for future work:
Areas where further research and study could be useful include, inter alia, concepts relevant to State use of ICTs. UNIDIR, as a UN research institute serving all Member States, is one such entity that could be requested to undertake relevant studies, as could other relevant think tanks and research organizations.
2010 07 UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (A/65/201)
2013 UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (A/68/98*)
2015 09 UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (A/70/174)