Agenda item 5: Day 2 Morning session
5 Mar 2024 15:00h - 18:00h
Event report
Agenda item 5
Table of contents
Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.
Knowledge Graph of Debate
Session report
Full session report
OEWG convenes to tackle rising cyber threats and stresses need for international cooperation
The Open-Ended Working Group (OEWG) on the Security of, and in the Use of, Information and Communication Technologies (ICTs) convened to discuss the multifaceted cyber threats impacting international peace and security. Delegates from various nations expressed deep concern over the surge in cyberattacks targeting critical public services, with a particular emphasis on the alarming increase in ransomware attacks and their potential to erode public trust in digital services and state institutions. Czechia reported a significant rise in cyber incidents, predominantly linked to Russian hacker groups, and called attention to the trend of ransomware as a service and the role of cryptocurrency in financing such illegal activities.
The session also delved into the challenges posed by emerging technologies like artificial intelligence (AI) and quantum computing, which could lead to more advanced and effective cyberattacks. Delegates stressed the need for focused discussions on these threats and emphasized the relevance of international humanitarian law in regulating ICT activities during armed conflicts.
A multi-stakeholder approach was advocated, highlighting the importance of including private sector, academia, and civil society in the cybersecurity discourse. The role of international cooperation and capacity building was recognized as crucial for enhancing global cybersecurity resilience, with several countries supporting initiatives such as the International Counter-Ransomware Initiative and the proposal for a UN threat repository.
The OEWG was acknowledged as an informal repository of information on cyber threats, serving as a platform for raising collective awareness and fostering discussions on how to address these threats collectively. The Chair of the session emphasized the importance of the OEWG’s work in the face of global geopolitical tensions and the low level of trust among nations. The Chair appealed to all delegations to focus on substantive matters and to work towards consensus, noting that the spirit of consensus should not be taken for granted and requires each delegation’s active participation and flexibility.
Geopolitical tensions were evident during the session, with several delegations exercising their right of reply to address broader issues beyond the immediate scope of the OEWG’s mandate. The Chair intervened to redirect the conversation back to the substantive matters at hand, underscoring the OEWG’s limited capacity to resolve geopolitical conflicts.
In conclusion, the session highlighted the urgency of addressing the evolving cyber threat landscape through international cooperation, inclusive dialogue, and collective action. The Chair adjusted the schedule for upcoming sessions to ensure that stakeholder contributions are heard while urging delegations to present succinct and focused interventions moving forward. The discussions underscored the critical role of the OEWG in navigating the complex intersection of cybersecurity and international relations amidst ongoing global challenges.
Session transcript
Chair:
Good morning, Distinguished Delegates. The third meeting of the Seventh Substantive Session of the Open-Ended Working Group on Security of, and in the Use of, ICT, established pursuant to General Assembly Resolution 75 slash 240, is now called to order. Distinguished Delegates, we will continue our discussion on the topic of existing and potential threats in the sphere of information security. And I’d like to continue with the speakers’ list. We have about 18 speakers who had inscribed yesterday. We will take them one at a time, and those of you who had pressed the button yesterday, you do not need to do it again today, unless there are additional requests for the floor. So we’ll start with Czechia, to be followed by Brazil. Czechia, you have the floor, please.
Czechia:
Thank you, Mr. Chair. Czechia aligns itself with the EU Statement and wishes to emphasize a couple of points in its national capacity. Speaking about new development and existing and potential threats, let me firstly note that the Czech National Cyber and Information Security Agency registered a record number of cyber incidents in my country in the past year. Compared to the previous year, there was an almost two-fold increase. The most common types of cyber attacks in Czechia are ransomware and DDoS attacks. The most frequent targets of cyber attacks are the online services of banks, government websites, universities, and hospitals. In our specific case, most cyber attacks are linked to Russian hacker groups. I agree with several previous speakers, including the EU Statement that ransomware has long been among the most serious cyber threats. We observe that specifically ransomware as a service is a rapidly developing trend. We noted also a crucial role of cryptocurrency used in acquiring funds for illegal activities connected with ransomware attacks, as mentioned yesterday by the Republic of Korea. This threat is unique for its use of multiple exceptions and begins to prevail. As far as random attacks are concerned, we also want to point out that they have significant potential to undermine public trust in the digital services and states that have been implemented in recent years. The challenges related to the fight against ransomware cyber threats are not only technical, but include criminal, financial, organizational, and international aspects. Czechia therefore supports the discussion about ransomware on an international level, including open-ended working groups and welcomes initiatives such as the International Counter-Ransomware Initiative. Based on our experience from the International Counter-Ransomware Initiative, we for example recently established a national-level interdepartmental working group that would address the challenges related to the fight against ransomware threats. In addition to threats such as ransomware, rapid progress in the field of artificial intelligence and chatbots based on large language models is increasingly being projected in the cyberspace. With this kind of development, it is likely that attackers will have better options when preparing cyber attacks. Czechia therefore joins what several other speakers already mentioned and would support more focused discussion on threats posed by the development of new and emerging technologies, including artificial intelligence and quantum computing. Czechia also notes that many countries are developing ICT capabilities for military purposes, which increases the risk that ICT systems will be used in future conflicts between states. Unfortunately, we already have cases where this is happening. In this context, Czechia stresses the importance of the call of the EU declaration on this Open-Ended Working Group to recognize that in the context of armed conflict, the serious risk that ICT activities pose to civilian objects, infrastructure and services, including humanitarian organizations and provisions of health care, is governed by the rules of international humanitarian law, which parties to any armed conflict must abide by. Finally, yet importantly, Czechia wishes to note that our debate regarding cyber threats cannot be effective if the practitioners from the private sector, academia and civil society are excluded from it. In the past, Czechia, for example, focused with the Open-Ended Working Group on the cyber threats against medical facilities. During this Open-Ended Working Group, the Executive Director for Cybersecurity of one of the world’s largest pharmaceutical companies wanted to share with us their latest trends regarding attacks on medical facilities. I’m convinced that her contribution could be very beneficial for a number of countries and the overall discussion was in the Open-Ended Working Group. Unfortunately, the specific stakeholder couldn’t share its knowledge with us because there are states that have repeatedly and pointlessly blocked the accreditation of non-governmental stakeholders on Open-Ended Working Group. Thank you, Mr. Chair.
Chair:
Thank you, Czechia, for your statement. Brazil, to be followed by Denmark.
Brazil:
Thank you very much, Mr. Chair. Mr. Chair, at the outset, I would like to express my delegation’s appreciation for your work since the beginning of the mandate of this Open-Ended Working Group and your efforts in ensuring that our discussions continue to incrementally advance. Rest assured of my delegation’s continued unwavering support to the OEWD and to you. The pervasive use of ICTs, now ubiquitous in all dimensions of our lives and societies, has exponentially increased our vulnerability to malicious cyber operations, which present one of the most complex challenges to international peace and security of our times. It is essential that this Open Networking Group continue to advance in the discussion of all threats in this domain, and particularly those which have emerged more recently. Rapidly evolving technologies bring new threats to critical infrastructure, such as the risk of sabotage to optic fiber cables or of damage to satellites used in cyber communications. We reiterate our appreciation for the second APR’s inclusion of ransomware in the threat section, given the grave implications for many ransomware attacks to the security and stability of states. We also emphasize the need for the OEWG to engage in deeper discussions on this issue, with a view to eventually making concrete recommendations to address this threat. While we welcome the discussion of this important issue in cybercrime fora and are members of initiatives such as the Counter-Ransomware Initiative, this group, as a UN forum with a mandate from the GA to discuss threats in which congregates the entire membership, is a body with the legitimacy to establish universal guidelines on this issue. Similarly, we reiterate the need for the OEWG to address the impacts of artificial intelligence and quantum computing to international peace and security. While AI has already and will surely continue to bring many beneficial, peaceful applications to humankind, we can predict with certainty that its applications will be extended to the military field, with relevant impact to peace and security. Those military applications, especially the use of force, must strictly abide by international humanitarian law as enshrined in the Geneva Conventions and other relevant international legal obligations and commitments. In this domain, Brazil advocates that we are guided by the concept of meaningful human control adopted in 2019 by the high-contracting parties of the Convention on Certain Conventional Weapons on its debates on lethal autonomous systems, but which also apply to discussions on the military uses of AI. Guiding Principle B of the GGE on Emerging Technologies in the Area of Lethal Autonomous Weapon Systems indicates that human responsibility for decisions on the use of weapon systems must be retained. since accountability cannot be transferred to machines. The centrality of the human element in any autonomous system is essential for the establishment of ethics standards and for full compliance with international humanitarian law. There is no replacement for human judgment and accountability. Military implications of AI must also be based on transparency and accountability throughout their life cycle from development to deployment and use. We are equally concerned by the uses of generative AI in misinformation and disinformation campaigns, particularly, but not limited to, the use of so-called deep fakes, the advanced digital manipulation of images, video, audio, or text generally used to create fake content that appears authentic, distorting reality to deceive or influence public perception. In the context of an armed conflict, this could cause grave harm to civilians and would constitute a violation of international humanitarian law. The use of AI for misinformation, disinformation purposes is also of particular concern in electoral processes, where it poses a significant threat to state’s political stability. With this in mind, our Supreme Electoral Court has enacted several norms ahead of this year’s municipal elections, which prohibits the use of deep fakes and greatly limit the use of AI in general in electoral campaigns. Mr. Chair, quantum computers, which are currently being developed, are like AI, a technology of dual use. Exponentially more powerful computing will accelerate science and innovation, therefore bringing many socioeconomic dividends to societies. However, quantum computers could also be used in the development of armaments and other military equipment and in offensive operations. In the context of ICT security, quantum computers will have the potential to break currently used cryptographic algorithms, leading to strategic advantages for those who control this technology. This would render the interception of confidential sensitive information an even more dangerous threat. By some predictions, classic cryptography systems could be obsolete in as little as 10-15 years. The international community is clearly concerned by these technologies, as evidenced by the many initiatives at the national and international levels that many countries have recently taken on these subjects. As with ransomware, while we have taken part in some of these processes, due to the intrinsically multidisciplinary nature of AI, our international discussions of it should remain open and inclusive. This group, with its universal UN membership composition, is the best forum suited to a structured, long-term discussion on the security aspects of artificial intelligence and quantum computing, including those related to their military applications. Mr. Chair, we share the concerns shared by many on the threat posed by the malicious use of commercially available cyber intrusion tools. It is important that regulations are put in place to combat the misuse of these technologies, which constitutes a threat to international peace and security and a violation of human rights, particularly of the right to privacy. We must bear in mind, however, that these tools, when duly regulated by the appropriate legal guardrails, have important legitimate uses, such as by law enforcement in criminal investigations with judicial authorization. In this context, we oppose using the term proliferation, traditionally associated with weapons of mass destruction, whose very existence are illegal to refer to their irresponsible dissemination and misuse. And initiatives aimed at regulating the commerce and use of these technologies must not pose undue constraints to their access by legitimate authorities, particularly in developing countries, many of which do not possess those capabilities. In the cyber realm, which has been transnational since its inception, international cooperation is even more important to countering threats. This includes capacity building, which has been rightfully recognized by the second APR as a cross-cutting element to all issues under the OEWG’s mandate. We also positively view some proposals made by other delegations within this OEWG, such as the creation of a threat repository and the adoption of a common terminology, and are open to deepening those discussions. I thank you, Mr. Chair.
Chair:
Thank you, Brazil, for your statement. Denmark, to be followed by Israel. Denmark, please.
Denmark:
Thank you. Denmark fully aligns with the EU statement and would like to make the following statement in our national capacity. The past years, we’ve witnessed a surge in cyberattacks, setting new benchmarks in terms of variety, volume, and consequences. Critical events like the ongoing war of aggression against Ukraine significantly influence the cyber threat landscape. In Denmark, we have seen a high level of activity among pro-Russian activist hacker group. Russia’s cyber capabilities are continuously weaponized in Ukraine in attempts to undermine trust in authorities and destroy critical infrastructure. This behavior is contrary to the framework for responsible state behavior in cyberspace. 2024 is going to be the biggest election year in history. Therefore, I would like to take the opportunity to highlight the concerning amount of cyberattacks targeting democratic elections. Last year, the UK attributed several cyberattacks on British politics and democratic processes to Russia. This behavior is unacceptable. And Denmark, together with the EU, strongly condemn malicious cyber activity targeting democratic elections and encourage all actors to live up to their international obligations. Emerging technologies are rapidly changing the cyber threat landscape these years. Artificial intelligence has not only resulted in an increase in volume of cyberattacks, but also made cyberattacks, including ransomware attacks, more effective. As pointed out numerous times today and yesterday, the increase in ransomware attacks is deeply worrying. To successfully combat ransomware attacks, it is crucial that we work together with different stakeholders. Private companies own a large proportion of critical infrastructure and therefore play an important role in safeguarding society. from malicious cyber activity. We must strive for effective coordination between governments and all relevant stakeholders, including civil society, academia, and the private sector, as combating cyber attacks must be a joint commitment. Thank you, Chair.
Chair:
Thank you very much, Denmark. Israel followed by Argentina. Israel, please.
Israel:
Good morning, Chair. Thank you, Chair, for giving us the floor, as it’s the first time a delegation takes the floor during the seventh substantive session of the Open-Ended Working Group. We wish to thank you and your team, as well as the UNODA, for the tireless efforts and dedication leading us through this process and for preparing this session. Mr. Chair, since the October 7th heinous terror attacks against Israeli citizens, around 15 cyber attack groups attributed to malign states and other terrorist and non-state actors have also intensified their attempts to launch cyber attacks against targets in the Israeli public, private, and government sectors. The attackers’ intention, as any other terror organization, is to spread terror by harming civilians and attempting to cause real damage. They have been using cyberspace to damage, among other things, our critical and civilian infrastructures, targeting our energy installations, water systems, and even hospitals. Their actions should be condemned uniformly. Also in this forum, as part of the efforts to confront these attempts to spread terror, Israel is continuing to thwart many attempts to penetrate cameras and billboards in the public domain, stopping them from gathering information and trying to influence and to damage our essential services, as well as thwarting numerous attempts to deny service or deface government and academic commercial websites and harm private sector entities and services. This malevolent actions and attempts violate the basic norms of responsible state behavior in cyberspace. Nations that are advocating and call for the implementation and adherence to these norms should all stand together today with Israel in condemning these harmful malicious cyber attacks. Even in more peaceful times, Israel continues to be a target of malicious efforts to penetrate and damage its digital infrastructure. It is the continuity of basic and essential services to the public that are at stake here. Mr. Chair, an additional threat is the one posed by malicious actors using Cybersphere to conduct influence operations through spreading misinformation and fake news and engaging in sophisticated phishing campaigns aiming to spread their malware. This is particularly serious as it directly threatens national security. Like the campaigns perpetrated by some of these attack groups and cyber terrorists using cyberspace cynically and mercilessly to hurt the families of the victims in the most degraded and despicable form while trying to spread fear and by stealing the hostages’ digital assets as they continue to hold 134 kidnapped Israelis and torture them and their worried families. We should all work together to improve our capabilities to fight these and similar threats. Mr. Chair, in an attempt to address your guiding questions, the introduction and use of AI and recently with the development of Frontier AI, a new challenge emerges also to cyber security. We wish to highlight that technology is neutral. There is no bad technology or good technology. Technology is in and of itself neither legitimate nor illegitimate. Nevertheless, the ongoing developments of AI and introduction of generative artificial intelligence have increased the attack surfaces. significantly. AI models and data sets used by these models present new opportunities to adversaries. Publicly available generative AI enhances attackers’ capabilities. We all need to address the challenges how to better secure AI models throughout their lifespan. This includes the need to secure AI development and data sets and safeguard the use of AI models. It should be mentioned that AI also holds great positive potential for cyber security and we should all work together to harness AI technologies for better cyber security and building a collective resilience. The emergence of new and very advanced technologies carries also many new opportunities and benefits and the international community will need to find the ways to balance the need of securing an open and free development of emerging technologies while mitigating the potential new threats they pose. In this regard, we wish to commend the U.S. for leading the efforts to draft a U.N. resolution on safe, secure, and trustworthy AI systems for sustainable development. Mr. Chair, per your second guiding question, another emerging threat we should take into consideration is the cooperation between rogue states and non-state actors like organized criminal actors or terrorist organizations acting as proxies. The proliferation and availability of advanced cyber tools in the hands of non-state actors and unauthorized private actors constitute a serious threat. The malicious use of these sophisticated intrusive cyber capabilities by non-state actors and unauthorized private entities carries serious implications to national security and to the stability of cyberspace as a whole. In many cases, these malicious actors are also receiving safe havens which enables them to pursue their harmful activities with impunity. In this context, offering hacking as a service and the illicit financing of cyber attacks using cryptocurrency is a growing threat. This is an area where countries could collaborate to break this kill chain and block funding for malicious cyber activities. We believe that if we could develop an efficient mechanism to freeze and seize cryptocurrencies on a global scale, we could drastically prevent many of these cyber attacks. To conclude, Mr. Chair, Israel is looking to cooperate with other states on the prevention and mitigation of existing and emerging risks and threats in the cyberspace, aiming at building together a stronger global resilience. Thank you, Chair.
Chair:
Thank you very much, Israel, for your statement. Argentina, to be followed by Bangladesh.
Argentina:
Thank you, Chairman. Since this is the first time that my delegation takes the floor, I would like to welcome you, your team, and to pay them tribute and show you the support of my delegation in your work. I’d also like to thank the Women in Cyber program for making it possible to have a greater participation of women in the discussions. Chairman, in the view of Argentina, the main threats that we must address are not unrelated to what is taking place in all corners of the world. Mainly because of the global nature of cyberspace and the transnational nature of cyber incidents. For Argentina, it’s of great concern the more frequent use of malware, ransomware, and phishing and their effects on critical infrastructure. The ecosystem of vulnerabilities in this critical infrastructure has worsened and this does represent a shared concern among states, the private sector, and civil society. In this regard, we highlight the importance of cooperation with the many stakeholders who are involved. to continue to analyze the existing and potential threats in cyberspace and to promote actions at the global level, such as exchange of experiences and the panel of experts. My delegation supports the initiative to establish a registry of states on a voluntary basis, as was proposed by the distinguished delegation of Kenya. We believe that this would be a means for confidence building and contribute significantly to better understanding of the threats we are facing and to developing effective strategies to reduce those threats. In the establishment of such a registry, we support strengthening the multi-stakeholder model and the promotion of the participation of the private sector and civil society. The stakeholders are at the center of the cyberspace, either as experts, owners or operators of infrastructure elements. Their participation gives us a fuller view of the problems that we are encountering collectively. It also ensures that we come up with more holistic solutions to the challenges represented by the new challenges in cyberspace. Also, Argentina gives great importance to analyzing the threats to the stability of cyberspace, which arise from new technologies, such as artificial intelligence and quantum computing. The development of emergent technologies in the area, for example, of autonomous weapon systems is a threat to international law, international humanitarian law, and for international human rights law. Therefore, it is vital to analyze how we can ensure a control of this type of technology through its entire life cycle. Similarly, we are particularly interested by the opportunities these emerging technologies allow us. for our societies. We understand that emergent technologies are neutral and that the problem is in terms of the control over the use of those technologies. In this regard we recognize the need to find a proper balance between the regulatory frameworks which are being established around the transfer of these technologies and the right of all states, principally developing states, to have access to emerging technologies for their well-being and their socio-economic growth, and also to contribute to the resilience of cyberspace for the benefit of all. Mr. Chairman, given the emerging threats, we must have greater cooperation between states in this area. In general, it’s the private sector which has the greatest capacity and resources to explore the operation of malware, and this allows them to update on the threats which exist. In this regard, establishing international cooperation with the private sector in this area does represent a tangible benefit for the entire international community. Thank you very much.
Chair:
Thank you very much, Argentina. Bangladesh, to be followed by Netherlands. Bangladesh, please.
Bangladesh:
Thank you, Mr. Chair. It’s a pleasure to see you in the work of this group. My delegation extends its genuine gratitude to you and your skilled team for steering this group with excellence. Rest assured, you have our unwavering support in all your endeavours. Mr. Chair, during the sixth substantive session in last December, my delegation underscored several threats, including deepfakes, quantum computing, AI-powered hacking, and supply chain attacks as new developments in existing and potential ICT threats. we reaffirm that these threats continue to be highly relevant in the context of advancement of AI and other emerging technologies. Chair, your guiding questions consistently push the boundaries of my knowledge and ingenuity. It leaves literally no room to recycle my statements. While undeniably taxing on my intellect, let me acknowledge that your questions are always a delightful mental workout. As we try to answer your questions, my delegation views the increasing weaponization of misinformation and disinformation driven by cutting-edge technologies, including artificial intelligence, using technologies like deep fakes as a pressing threat. This threat jeopardizes social harmony, democratic processes, and very existence of humanity itself. The cardinal principle of free will, the cornerstone of human superiority, faces unprecedented challenges as sophisticated misinformation and disinformation blur the lines of truth. This danger is particularly pronounced as billions of people worldwide approach crucial voting movements this year, as also mentioned by many other delegations, making them vulnerable to its manipulative power. Urgent attention and collaborative efforts are required to safeguard democratic values and preserve social unity. Chair, as AI becomes an integral part of people’s decision making processes, it is crucial to ensure that AI systems are explainable. This helps prevent them being perceived as black boxes and guarantees that human remains in control of AI-aided decision making. Second, AI is supercharging cyber attacks. Malicious actors can now leverage AI to craft hyper-personalized phishing campaigns. By analyzing a vast amount of data, AI can create highly believable emails that target individuals with unnerving accuracy, bypassing traditional spam filters. This deadliness is compounded by the automation of intuition attempts. AI-powered tools can orchestrate a relentless barrage of complex attacks, overwhelming security defenses with a constant stream of probing and exploitation efforts. This combination of hyper-personalization and automation makes AI a powerful weapon in the hand of cybercriminals. Third, the widespread availability of potent ICT tools, both commercially and open source, fosters a ripe environment for cybercrime. Through denial of service attacks, attackers can disrupt online services with minimal technical expertise. The anonymity afforded by open source tools, applications, attribution, emboldening perpetrators, and impending accountability. The dark web further exacerbates the situation, functioning as a marketplace for sophisticated hacking tools that lower entry barriers to cybercrime. Furthermore, vulnerabilities in widely used open source libraries create supply chain weakness, posing a risk to entire software ecosystem. Finally, the intertwining of AI and cyber security presents a paradox. While AI can significantly bolster defense mechanisms, it also equips adversaries with powerful tools to launch sophisticated attacks. As we witness the emergence of novel AI-driven threats, it becomes imperative for organizations, governments, and individuals to stay abreast of this emerging space and invest in technically appropriate security strategies. In an AI-dominated landscape, the future of ICT security requires more than just technological solutions. It demands a thorough understanding of evolving cyber adversaries’ tactics. The open-ended working group has been playing and can continue to play a crucial role in addressing this dynamic landscape which we all desperately aspire to navigate effectively. I thank you.
