Dedicated stakeholder session
6 Mar 2024 21:00h - 23:59h
Event report
Dedicated stakeholder session
Table of contents
Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.
Knowledge Graph of Debate
Session report
Full session report
OEWG session advances global cyber security with focus on confidence-building measures and international law application
The Open-Ended Working Group (OEWG) session on information and telecommunications in international security focused on several critical areas, including Confidence-Building Measures (CBMs), the application of international law to the use of Information and Communication Technologies (ICTs), capacity building, and the establishment of a global Points of Contact (POC) directory.
The session highlighted the importance of CBMs in fostering open dialogue and cooperation among states to prevent misunderstandings and reduce the risk of conflict resulting from cyber activities. The initial list of voluntary global CBMs was discussed, with an emphasis on operationalizing these measures through capacity building and the POC directory. There was a call for additional CBMs to be added to the list, focusing on transparency, cooperation, and stability to enhance ICT security and the peaceful use of cyberspace.
A significant milestone was the adoption of a common African Union position on the application of international law in cyberspace, demonstrating the possibility of achieving consensus among a large group of countries. The session saw cross-regional statements and national positions that built common understandings and showed progress in discussions on international law, including International Humanitarian Law (IHL), in the context of ICTs.
The establishment of the global POC directory was recognized as a key confidence-building measure at the global scale. The directory is expected to facilitate the application of other global CBMs, promote resilient and peaceful cyberspace, and support rapid crisis management and information sharing during cyber incidents. As of the session, 23 countries had nominated their POCs, with more expected to join.
The role of regional organizations in elaborating and implementing cyber CBMs was acknowledged, with the Organization of American States (OAS) cited as an example of successful regional cooperation. The OAS’s work on cyber diplomacy, including the designation of national POCs, was commended.
Capacity building was identified as a complementary aspect to CBMs, with a strategy needed to coordinate work with regional and sub-regional organizations. The involvement of multiple stakeholders, including academia, the private sector, civil society, and technical communities, was encouraged to leverage their experience and knowledge in implementing CBMs.
The session concluded with a recognition that building confidence is a long-term commitment that requires multilevel and multistakeholder engagement. The OEWG’s work on CBMs was seen as a continuation of the tradition of fostering cooperation, dialogue, and exchange of experiences to contribute to a secure and stable cyberspace. The session adjourned with plans to continue the discussion on the following day.
Session transcript
Chair:
And in accordance with the agreed modalities for the participation of stakeholders that we agreed to in April 2022, it’s my honor now to convene the dedicated stakeholder session. And as I said earlier this afternoon before we adjourned, I’d like to give stakeholders each an opportunity to make their statement within three minutes. And I kindly seek their understanding and cooperation. And I also invite them to make their statements available so that we can put it on the website and all delegations can have the benefit of the fuller intervention to understand the positions and contributions made by stakeholders. I have before me a list of stakeholders who have inscribed to speak. We have a list of 10 stakeholders, and we’ll give each one of them an opportunity, one at a time. So I start with the Center of Excellence for National Security, RSIS, National Technological University of Singapore, to be followed by Hitachi America. Center for Excellence of RSIS, you have the floor, please.
Center for Excellence of RSIS:
Thank you, Chair, for the opportunity to speak to the seventh substantive session of the Open-Ended Working Group. We also thank the Chair for continuing to hear input from all stakeholders, including those that have not been accredited at your virtual informal dialogue last week. And we hope that the useful stakeholder views that were shared with the Chair at the virtual informal dialogue can be shared with the wider OEWG as the Chair’s paper. We will make the following points based on the ongoing discussions this week, our experiences in capacity building in ASEAN with the UN-Singapore Cyber Fellowship, as well as other projects as a policy research think tank in Singapore. From the discussions this week, we agree that confidence-building measures are more important than ever. We agree with the Chair that these meetings are a form of CBM because of information sharing and greater transparency. And we’ve observed from these discussions that there are two areas where greater confidence needs to be built. One, critical information infrastructure or CII protection, and two, artificial intelligence AI threats vis-Ã -vis the use of ICTs. So first, for CII protection, we recommend engaging stakeholders like CII operators and practitioners. Compared to our work in assisting the review of Singapore’s Operational Technology Cyber Security Master Plan, we’ve observed the paucity of CII protection practitioners or operators at the OEWG formal and informal sessions. We know some states do engage their operators or practitioners domestically, but we recommend engaging them at a global level so the OEWG can benefit from concretely understanding the threats they are facing, then develop relevant, actionable and sustainable responses. Therefore, academic stakeholders like us are ready to help facilitate study groups or panels for states and CII operators on CII protection. The objectives can include capacity building for technical and policy experts, exchanging information on existing and potential threats to CII, and we believe this will be relevant to the agreements in the Second Annual Progress Report. paragraphs 