Chair:
Thank you very much, Bangladesh, for your thoughtful statement, and thank you for not recycling your statement. And it’s also quite clear that your statement was not prepared by generative AI, because I can see that you have thought very carefully and seriously about this matter, and that is very much appreciated. I give the floor now to Netherlands, to be followed by Belarus. Netherlands, please.
Netherlands:
Thank you very much, Chair, and as it is the very first time I take the floor in this open-ended working group, I want to thank you and congratulate you with your work in guiding us through this process. The Kingdom of the Netherlands aligns itself with the statement delivered by the European Union, and I will make some additional remarks in my national capacity. The Netherlands continues to be concerned by an ever-evolving pattern of malicious cyber activities, activities that have growing implications on individuals, societies, and peace and security between states. In our previous sessions, we held rich exchanges on the threat landscape, and were able to capture many of them in our APRs. The Netherlands considers our shared understandings of the threat landscape to be an essential basis for the rest of our work. Chair, before addressing your guiding questions, I would like to highlight the Netherlands’ continued concern over operations aimed at stealing intellectual property and other sensitive data. from commercial and government entities. On the 9th of February, the Netherlands National Cyber Security Centre published a technical advisory reporting an intrusion into this network of the Netherlands Ministry of Defence in 2023 that was attributed to a state actor. The advisory provides technical information regarding malware on FortiGate appliances, referred to as CodeHanger. It is our hope that this advisory will enable international partners and organisations to detect, prevent and mitigate this threat. Chair, allow me to highlight four areas in which the Netherlands considers this group could expand in its next APR. Firstly, we welcome the inclusion of ransomware in the last APR and hope to make further progress this year, as ransomware incidents with significant disruptions to economies, societies and individuals have been observed in various regions worldwide. For example, we have seen ransomware attacks on essential healthcare systems, as was mentioned also by, amongst others, Belgium, Australia, New Zealand and Italy, disrupting people’s access to medical information and may indeed put lives at risk. These kinds of ransomware incidents have such a disruptive impact that they may rise to a level of threat to national and international security. Secondly, the Netherlands is deeply concerned over malicious cyber activities targeting international organisations, such as the ICC. International organisations play a crucial role in addressing global challenges. from conflict resolution to providing justice, humanitarian aid, and peacekeeping. Cyberattacks targeting these organizations do not only disrupt their ability to do their work in an independent manner, but also pose a threat to effective multilateralism and a rules-based international order. It is of vital importance that international organizations are able to fulfill their respective mandates in a safe, secure, and independent manner. Thirdly, the Netherlands welcomes the language in the 2023 APR on the need for a gender perspective in addressing ICT threats. It is important to gain a better understanding on how ICT threats have a different impact on different groups and individuals on access to information, privacy, and security. In this regard, it would be beneficial if we could better link the Women in Peace and Security Agenda. Fourthly, the Netherlands would like to express concerns over the indiscriminate or reckless use of ICTs that cause harmful cascading effects on the critical infrastructure and essential services. While a wide range of technical properties have been known to cause such effects in past incidents, the use of automation and artificial intelligence in cyber operations increases their likelihood. And that leads to my final point, Chair. In your guiding questions, you ask us to reflect on the implications of AI for the international ICT security, a topic that was raised by many delegations during recent sessions. The Netherlands sees three potential areas for the Open-Ended Working Group to address the role of AI. First, the risk of AI-enabled threats. cyber operations that are more autonomous and scalable, and may therefore increase the risk of misperceptions and potential escalation between states. Second, the cyber security risk of AI systems, in particular, when it comes to key public services, industrial control system, and infrastructure. The potential risk of generative AI in writing malware is, of course, a big risk, noting, of course, that at the same time, as was mentioned also before, AI could also strengthen the effectiveness of cyber defense systems. Listening to the threats that other delegations have addressed, the Netherlands shares the concerns raised by, amongst others, Belgium, Australia, France, UK, and Canada, over the proliferation and the irresponsible use of commercial available intrusion capabilities, and, in particular, the misuse of such capabilities and services in a way that is incompatible with international human rights law. And I would like also to echo the points made by the Republic of Korea, Australia, and Japan on the threat related to crypto theft, including in relation to the risk of proliferation of weapons of mass destruction. Chair, as the cyber domain is ever evolving, and new threats to international peace and security arise, it’s important that all states attain the capacity to monitor and mitigate these threats. To that end, the Netherlands notes with interest Kenya’s proposal for a threat repository, and looks forward to discussing it further in the OEWG. Thank you very much.
Chair:
Thank you very much, Netherlands, for your statement. Belarus, to be followed by Nigeria. Belarus, please.
Belarus:
Mr. Chair. First of all, let me thank you and your team for your unflagging efforts to provide good conditions for the negotiation process within the Open-Ended Working Group on Security of and in ICTs. Please rest assured we will continue to support your efforts on behalf of Belarus, and we’re convinced that under your leadership the group will move forward during this session. Information technologies are daily developing, and around the world the number of crimes in the ICT domain is growing as well. They undermine democratic institutions, human values, law and order, sustainable development. We are concerned with the direct threats to critically important infrastructure facilities, specifically in health and education. The use by some actors of a broad array of ICT tools in their information warfare leads to unprovable accusations, denial of attribution, mass falsehoods and fakes. Strategic ignoring of disinformation and irresponsible handling of databases, insufficient security provided for ICT products, causes more such criminal activity. We’re convinced that special attention should be given to IA, especially the ethical element of artificial intelligence, and the risks posed for ICT. Many states will find it difficult to counter the threats in the ICT area on their own. solely relying on their own resources. We support the OEWG mandate affirmed by the UN General Assembly resolution and hope to see a substantive dialogue that will lead to new rules, norms, and obligations in terms of responsible conduct in the virtual domain, minimizing or preventing conflicts involving ICT. On behalf of Belarus, we are committed to a constructive, depoliticized, targeted dialogue within the group and wish everyone a successful session. Thank you very much.
Chair:
Thank you very much, Belarus, for your statement. I give the floor now to Nigeria to be followed by Switzerland. Nigeria, please.
Nigeria:
Thank you, Mr. Chair. Thank you, Chair. My delegation appreciates the concerted effort of your able leadership and that of your team in the last six sections of the OEWG. Your sterling performance in harmonizing divergent views of member states is laudable. The seventh section presents another opportunity for additional consensus to reach the group’s ultimate goal of safeguarding the peaceful use of cyberspace. The emergence and dynamics of modern technology has drastically altered our way of life. It has improved our personal lives, relationship and communication with others, as well as bolstering global economic indices. Its evolving nature further creates opportunities and challenges that require consistent discussion on reinforcing its benefits as well as mitigating its challenges, especially the malicious use of ICT. While Nigeria joins other delegations who have spoken on cyber threats, we call for urgent mitigation on the existing and potential threats in cyber security, particularly the dexterity of artificial intelligence, deepfake, human robots, ransomware, online child abuse, cryptocurrency, cyber terrorism, election interference, online identity theft, misinformation, disinformation to mention but a few in modern technology. Mr. Chair, in recent times, we have witnessed the use of deepfake in impersonating people with tendency of disseminate misinformation in the society. The surge in hacking and stealing personal data of clients from different organizations is worrisome, resulting in legal funds transferred, disruption of services, and blackmailing of victims. ICT has created a pipeline for money laundering, and it has increased tax evasion, depriving government sources of revenue to provide amenities for its populace. The list of existing and potential cyber threats is non-exhaustive, therefore, continuous dialogue and engagement with ICT companies is paramount to safeguarding area of mutual interest against nefarious cyber activities. Legislative acts with punitive measures enacted at national level could deter the proliferation of cyber threats. On the global scale, my delegation reaffirmed that guiding rules and strategic measures to curtail the excessiveness of malicious actors in cyber security could be harmonized by state and implemented as deterrence to violators of the prohibitive acts. This can be achieved through engagement with ICT companies while emphasizing the litigation of malicious activities in cyber space. Nigeria reiterates that the principle of responsible state behavior and a non-exhaustive list of norms in guiding cyber security should be upheld to consolidate transparency among states. In conclusion, Mr. Chair, the UN Charter advocates for global peace and security, human rights, and sustainable development. This time should be indoctrinated in the parameter of ICT and always upheld when conducting the activities of cyber security, be it by government, conglomerates, or innovators. Collective effort to defend humanity against all forms of cyber threat is paramount to our peaceful coexistence. Thank you, Mr. Chair.
Chair:
Thank you very much, Nigeria, for your statement. Switzerland to be followed by Ghana. Switzerland, please.
Switzerland:
Thank you, Mr. Chair, as this is the first time that we take the floor, I’d like to start by thanking you for your commitment, and your guidance, and your team for all the hard work in preparing these sessions. But I have to admit, I was a little bit puzzled when you gave us the homework already at the beginning of this session, and not at the end, as usual in school, at least in Switzerland. So my sympathy goes to all the students in Singapore schools. I feel with them, but okay, let’s go back to homework. Switzerland observes two defining developments in cyberspace. First, the increasing intensity. of ransomware attacks and state-sponsored cyberattacks against critical infrastructures, and second, the increased digitalization of conflict and the use of cyber operations during armed conflict. This is a reality, particularly true in Russia’s war against Ukraine. We still see the opportunistic attacks of many non-state actors on vital or critical ICT services and critical infrastructures as one of the main threats. The last months have shown some incidents with severe impacts, namely attacks by criminal ransomware groups targeting critical infrastructure and suppliers, among them many hospitals or humanitarian actors, and publishing sensitive information, which in some cases might amount to a national security issue. Belgium and Australia referred to such malicious operations in their statements. As the Republic of Korea and others, we also would like to mention the threat of cyber currency theft. And like others, Switzerland is also concerned that some states act as safe havens for criminal ransomware groups and sometimes appear to make use of them for their own purposes, this in stark contrast to the framework on responsible state behavior in cyberspace. To tackle such risk, Switzerland is participating in the Counter-Ransomware Initiative, among others. We also continue to observe the worrisome development of non-state actors being involved in offensive actions against ICTs within the frameworks of conflict or armed conflicts between member states. The direct or indirect tolerating, respectively incentivizing, of such actors rises the threat of direct or indirect attacks on third parties, as well as uncontrolled spillover effects. Switzerland also observed a handful of actions aimed at virtual and physical infrastructures providing the core of the Internet, like subsea cables. Such actions actions can trigger domino effects which might lead to the temporary impairment of vital services. Mr. Chair, Switzerland wants to highlight that AI is not per se a threat itself, but rather a potent and powerful tool which can be brought to many uses. The proper use of AI can increase the security and resilience of ICT solutions, as well as support mitigation and monitoring measures. However, AI vice versa may support the crafting of capabilities used in attacks against member states, may this be in the form of malware or the spread of seemingly real information, also called deepfakes. Some even say we will face cyber attacks on steroids. Hence, Switzerland is of the view that the developments in AI should be discussed in a technology-neutral manner which focuses on the actual use and implementation of this technology to adverse effects. But we also need to discuss about how to deal with attacks on AI itself, meaning not the use of AI for malicious purposes, but exploitation of vulnerabilities in the AI models themselves. It seems particularly important to us that governments and the private sector work together here, just as they do in traditional IT security. Like Kazakhstan and other delegations, Switzerland thinks we should also discuss the challenges related to the Internet of Things, and it was mentioned in the second annual progress report, which we welcome. The availability of intrusion ICT capabilities is a reality, and partially driven by member state dependence on such capabilities within the legal frameworks of law enforcement and ensuring national security. However, Switzerland is of the view that such capabilities only should be used within a strict legal mandate adhering to existing international law and human rights. Therefore, the focus should not only lay on AI. eliminating such offers, eventually pushing them in an even less controlled underground environment, but uncurbing the misuse of such solutions. Switzerland therefore supports the Palmal process, launched by France and the UK, which aims at creating a framework in order to establish solutions, guardrails, and legal options to increase the control over the use of such capabilities. We welcome the discussion of this topic also in the open-ended working group. Mr. Chair, Switzerland would like to highlight that cooperative measures must take place on all levels involved with the use of ICTs. We would also like to stress that there are already several regional and global platforms and forums existing in this regard, may it be on a technical level, diplomatic initiatives, or capacity building. We should make better use of these existing opportunities to strengthen cooperation. By doing so, we can also better assess what initiatives would be necessary at the global level. Switzerland is concerned about malicious cyber activities targeting democratic institutions and electoral processes, and we share the concerns expressed by many other delegations like the EU, Belgium, Italy, and other states in this regard. And finally, like the Netherlands, Switzerland would like to highlight the risks of malicious use of ICTs for international organizations. At the UNIDIR Cyber Stability Conference last week, the representatives of the UN International Computing Centre referred to the challenges faced by international organizations. We as states must help to ensure that they can fulfil their role unhindered by such activities. Thank you.
Chair:
Thank you very much, Switzerland, for your statement and for having done your homework. Ghana to be followed by Chile. Ghana, please.
Ghana:
Mr. Chair. My delegation wishes to express sincere appreciation for your outstanding leadership and guidance of this open-ended working group. Your dedication to steering our collective efforts towards meaningful progress is commendable, and we are grateful for the opportunity to contribute under your esteemed leadership. Mr. Chair, during the sixth substantive session of the United Nations Open-ended Working Group on ICTs, my delegation emphasized the importance of addressing developments in new technology, particularly artificial intelligence. In alignment with your outline concerns, Ghana proposes that the OEWG delve deeper into potential threats associated with AI, notably deep fake manipulation, where AI can fabricate convincing visual and audio content for malicious purposes, which can lead to misinformation and disinformation, opinion manipulation, or cyber crimes like identity theft. This could contribute significantly to undermining democratic processes like that of the elections. Additionally, there’s a deep concern about autonomous and anonymous threats, wherein AI-driven cyber threats operate without human intervention, utilizing technologies like blockchain for anonymity posing challenges for law enforcement. Furthermore, there’s a need to also address privacy risk, as AI often relies on extensive data raising privacy concerns and potential violations. Mr. Chair, my delegation also underscored in the sixth substantive session of the OEWG, the necessity for agreed upon international guidelines for ICT design and deployment, which should promote security by design, focusing on issues such as privacy, security, and accountability. These guidelines would establish a unified framework and will contribute significantly to enhancing cybersecurity initiatives globally, and ensuring the prioritization of security and ethical considerations, which will consequently foster a resilient ICT ecosystem. By incorporating security by design and ethical considerations, these guidelines will serve as a comprehensive framework to mitigate risks associated with digital technologies. My delegation would also like to commend the Chair’s initiative to engage experts in discussions on emerging technologies like quantum computing and AI, aiming to deepen our understanding of their impact. In conclusion, we reaffirm our support for Kenya’s proposal to establish a UN threat repository, fostering global awareness and understanding of existing and emerging cyber threats. We also advocate for exploring further initiatives at the global level, including the deployment of a comprehensive international guideline for ICTs promoting security, privacy and accountability in their design and deployment. Thank you, Mr. Chair.
Chair:
Thank you very much, Ghana. Chile to be followed by Germany. Chile, please.
Chile:
Thank you very much, Chairman. I’d like to thank you and welcome all those present and wish us success or work in this session. And I’d also like this opportunity to pay tribute to the efforts made by your team and by the Secretariat to prepare our agenda. And since we have the floor, there are many delegations taking part in this meeting. And this is the fruit of the questions that you have raised. We’ve done our homework, as you see. My delegation is aware that what we have seen here, there are two sides of the same coin. On the one hand, we are all aware that these new threats are emerging, they are present. On the other hand, states are subject of the effects and the impact of this, and therefore we need to be ready for this, therefore we need to make efforts which must be more and more successful. and we must speed up their implementation. Chile considers that the illegal activities in cyberspace are a clear threat to international peace and security. They could affect in different ways the states depending on the level of their digitalization in their security and the resilience of their ICT and communications technology. Now we must pay particular attention to these threats because they can affect in a differentiated way different groups and entities and we must bear in mind particularly women, children, adolescents. Therefore it’s important to work together amongst states to exchange experience in order to reduce these digital threats and face successfully the existing and potential threats as we move forward with the digitalization of the cyberspace. We’d like to thank you for your questions Mr. Chairman with regard to ICT and the development of the threats that the open-ended working group could discuss and in particular as was mentioned by a number of delegations, in the context of intelligence we can say the following. The AI has seen a development of software and reduced the cost of finding solutions and thanks to the current tools there is a need for a high level of knowledge so that we can develop these systems. This is a technology which is becoming easier to access over time. Nevertheless all this could represent a threat for the security and we believe that hacking is not just an issue to be dealt with by experts. We see an increase in the number of attacks or attempts of attacks using emerging technology which are available for all types of purposes. Now it’s essential to use AI under ethical standards in the view of my delegation and we should have to avoid the malicious use of such technology. Another important threat is the lack of ways of dealing with malware and how we can consider the information provided by artificial intelligence. So the use of AI currently has generated problems and errors in developing different services. Therefore it’s important that when we use artificial intelligence there are expert human controls that can validate that there are no errors in the system and which could threaten the use of that information. Now added to all this we are aware that the development of artificial intelligence could threaten democracy during electoral processes within the governmental bodies and the use for the revealing of false or confidential information. Therefore we need to have transparency, security and trust in all stages of the use of AI for our citizens. AI can be undermined by people threatening the Jews who try to implement malware using this technology which can lead to unexpected outcomes. There can be a change of data for malicious purposes. Now attacker can initiate in a more subtle way the attack on the networks and these attacks can be particularly directed at the health and transport sectors and other delegations have mentioned examples of these attacks. The malicious attacks can also be used to generate false information and the use of AI can automate phishing, use of malware and for identity theft. We need to work also in the area of voice recognition technology. Now given all this my country in October last year We promoted a regional initiative with regard to the governance of AI in the regional level, and 20 countries from our region signed the Santiago Declaration on the Ethical Use of AI in Latin America and the Caribbean. It seeks to promote, at the regional level, a combined approach to AI, so that we have an integrated approach and we have social and legal norms that recognize the cross-cutting impact of AI, including the proportional use, security, equity and non-discrimination in the use of AI, and also gender equality, sustainability in terms of social, economic and cultural sustainability. And also the oversight, security of information, transparency and making people accountable for the use of this technology. And also proper governance involving the many stakeholders. With regard to the implementation of cooperation measures to confront these threats and potential threats in the future, which we can undertake at the global level, I’d like to mention the following. States could generate necessary cooperative frameworks to share information and have technical meetings at the multilateral and bilateral level, and particularly at the regional level, and work in a coordinated way with the private sector and interested parties. And this would allow us, it’s therefore important to have national focal points, and to increase our capacities at the level of AI for an exchange of information. There’s also necessary to deal with regulatory frameworks, and also it’s vital that states should have permanent programs for training, particularly for governmental bodies and to establish coordination bodies, not just at the level of the government, but also to have alliances with civil society, public sector and the academic world. Now, with regard to what AEI represents, we believe that other interested parties, such as academic world, civil society and the technical community and others, could help states to identify concrete and possible threats. Our group could call for a study on this issue. Thank you very much.
Chair:
Thank you very much, Uli, for your statement. Germany, to be followed by Mauritius. Germany, please.
Germany:
Thank you, Chair. Germany is fully aligned with the statement of the European Union and wishes to deliver the following remarks in a national capacity. As we commence the first session of this working group in 2024, we find ourselves entangled in a complex web of challenges. Propelled by the swift pace of technological innovation, the expanding role of artificial intelligence in cyber attacks, the advent of cutting-edge technologies such as quantum computing and the transformation of cybercrime into a lucrative business model present multifaceted threats. These challenges are compounded by the rise of hacktivism, the strategic targeting of international organizations by both cybercriminals and state-controlled hackers, and the critical shortage of skilled IT security professionals. Today, we are witnessing increased vulnerability and instability of international networks, emanating by a significant degree from the cyber dimension of international conflicts. State and non-state actors exploit digital vulnerabilities to advance their agendas, disrupting digital peace and undermining trust among nations. We continue experiencing direct spillovers in German networks caused by Russia’s illegal war of aggression against Ukraine. Furthermore, it has become increasingly apparent that international organizations, including multilateral organizations belonging to the UN system, are being targeted more frequently, necessitating heightened vigilance. The respect for and protection of international organizations and the multilateral system must be of paramount importance to the community of states. We observe malicious actors positioning themselves to attack critical infrastructure and jeopardize democratic processes, including influencing elections. This is particularly alarming in light of the upcoming European elections and the three elections in German federal states coming up in 2024. The increasing proliferation of malicious cyber tools represents a significant trend that exacerbates these threats. Advanced technologies, including artificial intelligence, spyware, and commercially available intrusion tools, are now accessible to a wider array of actors than ever before. This proliferation enables even low-skilled individuals to launch sophisticated cyber attacks, amplifying the scale and impact of cyber threats across the globe. In this context, Germany fully supports the Franco-British Initiative aimed at addressing the proliferation of commercially available cyber intrusion tools. This collaborative effort signifies a crucial step towards international cooperation in the fight against the misuse of spyware and other cyber intrusion products that threaten the privacy and security of individuals, state authorities, and organizations worldwide. The professionalization of cybercrime continues to advance and will reach a new level of profitability in 2024. One of our prime concerns is the proliferation of ransomware. Therefore, Germany is an active contributor to the International Counter-Ransomware Initiative. Together with our colleagues from Nigeria, Germany is co-leading the Counter-Ransomware Initiative’s efforts on capacity building to ensure that our countries develop a high level of resilience against this malicious type of cybercrime. We look forward to continuing that cooperation in order to combat the business model of ransomware attacks. As we navigate this complex and dynamic environment, it is imperative that we foster international cooperation and develop robust cybersecurity frameworks to protect our shared digital future, including here at the UN. Before I conclude, dear Chair, let me invite you all to our lunchtime side event at the German House on Thursday, where we will be presenting the European Repository of Cyber Incidents. Independent experts from Heidelberg University, the German Institute for International and Security Affairs, Innsbruck University, and the Cyber Policy Institute in Tallinn have set up an open-access repository of cyber incidents, offering insights into more than 2,700 major current cyber incidents. Please join us to explore with our expert researchers how this repository can contribute to our joint understanding of the cyber threats that states and societies are facing. Sweet bites and coffee will be served. Thank you, Chair.
Chair:
Thank you very much, Germany, for your statement. And also, the office-at-site events are becoming even more and more tempting as the days go by. So, thank you for letting us know about your event. Let’s go on to the next speaker, Mauritius, to be followed by China. Mauritius, please.
Mauritius:
Good morning. Good morning, Mr. Chair, Excellencies and colleagues. The Republic of Mauritius would like to extend its gratitude to you and your dedicated team for your efforts in formulating a set of guiding questions that indicates how delegations could provide meaningful contributions to each agenda item of this meeting. The cyber threat landscape is an ever-evolving space marked by the constant emergence of new threats and the continuous improvement of existing ones. From malicious hackers seeking financial gain to state-sponsored actors engaged in espionage and sabotage, the landscape of cyber warfare is as diverse as it is insidious. The criminals continue to exploit vulnerabilities in our critical infrastructure, targeting businesses, governments, and individuals alike with cyber scams, ransomware attacks, and data breaches that compromise sensitive information and erode trust. Moreover, emerging technologies such as AI, quantum computing, and 5G bring new security concerns. While 5G promises unprecedented speed and connectivity, it also introduces new vulnerabilities that could be exploited by malicious actors. The sheer volume of data transmitted through 5G networks, coupled with proliferation of IoT devices, creates a vast attack surface ripe for exploitation. From potential interception of sensitive communications to the manipulation of network infrastructure, the security implications of 5G demand heightened vigilance and robust safeguards to protect against emerging threats, including its framework that is used to deploy the technology. Mr. Chair, as we are discussing about new cyber trends, it is important to highlight that the misinformation, disinformation and malinformation MDM, whose effects is costing the global economy billions of dollars each year, has become a serious security concern. Often known as fake news, MDM are damaging to public trust in institutions and during elections may even pose a threat to democracy itself. New technologies such as machine learning, natural language processing and amplification networks are being used to discredit factual information. Disinformation campaigns are using AI to spread false and misleading information such as deep fakes. Social media platforms have also become the new battlefield for such campaigns. In this context, it is important for states to have mechanisms in place to identify MDM activities and implement appropriate mitigation strategies. As mentioned by other member states, Mauritius too is of the opinion that the OEWG should also focus on addressing these emerging cyber threats. Mr. Chair, the future of cybersecurity lies in a proactive approach, where states should not only respond to threats but anticipate them. This includes integrating security into the design phase of products, continuously monitoring and analysing threats and fostering a culture of cybersecurity awareness. It is crucial to note that while technology plays a significant role in cybersecurity, humans are often the weakest link. Therefore, continuous education and training are critical. to ensure that everyone is equipped with the knowledge and skills to detect and prevent cyber threats. In the light of these threats, it is clear that our defences must evolve in step with the threats we face. Let me now elaborate on one of the major initiatives that Mauritius has taken to tackle existing and emerging cyber threats. Mauritius has set up a cyber threat information sharing platform through a membership program to facilitate exchange of information and intelligence on risk to critical infrastructure. Sharing of cyber threat information can help in terms of early detection of threats, enhanced situational awareness, improved incident response and collaborative defence. Through this initiative, Mauritius believes in the establishment of a community of trust between government, critical infrastructure owners and operators, as well as other stakeholders. This platform also acts as a cyber threat repository where members can share cyber threat details, incidents and vulnerability information in a secure manner to collaborate and better understand the taxonomy of cyber threats. By leveraging on this information sharing program, members can receive guidance on cyber-related threats to prevent, mitigate or recover from them. Mauritius remains committed to work closely with the regional and international community to share cyber threat information and responding to possible breaches. In this perspective, Mauritius would also like to collaborate with other Member States by extending this platform to the region and at the international level.
Chair:
Thank you very much, Mauritius, for your statement. China to be followed by the Syrian Arab Republic. China please.
China:
Thank you, Chair. At the outset, we thank the Chair for the excellent leadership and for promoting the adoption by the OEWG of the APR for two consecutive years. As always, China will support the work of the OEWG and the Chair, play a constructive role, and actively work for greater consensus in the group in the new year. At present, the trends of camp politics, militarization, and fragmentation in cyberspace are increasingly prominent. The existing international order in cyberspace is on the verge of collapse. A certain country is reproducing in cyberspace ideological confrontation in the physical world, pulling up a digital iron curtain, setting up a small yard and high fence, overstretching national security, engaging extensively in technology blockade and digital hegemony, practicing monopoly in the name of competition, and splitting the global cyber and digital industry and supply chains. Global cyberspace is facing division and block confrontation. In addition, a certain country has openly declared that it will take critical infrastructure as targets of wartime strikes and introduced military alliances into cyberspace, raising cyberspace friction and risk of conflict among countries and threatening international peace and security. Since 2022, China’s cybersecurity agencies have issued a series of reports. China has observed that a certain country’s government has, through organizations such as APTC39, launched large-scale, long-duration, and systematic cyber attacks against multiple countries in the world, including China, severely undermining the security of China’s critical infrastructure such as civil telecommunications and energy. exploit these malicious cyber activities to launch disruptive or destructive cyber attacks whenever they want. The malicious cyber activities of the said country contravene the UN Framework for Responsible State Behavior in Cyberspace. On the first guiding question, China is of the view that, in the field of AI and other emerging technologies, their development and peaceful use are the most prominent issues at present, especially when a certain country abuses national security as a pretext to formulate discriminatory standards and export control measures to suppress foreign businesses. At the same time, as mentioned by Kazakhstan, Malaysia, India, and Mexico, data security is a common and fundamental issue for emerging technologies, including AI, and an important area for discussion in the OEWG’s mandate. But we note with concern that, recently, a certain country has issued an executive order to prevent access to its sensitive data to countries of concern and used national security to launch investigations into automobiles from specific countries. Such behaviors are essentially abuses of national security to suppress the development of competitive high-tech companies of other countries. China has put forward the Global Initiative on Data Security, whose core is to develop and implement globally interoperable common rules and standards on supply chain security. The relevant content has been included in the UN Framework for Responsible State Behavior in Cyberspace and important consensus among all parties. The discriminatory measures taken by a certain country contravene its own commitment under the framework. Besides, on the global challenge of ransomware, China believes that it should be tackled in three aspects, its source, means of dissemination, and monetization channels. A certain country has gone to great lengths to develop and leak cyber weapons without regulation over anonymous networks and encrypted communication software that disseminate the source code of ransomware, and without effective control over the legal monetization of cryptocurrencies. Rather, it is busy piecing together small cliques to suppress ransomware. This makes us wonder whether its real purpose is to promote international cooperation against risks and challenges, or to serve geopolitical agenda and suppress and exclude specific countries. On the second question, China believes that the imperative is for all countries to fully observe and implement the framework for responsible state behavior in cyberspace, which is an important outcome of the 26 years of UN cybersecurity process and a solemn political commitment among member states, not a so-called voluntary and selective proposal or guiding principle. A certain country, in an attempt to suppress the normal development of other countries, has not hesitated in undermining the existing international system and rules, dividing the world and even coercing other countries to pay for its geopolitical aims. The working group should rectify such wrong practices, implement the framework in a comprehensive, full and accurate manner, jointly formulate unified and globally interoperable rules on supply chain security, and effectively uphold the existing international rules in cyberspace. Thank you, Chair.
Chair:
Thank you very much, China, for your statement. Give the floor now to the Syrian Arab Republic, to be followed by Vietnam. Syrian Arab Republic, please.
Syrian Arab Republic:
Thank you, Chair. At the outset, my delegation would like to thank you and your team and the Secretariat for the efforts that have been made in organizing this session. We’d also like to express our appreciation of the organizing skills which allows us to make progress in our work within the group. We believe that this open-ended working group is a unique platform. It allows us to ensure that all states participate in the discussions on an equal footing and discuss issues relating to ICT. Chairman, with regard to the issue under discussion, my delegation would like to emphasize the importance of taking into consideration the following threats. First of all, the use of ICT to limit or violate the sovereignty of states on the economic resources and the use of information resources on the territory of another state without the authorization of that state’s authorities. The violation of the sovereignty of states and also it’s a violation of its security and its economy. The misuse of ICT and media platforms including social media such as an instrument for interfering in the internal affairs of another state by disinformation and promoting hate speech and inciting violence and sabotage and the destabilization of states for political purposes. Next, the problems that could arise from this misinformation and when it is particularly difficult to ensure that we know what the source of these attacks are and in the absence of any regulamentation methods which allow us to identify the source of these cyber attacks in order to deal with these threats. And there’s also the embargo in the use of ICT and related services. This weakens the resilience of states. It harms the capacity to respond to these threats and to recover from these threats. A legally binding international instrument to govern the behavior of states in a binding way in the context of ICT is important. We stress the importance of adopting a global approach to deal with the digital threats in the context of ICT and particularly those that violate national sovereignty. and interference in domestic affairs and the misuse of economic systems by providing misinformation, disinformation and attempts to ensure political and social instability. In order to face the threats that we are facing in terms of ICT security, it’s vital to give priority to global commitment for a use of ICT for peaceful ends and we must fill the big digital gap and reduce the obstacles that are imposed on developing countries and particularly the unilateral sanctions and so that they can ensure the resilience of the basic infrastructure. It’s also important to negotiate an internationally legally binding instrument that can be adopted within the context of the United Nations as well as the work to come up with common approach to this issue in ICT. Thank you very much.
Chair:
Thank you Syrian Arab Republic for your statement. I give the floor now to Vietnam to be followed by Croatia. Vietnam please.
Vietnam:
Thank you Chair. Again in our first intervention this week we would like to reaffirm our strong support for the work of this working group under the leadership of His Excellency Ambassador Gaffer. We would also like to reiterate that the digital realm also known as the cyberspace or the ICT environment has become a crucial element for the progress of nations. Vietnam is actively seeking to capitalize on the promises offered by the 4th Industrial Revolution by enhancing its nationwide ICT infrastructure to facilitate digital transformation and the efficient operation of e-government services. ultimately contributing to our objectives of economic and social stability and growth. Mr. Chair, regarding the topic of existing and potential threats, we acknowledge that the rapid evolution of artificial intelligence is unfolding at an unprecedented rate, offering various ways for growth and cooperation. However, concurrently, it poses risk to the global peace, security, as well as national security and public order. Thus, the development of AI necessitates an alignment with the principles of international law, the United Nations Charter, and the framework of responsible state behavior within cyberspace. Ensuring that AI progresses within these parameters is critical to upholding global norms and maintaining stability in the digital realm. The United Nations assumes a central role in establishing the governance framework for AI, recognizing its potential to achieve the sustainable development goals while simultaneously addressing the most multifaceted risk AI poses to national sovereignty and security on cyberspace. The question on AI governance cannot be separated from the broader imperative of cultivating an open, safe, secure, peaceful, and resilient cyber ecosystem. Such an environment must place humans at its center, prioritizing their physical, mental, and intellectual well-being, fostering economic and social progressives, and safeguarding the legitimate rights of individuals, organizations, and states alike. Mr. Chair, the integration of AI into military and security systems represents a significant advancement, introducing new dimensions of capability and complexity. AI’s massive compute capability is being synergized with the global connectivity infrastructure. including undersea and orbit communication networks to enhance its effectiveness and impact. Notably, the AI’s role in identifying systems, vulnerabilities, and devising sophisticated cyber weapons is rapidly evolving, enabling quicker and more precise tailor-made attacks. Consequently, the threat landscape facing critical information systems is expanding as AI continues to exert its influence. Mr. Chair, this delegation again supports for the research and application of AI systems, which may assist states and the public in addressing concerns relating to national security, disaster relief, prevention of natural disaster, and response to emergencies, including pandemics. We also endorse international collaboration and encourage transparency in sharing AI algorithms, while also ensuring the role of human factors in AI operations. Vietnam stands firm in its determination to actively promote multilateral frameworks under the auspices of the United Nations to maximize the benefits of AI, while simultaneously mitigating emerging risk. I thank you for your kind attention.
Chair:
Thank you very much, Vietnam, for your statement. Croatia, to be followed by Republic of Moldova. Croatia, please.
Croatia:
Thank you, Chair, and your team, and Secretariat for dedicated work, and also for the guiding questions. Croatia aligns itself with intervention of the European Union, and in national capacity, we would like to echo many interventions by distinguished colleagues on constantly evolving threat landscape, both in amount, scope, and sophistication. And we cannot ignore the fact that geopolitics continue to have strong impact on cyber, and that cyber operations are used in armed conflicts. As mentioned by many, threats arise from the misuse of new and emerging technologies. like AI and quantum, but also from the increase of ransomware attacks which are jeopardizing normal functioning of public and private sector. All mentioned is a cause of great concern, and we agree with Ireland and Brazil that those threats can seriously impact international peace and security. Since the threats are evolving on a daily basis, the experts of the European Union Agency for Cybersecurity, shorter ANISA, had the demanding task to predict main cybersecurity trends till 2030. The full list is available on the ANISA website, and here I would like to mention just a few of them, such as supply chain compromise of software dependencies, advanced cyber-enabled disinformation campaigns, including deepfakes, rise of digital surveillance, auto-tourism, and loss of privacy, targeted attacks, such as ransomware, enhanced by smart device data, cross-border ICT service providers as a single point of failure, artificial intelligence abuse, increased digital currency-enabled cybercrime, exploitation of e-health and genetic data, attacks using quantum computing, exploitation of unpatched and out-of-date systems with the overwhelmed cross-sector tech ecosystem, disruption in public blockchains, manipulation of system necessary for emergency response, and skills shortages, which will encourage cybercriminals groups to target organizations with the largest skills gap and the last maturity. Since cyber threats are borderless and cross-cutting through different sectors, it is important to have cooperation and connect dots between different cyber and broader communities. Therefore, we cannot work in silos, since only with a whole-of-government and whole-of-society approach. we will be able to prevent, deter, respond and recover from malicious cyber activities. Divida et impera was for centuries motto of different hostile actors. Cyber malicious actors are no different. If we want to address those challenges and threats in a right way, a close collaboration between public and private sector, research and technical community and civil society is of outmost importance. States especially have responsibility and obligation to investigate criminal cyber groups and malicious cyber actors operating from their territories, so that such malicious cyber activities don’t go unpunished. And to quote Grand Master Yoda, do or do not, there is no try. So states are either acting responsible or not, respecting international law or not, implementing norms of responsible state behavior in cyberspace or not. We would like to express solidarity with all states which have suffered grave consequences from malicious cyber attacks in recent times, such as Albania, Australia, Costa Rica, Vanuatu and especially Ukraine, which is a victim from both cyber and kinetic unjustified military attacks. Mr. Chair, in this super election year, we would like to join colleagues who raise concerns regarding cyber-enabled foreign interference in democratic processes and stress the importance of protection of electoral infrastructure and processes. As the UK and France mentioned, the responsible use of commercial cyber intrusion tools and services should also be discussed within this group. Just to give you an example, how easy it is to hire a black hat hacker. For DDoS attack, average price is 26 US dollars per hour. For website hacking, 394 dollars per hour. And for email hacking, 241 dollars. And if you want a custom malware, it will cost you only $318 average. Additionally, we agree with Philippines that malicious use of AI in cyberspace should be further discussed since the generative AI is used not only to write malicious software, but also to spread malware more efficiently and more cheaper. We also support Malaysia that security by design is one of the prerogatives for more secure use of ICT. In the European Union, we have made a significant step into that direction with agreement on Cyber Resilience Act, which will bring common cybersecurity standards for products with digital elements at the European market, and we are ready to cooperate with others in this area. And although this working group is an exceptional example for women participation and their valuable intervention, the situation in cyberspace is not that bright, and therefore, we agree with Australia, New Zealand, and Netherlands, that special attention should be given to gender perspective in all chapters of APR this year. Thank you very much.
Chair:
Thank you very much, Kurusha, for your statement and for your Yoda wisdom. And I also know that at some point Yoda did say that many of the truths that we cling to depend on our point of view. And this is a process in which we have to listen to everyone’s point of view and try and understand where everyone else is coming from. This was a point I made yesterday at the reception as well, but thank you very much. We need all the wisdom we can get in this process to get us to where we need to go and avoid the dark side. Let’s go on with the speaker list. I have Republic of Moldova to be followed by Jordan. Moldova, please.
Republic of Moldova:
Thank you, Mr. Speaker, for giving me the floor. Moldova fully aligns with the statement delivered yesterday by the European Union delegation and would like to make the following statement in its national capacity. Mr. Chair, we have been dealing with cyber incidents for many years, but it is only now that we can say we are entering a new cyber security era, one in which governments, regulatory agencies and companies around the world work to increase oversight of cyber security incidents. The cyber security field is extremely dynamic. As Switzerland and Chile just stated, emerging technologies, especially artificial intelligence or machine learning, create both new opportunities but also new challenges. Attackers’ techniques are becoming more advanced with more tools available to fraudsters. Our region registers a constant increase in cyber attacks, the most widespread types of cyber attacks being DDoS and ransomware. Moreover, the so-called FIMI attacks, foreign manipulation of information and interference, have also registered a substantial increase. Images, fake news and video posts based on artificial intelligence are part of the arsenal of disinformation cyber attacks. We now live in a world where we need to tackle a wide range of threats, including cyber security threats. Our country is no exception. Moldova’s government is constantly being subject to destabilization and are undermining through what we call generically hybrid war instruments. The public sector is still the most targeted by cyber attacks. Attacks are directed at government services but also at critical infrastructure. Commonly, the range of cyber security attacks on the government authority’s website are used to derail the European path established by the Moldovan government. Like Belgium, Germany, Croatia and other delegations, Moldova would also like to express its concern towards the existing threats around the upcoming elections. As we are currently in proximity to the general elections in Moldova, we envisage that these attacks will be continued and will be used on an ever greater scale. We must attest that combining malign political goals with disruptive technologies can lead to serious political implications. The collective responsibility for cybersecurity that we are talking about today highlights the common obligation we have to protect the digital space that increasingly defines our daily lives. We are here today to also show the strong and coordinated commitment to the cybersecurity priorities of our governments by enhancing our capacities, establishing effective international partnerships, building trust and resilience. I thank you, Mr. Chair.
Chair:
Thank you very much, Republic of Moldova. Give the floor now to Jordan to be followed by Kenya. Jordan, please.
Jordan:
Thank you, Mr. Chair. In addressing the existing and potential threats related to the use of ICTs, Jordan would like to make the following remarks. Regarding new developments or trends in existing and potential ICT threats, which the open-ended working group should discuss in depth, the group should continue to address various aspects, including critical infrastructure, critical information infrastructures, risk assessments and policies, in-depth and extensive discussions on the applicability of international law in cyberspace, the potential and existing misuse of emerging technologies like applied and generative AI challenges and opportunities posed by the fragmentation of cyber norms, the intersection of cyberspace and geopolitics and strategies for attributing cyber attacks, particularly ransomware, and mitigating their consequences for developing countries. Recent discussions at the Open-Ended Working Group have included the potential implications of recent developments in artificial intelligence and other emerging technologies for ICT security. The Open-Ended Working Group should further investigate potential threats in this area, including cyber attacks, targeting AI algorithms, the activities of malicious actors exploring and leveraging AI for cyber attacks, the risks posed by unsecured AI leading to misuse of AI technologies, the importance of taking security precautions, biases in AI-based and distorted data, and privacy considerations when utilizing AI technologies. On concerns related to the proliferation and accessibility of advanced commercial and open-source ICT capabilities to non-state actors potentially impacting ICT security, the Open-Ended Working Group should indeed consider further studying potential threats in this domain, including the heightened sophistication of malicious acts in cyberspace, the urgent necessity to regulate open-source AI to mitigate associated threats and risks, and the implications of the expanding commercial market facilitating the acquisition and utilization of cyber intrusion capabilities on national security, human rights, and international peace and security. Recognizing the urgent imperative for heightened awareness and comprehension of both existing and potential threats, Jordan advocates for global-level initiatives. These include fellowship programs aimed at strengthening understanding and awareness of ICT threats to ensure global alignment, joint collaboration with the private sector, and the development of monitoring and evaluation metrics for such partnerships, aligning cyber-related engagements with globally recognized events, and conducting research to identify incentives for promoting awareness of existing and potential ICT threats, including a list of potential consequences in cases of non-compliance is crucial. Collaboration among states is essential to ensure the alignment and effectiveness of these initiatives in addressing ICT threats. I thank you, Mr. Chair.
Chair:
Thank you very much, Jonathan, for your statement. Kenya, to be followed by Fiji. Kenya, please.
Kenya:
Thank you, Chair. My delegation commends Your Excellency and your team for your continued efforts in providing the needed leadership of this open-ended working group, including the action-oriented program of work. We hope that during this session we will continue to build on the progress that we have so far achieved. Kenya, like many other developing countries, is undertaking advancements in digital connectivity and technology adoption, both in the public and the private sector. The government is using ICTs to improve access to efficient public services, while reducing on the cost of providing them. In the last one year alone, the government has added 5,000 public services, representing 90 percent of all public services to digital platforms. What this means is that we have a greater risk of exposure to cybersecurity threats. On the issue of existing and potential threats, and the question posed on potential threats that may be studied further, there are vulnerabilities stemming from inadequate infrastructure, limited resources, and varying levels of cyber security awareness. We remain highly susceptible to cyber crimes, data breaches, and other malicious activity. AI as a technology is a welcome development, as a tool with the ability to create actors with urgency, to make and implement decisions autonomously, greatly improving efficiency in data delivery. However, unlimited urgency may lead to undesirable outcomes. Distorted data sets that are unreliable and not vetted may result in biased output, security breaches, or system failures. The increased ease with which information can be accessed and assessed using AI models may result in increased ransomware attacks. The use of malware, distributed denial of service, and crypto-jacking attacks, which compromise container-based cloud systems, restrict access to services, expose restricted data, and enhance outdoor backdoor attacks also pose increased risks and threats to cyberspace. To address the challenges we face today, Kenya hopes for an inclusive access to cyber security resources. We remain alive to the existing huge digital divide and pursue equitable global cyber security. The UN must assertively champion inclusive access to cyber security resources. This is why Kenya supports cyber security proposals and initiatives that transcend technological disparities among countries. The UN should create a database that make essential cyber security tools, best practices and threat intelligence universally accessible. The advantage of having this approach is that regardless of a nation’s level of technological development, it would create a shared foundation for addressing and mitigating cyber security threats. This is where a nation, irrespective of their digital maturity, can actively participate in safeguarding their cyber environment, and the benefits of cyber security can be realized universally, enhancing the resilience of nations and collectively contributing to global cyber security governance. I thank you.
Chair:
Thank you very much, Kenya, for your statement. Fiji to be followed by Guatemala. Fiji, please.