12, 13, 17, and 23C. We also invite states to involve their CII operators and practitioners in the discussions at OEWG, the Global Roundtable on Capacity Building upcoming, and intersessional meetings in May, as this can benefit all. Secondly, for artificial intelligence, we recommend engaging relevant experts as well. We agree with Switzerland’s assessment that AI should be viewed in a balanced manner because it brings opportunities for developments and improvements in security, as well as threats. We echo Argentina’s call for a multi-stakeholder study group to help better understand the threat and opportunities in a balanced manner. Therefore, academic stakeholders like us are again ready to help facilitate study groups or panels for states and AI experts on the role of responsible state behavior in responding to artificial intelligence and other emerging technologies, like quantum. From my experience working with AI experts in AI governance projects in Singapore and in AI standard setting with ISO, we suggest there are three aspects where experts can help with capacity building for smaller states. One, cyber threats to AI system. Two, cyber and information threats enabled or enhanced by AI. And three, what might constitute responsible state behavior in respect of these threats? In conclusion, we, as part of the stakeholder community, reiterate that we are ready to collaborate with interested states and stakeholders regardless of accreditation status to help the OEWG deepen understandings and make informed decisions on the rapidly evolving threat landscape. We invite states and stakeholders to work together as a matter of priority, and we are here all week. We hope to engage with you. Thank you, Chair.
Chair:
Thank you very much, Center of Excellence for National Security, RSIS, from Singapore. I give the floor now to Hitachi America to be followed by Youth for Privacy.
Hitachi America:
Thank you, Mr. Chair, for continuous and inclusive stakeholder engagement with states. I’m honored to be here. First, new emerging technologies such as AI and quantum computing can be used positively or negatively. We need threat measures and risk assessment based on the human life’s impacts. For practical implementation against the supply chain and ransomware attacks, stakeholders can contribute protection solutions and tools working with the states, addressing the critical infrastructure by-product and the sector, addressing threat lifecycle, including backdoor detection, data integrity, emergency response, remediation, and improvements. Second, the draft checklist with 11 norms is very comprehensive and actionable to start with. Additional norms to consider includes continuous technology impacts to human lives and risks regardless of peace or wartime in such sector as healthcare, energy, and water. Thank you, a group of 13 countries, for sharing the working paper on application of international humanitarian law on March the 1st. to clarify IHL positive position further. Third, another suggestion on norm checklist is to clarify capacity building, spelling out. First, timely disclosure versus remediation, since automated threats can be exploited right after disclosure, which is related with the norm I and J. Second, coordination with regulation and compliance beyond the jurisdictions through international standard and certification in norm I. Fourth, about the capacity building, the best practice to protect critical infrastructure includes security by design and the default, zero trust architecture in every component of digitized supply chain from end to end, including hardware, software, firmware, IOT chips, and the cloud, data, human in the loop. Suppliers include small and medium-sized companies and the customers and the citizens. Finally, public-private collaboration, such as global round table is a great step up. Peace, safe, and resilient environment can be accomplished by working together with the trust. And supplemented by positive use of technology such as AI for civilization. Thank you, Mr. Chair.
Chair:
Thank you very much, Hitachi Marike, for your contribution. I give the floor now to Youth for Privacy to be followed by excellent safe PC solutions.
Youth for Privacy:
Dear Chair, Youth for Privacy is glad to be at the Open-Ended Work Group on ICTs today. Ever since we participated in the third Open-Ended Work Group, our organization has sought to present youth perspectives in these conversations on making the internet safe and secure for all. For our intervention today, we seek to highlight three points. First, the cybersecurity threats that we… we’re discussing today, are already affecting the most vulnerable, especially the youth. Young people like us might be familiar with the internet and use it the most. Yet, that also opens up us to be vulnerable to ransomware, deepfakes, and other attack vectors. Just consider the case of deepfakes. For young people going to school right now, there is a real possibility that your classmates might be making deepfake explicit images of you that are spread across group chats. These types of technologies, augmented with AI, are not limited to state sponsors’ behaviors. They already affect us all. It is with the importance of the youth perspective that we move on to our second point. Regarding the proposed permanent mechanism for ICT security, we recommend a possible area of thematic interest, youth. It goes without saying why we, as an organization called Youth for Privacy, care about this topic. Having a youth-focused thematic dialogue as part of the permanent mechanism will ensure that youth perspectives are systematically reflected. Finally, regarding capacity building, we highlight the need for educational programs that equip young people with the skills necessary to participate in and contribute to the digital economy safely and effectively. These programs should focus on cybersecurity, data privacy, and ethical considerations in the use of ICTs. In conclusion, incorporating youth perspectives in the guiding principles for the use of ICTs is not only beneficial, but essential for creating a secure, inclusive, and prosperous digital future. We urge all delegates to consider the voices of young individuals in your deliberations and to recognize their potential as partners in shaping the digital world. Thank you for your time.
Chair:
Thank you very much, Youth for Privacy. I agree with you that we certainly need to engage the voices of the young people in this process. Really appreciate your engagement and contribution. I give now the floor to Excellent, Safe PC Solutions, to be followed by Chatham House.
Safepc Solutions:
Thank you, Mr. Chairman, for giving me the opportunity to speak. speak, and to express my sincere and growing appreciation for giving the private sector stakeholders such as Safe PC Solutions the opportunity to share my feedback on some of the revised critical questions that you are asking. Are there any new developments or trends in existing and potential ICT threats which the OEWG should discuss in depth? In terms of new developments, we are currently implementing AI rapidly in 2024, be it Microsoft 365 Copilot Solution or READ.AI, which integrates with both Microsoft 365 and Google Workspace, as well as Google has come out with Gemini. During these implementations, the most important questions that CIOs and CISOs are asking us is governance as it relates to the security policies such as conditional access within these organizations because of the usage within AI. I want to emphasize AI is here, and it is not going anywhere. And we need to begin digging deeper in terms of the policies around that. The other question that you asked that was very important that we’re facing in the IT industry, of course, is supply chain. What are specific ways in which states can further strengthen cooperation to ensure the integrity of the supply chain and prevent the use of harmful hidden functions? Are there existing programs, policies that help promote the adoption of good practices by suppliers and vendors of ICT equipment and systems? Safe PC Solutions is currently researching and writing a white paper on how to identify risk in the supply chain of hardware and software. And we are rapidly doing the research due to the increased usage within AI. So in order for us to effectively identify risk in the supply chain hardware and software, we have developed a systematic process. And these key elements involve mapping the supply chain comprehensively, assessing the threat landscape, evaluating the likely impact of a risk scenario, prioritizing critical risk and developing mitigation strategies, and monitoring and reviewing the effectiveness of the risk management process. I would like to reiterate your suggestion that we need to collaborate with other stakeholders and produce a working paper on developing IT security risk and how supply chain within the ICT can assist with risk mitigation and possibly conduct a workshop to build a toolkit for UN member states. We have already started to partner with RightPilot to give us perspective on member states from the Middle East, but I open this up to other member states, I open this up to other stakeholders as well. Thank you so much.
Chair:
Thank you very much. SafePC, solutions for your contribution and also for your invitation extended to member states as well as to other stakeholders, I wish you all the best in your collaborative project. I give now the floor to Chatham House to be followed by Diplo Foundation.
Chatham House:
Thank you, Mr. Chair, for the opportunity to make a statement today. As many delegates have already articulated, the distinction between cybercrime and state-sponsored cyberattacks can be difficult to ascertain. Cybercrimes are rising to the level of national or international security risk or threat, and cybercriminal groups are working with state actors to deploy cyberattacks. Additionally, states sometimes overlook cybercriminal activity originating from their territories. This complexity is compounded by the commercialization and proliferation of high-end cyber capabilities and by the wide range of targets that are vulnerable to cyberattacks, whether politically or criminally motivated. Looking at critical infrastructure, for instance, the perpetrators of attacks on CI are not limited to states. As such, discussions on how to address these threats cannot be limited to forums which consider exclusively threats emanating from states. Another area of concern is the proliferation of commercial cyber intrusion tools. Recent efforts to build international collaboration on dealing with this problem, such as the Palmao process, are welcome and promising. Again, this is an area where the threats do not solely emanate from or affect states. Both CI and commercial intrusion tools are important parts of our discussion in this forum. They are also frequently discussed in the AHC process to develop a cybercrime convention. As AHC negotiations will likely continue into the summer, connecting various processes can lead to positive progress and coherence on how states and non-states can work together to deal with these issues. Many organizations are doing important work on connecting these forums and building the capacity and capability of stakeholders to contribute constructively to the shared goal of a peaceful cyberspace. For example, Chatham House co-drafted a paper with UNIDIR on understanding the intersections between ICTs, international security, and cybercrime, which we would, of course, recommend you read. Additionally, Chatham House is undertaking research on all of the issues I have mentioned previously. We have and continue to undertake research on the cybersecurity of nuclear infrastructure, for example. In collaboration with the Royal United Services Institute and with support from the UK Foreign Commonwealth and Development Office, we are undertaking research on what behaviors and values make the proliferation of commercial cyber intrusion tools possible and what efforts might be appropriate to curb this proliferation. And with support from the Netherlands, we are conducting research on how to operationalize the 10 Cyber Capacity Building Principles with a view to further advancing the framework for responsible state behavior in cyberspace. We hosted a consultation this morning, which we were grateful for your presence at, which gathered important insights, and we look forward to presenting this research in July later this year. Such research is an important form of capacity building as it builds our collective understanding of the intricacies of these matters. To conclude, threat perception, detection, and response are changing. Cybercrimes impact national and international security, and it is insufficient to conceive of it purely through a crime paradigm. So we encourage states to consider the importance of cross-pollination and coherence between various cyber processes, and to continue to underscore the importance of capacity building in ensuring broad and diverse participation and contributions to these discussions. Thank you, Mr. Chair.