Fiji:
Mbulavanaka Chair, colleagues and dear friends, Fiji, like fellow member states, commends the Chair on your decisive leadership and the Secretariat in organizing this meeting. Chair, your words resonate. Ultimately, it is the people that hold the utmost importance. Our mission remains steadfast to safeguard a secure and a resilient cyberspace that propels socio-economic advancement. That is our North Star. That is our why. Chair, Fiji is pleased with the emphasis in the second annual progress report on the existing and potential threats on the need to give due attention to the growing digital divide in the context of accelerating the implementation of the Sustainable Development Goals while respecting the national needs and priorities of states. Regarding this, Fiji notes that at the end of 2018, the International Telecommunications Union confirmed that 49% of the global population were offline. At the end of last year, this statistic has decreased to 33% of the global population. And this demonstrates the good work being done to ensure universal access to meaningful connectivity. But more needs to be done in this regard. Fiji is resolutely advancing towards the enhancement of meaningful connectivity and investment in modern and resilient ICT infrastructure. Chair, now with the increased connectivity efforts not only in Fiji but the region and globally and with the surge in digital transformation efforts, the cyber threat landscape continues to increase. And we have also seen the increase in the sophistication and frequency of cyber attacks. Coupled with this, we note that states are also grappling with the spillover effects from global conflicts. This makes the work that we do here more urgent and more crucial. Regarding your first guiding question, Fiji echoes the statements made by a number of delegations both yesterday and this morning, and is deeply concerned with the surge in ransomware incidents, phishing attacks, online scams, and the malicious use in artificial intelligence. The Pacific Security Outlook Report of 2022 and 2023 confirms that the Pacific region is experiencing an increase in ransomware efforts, events, as previously mentioned by Australia and New Zealand, such as the attack on a Department of Finance’s payment system of a Pacific Island country and a regional hospital in another. The hospital ransomware attack disrupted delivery of critical emergency surgical and other healthcare services. Similarly, a national telecommunications authority of a Pacific Island country experienced a major distributed denial-of-service cyber attack that disrupted Internet services for about 10 days. Now, we’re observing and through this report see that these are infiltrating networks and are digging deep into infrastructures before deploying subsequent attacks. Furthermore, Chair, the World Economic Forum, in its Global Risks Report of 2024, stated that out of the top 10 risks globally within a two-year projection, Disinformation and misinformation continues to be the number one global risk. Cyber insecurity is a number four threat. Now, these existing and potential threats aggravate existing vulnerabilities that are inherent in small, isolated economies of the blue Pacific continent who are dealing with compounded crises and are also on the cold face of climate change. Therefore, Chair, to promote common and deepened understanding and to enable all states to be on an equal footing, Fiji also welcomes the proposal of a dedicated session with focused discussions and briefings for our experts on these threats, including the need for a gender perspective in addressing these threats. Noting the increased relevance of data, as stated in our annual progress report, Fiji advocates for and welcomes further discussions on the security by design approach embedding data protection and data security as smaller states are rapidly undertaking digitalization efforts. Fiji also looks forward to further exploring the proposal by Canada and has further contributed to by Malaysia. Fiji looks forward to further understanding how the repository of cyber threats can fit within the existing platforms. Fiji acknowledges, Chair, that under your leadership, we have achieved tangible progress through the two annual progress reports. We will continue to forge a common path ahead and continue to build bridges as we prepare for the upcoming annual progress report. Chair, in closing, please be rest assured of Fiji’s continued commitment in this regard. Thank you.
Chair:
Thank you very much, Fiji, for your statement. Guatemala, please.
Guatemala:
Thank you, Chairman. Allow me to begin by thanking you and your team for coordinating this, the seventh substantive meeting of the Open-Ended Working Group and all the coordination work previous to this meeting. We recognize that cyberspace has become a place which is indispensable for global activities because of its civil and dual use, and it is used by criminal groups and terrorist groups on more than one occasion. The interconnected global networks and the importance in the global economy means that violations of security represent serious threats economically and in terms of security. Mr. Chair, following up on the guiding questions, my delegation would love to raise the following themes which we believe are important. My country is concerned at the vulnerabilities in and on ICT networks. These can be used by malicious users to access confidential information or to undertake illicit activities. Therefore, the use of software or the low access to software or training with regard to implementing adequate protective measures exponentially increases the risk. We have experienced cyber attacks which include the use of malware and phishing and identity theft and also the use of ransomware. These crimes have affected both individuals and companies. They’ve had a significant impact on our economy and national security. It’s of great concern also that despite the importance of confidence building, there is still some problems with sharing information on the threats because of a concern at revealing one’s own vulnerabilities. In this regard, Guatemala recognizes the importance of developing and implementing confidence building measures, in particular by work which is being undertaken regionally in the context of the working group for drawing up cooperation and confidence building measures in cyberspace under the Organization of American States. We can also not forget that this can be a catalyst for human progress and therefore we must deal with crises and it also has an important impact in education and health. and it is important to government, civil society and the UN in all areas. Nevertheless, its malicious use can undermine trust in institutions, it can weaken social cohesion and be a threat to democracy. Mr. Chairman, we are faced with the need to step up our efforts to establish a protection for critical structures such as electrical system, communication networks, transport systems, because they seem to be an attractive target for malicious attacks. There is no doubt that these attacks have a high impact on society. They interrupt vital services and cause considerable damage. We cannot ignore the threats of the greater use of ICT. We support the development of norms under international law that protect the individual. In this line, it is vital to ensure that we protect human rights to promote a safe digital environment to deal with hate speech and cybercrime. Given this, for my country, this is a critical moment to strengthen cooperation in the public and private sector, so that together we work on developing methodologies and norms to deal with the training to face such needs. This is important to ensure that we have improved and better responses to these threats. Finally, Chairman, we would like to remind all states that the ICT should be used for peaceful ends and for the well-being of humanity and to ensure sustainable development in all countries, irrespective of their scientific and technological development. Thank you very much.
Chair:
Thank you very much, Guatemala, for your statement. I’d like to give the floor now to the International Committee of the Red Cross, ICRC. Please.
International Committee of the Red Cross:
Excellencies, dear colleague, Committee of the Red Cross is grateful for the opportunity to participate in this session of the Open Ended Working Group. As a neutral, impartial and independent humanitarian organization, we have been closely monitoring the use of ICTs in situations of armed conflict and the threat that arises for the safety and dignity of people. We would like to commend the pertinent analysis of existing threats in the last progress report and share our view on five threats that we consider of particular concern. First, the group has noted that, I quote, ICTs have already been used in conflict in different regions, end of quote. We share this assessment and the ICRC has expressed its concern about the human and societal cost of such uses. In some of today’s armed conflict, ICTs are used to disrupt critical civilian infrastructure, including ICT infrastructure needed to ensure access to water, petrol, electricity or medical services. The ICRC encouraged this group to reiterate its strong concern about this development. Second, since 2022, the ICRC has also repeatedly drawn the attention of this group to the threat of ICT activities that target humanitarian organization. We commend its inclusion in the last progress report. In a global context marked by large humanitarian needs and an insufficient response capacity, cyber information operation against humanitarian organization creates significant risk for their ability to operate. In recent years, the ICRC and other humanitarian organizations have been affected by such operations. When our systems are disrupted, sensitive data are exfiltrated and our reputation undermined. Our operations for people slow down and we spend scarce resources on feeding off malicious ICT activities and not on people’s needs. Third, the ICRC also shares states’ concerns about the increased involvement of non-state actors, individuals and groups in ICT activities in situations of armed conflict. We see varying trends of civilians being encouraged and supported or otherwise deciding to take part in cyber operations against the civilian infrastructure of countries affected by armed conflict. It is the responsibility of states to impose limits on unlawful cyber operations by non-state actors within their jurisdictions and to ensure that civilians are aware of the risks posed to their activities. Fourth, based on our first-hand experience operating in situations of armed conflict, the ICRC would like to support the agreement in the Progress Report of the relevance of ICT-enabled information operations. This information and its speech, for instance if directed against civilian populations or persons in situations of vulnerability, can cause harm to people and societies, directly and indirectly. Such operations risk raising tension and can contribute to dangerous escalation of conflicts. Fifth, we would like to draw your attention to one threat which is not yet reflected in the Progress Report. States have emphasized in the United Nations that the use of civilian ICT infrastructure, such as cloud computing or communication infrastructure, faces a risk of disruption or destruction if it is used by the military in situations of armed conflict. In other words, if armed forces rely on the same infrastructure and services as civilians, there is a real risk that such infrastructure and services may be considered as military objective and consequently attack and ultimately no longer available for civilian population. Against this background, together with a global group of experts, we recommend that state and ICT companies segment to the maximum extent feasible data and communication infrastructure used for military purposes for civilian ones. To conclude, the ICRC would like to commend your effort in reflecting this very concrete threat in the last progress report. Thank you.
Chair:
Thank you very much, ICRC, for your statement and contributions. I give the floor now to Ukraine.
Ukraine:
Thank you, Mr. Chair. Ukraine aligns itself with the statement delivered by the European Union and would like to make some remarks in its national capacity. Today we are continuing to witness the dramatic increase of malicious cyber activity and directed at critical infrastructure, including against this restructure delivering essential services to the public such as medical facilities, water, energy and sanitation restructure. Ukraine is gravely concerned that certain states deliberately use non-state actors to allow them to conduct malicious cyber activities from their territory with impunity. Mr. Chair, Ukraine has been facing constant large-scale cyber attacks by Russia since the start of its full-scale invasion of our country in 2022, while the active phase of the cyber warfare against Ukraine is currently underway. The strategic goals of Russia’s cyber attacks is to support its aggression by causing a destructive impact on processes, including socio-political, economic, as well as create havoc by destroying electronic resources, blocking the operation of critical services, as well as manipulating public opinion. According to CRT-UA, about 1,374 cyberattacks were carried out on the information systems of enterprises, institutions, and organizations of the private and public sectors of Ukraine in 2021, 2,187 in 2022, and more than 2,300 in 2023. Even though during the fourth quarter of 2023 the Ukrainian authorities have recorded the downward trend in the total number of cyberattacks initiated by pro-Russian hacktivist groups targeting Ukrainian organizations of various forms of ownership and industries since the beginning of 2023, overall there is no notable changes in the attack frequency or intensity. Currently, Russian hackers are using a wide range of cyber means against national security of Ukraine, including, but not limited to, phishing attacks, distribution of malicious software, DDoS attacks, cyberattacks on critical infrastructure, in particular on power grids, transport systems, and water supply, cyberespionage, including theft of data, government institutions, enterprises, and individuals, disinformation and propaganda, including spreading propaganda on the Internet to sow division in Ukrainian society. As our delegation informed the OEWG during the sixth substantive session in December 2023, as the result of a powerful cyberattack launched by a hacker group controlled by the military intelligence of the Russian Federation against Ukraine’s telecommunications operator Kyivstar, 24 million of its subscribers were left without communication. Fortunately, the Ukrainian authorities have successfully restored all basic services affected by the attack within a few days. Mr. Chair, given the importance of effectively tackling cyber threats, Ukraine has joined a number of mechanisms and initiatives at the international level. including the International Counter-Ransomware Initiative as well as the Talon Mechanism. It is worth noting that the Talon Mechanism has been established to strengthen the cooperation in the field of cyber security against the backdrop of Russia’s aggression against Ukraine, and it is an essential component aimed at taking international efforts to enhance cyber resilience and cyber defense of Ukraine’s civil infrastructure. We strongly believe that international cooperation is crucial to prevent and combat cyber threats that cross borders, target critical infrastructure, steal sensitive data, and manipulate public opinion worldwide. In addition, information sharing, including open communications and exchange of knowledge, are also valuable in understanding the nature of cyber attacks and in order to tackle them effectively.
Chair:
I intend to give the floor to the following three delegations before we wrap up the discussion on existing and potential threats. So, starting with the State of Palestine to be followed by the Russian Federation, and then Yemen taking the floor in the exercise of the right of reply. State of Palestine, you have the floor, please.
State of Palestine:
Thank you, Mr. Chair. Mr. Chair, each time an Israeli representative takes the floor, he or she gives the impression that whether they live in another reality, or maybe they think that everyone else does. First of all, I would like to make sure that any Israeli representative here or elsewhere knows that everyone knows the truth now and there is no way to hide it. Mr. Chair, it has been five months of mass killings of Palestinians in Gaza. We are talking about at least 100,000 casualties, including 30,000 or more killed in the most cruel and ugly way, most of them children and women. That, without mentioning hospitals, schools, mosques, churches, and most of the residential buildings are destroyed. Even belongings of this institution, the United Nations, are targeted. The aggression that the extreme right government of Netanyahu is perpetrating is unprecedented in all forms. I would like to remind the Israeli representative that we are talking about a genocide that is taking place in Gaza by the Israeli war machine, and it became a process in the ICG thanks for South Africa. But as usual, Israel is not complying with any of its provisional measures, despite the fact that it’s binding in nature. Israel has been intentionally starving the Palestinian people in Gaza. Now it’s targeting civilians seeking for humanitarian aid and convoys. After all these atrocities that Israel is perpetrating, how its representatives could have the audacity to come and tell us what they are telling us? It’s another attempt, maybe, to distract of what’s really happening. Mr. Chair, I would like to finish my statement by saying that I assure you that I didn’t want to bring this issue to this room. But after what I heard, I can’t, I could not reply. Thank you.
Chair:
I give the floor now to the Russian Federation.
Russian Federation:
Mr. Chair, our delegation is compelled to take the floor to respond to unsubstantiated political attacks against Russia from Western delegations. The attempts of NATO countries to portray Ukraine as the main digital victim are extremely unconvincing, especially given that Kiev authorities continue to boast about their sabotage activities with the use of ICTs and the so-called IT army supervised by the Zelensky regime together with Western governments is increasing its hostile activity. Our experts record on a daily basis computer attacks against information resources, government agencies and critical information infrastructure facilities of the Russian Federation. This rampant hacker conglomerate affects other countries as well. In January 2024, the Bangladesh Election Commission reported attempts originating from the territory of Ukraine to disable electronic voting facilities for the general parliamentary elections. Cyber fraudsters are still operating from about a thousand call centers in Ukraine. It is noteworthy that Kiev acts as an aggressor in the information space owing to the support it receives from the West. U.S. Cyber Command units and multinational European Union cyber forces are deployed in Ukraine. They train and coordinate hackers, collect data on hacking methods and the vulnerabilities of Russian systems, which are subsequently transferred to the Pentagon and NSA, as well as NATO military institutions. Strategic formats are created to assist the Zelensky regime in the use of ICT for military political purposes. In particular, the TALIN mechanism, created in December 2023, is tailored for this task. Western IT corporations are contracted by their governments to provide material and technical support to strengthen the information security of Ukrainian government agencies, circulate reports and papers containing unsubstantiated accusations of Russia for cyber aggression. Products of these companies, such as mobile-aided forensic bi-compulsion, allow unauthorized extraction of protected data from personal devices and are used to intercept the correspondence of Russian citizens. Thank you.
Chair:
MODERATOR I give the floor now to Yemen.
Yemen:
Thank you, Mr. Chairman. My delegation was compelled to take the floor in exercise of the right of reply on behalf of the Arab group in commenting on what was said by the representative of Israel in his intervention. Everybody is aware of… of the genocide and the heinous atrocities perpetrated by the Israeli occupation forces against the Palestinian people in the Gaza Strip and in the West Bank over the last five months. This constitutes a blatant violation of international law and international humanitarian law and led to an unprecedented humanitarian catastrophe to the Palestinian people. It has led to the killing of more than 30,000 Palestinians, including more than 70 percent of women and children, in addition to more than 70,000 wounded. It is no surprise to hear today the representative of Israel calling upon the international community to condemn the targeting of health and civilian facilities and civilian infrastructure, while facts and figures make it necessary to condemn Israel in that case. It is very strange for the killer to call for the condemnation of the victim. Over the last five months, Israel has cut off the supervision of water, energy and communication on the Gaza Strip, thus separating the population of the Strip from the communication networks and the internet. This led to additional humanitarian suffering for civilians in Gaza. It made it impossible to communicate with health facilities to provide support to the wounded. It also prevented showing the world this catastrophe in order to hide their crimes. This in itself is an additional violation of international law. They have not only prevented the civilians in the Gaza Strip to – from having the basic services and prevented the humanitarian assistance to access the Gaza Strip. It also – we have also seen the harrowing scenes of Israel targeting and killing civilians while they are receiving humanitarian assistance. The dissemination of false and distorted information, as well as disinformation campaigns, are among the threats in the use of ICT. We continue to see Israel disseminating distorted information in order to falsify facts and to manipulate the world’s public opinion. But while it has been proven before the international community and on more than one occasion that the information disseminated by Israel is unsubstantiated, we call on the Israeli delegation to stop the spreading of false information in the UN and outside it. We urge the Israeli delegation to stop wasting the time of the delegations here and to concentrate on the substantive discussions of the OEWG. We will reserve our right to raise the question of attack on Gaza in the right form. Thank you, sir.
Chair:
I have received an additional request, I believe, in the exercise of the right of reply. I give the floor now to the delegation of Israel.
Israel:
Thank you, Mr. Chair. It’s very unfortunate that we have to listen to this ROR. And we ask the right of reply because it’s very important to remind all of us here the heinous October 7th massacre and that this massacre did not happen in a vacuum. It happened because decades of, for decades, the minds of Palestinian children were poisoned with murderous doctrine. This was done online, offline, in high schools, in textbooks, and also, as evident in also in the UNRWA books. The words from these books, by the way, turned to action. The atmosphere that was created within the Palestinian territory assisted and most horribly has proved that this was also by evidence that also UNRWA members themselves participated in this massacre. This happened because decades of many countries donating member states, donating funds, also UN money that was funneled to build up this military capabilities of Hamas. Hamas built these capabilities within and underneath hospitals, UN facilities, schools, and civilian infrastructure, and by doing so, they commit a double war crime, shooting rockets at Israel’s civilian population from within Palestinian civilian population. Mr. Chair, in contrary to what we heard, some member states are trying to falsely say that Israel is operating Gaza, and what we are trying to do is depose the Hamas regime, a regime that has been behind the 7th of October massacre, and we would like to remove this terrorist threat posed on every Israeli citizen from the Gaza Strip, and to act to return all our 134 hostages. We call for the immediate and unconditional release of all these hostages, with no exceptions, and we call, and we only hope, that all peace-loving countries will join us in this demand. Israel will achieve these goals in compliance with international law. Israel works to limit damage caused to civilian population and attacks only legitimate military targets and is permitting the passage of humanitarian supplies for the civilian population in Gaza. Israel is facilitating the entrance of humanitarian aid into Gaza, including from its own territory. The full story of the war will be complete without mentioning the oppressive current malign states in the region that are supporting this heinous attack by Hamas. These regimes are in the heart of this problem when they finance, arm, and train Hamas and is therefore also responsible for the capabilities and for its actions. These regimes operate in an identical manner from the north through Hezbollah and from Syria and from the south and also from Yemen by the Houthis. These actions perpetrated by this regime are aimed to destabilize our region and threaten the peace of the entire world. The international community must take its clear and very strong stance against this murderous regime and all its proxies, whether it’s Hamas, Hezbollah, and the pro-Iraqi terrorist groups and the Houthis. Israel will not accept the current security reality. Thank you, Chair.
Chair:
Distinguished Delegates, Distinguished Delegates, I’m getting more requests for the right of reply and I know that this is the sovereign right of all delegations to exercise their right of reply. But I also wish to draw your attention to the fact that this is a meeting of the Open-Ended Working Group on ICT Security established under a mandate in accordance with Resolution 75-240. I can understand the fact that a discussion on issues within the mandate of this working group will inevitably impact on every other aspects, geopolitical issues, as well as ongoing incidents and situations around the world. But at the same time, the open-ended working group cannot take it upon itself to resolve the geopolitical tensions prevailing at this point in time. These are matters to be discussed here at the United Nations, but in different fora. So I’d like to appeal to all delegations which have taken the floor in the exercise of the right of reply to refrain from asking the floor again, and in this period of trying to get back to the substantive matters that is before the agenda of the open-ended working group. I intend to give the floor to three more delegations, and then I really appeal to all delegations to refrain from requesting for the floor in the exercise of the right of reply. I give the floor now to Germany, to be followed by Yemen and the Syrian Arab Republic. Germany, you have the floor in the exercise of the right of reply.
Germany:
Thank you, Chair. This is in response to the most recent statement delivered by Russia. Germany and its allies are cooperating with President Zelensky as a legitimate and democratically elected head of government. and with Ukraine as a sovereign state that has fallen victim to Russia’s illegal war of aggression. In particular, the Tallinn Mechanism merely supports fostering our Ukrainian partners’ cyber-resilience. Russia’s attack on Ukrainian sovereignty through its illegal war of aggression must not be repeated by any statements that put the sovereign legitimacy of the state of Ukraine or any other state into question. Thank you, Chair.
Chair:
I give the floor now to Yemen.
Yemen:
Thank you, Mr. Chair. I apologize for taking the floor again. I would like to exercise the right of reply on behalf of the Arab group. I agree with you, Mr. Chair. This OEWG is not the most appropriate avenue to discuss geopolitical issues, but we had to reply on behalf of the Arab group. We had to reply to Israel’s delegate. The 7 October incidents did not come out of vacuum. I agree, but as the Secretary General said, they are the result of 75 years of heinous Israeli aggression and attack and occupation on the Palestinians. The crisis will only end with the establishment of a Palestinian state based on the two-state solution along the 4 June 1967 borders. The Palestinians should enjoy their fully-fledged rights to the establishment of their Palestinian state and their self-determination. Thank you.
Syrian Arab Republic:
Thank you, Mr. Chair. I did not intend to take the floor, but I had to because my country was mentioned in Israel’s statement. In this context, I would like to dot the I. Firstly, Israel itself is a serious threat to international peace and security, given its track record occupation of occupied Arab territories, including Golan. Israel, for tens of years, has turned a blind eye to international resolutions. Israel did not withdraw from Arab territories. It is an entity that is based on occupation and aggression. It repeatedly targets my country. It targets civilian objects and infrastructure, including airports and seaports, in flagrant violation of international law and the Charter of the United Nations. This shows Israel’s true hypocrisy. Israel’s delegate pays lip service to international principles, but this will not be enough to conceal Israel’s disregard of international legitimacy resolutions. Stability and security in the Middle East will remain at risk if Israel continues its – the Israeli occupation power pursues its crimes, and if the occupying forces continue its practice. And of course, the list is endless of Israel’s crimes against humanity and genocidal crimes perpetrated. On the statement of Israel and what he mentioned about my country, I categorically reject this statement. Its goal is known, and it lacks credibility. It comes from a hostile regime. Thank you, Mr. Chair.