Chair:
Thank you very much, Chetum House, for your contribution. Diplo Foundation, to be followed by Access Now.
Diplo Foundation:
Mr. Chair, distinguished delegates and colleagues, my name is Vladimir Radunovic. I represent Diplo Foundation, a non-profit educational organization supporting small and developing countries, as well as various stakeholders in industry and civil society through capacity building in cyber diplomacy, cyber security, and internet governance topics for about 20 years. Mr. Chair, we would like to reflect on some elements of the ongoing discussions in the Open Annual Working Group. In terms of the norms implementation checklist outlined in the second annual progress report, we suggest such a checklist to map the roles and responsibilities of both state and non-state stakeholders. The Geneva Manual, the most recent output of the Geneva Dialogue on Responsible Behavior in Cyberspace, established by Switzerland and led by Diplo Foundation, outlines roles that the industry, technical and open source community, civil society, customers, and users play in implementing the UN norms ING. These norms relate to the security of the ICT supply chains and the responsible reporting of vulnerabilities. Our further work, through an open dialogue with over 50 representatives of stakeholders and independent experts around the world, intends to map such roles and responsibilities related to the protection of critical infrastructure. Importantly, the findings also outline mutual expectations that stakeholders have from each other as well as from the public authorities to be able to fulfill their roles. We invite delegates to consult the Geneva Manual, also available on the Open Annual Working Group website, and encourage stakeholders to contribute to the Geneva Dialogue. In terms of capacity building, we commend the convening of a dedicated global roundtable on ICT security capacity building and the opportunity for all stakeholders to contribute to this important dialogue. We invite delegations to involve representatives of local and regional capacity building organizations and other relevant stakeholders whose contributions are essential for putting the principles defined by the Open Annual Working Group into practice and ensure capacity building is inclusive, holistic and neutral. Diplo Foundation has submitted its contribution to the mapping exercise and remains committed to supporting capacity building efforts, including at the upcoming global roundtable. Thank you for this opportunity, Mr. Chair.
Access Now:
Thank you for the opportunity to present our viewpoints and add to the significant expertise of this body, thanks to these regularly convened meetings. In 2024, we face a global context where the attack surface for cyber operations has increased, given the rapid, if far too unequal, digitization of our societies. The effects of malicious cyber attacks are also more significant from spyware and the targeted hack-by-hire operations that so many human rights defenders and journalists face to systemic efforts that target processes and institutions crucial to voting in this year of elections. We urge you to recognize the intersectional harms caused by malicious cyber threats. As we celebrate International Women’s Day later this week, we draw your attention to our most recent report on Pegasus spyware attacks published last month, which showed more than 35 people in civil society attacked, including a founder of a civil society organization aimed at empowering women in politics and an award-winning human rights lawyer who works to defend women’s rights, workers’ rights, and the freedoms of opinion, expression, and peaceful assembly. Such unlawful, targeted surveillance is made possible by the organized for-profit exploitation of cyber vulnerabilities in the global spyware industry. This constitutes a form of violence against women. We therefore urge the OEWG to explicitly name cyber mercenaries in the hack-for-hire industry generally, and spyware developers and operators in particular, as a key and existing and potential threat in its 2024 reporting, which all states are under an obligation to take. We need to recognize that the global hack-for-hire industry constitutes a threat to the stability of the Internet as a whole. We take note of the draft checklist prepared by the Chair and welcome efforts to responsibly advance upon the international consensus of past OEWGs. We draw your attention in particular to Norm E and Norm J on human rights and responsible reporting. In Norm E, we point to the insightful guiding question around what global or regional processes exist to address human rights. In this regard, we’re glad the Chair’s draft explicitly recognizes consensus principles advanced by the UN itself at the Human Rights Council and its resolutions on human rights on the Internet and right to privacy in a digital age. We recommend the checklist include a clear guiding question to states on how they implement these recommendations, and also look at the recommendations advanced by the Freedom Online Coalition’s 2014 Working Group on Cybersecurity. Norm J recognizes the importance of legal frameworks and protocols to enable reporting of vulnerabilities, as well as the need to protect researchers and penetration testers. This is how we form good-faith cybersecurity research. Finally, we invite you all to open accessible spaces, and those open to civil society as well as the private sector, such as our RightsCon Summit Series, which will next convene in East Asia in February 2025. These open discussions are a confidence-building measure. Thank you.