Chair:
I have no further requests for the floor, and I’d like to thank all delegations for the understanding. Now, I just wanted to make some concluding observations with regard to the section on rules, norms, and principles. First, it is very clear that the Open-Ended Working Group is a barometer of the global geopolitical temperature and conditions. And as we have just seen, we have had a very rich discussion, but a discussion on the threat landscape inevitably will address prevailing geopolitical tensions and situations. And in such a context, I’d like to reiterate what I said yesterday, right at the outset, that we cannot take for granted that consensus in this process in the OEWG is guaranteed. We have to work for outcomes, and we have to work for consensus because of prevailing geopolitical tensions. And also, as the Under-Secretary-General Izumi Nakamitsu told us yesterday, there is a low level of trust across the board. That is precisely why the work of this Working Group is challenging. But it is also precisely why the work of this Working Group has become even more important. Because it is only in the context of geopolitical tensions that there is the possibility, a heightened possibility, of ICT incidents escalating or evolving into interstate conflict. And so the work we do is not abstract. It’s real. It is directly related to prevailing international situation. So that’s the first point that I want to make. Please do not take for granted that success in this open-ended working group is a given. And please do not assume that the chair and the team and the secretariat will deliver you a document that will somehow miraculously capture all your concerns and find a perfect balance. It’s impossible. Just because we have done it twice does not mean we will be able to do it again this year or next year. Each time we have to work for it. It’s not me as the chair working for it. Each time you have to work for it. Because ultimately the demonstrations of flexibility will have to come from the floor, not from the chair. I don’t have a position of my own. My position is that we get to consensus. And that will require each one of you demonstrating flexibility and each one of you not taking for granted the spirit of consensus that has prevailed so far. And each one of you need to nurture that. And yes, there will be differences expressed in this working group, but those differences are also legitimate and we need to listen to each other, which is also a message that I conveyed. Yesterday, as opening remarks at the reception I convened at the Singapore Mission yesterday evening. So that’s the first point I want to make. The second point I want to make is that this discussion on threats has been almost two sessions, six hours of it. We’ve exceeded the time allocated for it. But if you had noticed, I had not cut short any intervention, because I think the discussion on the threat landscape is foundational to international cooperative action. And it’s therefore important and necessary for everyone to understand the evolving and emerging as well as the existing threat landscape. And therefore, the Open-Ended Working Group itself is a platform for information sharing on existing and potential threats. In some ways, it is an informal repository of information about existing and potential threats. This is the only place where all member states can come and listen to each other’s assessments of existing and potential threats, and in the process, also raise the collective level of awareness about existing and potential threats. But more importantly, to then begin to have a discussion about what we can do. Because if this is just an exercise of coming here, spending two or three sessions talking about threats, and then going back, that in itself would serve no productive purpose. Because the question is, what are we going to do? So in that sense, this discussion was useful. It exceeded the time that we had allocated under the work program. But I think it’s a worthwhile investment of our time in understanding the threat landscape, which therefore raises the question, what are we going to do about it collectively? And that, therefore, leads to the next topic. Next topic is rules, norms and principles. And so I’d like to get into that discussion, but we have 10 minutes left. But before we take speakers under rules, norms and principles, I want to also say this. It is very clear, and I’m very encouraged by this, no one has recycled their statements. Everyone has looked at the guiding questions very seriously. Everyone has come prepared with very detailed statements. And I have no doubt that some of the statements were also the result of domestic interagency processes. And therefore, you feel a deep sense of obligation to read every single word that has been prepared, and that’s on your laptop. Now, if we take that approach of giving everyone the chance to read the entirety of their very well-crafted and thoughtful statements, then we may not have the time this week to cover all the issues that we need to cover. In fact, sitting here, I was thinking to myself that the future mechanism, future permanent mechanism that we are going to discuss later in the week, the future permanent mechanism post-2025, should perhaps be meeting for two weeks, because all of you are so hard-working, all of you have done the homework, all of you are A students, all of you are so deeply committed to this process, that it’s fair that we give everyone the time. to make the contributions that they feel strongly about. So I just wanted to say that when we get to the norms, rules, norms, and principles section, I do encourage delegations. I do not want to cut off delegations yet, yet, underline that. I do not want to put a time limit, yet, yet, underline that. But I do ask you to look at your statements for the subsequent sections and highlight the key elements that you think everyone else should know about your position. So this afternoon, when we start with rules, norms, and principles, it is almost one, so I do not intend to start the next list of speakers at this point for rules, norms, and principles. So this afternoon, when we come to rules, norms, and principles, please look at your careful, please look carefully at your prepared interventions and see how you can summarize it and make it succinct. And then after rules, norms, and principles, tomorrow is Wednesday, and tomorrow afternoon, we have a dedicated stakeholder session, and we have allocated three hours for that, but I’d like to say that the dedicated stakeholder session will be now limited to one hour, three to four p.m. This by no means limits the opportunity for stakeholders, because we have invited them to register themselves for the interventions. I think we can give everyone who wishes to speak an opportunity, but I would put a time limit for stakeholders, and I beg their indulgence. and the understanding for that. So we should be able to cover the stakeholder contributions from 3 to 4 p.m. and then from 4 to 6 p.m. Wednesday. We will continue with the other items under our program of work. And as I said, I do attach the greatest importance to the contributions from the stakeholders. I did have a separate session of my own last week, but it’s important that we also hear them here. And for the stakeholders as well, I’d like all of you to look at your prepared statements and see how you can zero in on the key points that you would like members to think about and reflect about. So friends, once again, this is what I would call a good start to the seventh substantive session. We covered a lot of ground under the first section on existing and potential threats. We touched on every other aspect of the mandate in terms of rules, in terms of international law, in terms of CBMs, in terms of capacity building. And also, I think there was a discussion about how we should structure our work in the future. So in that context, we also looked at the post-2025 possibilities. So I wish you all a good lunch, and we will begin the meeting this afternoon, 3 p.m. sharp, Swiss time. So I wish you a pleasant lunch, and the meeting is adjourned. Thank you very much.
Speakers
A
Argentina
Speech speed
142 words per minute
Speech length
637 words
Speech time
269 secs
Report
In the Argentine delegation’s inaugural formal address, they commenced by expressing solidarity with and support for the Chairman and his team. The delegation conveyed their commitment to facilitating the Chair’s endeavours. Additionally, the delegation lauded the Women in Cyber programme for its efforts in boosting female participation in cyber-related dialogues.
Substantively, Argentina’s concerns centred on the intensification of cyber threats, among them malware, ransomware, and phishing. These threats were spotlighted for their disruptive impact on critical infrastructure and the amplification of systemic vulnerabilities. To combat these emerging cyber threats, the delegation underscored the necessity of collaboration between governments, the private sector, and civil society.
The primary aim is to develop collaborative defence mechanisms, assess risks, and implement actions on a global stage by leveraging collective insights and proficiency. Moreover, the Argentine delegation offered backing for Kenya’s proposal to set up a voluntary state registry.
This registry was seen as a strategic measure to foster state confidence, improve the understanding of cyberspace security threats, and aid in formulating effective countermeasure strategies. Argentina also advocated for the participation of multiple stakeholders in both the creation and functioning of the proposed state registry.
These stakeholders are integral, in their capacity as specialists, operators, or owners of cyberspace infrastructure, for providing a well-rounded perception of challenges and contributing to comprehensive solutions. The Argentine address also identified potential risks associated with emerging technologies like artificial intelligence and quantum computing.
There were reservations about the threats these technologies, including autonomous weapon systems, pose to the integrity of international legal frameworks, such as international law, humanitarian law, and human rights law. Given this, it was deemed vital to manage these technologies throughout their development and operational phases.
Despite these risks, Argentina recognised the significant socio-economic advantages that could be harnessed from new technological advancements, emphasising technological neutrality and the importance of controlled use. The delegation called for a balanced approach to regulatory frameworks controlling technology transfers, ensuring equitable access to cutting-edge technologies.
Stressing the rights of all states, particularly developing ones, to such technologies is essential for fostering progress, societal welfare, and strengthening the resilience of global cyberspace. In conclusion, the delegation highlighted the imperative of heightened inter-state cooperation. Acknowledging the formidable capabilities and resources of the private sector in malware research and cyber threat intelligence, leveraging partnerships with private entities was seen as a beneficial strategy for the wider international community.
Such international cooperation is strategically important for advancing collective security in cyberspace. This expanded summary underscores Argentina’s dedication to a multi-stakeholder, co-operative approach in cyber security, encouraging a balanced regulation of technology, and acknowledging the vital role of private sector collaboration in creating a secure, resilient, and equitable digital environment.
B
Bangladesh
Speech speed
133 words per minute
Speech length
679 words
Speech time
306 secs
Report
The delegation started by expressing heartfelt gratitude to the Chair and their highly skilled team for their exemplary leadership which has skillfully directed the group’s progress, assuring the Chair of their steadfast support. They revisited the key issues raised during the sixth substantive session held in December, highlighting the growing potential threats stemming from deepfakes, quantum computing, AI-enabled hacking, and supply chain vulnerabilities.
They emphasised the persisting relevance of these concerns in light of the advanced development of AI and other emerging technologies. The delegation specifically pointed out the severe challenges posed by the deliberate misuse of misinformation and disinformation, exacerbated by modern technologies such as AI and deepfakes.
These technological advances threaten to erode social unity, compromise democratic institutions, and the fabric of our humanity, contesting the quintessence of human free will. With elections around the corner worldwide, the malign influence of altered information renders societies prone to manipulation, underlining the urgent need for a unified response to safeguard democratic tenets and social cohesion.
Focusing on AI’s role in decision-making, the delegation advocated for AI systems that are transparent and understandable to prevent any misconceptions about their nature and to guarantee human oversight. They also highlighted the dangers of AI in orchestrating highly personalized phishing attacks that bypass conventional security measures, citing the proficiency of AI in refining targeting and accuracy.
This problem is accentuated by AI’s ability to automate sophisticated and relentless attack strategies, thus posing an increasingly sophisticated and tireless challenge to cybersecurity measures. The delegation also reflected on the easy availability of advanced ICT tools in the open market and the dark web, which lowers the barriers to cybercrime and enables even those with modest expertise to launch significant attacks.
The anonymity and obfuscation provided by these technologies emboldening malefactors and undermining existing accountability frameworks. They cautioned about vulnerabilities in widely used open-source libraries that create significant risks across software supply chains. In discussing the dual nature of AI in relation to cybersecurity, the delegation acknowledged that AI has the potential to strengthen defences but also gives adversaries powerful new ways to initiate advanced threats.
They noted that the rise of AI-powered threats requires vigilant and strategic engagement by organisations, governments, and individuals to stay informed and protected. To summarise, the delegation commended the open-ended working group’s crucial role in helping navigate the complex ICT security environment, stressing the need to understand the ever-evolving strategies of cyber threats comprehensively.
They advocated a comprehensive approach that includes both technological solutions and an in-depth understanding of the threats, promoting a proactive and informed approach to the challenges of ICT security.
B
Belarus
Speech speed
108 words per minute
Speech length
301 words
Speech time
167 secs
Report
In an elaborate discourse presented to the Open-Ended Working Group (OEWG) on the Security of and in Information and Communication Technologies (ICTs), the delegate from Belarus commenced by articulating profound gratitude for the Chair and their team’s dedication to establishing conducive negotiations.
Belarus pledged steadfast backing for the Group’s initiatives and lauded the leadership’s competency in guiding the Group’s progress. The focus then shifted to the burgeoning complexities within the world of ICTs, marked by a worrying increase in global cybercrime. The Belarusian representative flagged the profound repercussions of such illicit activities, particularly their undermining influence on democracy, societal values, law enforcement, and sustainable development.
The address pinpointed risks to the critical infrastructures of healthcare and education, emphasising their susceptibility to ICT exploitation. The issue of information warfare was brought to the forefront, alongside the concern for unfounded allegations, attribution denial, and rampant dissemination of misinformation and doctored content.
Belarus pinpointed the mishandling of databases, the lack of stringent security for ICT products, and the inadequate strategic response to disinformation as pivotal factors aggravating cyber threats. The discussion pivoted towards Artificial Intelligence (AI), urging dedicated focus on its ethical use and the inherent security risks within the ICT landscape.
The representative acknowledged the states’ plight in combating these cyber threats, often hindered by insufficient capacity to tackle such challenges solo. Belarus then voiced support for the OEWG’s mission—sanctioned by a UN General Assembly resolution—to spur detailed discourse and foster new behavioural norms, rules, and principles for cyberspace.
The aspiration was to devise strategies to diminish conflict potential in the ICT milieu. Concluding, Belarus confirmed its commitment to constructive, impartial conversation within the working group, aspiring for fruitful negotiation outcomes. In summary, the representative’s observations underlined the urgency and intricacy of ICT security challenges and the imperative for cooperative international action to secure a stable, safe cyberspace.
The summary accurately mirrors the analytical content provided, incorporating relevant long-tail keywords without compromising quality. UK spelling and grammar have been maintained throughout.
B
Brazil
Speech speed
176 words per minute
Speech length
1206 words
Speech time
410 secs
Arguments
Brazil appreciates and supports the Chair and the Open-Ended Working Group’s efforts.
Supporting facts:
- Brazil has expressed unwavering support to the OEWD.
- The role of the Chair in progressing discussions has been acknowledged.
Topics: International Cooperation, Cybersecurity
The pervasive use of ICTs increases vulnerability to cyber operations and challenges international peace.
Supporting facts:
- ICTs are ubiquitous in society.
- The increase in malicious cyber operations presents complex challenges.
Topics: Cybersecurity, Information and Communication Technology
Brazil sees the need for discussions on new threats like optic fiber sabotage and damage to satellite communications.
Supporting facts:
- New technologies bring new threats to critical infrastructure.
Topics: Cybersecurity, Critical Infrastructure
Brazil acknowledges the inclusion of ransomware in threat discussions and supports deeper analysis and recommendations.
Supporting facts:
- Ransomware has grave implications for security and stability.
- Brazil is a member of initiatives like the Counter-Ransomware Initiative.
Topics: Cybersecurity, Ransomware
Brazil advocates for discussions on AI and quantum computing impacts on peace and security.
Supporting facts:
- AI’s potential military applications present relevant impacts on peace and security.
- Meaningful human control is emphasized in the context of lethal autonomous systems.
Topics: Artificial Intelligence, Quantum Computing, Military Technology
Brazil stresses the need for transparency and accountability in the military uses of AI.
Supporting facts:
- Military applications of AI must abide by international humanitarian law.
- Human judgment and accountability cannot be replaced in autonomous systems.
Topics: Artificial Intelligence, Military Ethics, International Humanitarian Law
Concerns about AI use in disinformation campaigns, particularly deep fakes, and the impact on electoral processes.
Supporting facts:
- Generative AI can increase the effectiveness of disinformation.
- Brazil’s Supreme Electoral Court enacted norms to prohibit the use of deep fakes in elections.
Topics: Artificial Intelligence, Misinformation, Electoral Integrity
Quantum computing can both advance socioeconomic benefits and pose significant military and interception threats.
Supporting facts:
- Quantum computers could break current cryptographic patterns.
- Quantum computing offers both socioeconomic dividends and military application concerns.
Topics: Quantum Computing, Cryptography, Military Technology
Brazil opposes using the term ‘proliferation’ for cyber intrusion tools, highlighting the importance of legitimate use by authorities.
Supporting facts:
- Cyber intrusion tools can have important legitimate uses.
- Regulations should not unduly constrain legitimate authorities, especially in developing countries.
Topics: Cyber Intrusion Tools, Regulation, Law Enforcement
International cooperation is vital in countering cyber threats, and Brazil supports capacity building efforts.
Supporting facts:
- Cyber realm’s transnational nature requires international cooperation.
- Capacity building is a cross-cutting element recognized by the OEWG.
Topics: International Cooperation, Cybersecurity, Capacity Building
Report
Brazil’s engagement with global cybersecurity issues is multifaceted, characterised by support for collaborative frameworks and a proactive stance towards emergent technological threats. Brazil’s unwavering backing of the Open-Ended Working Group (OEWG) exemplifies its commitment to international cooperation in the cyberspace arena, together with an appreciation for the pivotal role played by the Chair in driving cybersecurity discussions forward.
A significant Brazilian concern revolves around the pervasive use of Information and Communication Technologies (ICTs), which has intensified society’s vulnerability to malign cyber activities. These activities pose intricate challenges to international peace and security. Moreover, Brazil considers the protection of critical infrastructure against new threats, such as optic fibre sabotage and satellite communication damage, as essential, necessitating the international community’s swift and coordinated response.
Artificial Intelligence (AI) and quantum computing represent breakthroughs with dual-use potential. Brazil advocates for comprehensive and ongoing discussions under the OEWG framework to navigate these concerns, focusing on the ramifications of AI’s military applications on global stability. The nation emphasises the need for human oversight over autonomous lethal weapons, demanding that military deployments of AI conform to international humanitarian law principles and uphold values of transparency and accountability.
In the domain of misinformation, Brazil confronts the role of AI, particularly highlighting the dangers posed by deep fakes to electoral integrity. To safeguard democratic processes, Brazil’s Supreme Electoral Court has implemented measures prohibiting the use of deep fakes during elections.
On the subject of quantum computing, Brazil’s perspective is nuanced, acknowledging the vast socioeconomic dividends while remaining cautious of the substantial military and surveillance risks, given quantum computing’s capacity to undermine existing cryptographic measures. Brazil opposes labelling the distribution of cyber intrusion tools as ‘proliferation’, highlighting their legitimacy for authorised law enforcement and national security endeavours.
However, the country recognises that regulations must be balanced, particularly in developing nations, to avoid unduly curtailing the constructive use of these tools. Brazil promotes capacity building as a key element in the collective effort to combat cyber threats, aligning with the principle that the cyberspace domain’s transnational nature necessitates a cooperative response.
The OEWG’s initiatives for capacity enhancement receive strong support from Brazil. In summary, Brazil’s active roles in cybersecurity dialogues demonstrate a sophisticated and anticipatory approach. The nation fosters international dialogue, identifies the dangers of cutting-edge technologies, and advocates for harmony between innovation, security, regulatory controls, and ethical conduct.
Brazil remains resolute in its pledge to advance these discussions and ensure that cybersecurity protocols evolve in step with technological progress and the dynamic landscape of cyber threats, thereby safeguarding international peace and security.
C
Chair
Speech speed
140 words per minute
Speech length
2798 words
Speech time
1201 secs
Arguments
Czechia registered a record number of cyber incidents with almost a two-fold increase from the previous year.
Supporting facts:
- Czech National Cyber and Information Security Agency reports a significant rise in cyber incidents.
Topics: Cybersecurity, National Security
Most common cyber attacks in Czechia are ransomware and DDoS attacks, target services such as banks, government websites, universities, and hospitals.
Supporting facts:
- Ransomware and DDoS attacks are frequently aimed at crucial public sectors and services.
Topics: Cybersecurity, Public Infrastructure, Healthcare
Russian hacker groups are predominantly linked to cyber attacks in Czechia.
Supporting facts:
- Targets of cyber attacks in Czechia are often linked back to Russian hacker groups.
Topics: International Relations, Cybersecurity
Czechia observes rapid development of ransomware as a service and cryptocurrency used in illegal activities.
Supporting facts:
- Growth in ransomware as a service and reliance on cryptocurrency for ransom payments noted.
Topics: Cybersecurity, Cryptocurrency, Financial Crime
Ransomware attacks can undermine public trust in digital services and the state.
Supporting facts:
- Ransomware poses significant risks to the credibility and reliability of digital services offered by states.
Topics: Cybersecurity, Public Trust
Czechia supports international discussions on ransomware, including initiatives and working groups.
Supporting facts:
- Czechia partakes in International Counter-Ransomware Initiative and national interdepartmental working groups.
Topics: Cybersecurity, International Cooperation
Development of AI and quantum computing poses new cyber threats.
Supporting facts:
- Advancements in AI and quantum computing could be leveraged for sophisticated cyber attacks.
Topics: Artificial Intelligence, Cybersecurity, Quantum Computing
Many countries developing ICT for military purposes raises the risk of ICT systems being used in conflicts.
Supporting facts:
- The military use of ICT capabilities increases the potential for cyber warfare in state conflicts.
Topics: Cybersecurity, Military Technology, International Security
Activities in cyberspace during armed conflict must adhere to international humanitarian law.
Supporting facts:
- ICT activities during armed conflicts should be governed by the rules of international humanitarian law.
Topics: Cybersecurity, International Law, Armed Conflict
Exclusion of non-governmental stakeholders from discussions limits effectiveness in addressing cyber threats.
Supporting facts:
- Non-governmental experts, such as those from private sector and academia, are vital for effective cyber threat mitigation.
Topics: Cybersecurity, Civil Society, Public-Private Partnership
Bangladesh delegation appreciates the Chair’s leadership and challenging guidance
Supporting facts:
- Bangladesh extends gratitude to the Chair
- The Chair’s questions push the boundaries of their knowledge
Topics: Diplomacy, ICT Security
Emerging ICT threats such as deepfakes, quantum computing, AI-powered hacking, and supply chain attacks remain highly relevant
Supporting facts:
- Deepfakes and AI are weaponizing misinformation
- Supply chain attacks pose risks to the software ecosystem
Topics: Artificial Intelligence, Cybersecurity, ICT Threats
Weaponization of misinformation driven by AI is a significant threat to democracy and social harmony
Supporting facts:
- Deepfakes undermine free will
- Misinformation affects crucial voting moments
Topics: Misinformation, Artificial Intelligence, Democracy
The AI-driven threat landscape necessitates updated security strategies and understanding of adversary tactics
Supporting facts:
- AI systems require explainability to maintain human oversight
- AI powers more sophisticated phishing and cyber attacks
Topics: AI-driven Cybersecurity, Cyber Adversaries
Open-ended working group plays a critical role in addressing dynamic cybersecurity and AI challenges
Supporting facts:
- The working group can help navigate the AI-dominated security landscape
- The group could facilitate international collaboration and strategies
Topics: Cybersecurity Policy, Open-ended Working Group
Belarus appreciates the work of the OEWG chair and team on ICT security negotiations.
Supporting facts:
- The statement begins with a thank you note to the OEWG chair for the efforts in providing good conditions for the negotiation process.
Topics: ICT Security, International Negotiations
Belarus is concerned about the increasing number of ICT crimes affecting various sectors.
Supporting facts:
- Belarus highlights the growth of ICT crimes worldwide and their adverse impact on democratic institutions and sustainable development.
Topics: Cybersecurity, ICT Development, Cyber Crimes
Belarus emphasizes the threats to critical infrastructure, especially in health and education.
Supporting facts:
- The threats to critically important infrastructure facilities in health and education are specifically mentioned as a concern.