Chair:
Thank you very much, AccessNow, for your contribution. Center for International Law, to be followed by Nuclear Age Peace Foundation.
Center for International Law:
On behalf of the Center for International Law, we thank the Chair for this opportunity to engage in the discussions of the OEWG. The application of international law to the use of ICT by states and understanding how existing international law applies to cyberspace is critical in moving towards a shared understanding and ultimately to maintaining peace, security, and stability in the ICT environment. Converging on a common understanding of how international law applies will also illuminate gaps in the existing legal frameworks, if any, and how they may be addressed. Statements of national positions and interventions on international law in the OEWG thus far have reflected areas of consensus, such as the applicability of the UN Charter, as well as principles such as the use of force and the principle of non-intervention. These statements, as well as statements on how international law applies in the cyberspace, have been valuable in scoping the legal analysis and the landscape, both for what they say as well as for what they do not say, and signposting where my dialogue is needed. Turning to the question of emerging technologies, it is unsurprising that AI has featured predominantly in the discussions so far, given its transformative and disruptive nature, with both positive and negative effects. What does international law say about the deployment of AI of ICTs? International law is technology neutral, and as such already applies to scenarios involving the use of AI technologies. States are already bound by the existing treaties, customary law, as well as general principles of law. For instance, the principle of non-intervention requires states not to interfere in the internal or external affairs. This broad principle applies regardless of the means and methods used. Nonetheless, while principles of rules or principles are sufficiently general and flexible to respond to new technological developments, are there nonetheless unique features which require distinctions in how the law applies? How does the nature of AI technologies, particularly autonomous and generative AI, affect legal analysis, legal evidence collection and analysis, as well as legal attribution? How does the nature of AI affect the expected conduct of states to prevent or mitigate AI-enabled malicious cyber operations? This requires a thorough appreciation of the unique features of AI technologies, and unnecessarily requires a multidisciplinary and multistakeholder engagement to understand and better appreciate the unique specificities. In the discussions this week on potential existing threats, several delegations have also cited misinformation and disinformation cyber operations. Stakeholders can play an important role in catalyzing discussions of such emergent concerns. In this regard, the Center, the CIL, is supporting the American University, Washington College of Law, in partnership with other institutions, in convening the Third Annual Symposium on Cyber and International Law, with the specific theme of cyber and information conflict, the international law implications of convergence. Recent history has demonstrated that the advance of cyberspace has enabled and evolved the realm of information conflict with the attendant convergence of cyber and information operations. The symposium seeks to explore the implications of this trend, which raises critical questions across the spectrum of war and peace, including, among others, the law state responsibility and international human rights. We leave the rest of the statement for delegations to read, and thank you, Chair, for this opportunity to address. Thank you.
Chair:
Thank you very much, Center for International Law. I give the floor now to the Nuclear Age Peace Foundation.