Topics: Critical Infrastructure, Health Sector, Education Sector
Belarus perceives the use of ICT tools in information warfare as a significant issue leading to false accusations and misinformation.
Supporting facts:
- Belarus points out the use of ICT tools in information warfare, leading to unprovable accusations and the spread of false information.
Topics: Information Warfare, ICT Tools, Disinformation
Belarus calls for special attention to the ethical aspects of artificial intelligence.
Supporting facts:
- The statement reflects a belief that special focus should be on the ethical aspects and risks of artificial intelligence in ICT.
Topics: Artificial Intelligence, Ethics
Belarus supports the UN mandate for OEWG and seeks a substantive dialogue for establishing norms in ICT conduct.
Supporting facts:
- Belarus backs the OEWG mandate affirmed by the UN General Assembly resolution, aiming for a substantive dialogue to establish new rules and norms for ICT.
Topics: UN Mandate, OEWG, ICT Conduct Norms
Belarus expresses commitment to constructive, non-political dialogue within OEWG for successful outcomes.
Supporting facts:
- The commitment to a targeted and non-political dialogue within OEWG is clearly articulated for successful session outcomes.
Topics: ICT Diplomacy, OEWG
Acknowledgment of team and Secretariat efforts to prepare the agenda
Topics: Diplomatic Protocol, Agenda Preparation
Emerging threats in cyberspace are a clear danger to international peace
Supporting facts:
- New threats are emerging and present
- States are affected differently by the impact of cyber threats
Topics: Cybersecurity, International Peace
Need for cooperation and exchange of experience to mitigate digital threats
Supporting facts:
- Digitalization comes with risks that require joint efforts to address
- Differentiated impact on groups such as women and children
Topics: Cybersecurity Cooperation, Knowledge Exchange
The AI development brings reduced costs and increased accessibility, but also ethical and security concerns
Supporting facts:
- AI technology is becoming easier to access
- Ethical standards and human oversight are crucial
Topics: Artificial Intelligence, Ethics in Technology
The Santiago Declaration aims for the ethical use of AI in Latin America and the Caribbean
Supporting facts:
- 20 countries signed the declaration
- Focus on equity, non-discrimination, and gender equality
Topics: Santiago Declaration, AI Governance
Proposed study by the group on the impact of AI and cooperation measures
Supporting facts:
- Potential to aid states in identifying concrete and possible threats
Topics: Artificial Intelligence, Collaborative Studies
The organization of the session and the work of the Secretariat are appreciated.
Supporting facts:
- Efforts made in organizing the session are acknowledged.
- Organizing skills have been conducive to progress within the group.
Topics: Diplomatic Protocol, International Relations
The open-ended working group is a unique platform for equal participation and discussion on ICT issues.
Supporting facts:
- All states can participate in discussions on an equal footing.
- The group focuses on issues relating to ICT.
Topics: Information and Communication Technology (ICT), International Cooperation
The use of ICT to undermine state sovereignty and security is a significant threat.
Supporting facts:
- ICT can be used to violate state sovereignty.
- Infringement of economic and information resources’ security is a concern.
Topics: Cybersecurity, State Sovereignty
Misuse of ICT and media for interference in internal affairs through disinformation and incitement is a concern.
Supporting facts:
- Social media can be used for disinformation.
- Misinformation campaigns may destabilize states politically.
Topics: Media, Cybersecurity, Disinformation
Difficulty in tracing the source of cyber attacks exacerbates threats.
Supporting facts:
- Identification of cyber attack origins is challenging.
- Lack of regulation exacerbates issue.
Topics: Cybersecurity, Digital Forensics
Embargoes on the use of ICT services can weaken state resilience to threats.
Supporting facts:
- Sanctions harm states’ capacity to respond and recover from threats.
- Embargoes impede technological development.
Topics: Cybersecurity, Economic Sanctions
The need for a legally binding international instrument to govern state behavior in ICT.
Supporting facts:
- A global approach is required to address digital threats.
- Ensuring peaceful ICT use is a priority.
Topics: International Law, Cybersecurity
Advocacy for a global commitment towards peaceful ICT use and reducing the digital gap.
Supporting facts:
- It’s vital to commit globally for peaceful ICT use.
- Reducing the digital divide is emphasized.
Topics: Digital Divide, ICT for Development
Kenya appreciates the leadership and the progress achieved by the working group.
Supporting facts:
- The government has made significant advancements by digitalizing public services.
Topics: International Cooperation, Digital Connectivity, Cybersecurity
Digital advancements bring increased cybersecurity risks.
Supporting facts:
- Kenya has moved 90% of public services to digital platforms, raising the risk of exposure to cyber threats.
Topics: Cybersecurity, Public Service Digitalization
Artificial Intelligence enables decision-making but poses new challenges.
Supporting facts:
- AI might result in biased outcomes if fed with distorted datasets, and increased ransomware attacks.
Topics: Artificial Intelligence, Cybersecurity Threats
Kenya supports inclusive access to cybersecurity resources.
Supporting facts:
- Kenya urges for a united approach to cybersecurity, stressing on the global digital divide.
Topics: Cybersecurity, Digital Divide
A global database with cybersecurity tools and threat intelligence could benefit all nations.
Supporting facts:
- Making cybersecurity resources universally accessible would establish a common framework for threat mitigation.
Topics: Cybersecurity Governance, Information Sharing
ICTs are being used in conflict to disrupt critical civilian infrastructure.
Supporting facts:
- ICT infrastructure needed for essential services like water, petrol, electricity, or medical services is being targeted.
Topics: Cyber Warfare, Civilian Impact
Cyber operations against humanitarian organizations increase risk to their operational capacity.
Supporting facts:
- The ICRC and other organizations face disruptions and data breaches, leading to slowed response and misallocated resources.
Topics: Cybersecurity, Humanitarian Operations
States must limit unlawful cyber operations by non-state actors and prepare civilians on associated risks.
Supporting facts:
- Trends show civilians participating in cyber operations, which poses legal and ethical questions.
Topics: Cyber Law, Non-state Actors
ICT-enabled information operations causing psychological and societal harm must be addressed.
Supporting facts:
- Disinformation and hate speech risk escalating conflict and tension, affecting vulnerable populations.
Topics: Information Warfare, Psychological Impact
Military reliance on civilian ICT infrastructure raises the risk of it being targeted and destroyed.
Supporting facts:
- Use of civilian ICT infrastructure like cloud computing by armed forces can make it a military objective.
Topics: Military-Civilian Infrastructure, Cyber Warfare
The State of Palestine accuses Israel of perpetrating genocide in Gaza.
Supporting facts:
- At least 100,000 casualties reported in Gaza, including 30,000 or more killed, predominantly children and women.
- Significant infrastructure destruction in Gaza, including hospitals, schools, and religious buildings.
Topics: Israeli-Palestinian Conflict, Gaza Strip
Palestine claims Israel is not complying with international obligations and is committing human rights violations.
Supporting facts:
- Allegations of Israel’s non-compliance with the International Court of Justice’s provisional measures.
- Reported targeting of civilians and humanitarian aid efforts by Israel.
Topics: Human Rights Violations, International Law
The Russian delegation has accused Western countries of making unsubstantiated political attacks.
Supporting facts:
- Russia responds to claims by NATO countries
- Allegations of Western support to Ukraine in cyber activities
Topics: Cybersecurity, International Relations
Ukraine is accused of boasting sabotage activities and having an IT army conducting cyber attacks.
Supporting facts:
- Kiev authorities and the IT army’s increasing hostile activities
- Daily recorded computer attacks against Russian resources
Topics: Cyber Warfare, ICT
The Russian Federation alleges cross-national effects of Ukrainian cyber activities, including attacks on Bangladesh.
Supporting facts:
- Bangladesh Election Commission reported cyber attacks from Ukraine
- Global impact of the hacker conglomerate
Topics: Cybersecurity, International Relations
Western IT corporations are claimed to support Ukraine’s information security and facilitate cyber aggression.
Supporting facts:
- Collaboration of Western IT companies with governments for support to Ukraine
- Alleged provision of tools for cyber aggression and unauthorized data extraction
Topics: Cybersecurity, Corporate Responsibility
United States and European Union alleged to have cyber units deployed in Ukraine, training hackers and collecting data on Russian vulnerabilities.
Supporting facts:
- Deployment of US Cyber Command and EU cyber forces in Ukraine
- Training, coordination, and intelligence gathering activities against Russia
Topics: Cyber Warfare, US-Russia Relations, EU Policies
Western support is deemed essential for Ukraine’s aggressive cyber activities.
Supporting facts:
- Western backing for Ukrainian activities
- Creation of strategic formats like TALIN to assist Ukraine
Topics: International Support, Cyber Warfare
Germany supports the legitimacy of President Zelensky and Ukraine’s sovereignty.
Supporting facts:
- President Zelensky is democratically elected
- Russia’s war of aggression is deemed illegal by Germany
Topics: International Relations, Ukraine’s Sovereignty
Report
The extensive discussions on cybersecurity highlighted significant global concerns due to the substantial rise in cyber incidents reported by Czechia, with an almost two-fold increase in cyber attacks compared to the previous year. The prevalent sentiment regarding these incidents is largely negative because of the severe threats they pose to national security and public trust in digital services.
Czechia’s cyber attacks typically manifest as ransomware and DDoS attacks, with vital public sectors such as banks, government websites, universities, and hospitals being prime targets. Additionally, there has been a noticeable trend concerning the development of ransomware as a service in Czechia, coupled with an increased reliance on cryptocurrency for ransom transactions, further complicating cyber financial crimes.
Czechia is engaging in international counter-ransomware efforts, as evidenced by its participation in initiatives and interdepartmental working groups dedicated to tackling the cyber threat landscape. This involvement indicates an acknowledgment of the issue and a proactive stance in seeking collaborative solutions.
Belarus expressed concerns over the international growth of ICT crimes, which have detrimental impacts on democratic institutions and sustainable development. Belarusian officials highlighted the specific threat of ransomware and DDoS attacks to the country’s critical infrastructure sectors, such as healthcare and education.
Moreover, Belarus condemned the harmful use of ICT as tools for disinformation warfare, which leads to unverified accusations and potential political destabilisation. In the conversation, Belarus advocated for a conscientious approach to integrating AI in ICT and endorsed a cooperative, non-political dialogue within international forums like the OEWG to achieve successful outcomes.
Chile’s position was proactive, showcasing the critical need for enhanced cooperation at regional and global levels to tackle digital threats effectively. Chile also emphasised the ethical use and control over AI to avert its malicious application. The country highlighted the Santiago Declaration, backed by 20 countries, aiming for the ethical use of AI with a particular focus on equity and non-discrimination.
The Israeli-Palestinian conflict entered the discussions, with Palestine accusing Israel of committing genocide in the Gaza Strip and flagging extensive infrastructure damage as well as a considerable number of casualties. Palestine urged international acknowledgement of Israel’s ongoing human rights violations.
Russian delegations responded to accusations from NATO countries, rejecting them as baseless political attacks. Russia also held the Ukrainian authorities accountable for cyber attacks against Russian resources, describing these as sabotage activities by Ukrainian “IT armies.” The Russian Federation condemned Western IT companies’ involvement in the conflict, alleging their participation in cyber aggression.
In contrast, Kenya recognised the progress achieved by digitalising public services but expressed concern over the corresponding increase in cybersecurity risks. Kenya called for a united and equitable approach to cybersecurity, promoting inclusive access to cybersecurity resources for global governance.
The vulnerability of humanitarian operations to cyber attacks was also addressed, with the International Committee of the Red Cross amongst others, facing disruptions hindering their response capacity to crises. The Syrian Arab Republic demanded a global approach to address ICT threats that undermine sovereignty and domestic affairs, highlighting the misuse of ICT for political destabilisation.
The discussions underpinned the complexity of cybersecurity challenges, including aspects of international law and the ethical governance of emerging technologies such as AI. A common narrative woven through several statements was the urgency for international cooperation and the establishment of global norms in cyberspace.
There was a call for equitable resource distribution to reduce the digital divide, thus enabling all nations to effectively counter cyber threats.
C
Chile
Speech speed
138 words per minute
Speech length
1103 words
Speech time
479 secs
Report
During the meeting, the Chilean representative commenced with thanks directed towards the Chairman, the organising team, and the Secretariat for their meticulous preparation of the meeting’s agenda. The delegate welcomed the attendees, expressing hope for a fruitful session. They acknowledged the complex nature of emerging cyber threats, which were seen as both immediate hazards and a stimulus for states to reinforce their defences and advance their countermeasures.
The concern about illicit activities in cyberspace was articulated by the Chilean delegate, with special attention to the dangers they pose to global peace and security. The representative pointed out that the vulnerability of a nation is linked to its degree of digital proficiency and the robustness of its ICT infrastructure.
They promoted collective endeavours to combat digital dangers, highlighting the need to shield susceptible groups such as women and children. The discussion then moved to the challenges associated with artificial intelligence, identifying how AI has evolved to be more user-friendly but also poses new security concerns.
The speaker noted that hacking is no longer restricted to specialists since cutting-edge technologies have democratised cyber attack tools. Ethical guidelines in AI development were stressed in order to prevent its deleterious usage, especially as AI-generated errors in key services present a formidable threat.
Therefore, they called for stringent human oversight over AI systems to prevent inaccuracies that could compromise information integrity. The Chilean delegate cited the Santiago Declaration as an illustration of regional collaboration to institute common principles in AI governance. Jointly supported by 20 countries following Chile’s advocacy, the declaration emphasises ethical AI usage, focusing on balanced application, security, fairness, non-discrimination, gender equality, and broader social, economic, and cultural sustainability.
Moving onto proposed measures, the representative underlined the necessity for states to determine multilateral, bilateral, and regional cooperation frameworks for sharing information and coordinating efforts between the private and public sectors. They stressed the creation of national contact points dedicated to the exchange of AI information and highlighted the importance of continuous training programmes for officials.
Additionally, they advocated for the establishment of coordinating bodies to oversee cross-sector collaborations. In closing, the delegate urged for the involvement of academia, civil society, technical experts, and other stakeholders in a joint mission to detect and alleviate tangible threats posed by AI.
A recommendation for a commissioned research study on AI-related threats was made to guide strategic responses to AI’s evolving challenges. Chile’s closing message championed a unified and proactive stance to address the risks arising from advancements in both cyberspace and artificial intelligence.
C
China
Speech speed
147 words per minute
Speech length
790 words
Speech time
322 secs
Report
The Chinese representative took the floor to voice appreciation for the Open-Ended Working Group (OEWG) Chair’s stewardship and reiterated China’s pledge to support the OEWG’s efforts. The official stressed China’s intent to play a proactive role in the group and aim for a broader consensus in the coming year.
The essence of the address was a growing alarm over increasing polarisation and divisions within global cyberspace. The delegate highlighted a perception that the prevailing international cyberspace order is at risk, citing a troubling shift towards ideological camp politics, militarisation, and cyberspace fragmentation.
An unspecified country was blamed for reviving Cold War-like ideological conflicts in the digital sphere. The Chinese delegate accused this nation of erecting a ‘digital iron curtain’ and engaging in technology embargoes and digital dominance, actions which are seen to stifle competition and fracture the global cyber and digital industry, along with supply chains.
Furthermore, the representative denounced the unnamed country’s militaristic cyberspace strategies, notably its expressed willingness to target critical infrastructure in wartime and the incorporation of military alliances into the cyberspace domain. Such activities are depicted as elevating the threats of friction and conflicts among nations, threatening international peace and security.
The Chinese side also reported cyber-attack campaigns originating from the said country, pointing to groups like APTC39 that have purportedly conducted systematic cyber assaults on numerous nations, substantially compromising the security of critical infrastructure in China, including civil telecommunications and energy sectors.
Regarding Artificial Intelligence (AI) and other emerging technology, the emphasis was placed on their development and peaceful utilisation as urgent priorities. The unnamed country was reproached for exploiting national security as a pretext to enforce discriminatory standards and export restrictions to stifle foreign enterprises.
The matter of data security was underscored, with acknowledgement of shared international concerns. An executive order by the unidentified country designed to block access to sensitive data was labelled an abuse of national security, aimed at oppressing foreign competitive tech companies.
In response to these challenges, China introduced the Global Initiative on Data Security, seeking to create consistent, interoperable rules and standards on supply chain security, within the context of the UN Framework for Responsible State Behaviour in Cyberspace. With respect to the global ransomware menace, China suggested addressing it from three angles: its origin, dissemination channels, and monetisation tactics.
The unnamed country was criticised for purportedly lax regulation of networks and software that facilitate ransomware’s spread, and the alleged inefficacy in handling the cryptocurrency transactions that underpin ransom demands. In closing, the Chinese address urged all countries to adhere to and enforce the framework for responsible state behaviour in cyberspace, highlighting this as a binding political commitment rather than an optional guideline.
China accused the unnamed country of distorting the established international order for its geopolitical goals and insisted that the OEWG counter such conduct, unify rules on supply chain security, and protect the international rules governing cyberspace. The summary has been checked and corrections were made to ensure UK spelling and grammar throughout, while including long-tail keywords to maintain the quality of the summary.
C
Croatia
Speech speed
150 words per minute
Speech length
852 words
Speech time
342 secs
Report
Croatia has expressed solid support for the European Union’s stance on the complex spectrum of cyber threats that endangers international peace and security. The country acknowledges the impact of geopolitical strife on cyber operations, especially the deployment of cyber capabilities during armed conflicts.
The imperative for a collaborative, cross-sectoral response to emerging cyber threats is recognised by Croatia, with a call for a holistic strategy encompassing all levels of government and society. Highlighting the boundaryless nature of cyber threats, Croatia insists on fostering connections and cooperation across different cyber domains and wider communities to effectively counter these threats.
Croatia references the European Union Agency for Cybersecurity (ENISA) for predicted cybersecurity trends up to 2030, available on ENISA’s website. These predictions include concerns such as software supply chain compromises, sophisticated disinformation campaigns powered by technologies like deepfakes, increased digital surveillance and privacy erosion, ransomware attacks proliferation, AI exploitation, cryptocurrency-enabled cybercrime, vulnerabilities in e-health and genetic data, quantum computing threats, reliance on outdated systems, public blockchain disruptions, manipulation of emergency response systems, and skill shortages that expand cybercriminals’ attack surface.
Croatia advocates for breaking down informational silos and forging a united stance among public and private sectors, the technical community, and civil society. The state is depicted as bearing a crucial role in investigating and mitigating cybercrime, ensuring malicious cyber activities bear consequences.
Croatia shows solidarity with countries hit by aggressive cyber operations, including Ukraine, which has endured cyber and military attacks. The safeguarding of democratic processes from cyber-foreign interference is a priority, with emphasis on protecting electoral systems. An alarm is raised over the market for cyber intrusion tools, demonstrating the ease and low cost of launching cyberattacks.
The availability of these services can potentially lead to more frequent cybersecurity incidents. For preventative measures, Croatia supports risk identification associated with artificial intelligence in cyberspace, where AI can amplify the creation and distribution of malicious software efficiently and cost-effectively.
From a regulatory standpoint, the EU’s Cyber Resilience Act, aimed at establishing common cybersecurity standards for digital products in the EU market, is lauded by Croatia. The nation is keen to collaborate globally to reinforce ‘security by design’ in ICT.
Finally, Croatia underscores the importance of a gender-inclusive approach in cybersecurity, acknowledging gender disparities and the value of female involvement in cyber threat and policy discourse. In sum, Croatia’s statement underlines the pressing necessity for collective action, enhanced security protocols, and global cooperation to address an increasingly intricate and unconfined cyber threat landscape, while advocating for gender inclusivity in cybersecurity initiatives.
C
Czechia
Speech speed
154 words per minute
Speech length
681 words
Speech time
266 secs
Report
Czechia has echoed the broader European Union viewpoint on the heightened issue of cyber threats, whilst drawing attention to their national experience of a near two-fold escalation in cyber incidents over the past twelve months. The Czech republic detects a prevalence of ransomware and Distributed Denial of Service (DDoS) attacks that negatively impact essential services including banks, government institutions, university networks, and hospitals.
These attacks are predominantly attributed to Russian hacker groups. The discourse on threat dynamics emphasised the morphing of ransomware into a ‘ransomware as a service’ business model, illustrating its convoluted and commercial nature. The adoption of cryptocurrencies as the preferred method for ransom financial transactions was also stressed, aligning with concerns from the Republic of Korea and hence framing the problem within a global context.
Czechia articulated apprehensions about how ransomware attacks threaten to undermine public confidence in digital structures and state operations, making it clear that the risks extend beyond technical disruptions to include criminal, financial, organisational, and critical international considerations. Tackling these composite threats, Czechia has taken a proactive role by not only engaging in global discussions like the International Counter-Ransomware Initiative but also by inaugurating a dedicated national interdepartmental team to focus on these issues.
Furthermore, Czechia expressed concerns regarding the evolving technological advancements in artificial intelligence and quantum computing, which could empower cyber assailants with enhanced tools, potentially revolutionising the mode and efficacy of cyber attacks, with significant implications for cybersecurity. The conversation also encompassed the militarisation of ICTs, emphasizing the increased dangers posed by cyber systems in state conflicts and underscoring the obligation to comply with international humanitarian law to safeguard civilian amenities and health care institutions from cyber warfare.
In conclusion, Czechia accentuated the significance of an inclusive approach to cybersecurity dialogue. The nation upholds the essential involvement of industry professionals, academics, and civil society voices. This inclusive narrative was substantiated by a specific event wherein a cybersecurity leader from a top pharmaceutical firm was prevented from contributing expertise to the Open-Ended Working Group due to the obstruction of non-governmental participant accreditation by some countries.
Czechia voiced its dismay at such exclusionary tactics, which it regards as detrimental to the development of a resilient international cybersecurity framework and the exchange of best practices.
D
Denmark
Speech speed
150 words per minute
Speech length
327 words
Speech time
131 secs
Report
Denmark has expressed grave concerns over the surge in cyberattacks, aligning its stance with the European Union’s position on the matter. The country has observed a sharp increase in incidents, predominantly ones executed by pro-Russian hacker groups. These escalating cyber events are noted for their diversity and higher frequency, leading to significant disruptions, especially given the backdrop of Russia’s military engagement with Ukraine.
Denmark has criticised Russia’s cyber tactics aimed at Ukrainian critical infrastructure and state functions, actions that aim to undermine confidence in governmental institutions and which contravene accepted international cyber conduct norms. As the world approaches a pivotal moment in 2024—anticipated as the year with the highest concentration of elections in history—Denmark raises alarms about the potential of cyberattacks targeting the democratic electoral process.
The country reflects on the UK’s own dealings with acknowledged Russian cyber interferences in its political system, deeming such interventions as indefensible. Denmark, together with its European partners, firmly condemns cyber strategies that jeopardise the sanctity of democratic systems. With advancements in technology, notably artificial intelligence, there is a noticeable shift in the cyber threat landscape.
AI’s role is seen as a double-edged sword, increasing not only the volume but also the sophistication of cyberattacks, including the rise of ransomware attacks—a development that alarms Denmark and beyond. Underlining the complexity of global cybersecurity challenges, Denmark emphasises the critical need for multi-sector collaboration.
It notes the strategic importance of involving private companies, which manage a substantial portion of crucial infrastructure, in a combative partnership with governments to build a resilient cybersecurity infrastructure. In closing, Denmark advocates for an enhanced alliance amongst governments, civil organisations, academia, and the private sector to confront the escalating menace of cyber threats.
The nation calls for a united front to safeguard societal structures from such threats, underscoring that a shared responsibility is vital to uphold cyber peace and adhere to international standards aimed at curbing the escalation of cyber warfare.
F
Fiji
Speech speed
160 words per minute
Speech length
761 words
Speech time
286 secs
Report
The Fijian delegate commenced the address with an expression of gratitude towards the Chair for the latter’s exemplary leadership and acknowledged the Secretariat for its efficient orchestration of the meeting. The delegate emphasised the paramount importance of unwavering commitment to the security of cyberspace, coining it as the ‘North Star’—a guiding beacon reflecting the socio-economic advancement and safety of member nations.
Fiji applauded the progress report for casting light upon both current and looming cyber threats while pinpointing the pivotal concern of the digital divide in correlation with the Sustainable Development Goals (SDGs). The delegate clarified that the divide concerns not only access but also meaningful connectivity that champions social and economic inclusion.
Fiji presented noteworthy statistics indicating headway in bridging the global digital divide—from 49% at the conclusion of 2018 to 33% at the end of the preceding year, marking significant steps towards ubiquitous access. Nevertheless, the uptake of digital tech ushers in escalating cyber risks.
Fiji conveyed worries about the surge in complex and frequent cyber threats, including ransomware, phishing, and the nefarious employment of artificial intelligence (AI). The Pacific region, as specified in Australian and New Zealander reports, has suffered disproportionately, with ransomware severely impacting critical infrastructure and substantial interruptions caused by distributed denial-of-service (DDoS) attacks.
The delegate also sounded the alarm on the World Economic Forum’s Global Risks Report listing disinformation and cyber insecurity as top-tier global threats, which magnify vulnerabilities, particularly for smaller, insular Pacific economies battling climate change. In response to these issues, Fiji backed the suggestion of a distinct session tailored to cyber threat comprehension, while advocating for a gender-sensitive approach that acknowledges the differentiated cyber impacts on and roles of men and women.
The Fijian representative stressed the imperative for a ‘security by design’ stance concerning data protection, vitally important as less developed states hasten their digital transformation. The delegate also showed openness towards dialogues on establishing a cyber threat database—an idea introduced by Canada and elaborated on by Malaysia—to strengthen collective understanding and countermeasures.
To conclude, the Fijian representative reflected commendably on the substantive progress achieved under the Chair’s stewardship, including the reports, and pledged Fiji’s consistent participation and collaboration on matters of cyberspace. This pledge reaffirmed Fiji’s dedication to working in partnership with other nations to amplify cyber resilience and guarantee fair progress in the digital domain for all countries.
G
Germany
Speech speed
139 words per minute
Speech length
767 words
Speech time
332 secs
Report
Germany has reaffirmed its commitment to the European Union’s stance on cybersecurity, highlighting the complexity of the digital threat landscape in light of rapid technological advancements. The country has raised concerns about the potential use of artificial intelligence in cyber attacks, the risks posed by quantum computing, and the sophisticated evolution of cybercrime into a commercial undertaking.
These issues are exacerbated by a rise in hacktivism, targeted attacks from state-sponsored and independent cybercriminals, and a significant shortage of skilled IT security personnel. The spillover of cyber attacks from the Russian aggression against Ukraine into German networks exemplifies the transboundary nature of digital conflicts, underlining the vulnerability of international networks and the associated trust erosion between states.
With the upcoming 2024 European and regional German elections, Germany faces increased cyber threats aimed at undermining its democratic processes and critical infrastructure. In support of international cybersecurity initiatives, Germany has endorsed the Franco-British Initiative, which seeks to control the spread of commercially available cyber intrusion software.
These tools’ commercialisation has lowered the skill barrier to launching advanced cyber attacks, which can empower less experienced individuals. Additionally, Germany is participating in the International Counter-Ransomware Initiative and has a partnership with Nigeria focused on building capacity to tackle ransomware.
Germany advocates for stronger global cooperation and the creation of robust cybersecurity frameworks to safeguard the digital future’s integrity. The country has announced a forthcoming event to unveil the European Repository of Cyber Incidents, which will provide open-access data on over 2,700 large-scale cyber incidents, enhancing strategic knowledge and preventive capabilities against cyber threats.
The repository is a culmination of expert research from various institutions. In response to recent comments by Russia, Germany has unconditionally supported Ukraine’s sovereignty and its democratically elected president, Volodymyr Zelensky, condemning Russia’s illegal military actions. Germany’s position underscores the importance of upholding state sovereignty and the international principle that no nation’s independence should be compromised through aggression.
G
Ghana
Speech speed
151 words per minute
Speech length
439 words
Speech time
174 secs
Report
Mr. Chair, the delegation commenced by extending profound gratitude for your exemplary leadership and stewardship of the open-ended working group, acknowledging the significant progress achieved under your guidance. Representing Ghana, the delegation seized this opportunity to voice concerns and proposals concerning the evolution and threats posed by new technologies, particularly artificial intelligence (AI).
Ghana highlighted the urgent need to address the dangers associated with advancements in AI. The delegation identified deepfake technology as a substantial threat, capable of producing deceptive visual and audio content, which poses risks of misinformation and disinformation. Such manipulations could severely impact the integrity of democratic processes, especially during elections, by influencing public opinion or facilitating cybercrimes such as identity theft.
Concerns were also raised regarding the potential for AI systems to operate autonomously and anonymously, presenting challenges for law enforcement. The delegation underscored the significant threat posed by AI-driven cyber threats that act independently, often using technologies like blockchain to evade detection.
Additionally, privacy risks were spotlighted, as AI systems rely heavily on processing vast amounts of data, potentially leading to invasions of privacy and violations of data protection. These concerns underscore the need for international guidelines on the design and deployment of ICT, advocating for principles such as ‘security by design’ to prioritise privacy, security, and accountability.
The delegation emphasised that bona fide international guidelines would provide a foundational framework to unify and enhance cybersecurity efforts worldwide. By integrating security and ethical considerations into the ICT design process, these guidelines would serve as formidable measures against digital technology risks.
Commendations were given to the Chair for involving experts in dialogues about emerging technologies, such as quantum computing and AI, a move that aligns with the delegation’s call for comprehensive understanding of these technologies’ impacts. The delegation reiterated their support for Kenya’s initiative to establish a UN threat repository, designed to foster universal awareness and understanding of existing and emerging cyber threats.
In closing, the delegation advocated for the development of global initiatives, including the implementation of comprehensive international guidelines for ICTs that promote security, privacy, and accountability, culminating in a more secure and resilient ICT ecosystem. Thank you, Mr. Chair, for your attention and for providing a platform for these crucial discussions and proposals.
G
Guatemala
Speech speed
141 words per minute
Speech length
611 words
Speech time
261 secs
Report
The speaker, addressing the Chairman during the seventh convening of the Open-Ended Working Group, expresses appreciation for the organisation of the session and the groundwork laid prior to it. The introduction sets the stage for a discussion about cyberspace, depicting it as a vital sphere for global operations, utilised by both law-abiding individuals and nefarious actors, such as criminal and terrorist organisations, indicating the seriousness of the subject.
Within the address, several crucial issues are underscored. Firstly, the vulnerabilities in information and communication technology (ICT) networks are a primary concern. These weaknesses are susceptible to exploitation by malicious actors aiming to access sensitive data or conduct unlawful acts.
The speaker elaborates on compounding factors, including limited availability of security software or training, which amplify the threat of cyber incursions. The speaker’s country has endured cyber incidents such as malware, phishing, identity theft, and ransomware attacks, impacting economic stability and national security.
There’s mention of the reluctance among entities to disclose information on cyber threats, primarily due to fears of exposing their security weaknesses. Hence, the speaker praises initiatives like those by the Organization of American States, encouraging cooperation and strengthening cyber defence capacities.
The positive impacts of ICT on human advancement, emergency response, and support in sectors including education, health, governance, civil society, and the UN are acknowledged. Nonetheless, the speech contains a caveat: the malicious use of ICT can compromise trust in institutions, disrupt social cohesion, and threaten democratic integrity.
The speaker stresses the urgency to enhance measures protecting critical infrastructure, such as power grids, communication networks, and transportation systems, noting their vulnerability to significant cyberattacks and potential societal repercussions. The delegate calls for international legal norms preserving individual and human rights in the digital realm.
The goals include safeguarding digital practices, countering hate speech, and fighting cybercrime. The speech concludes with an appeal for greater public-private partnership in developing effective cyber defence strategies. In summary, the speaker, reflecting their nation’s stance, reminds states of the fundamental principle that ICT should serve peaceful objectives, bolster human welfare, and foster sustainable development globally, regardless of technological progress.
IC
International Committee of the Red Cross
Speech speed
135 words per minute
Speech length
652 words
Speech time
289 secs
Report
The International Committee of the Red Cross (ICRC) expresses gratitude to the Open-Ended Working Group for inviting them into their session and values the insightful examination of the cybersecurity threats relating to the use of information and communication technologies (ICTs) in conflict zones.
The ICRC offers a more refined outlook on five pivotal issues from its standpoint as a humanitarian organization committed to neutrality and impartiality: 1. **Employment of ICTs in Warfare**: The ICRC concurs with the observation that ICTs are being deployed in regional conflicts to interrupt essential civilian services.
These hindrances affect vital infrastructures, disabling access to water, electricity, fuel, and medical services. The ICRC underscores the profound human and societal cost of these interruptions and encourages the Working Group to take a firm position on this escalating concern.
2. **Cyber Attacks on Humanitarian Entities**: Cyber operations targeting humanitarian organizations, a significant issue highlighted by the ICRC and acknowledged in the progress report, aggravate the challenges in an already overstretched humanitarian landscape. Such cyberattacks have disrupted the internal operations of the ICRC, leading to data loss, reputational harm, and the diversion of scarce resources from relief operations to cybersecurity.
3. **Cyber Engagement by Non-State Actors**: The increase in cyber activities by non-state players during armed conflicts is worrying, including civilians undertaking cyber offensives against a nation’s civilian infrastructure, sometimes encouraged by states or on their own initiative. The ICRC draws attention to the responsibility of states to dissuade such illicit activities and to educate their civilians on the risks involved.
4. **ICT-Enabled PsyOps**: The ICRC endorses the conclusion about the impact of ICT-facilitated psychological operations. These operations can cause harm by inciting tension and conflict escalation through propaganda and target vulnerable civilian groups. 5. **Dangers to Civilian ICT Resources Utilized by Military**: Finally, the ICRC brings attention to the overlooked risk pertaining to the armed forces’ reliance on civilian ICT infrastructure like cloud services and communication networks.
The ICRC proposes that military and civilian usage of critical infrastructures should be separated to prevent civilian resources from becoming collateral damage in military targeting. The ICRC praises the Working Group for their effort in documenting vital infiltrations of ICT in conflict zones and trusts that these matters will persist to be recognized and tackled in subsequent reports.
This ongoing dialogue is key to reducing the detrimental effects of ICT on global armed conflicts. While reviewing the text, no spelling or grammatical errors were found that would require corrections to align with UK English. The summary has also been enhanced with relevant long-tail keywords to improve its richness without compromising on quality.
I
Israel
Speech speed
147 words per minute
Speech length
1481 words
Speech time
605 secs
Report
During the seventh substantive session of the Open-Ended Working Group, the Israeli delegation voiced their gratitude to the Chair and the UNODA for their role in organising the session. They reported an urgent concern regarding the escalation in cyber threats against Israeli citizens following the October 7th terrorist attacks.
Approximately 15 groups, connected to various state and non-state actors, have targeted Israel’s critical infrastructure, aiming to disrupt civilian life by attacking energy networks, water systems, and hospitals. Israel has addressed these cyber intrusions by intercepting and neutralising many attacks, reiterating that their actions are defensive, countering violations of accepted norms of state behaviour in cyberspace.
The delegation called for global condemnation of these cyber-terrorist attacks and sought international solidarity against such threats. The address also shed light on the challenges brought by advancements in artificial intelligence, particularly generative AI, which can introduce new vulnerabilities and amplify cyber attack risks.
Though these developments in AI are recognised as technologically neutral and have the potential to bolster cybersecurity, there is concern about the enhanced capabilities they could offer adversaries. The United States’ leadership in advocating for a U.N. resolution on trustworthy AI systems was acknowledged, which indicates the need to balance the open development of technology with potential threats.
The cooperation between rogue states and non-state entities, such as organised crime groups and terrorist organisations, accessing advanced cyber tools was highlighted as alarming, as it heightens the threat to national security and cyberspace stability. The delegation called attention to the use of cryptocurrencies in funding cyber attacks and advocated for international action to disrupt these financial mechanisms facilitating malicious activities.
Israel expressed a willingness to work with other nations to improve collective cyber resilience, addressing both current and future cyberspace challenges. In a subsequent right of reply, the Israeli delegates discussed the October 7th massacre, describing it as part of a broader indoctrination campaign against Israelis, facilitated through online platforms, educational materials, and international funds inadvertently used for military purposes by groups like Hamas.
Moreover, they insisted that Israel’s military actions in Gaza conform to international law, focusing on quelling Hamas’s threat and ensuring the release of Israeli hostages. The delegation highlighted their efforts to protect civilians and provide humanitarian assistance amid the conflict.
Finally, they criticised regional support from states like Iran for Hamas and other terror groups, claiming this destabilises the area and presents a significant threat to global peace. Israel urged the international community to take a decisive stand against such states and their proxy terrorist organisations.
They emphasised the crucial nature of security concerns in maintaining regional and international stability.
J
Jordan
Speech speed
118 words per minute
Speech length
438 words
Speech time
223 secs
Report
In their comprehensive address to the Open-Ended Working Group, the Jordanian representative underscored the significance of continuous and in-depth discussions on both current and forthcoming threats in the realm of Information and Communication Technologies (ICTs). They stressed the crucial need to safeguard critical information infrastructure, conduct risk assessments, formulate bespoke policies, and thoroughly explore the application of international law in the digital domain.
Particular attention was drawn to the dual nature of emerging technologies like artificial intelligence (AI) as catalysts for advancement and, conversely, as potential instruments of misuse. With the proliferation of AI, the representative elaborated on the potential for cyber attacks targeting AI systems, the use of AI by malicious actors to enhance their cyber capabilities, and the vulnerabilities of inadequately protected AI infrastructures.
These issues are further complicated by the potential for AI to introduce biases in decision-making, compromise data integrity, and infringe upon individual privacy. The address raised concerns about the escalating complexity of cyber tools available to non-state actors, which could pose a threat to ICT security.
The need to contemplate the regulation of open-source AI to mitigate related risks was emphasised, along with the implications of a growing commercial market for cyber intrusion tools that could impact national security, human rights, and international peace. To foster a concerted response to these challenges, Jordan advocated for increased global consciousness and an integrated understanding of the landscape of ICT threats.
Initiatives proposed included fellowship programmes to deepen knowledge of ICT threats, partnering with the private sector, and the development of metrics to assess the efficacy of such partnerships. Also mentioned was the potential for aligning cyber-related activities with recognised global events and conducting research to unveil incentives that may encourage the acknowledgment and combatting of ICT threats, thereby promoting compliance and awareness.
Concluding the address, Jordan emphasised the imperative role of international cooperation in harmonising and invigorating strategies to address ICT threats effectively. The appeal for action indicates Jordan’s dedication to establishing a secure and resilient global ICT framework and highlights the urgency for the international community to improve its collective capacity to predict, forestall, and react to the diverse and growing challenges that are manifesting in cyberspace.
K
Kenya
Speech speed
131 words per minute
Speech length
494 words
Speech time
226 secs
Report
The Kenyan delegation commenced their statement by lauding the chair’s leadership and voicing their optimism that the current session of the open-ended working group would continue to foster advancements in digital connectivity. With a perspective representing many developing countries, Kenya detailed significant progress in integrating digital technologies across the public and private sectors, highlighting the digitalisation of 5,000 public services – comprising 90 percent of all government services – over the past year.
However, Kenya acknowledged a dual aspect to this digital evolution, as it simultaneously heightened the nation’s exposure to cybersecurity threats. Developing countries, such as Kenya, face particular challenges, including insufficient infrastructure, constrained resources, and varying levels of cybersecurity awareness, which collectively enhance the risk of cybercrime.
The concern specifically pointed to artificial intelligence (AI), recognising its potential to transform productivity through accelerated decision-making and data processing capabilities. Still, the delegation underscored the risks of AI, including the likelihood of biased outcomes from defective datasets, the danger of security breaches, and the possibility of total system failures.
The ease with which AI can be repurposed for cyberattacks, such as ransomware, and the threat of harmful strategies, including malware, distributed denial of service (DDoS) attacks, and crypto-jacking, were pinpointed as substantial risks – particularly to cloud-based systems, which could result in unauthorised access and data compromise, and potentially allow subsequent infiltrations.
In the face of these escalating challenges, Kenya called for access to cybersecurity resources that is both inclusive and equitable, with special regard to the digital divide. They urged the United Nations to take the lead by advocating for cybersecurity propositions that mitigate technological disparities among nations.
A key suggestion from Kenya was for the establishment of a UN-supported cybersecurity database. This would serve as a hub for essential cybersecurity tools, best practices, and threat intelligence, accessible to all countries, to facilitate a collective defence against cyber threats.
Such an initiative would enable nations, irrespective of their digital proficiency level, to safeguard their cyberspace effectively. Kenya envisions a scenario where enhanced cybersecurity measures and bolstered global cyber resilience would universally benefit participating nations, marking significant progress towards collaborative international cybersecurity governance.
In concluding, Kenya stressed the importance of a combined approach to tackling cyber challenges, and called for more inclusive access to resources and a division of responsibility. **Note**: The given text was already in UK English and did not have noticeable grammatical errors.
I have made minor adjustments to make the text more fluid and to enhance the inclusion of long-tail keywords such as “escalating challenges in cybersecurity,” “international cybersecurity governance,” “inclusive access to cybersecurity resources,” and “collective defence against cyber threats,” among others.
The summary’s content is now optimally reflective of the original analysis.
M
Mauritius
Speech speed
122 words per minute
Speech length
750 words
Speech time
370 secs
Report
The Republic of Mauritius addressed the meeting with gratitude towards the chair and team for their work in crafting guiding questions that facilitated valuable contributions to the agenda. The Mauritian delegate underlined the dynamic and rapidly evolving nature of the cyber threat landscape, noting how threats are not only becoming more sophisticated but new ones are also emerging.
Presenting a comprehensive overview of cyber threats, the delegate pointed out the range of adversaries from cybercriminals driven by financial gain to state-sponsored agents engaged in espionage and sabotage. Notably, the vulnerability of critical infrastructure was a major concern, frequently targeted by cyber scams, ransomware, and data breaches.
Such incidents jeopardise sensitive information and erode trust in institutions. The delegate shined a light on the role of emerging technologies such as AI, quantum computing, and 5G networks in the evolution of cyber threats. These advancements, although beneficial, present potential for exploitation by malicious actors.
With 5G technology in particular, there is a heightened risk due to its high-speed connectivity and the integration with IoT devices, leading to increased opportunities for attackers. The delegate stressed that the extensive data transmitted over 5G networks demands robust protective measures to prevent sensitive communication breaches and the manipulation of infrastructure.
The Mauritian delegation pinpointed misinformation, disinformation, and malinformation (MDM)—collectively termed as ‘fake news’—as a serious issue that burdens economies and threatens democratic processes by undermining public trust, especially during elections. Emerging technologies such as machine learning and natural language processing can further exacerbate this problem by facilitating the creation and dissemination of disinformation, including the use of deep fakes and social media platforms.
Supporting the Open-Ended Working Group’s (OEWG) previous sentiments, Mauritius pressed the need to address these challenges. The delegate advocated for a proactive approach to cybersecurity, integrating security in product development phases, consistent threat monitoring, and sensitising the public through a pervasive cybersecurity awareness culture.
Emphasising education and training, the delegation argued for strengthening human defences against cyber threats. Mauritius highlighted its national cyber threat information sharing platform, which allows for the exchange of intelligence regarding threats to critical infrastructure. The platform is considered crucial for early threat detection, increased situational awareness, and a collaborative defence approach, establishing a trusted network among government agencies, infrastructure operators, and various stakeholders.
In conclusion, the Mauritian delegate reaffirmed the country’s commitment to enhancing cybersecurity through partnership with regional and international bodies and information sharing. Furthermore, Mauritius expressed its willingness to extend the reach of its threat information sharing platform internationally, underscoring a commitment to cooperative global cybersecurity initiatives.
N
Netherlands
Speech speed
142 words per minute
Speech length
972 words
Speech time
409 secs
Report
The representative from the Kingdom of the Netherlands presented a statement during the Open-Ended Working Group (OEWG) on developments in the field of information and telecommunications in the context of international security, building upon the collective stance of the European Union.
The statement began by expressing concern over the evolving and complex nature of malicious cyber activities, which represent a threat to individual, societal, and national peace and security. Specifically, the Dutch representative highlighted a cyber espionage incident involving ‘CodeHanger’ malware on FortiGate appliances that targeted the Netherlands Ministry of Defence in 2023.
The statement suggested four key areas for attention and development in the forthcoming APR of the OEWG: 1. The disruptive impact of ransomware, particularly on essential healthcare infrastructure, and its potential threat to national and international security. 2. Cyber threats to international organisations, including the International Criminal Court (ICC), potentially disturbing their independent functions and undermining effective multilateralism.
3. The integration of a gender perspective in analysing ICT threats, acknowledging varied impacts across different demographics, to align with the Women, Peace and Security Agenda. 4. The risks associated with indiscriminate use of ICTs, especially concerning AI and automation, which could lead to widespread damage to critical infrastructure and essential services.
Furthermore, the Dutch representative highlighted the need for OEWG to consider the implications of AI for ICT security, identifying three areas of focus: a. The risks of AI-enabled autonomous cyber operations causing escalations between states. b. The vulnerabilities in essential public services and the potential for AI-generated malware.
c. The dual potential of AI in both presenting risks and enhancing cyber defence systems. The Netherlands joined other nations in voicing concerns about the misuse of commercially available cyber intrusion tools and endorsed points made by the Republic of Korea, Australia, and Japan regarding the danger of crypto theft linked to the proliferation of weapons of mass destruction.
The statement concluded with support for maintaining up-to-date capacities to counter emerging cyber threats and expressed interest in discussing Kenya’s proposal for a threat repository within the OEWG to improve collective understanding and responses to the cyber threat landscape. The extended summary reflects the Netherlands’ proactive stance in international cyber security discussions, emphasising the emerging challenges in the cyber realm and the country’s commitment to fostering cyber stability and security.
It ensures the use of UK spelling and grammar throughout the text.
N
Nigeria
Speech speed
115 words per minute
Speech length
504 words
Speech time
264 secs
Report
The Nigerian delegation, led by their Chairperson, recognises the vast impact of technological advancements on personal relationships, communication, and economic development. However, the delegation expresses serious concerns over the malicious use of ICT, highlighting the urgent need to address growing cyber security threats.
The delegation identifies numerous cyber threats, such as the sophisticated creation of deepfakes through artificial intelligence, human-like robots, widespread ransomware, a surge in online child exploitation, issues arising from cryptocurrency, the dangers of cyber terrorism, election interference vulnerabilities, rising incidents of online identity theft, and the pervasive spread of misinformation and disinformation.
Deepfake technology is singled out for its potential to spread misinformation widely. The delegation is also deeply concerned about increased hacking and the resultant theft and misuse of data from businesses and public entities, which not only jeopardises personal privacy but also has substantial economic impacts including illicit fund transfers, service disruptions, and victim extortion.
The use of ICT in abetting money laundering and facilitating tax evasion, undermining government revenue necessary for public services, is also underlined. Noting the unending possibilities for cyber threats, the Nigerian delegation encourages continuous engagement with ICT companies to bolster collective security.
The delegation suggests enacting stringent national laws to stem cyber threats. At the international level, the delegation urges agreement on guidelines and strategic measures to counter malevolent cyber activities. This would require collaboration with ICT firms and the implementation of strict legal sanctions against cybercriminals.
Nigeria stresses the importance of responsible state behaviour in cyberspace, advocating for a set of norms that would foster transparency among nations. In closing, the delegation aligns with the UN Charter’s ideals, calling for the promotion of global peace and security, human rights, and sustainable development within the ICT industry.
Nigeria points out the necessity of maintaining these values in cyber security efforts by governments, corporations, and individual innovators, as crucial to the global effort in thwarting cyber threats and preserving peaceful international relations.
RO
Republic of Moldova
Speech speed
139 words per minute
Speech length
440 words
Speech time
191 secs
Report
Moldova has reinforced its support for the European Union’s position, as expressed in the statement issued by the EU delegation, on the escalating threat posed by cyber incidents. Nationally, Moldova recognises the dawn of a new cyber security era marked by an increase in global cooperation among governments, regulatory authorities, and businesses to improve the handling and observation of cyber events.
The nation acknowledges the variable nature of the cyber security landscape, mirroring concerns raised by Switzerland and Chile about the ambiguous implications of advanced technologies like artificial intelligence and machine learning. While these innovations offer groundbreaking prospects, they also introduce intricate challenges as cyber perpetrators utilise more intricate methods and tools.
Within its own region, Moldova has witnessed a disturbing increase in cyber aggression, particularly emphasising the surge in distributed denial of service (DDoS) and ransomware attacks, alongside a noticeable rise in foreign manipulation of information and interference (FIMI) assaults. The latter involves the use of AI-enabled fake news and video content to propagate misinformation.
Moldova has reported experiencing destabilising actions that are perceived as part of a wider hybrid warfare strategy aimed at its governance structures. These attacks threaten not only government operations but also seek to undermine essential national infrastructures. As the country approaches its general elections, it foresees an escalation of these cyber threats, anticipating that they will be employed more broadly to sway the electoral results and emphasises that such politically-charged cyber activities carry grave political consequences.
The address culminated with an appeal for unity and dedication to cyber security endeavours, highlighting the necessity to enhance capabilities, create effective global partnerships, and cultivate an atmosphere of mutual trust and resilience. This is crucial for safeguarding the ever-present digital domains that are vital to contemporary life.
In summary, Moldova’s comments at the forum underscored the imperative for a proactive and cooperative approach against the advancing cyber threats that not only jeopardise national security and the democratic process but also risk the integrity of international digital infrastructure.
This drive towards robust collaborative cyber defence initiatives is a key focal point in the discourse on securing digital spaces against the sophisticated landscape of cyber threats.
RF
Russian Federation
Speech speed
107 words per minute
Speech length
341 words
Speech time
192 secs
Arguments
Russia accuses Western countries of making unsubstantiated political attacks.
Supporting facts:
- Russia is responding to accusations from NATO countries.
- Portrayal of Ukraine as a digital victim by the West is considered unconvincing by Russia.
Topics: Geopolitics, Information Warfare
Russia claims cyber attacks on its information resources and infrastructure are coming from Ukraine.
Supporting facts:
- Russian experts record daily computer attacks.
- Attacks affect government agencies and critical infrastructure.
Topics: Cybersecurity, International Relations
Russia alleges Ukrainian authorities are involved in cyber sabotage activities.
Supporting facts:
- Ukraine boasts about sabotage activities using ICTs.
- The ‘IT army’ is supervised by the Zelensky regime.
Topics: Cyber Warfare, Ukrainian Government
Other countries also report cyber attacks originating from Ukraine.
Supporting facts:
- Bangladesh Election Commission reported attempts from Ukraine to disable its voting facilities.
Topics: International Cyber Incidents, Third-Party Impacts
Russia highlights the role of the West in supporting Kiev’s aggression in cyberspace.
Supporting facts:
- U.S. Cyber Command and EU cyber forces are reportedly active in Ukraine.
- The West collects data on hacking methods and vulnerabilities of Russian systems.
Topics: Western Support, Cyber Espionage
Russia objects to the creation of strategic formats to aid Ukraine in ICT military purposes.
Supporting facts:
- The TALIN mechanism was created to assist the Zelensky regime for military political purposes.
Topics: Military Cooperation, ICT in Conflict
Russian Federation points to the use of Western technology for unauthorized data extraction and intercepting correspondence of Russian citizens.
Supporting facts:
- Usage of mobile-aided forensic bi-compulsion by the West.
- Protected data from personal devices is unauthorizedly extracted.
Topics: Privacy Concerns, Surveillance
Report
The Russian Federation has adopted a resolute stance against what it perceives to be unjustified political attacks in the cyber realm by Western countries, particularly from NATO members. Russia challenges the depiction of Ukraine as a helpless victim in digital warfare, deeming such characterisations by the West as unconvincing and politically charged.
The Russian narrative is constructed around escalating geopolitical tensions, focusing on cybersecurity issues and the dynamics of international power relations. Russia asserts that it frequently encounters cyber attacks targeting its government agencies and vital infrastructure. It accuses Ukraine of orchestrating attempts to compromise Russian cyber integrity, indicating a coordinated effort to destabilise its systems.
Russia further accuses Ukrainian authorities of participating in cyber sabotage, with President Zelensky’s government allegedly overseeing these activities. The Ukrainian ‘IT army’ is highlighted by Russia as an embodiment of state-sanctioned cyber belligerence. Additionally, Russia cites international cyber incidents, with countries like Bangladesh reporting attacks traced back to Ukraine, targeting essential voting infrastructure.
The Russian account emphasises a substantial Western presence in Ukraine’s cybersecurity strategies, with the involvement of the US Cyber Command and EU cyber forces. These Western elements are implicated in intelligence gathering on Russian cyber approaches and system vulnerabilities, purportedly to reinforce Kiev’s digital offence capabilities.
Russia also castigates Western IT corporations, accusing them of aiding Ukrainian government agencies under contract and spreading unfounded allegations against Russian interests. Regarding privacy and human rights concerns, Russia vocalises grievances about the use of Western technology for unauthorised data extraction.
It claims that the West employs tools such as mobile-aided forensic bi-compulsion to unlawfully extract protected data from the personal devices of Russian citizens and intercept their private correspondence without consent. These criticisms suggest deep-rooted issues concerning privacy breaches and unauthorised surveillance, indicative of extensive espionage activities.
The analysis unveils a pronounced schism within the international community, where Russia portrays itself as the target of cyber invasions and misleading narratives. The ensuing tension contributes to worsening international relations, potentially leading to intensifying confrontations in the arena of information warfare.
Russia’s deterrence of perceived aggressive maneuvers by Ukraine and the West underscores a convoluted web of geopolitics and cybersecurity, underscoring the challenges of maintaining digital sovereignty. This protracted conflict transcends bilateral tensions, prompting a wider discourse on the norms governing state conduct in cyberspace and the power politics at play on a global scale.
SO
State of Palestine
Speech speed
139 words per minute
Speech length
327 words
Speech time
141 secs
Report
In a fervent address to the Chair, the speaker issues a potent counterargument to the accounts presented by Israeli officials, accusing them of either being out of touch with reality or falsely presuming others to be so. The speech is driven by a profound sense of frustration, as it paints a grim portrait of the humanitarian plight in Gaza.
The speaker argues that contrary to Israeli narratives, the international community is acutely conscious of the dire situation. The central arguments of the speech delineate what is termed a large-scale humanitarian disaster brought about by Israeli military actions. The speaker conveys statistics of the human toll over a five-month period, including an estimated 100,000 Palestinian injuries and 30,000 deaths in Gaza, with a tragically high proportion of women and children among the deceased, described as casualties of brutal and merciless acts.
Attention is also drawn to the widespread demolition of civilian infrastructure, such as hospitals, schools, and holy sites, emphasising that even United Nations establishments have been subjected to what is depicted as indiscriminate violence. The speaker delivers a stinging critique of Prime Minister Netanyahu’s administration in Israel, branding its conduct as extraordinarily aggressive.
The Gaza crisis is portrayed as genocidal, with reference to the International Criminal Court’s (ICC) engagement and South Africa’s involvement in starting proceedings via the ICC. The speaker rebukes Israel for its alleged defiance of the ICC’s preliminary measures, despite their obligatory status.
The speaker raises the issue of collective punishment, alleging that the Israeli state is deliberately causing starvation among Palestinians and targeting civilians, including those participating in humanitarian missions. The tone conveys deep disillusionment with the perceived audacity of Israeli spokespeople defending their country’s stance amid extensive global censure.
The speech culminates with the speaker expressing a lacklustre willingness to broach the topic, presumably a reaction to earlier declarations by an Israeli envoy. This implies a view that Israeli authorities might be using dialogue as a means to obfuscate the stark conditions present in Gaza.
This edited summary ensures not only that UK spelling and grammar are maintained but also encapsulates the emotional intensity and ethical imperative of the speaker’s appeal. It deftly captures the complex nature of the Israeli-Palestinian discourse within international assemblies while optimising for long-tail keyword inclusion without compromising the integrity of the summary.
S
Switzerland
Speech speed
157 words per minute
Speech length
1012 words
Speech time
386 secs
Report
In a formal address to the Chair, a representative from Switzerland acknowledged the Chair’s dedication and the efforts made by the team in preparing for the current sessions. The representative used humour to comment on the Chair’s assignment of ‘homework’ at an unusual time, drawing a light-hearted comparison with the rigorous educational standards of Singapore and expressing camaraderie with students accustomed to such demands.
The address swiftly moved to Switzerland’s primary concerns regarding cybersecurity, drawing attention to the alarming rise in ransomware and cyberattacks, especially those that are state-sponsored and aimed at crucial infrastructure. The ongoing digitalisation of conflict, exemplified by the war in Ukraine, was cited as evidence of the substantial risks and potential damages posed by these cyber threats.
Switzerland highlighted the issue of certain states offering safe havens to criminal ransomware groups, a practice at odds with the framework for responsible state behaviour in cyberspace. These states not only shelter but also potentially utilise these groups to further their state interests, thereby intensifying cybersecurity threats.
Switzerland’s active participation in the Counter-Ransomware Initiative to tackle these issues was also mentioned. Concerns about the participation of non-state actors in offensive cyber operations were outlined, noting the risk of uncontrollable side effects and accidental impacts on third parties.
The danger posed to Internet infrastructure, including subsea cables, and the potential for widespread disruption due to domino effects were specifically mentioned as particularly disturbing. The representative addressed the dual nature of Artificial Intelligence (AI)—its ability to bolster the security and resilience of Information and Communication Technology (ICT) solutions while also enhancing the capabilities of malevolent cyber operations, including ‘deepfakes’ and other advanced attacks.
A technology-neutral approach to the discussion on AI was urged, focusing on its application and implementation to mitigate harmful impacts and protect AI models from being exploited. Acknowledging the necessity of certain intrusive ICT capabilities for law enforcement and national security, Switzerland stressed their use should be confined within legal parameters, in adherence to international law and human rights.
The endorsement of the Palmal process by Switzerland aims to establish increased control over the deployment of cyber capabilities. Switzerland underscored the value of leveraging global and regional platforms, initiatives, and forums to bolster cybersecurity efforts, highlighting how such collaborative efforts at various levels could also inform the development of broader global initiatives.
The address concluded with Switzerland joining other delegations in voicing serious concern over malicious cyber activities targeting democratic institutions and electoral processes. Cyber threats to international organisations were emphasised, with Switzerland reiterating the responsibility of states to protect these entities from such interference.
In summary, Switzerland’s comprehensive approach to combating cyber threats includes fostering cooperation across established structures, promoting responsible AI utilisation, regulating cyber capabilities, and safeguarding democratic and international institutions. The speech emphasised the critical importance of international cooperation and Switzerland’s ongoing commitment to contributing to the maintenance of global cyber stability and security.
SA
Syrian Arab Republic
Speech speed
126 words per minute
Speech length
761 words
Speech time
363 secs
Report
The delegate initiated their speech with thanks to the Chair, the organising team, and the Secretariat for their meticulous efforts in setting up the session. They praised the organising committee’s efficient coordination, which facilitated productive discussions on important issues. The delegation acknowledged the significance of the working group as an essential platform for inclusive participation by states in matters related to Information and Communication Technology (ICT), thereby emphasising the necessity for equitable dialogue and decision-making on global digital policies.
The main focus of the delegate’s address centred on the various threats posed by the misuse of ICT to state sovereignty. The delegation pinpointed the potential for ICT to undermine a state’s control over its economic resources and unauthorised use of information resources, constituting a violation of sovereignty that could jeopardise national security and economic stability.
The misuse of media platforms, especially social media, was indicated as a specific area of concern. These platforms were described as facilitators for external entities to interfere in a state’s domestic affairs through disinformation, hate speech promotion, violence incitement, and sabotage – all aimed at destabilising governments for political objectives.
The delegation stressed the difficulty in tracing the origin of cyberattacks and the lack of effective regulatory frameworks to address this challenge. They also criticised the impact of ICT embargoes that reduce states’ resilience and ability to counteract and recuperate from digital threats.
In seeking solutions, the delegation proposed the establishment of a globally recognised, legally binding agreement to regulate state behaviors in relation to ICT. They argued for a unified international strategy to mitigate digital threats and prevent intrusions into national sovereignty and internal issues.
The delegate called for actions to bridge the technological gap, promoting peaceful ICT utilisation and advocating for the removal of unilateral sanctions that impede developing nations’ infrastructure development and resilience. The speaker advocated for the negotiation and introduction of an international, legally binding ICT treaty under the United Nations’ auspices, and for concerted efforts to address ICT challenges collectively.
Subsequently, the proceedings were taken over by a different speaker in response to remarks made by the Israeli delegation concerning their nation. This speaker delivered a strong condemnation, labelling Israel as a major threat to international peace and security due to its longstanding occupation of Arab territories, particularly the Golan region.
They highlighted Israel’s disregard for international resolutions and its aggressive actions, including targeting civilian infrastructure, which they condemned as serious breaches of international law and the United Nations Charter. The speaker accused Israel of hypocrisy in citing international principles while failing to adhere to resolutions concerning international legitimacy.
They held that Israel’s actions and ongoing occupation posed continuous risks to the Middle East’s stability and security, accusing Israeli forces of committing crimes against humanity and genocide. The Israeli delegate’s comments were roundly dismissed as lacking credibility and emanating from a hostile regime.
The summary’s language has been assessed and uses UK spelling and grammar. The text reflects the analysis accurately, including relevant details and long-tail keywords without compromising quality.
U
Ukraine
Speech speed
135 words per minute
Speech length
577 words
Speech time
256 secs
Report
At a formal presentation to the Chair, Ukraine began by expressing agreement with the European Union’s previously made statement, and then further elaborated in its capacity on the concerning escalation of hostile cyber operations targeting critical infrastructure sectors such as medical, water, energy, and sanitation services.
Ukraine has been the victim of persistent and extensive cyberattacks that have notably increased since the start of the full-scale invasion by Russia in 2022. These cyber offences are a strategic part of Russia’s broader tactics aimed at destabilising Ukrainian social, political, and economic foundations, causing disruption to electronic data and critical services, and influencing public opinion through disinformation.
The country highlighted a significant increase in cyber incidents with statistics from CRT-UA, citing an escalation from 1,374 attacks in 2021 to over 2,300 in the current year, 2023. Although there has been a slight decrease in the number of cyberattacks perpetrated by pro-Russian hacktivist groups, the overall trend remains one of high frequency and intensity.
Russian cyber warfare strategies are diverse, involving phishing, spreading of malicious software, DDoS attacks, and direct assaults on critical infrastructure systems, alongside cyberespionage and online disinformation campaigns intended to divide Ukrainian society. A notable cyberattack on Ukrainian telecom operator Kyivstar by a hacker group linked to Russian military intelligence caused significant communication disruptions affecting 24 million users.
However, the prompt and effective response of Ukrainian authorities ensured a quick restoration of services. In conclusion, Ukraine emphasised its dedication to international cooperation in cyber defence, participating in global initiatives like the International Counter-Ransomware Initiative and the Talon Mechanism to bolster cybersecurity against Russia’s hostile activities, especially towards civilian infrastructure.
Ukraine pressed on the need for international collaboration against cyber threats that compromise critical infrastructure, misappropriate sensitive data, and manipulate public opinion worldwide. Sharing information and maintaining open communication were stressed as crucial for understanding cyber threats and developing efficient counter-strategies.
This address by Ukraine demonstrates its keen awareness of the intricate and severe cyber threats it faces and its active role in international efforts to address these challenges. The significance of global solidarity and the exchange of intelligence in combatting the rising and evolving threat of cyber warfare was underscored.
V
Vietnam
Speech speed
135 words per minute
Speech length
532 words
Speech time
236 secs
Report
In a statement addressed to the Chair, the Vietnamese delegate fervently endorsed Ambassador Gaffer’s leadership and the progress made by the working group, accentuating the crucial role of cyberspace in nation building. Vietnam is actively improving its ICT framework, embracing the upcoming 4th Industrial Revolution, and focusing on digital transformation and enhancing e-government in pursuit of economic and societal enrichment and constancy.
While recognising artificial intelligence’s potential to foster advancement and global collaboration, the Vietnamese delegate also cited the substantial risks AI poses to international equilibrium, security, and national structures. Vietnam argued for the development of AI in strict conformity with international law, the United Nations Charter, and existing frameworks, emphasising responsible conduct in cyberspace.
Furthermore, Vietnam highlighted the critical need for stable global cyberspace norms and pointed to the United Nations’ vital role in creating an AI governance framework in alignment with sustainable development objectives, without jeopardising national sovereignty or security. The governance of AI was linked to the aim of cultivating an open, secure, resilient, and human-centric cyber ecosystem, prioritising individual welfare and progress while preserving the rights of individuals, organisations, and states.
AI’s integration into military and security areas introduces heightened capabilities and complexity. Vietnam noted the convergence of AI’s computational strength with communications networks like undersea and orbital systems, enhancing the capacity for identifying system weaknesses and developing advanced cyber weaponry, thereby complicating the threat environment, especially as AI influence escalates.
The Vietnamese delegation confirmed its support for employing AI in national security, disaster relief, and pandemic responses, stressing the need for global cooperation, algorithmic transparency, and the retention of human control over AI-driven processes. In conclusion, Vietnam reiterated its dedication to promoting United Nations-backed multilateral AI frameworks, balancing the technology’s benefits against its risks.
The delegate thanked the Chair and reiterated Vietnam’s commitment to collaborating and advancing in AI responsibly, guided by international consensus. The summary has been carefully checked for both grammatical accuracy and adherence to UK spelling and grammar. Any existing errors were amended to ensure a clear and precise reflection of the original statement as presented by the Vietnamese delegate, without losing the summary’s quality.
The adjusted text also includes relevant long-tail keywords to enhance its comprehensiveness and searchability.
Y
Yemen
Speech speed
121 words per minute
Speech length
635 words
Speech time
315 secs
Report
In responding to claims by the Israeli delegate, the Arab group’s representative contested the depiction of Israel as a victim, instead branding it as the aggressor in its conflict with the Palestinians. Over the past five months, the Arab representative claimed, Israeli forces have perpetrated acts tantamount to genocide and extreme violence against the Palestinian populace in Gaza and the West Bank, constituting international law violations and resulting in a humanitarian crisis.
They cited alarming figures—over 30,000 Palestinians killed, the majority being women and children, who comprise over 70% of the fatalities, and in excess of 70,000 injured. The representative lambasted Israel for denouncing the targeting of civilian infrastructures while purportedly committing similar offences.
This perceived hypocrisy, according to the Arab group, shows Israel decrying practices it allegedly engages in. The Arab spokesperson detailed how disruptions of water, energy, and communications by Israel have heightened Palestinian suffering, with the disconnection from networks and the internet creating pronounced challenges for medical services and obscuring the crisis’s severity from the global community—a breach of international law in the group’s assertion.
In addition, the delegate condemned the reported deliberate targeting of civilians by Israel during humanitarian assistance operations, emphasising the gravity of the alleged direct assaults on non-combatants. The representative charged Israel with propagating disinformation to skew international perception, urging it to halt the dissemination of purportedly unsubstantiated narratives within and beyond the UN.
Though the Arab delegate called for the Israeli side to focus on pertinent discussions within the OEWG rather than political and geopolitical disputes, they acknowledged the necessity of addressing those issues properly. Concluding, the Arab group’s delegate promised to bring the Gaza assaults to an appropriate forum and restated the Arab position: the formation of a Palestinian state based on the 1967 borders is crucial to the conflict’s resolution and the Palestinians’ right to self-determination—a stance supported by international consensus and seen as key to peace in the region.