Nuclear Age Peace Foundation:
Chair and distinguished delegates, my name is Stella Rose, and I’m a representative of the Nuclear Age Peace Foundation and youth advisor for Reverse the Trend, a youth initiative of our organization. I’m highly concerned about the continued evolution of ICTs and the possibility of cyber attacks of command and control systems for nuclear weapons. The OEWG must consider and examine the application of the UN Charter and international humanitarian law to the possibility of use of ICTs during armed conflicts. We must strive for a shared emphasis on the application of the tenets of international humanitarian law, including the distinction between civilians and combatants, the prohibition to attack those not directly engaged in hostilities, proportionality, and the prohibition to inflict unnecessary suffering. When ICT networks are the targets of cyber warfare, the vulnerabilities of security networks, hospitals, schools, water and electricity infrastructure are exploited to threaten civilian lives. Chair and distinguished delegates, in the nuclear age, cybersecurity is critical, not just for the sake of right to privacy, but for the safeguards of our weapon systems. In this regard, we cannot afford a misstep. The threat of nuclear war is subject to the sophistication of security systems that protect weapon softwares from hacking. These systems are fallible. Softwares for the most sophisticated institutions have endured continued breaches, relying on luck to prevent accidental nuclear weapon launches is a strategy which continually threatens our existence. For the sake of the greater good, we need to approach this challenge with vigilance, accountability, and transparency. Chair and distinguished delegates, as we further examine the importance of international humanitarian law within the cyber domain, the international community needs to take into account the views of young people. Young people, including myself, have grown up in the digital age and have unique skills that can help strengthen our common goal of creating a secure ICTs environment. In this regard, we are requesting that the global POC directory should include young people who have expertise and are deeply concerned about the potential malicious use of ICTs in armed conflicts. Furthermore, we are proposing capacity building efforts that allow for young people to be involved in enhancing and facilitating a broader understanding and analysis of ICTs challenges. Our inclusion and expertise will ensure a safer future that we will ultimately inherit. Only by working together can we create a better world, one that keeps humanity safe from existential threats and technological harm in times of war. Thank you.
Chair:
Thank you very much, Nuclear AHP’s Foundation, for your contribution. I give the floor now to the National Association for International Information Security.
National Association for International Information Security:
Mr. Chairman, thank you. The application of voluntary norms of responsible behavior on the part of states in the ICT environment includes very important points. We need to understand the interpretation of the norms on ICTs in order to expand the international regulatory system on ICTs. To implement the norms of state responsible behavior, we must create an appropriate international framework which establishes the elements of the international system and also includes bases for the conduct of international relations regulated under national laws. That can be applied in the framework of a convention on international information security, and that can help relations on ICTs and global data relations, a new space of international cooperation. It will be interesting in this context to discuss the regulation of situations in which there are disputes over ICTs, and the annual report indicates that non-binding norms allow the international community to evaluate the activities of states. Let us recall that in resolution 7323 of the General Assembly, an ICT activity being launched onto a territory is not sufficient in itself to call for action by that state. The illicit acts against states must be regulated, including in the context of problems of attribution and the nature of consequences. It is obvious that fundamental problems and the application of the rules having to do ICT responsible behavior of states include an assessment by states of those episodes, otherwise there will be no contribution to international peace and security. security. Artificial intelligence needs to be considered as well under ICTs. Important tasks for the international community ensures the responsible use of ICTs. This must be considered in the context. Thank you.
Chair:
Thank you very much, National Association for International Information Security for your contribution. I give the floor now to Paris Peace Forum.
Paris Peace Forum:
Thank you, Mr. Chair, distinguished delegates, Mr. Chair, allow me to first join my fellow stakeholders to reiterate our appreciation for your sustained efforts to ensure the participation of all interested stakeholders in the work of this open-ended working group during and outside the substantive session. We would like to focus our intervention on the commercial proliferation of cyber-intrusive and disruptive cyber capabilities and possible useful steps that states could undertake in the short term, which will actually build on remarks made by my colleagues from Chatham House and Access Now. Many delegations have acknowledged the worrying proliferation of intrusive and disruptive cyber capabilities on both underground and semi-regulated commercial markets, where they can be mobilized by malicious actors to conduct unlawful actions that may threaten international peace and security. Such a trend is empowering a growing threat landscape, both by increasing the number of threat actors across the globe and by complexifying the modalities of cyber attacks. On this important matter, the Paris Peace Forum wishes to commend the 25 states that united at the invitation of France and the United Kingdom last month with members of the stakeholder community to launch the Palmar process to tackle proliferation and irresponsible use of commercial cyber-intrusion capabilities. Such initiatives help draw in common understandings among participating states and can, in due course, inform the work of the OAWG by providing additional guidance for the implementation of the International Framework of Responsible State Behaviour and significantly norms I and J. In the framework of the OAWG and in line with your guiding questions, Mr. Chair, for the agenda items related to rules, norms, and principles, we would like to encourage states to share national positions on what they consider being a responsible use of commercially available intrusive and disruptive cyber tools, as well as to hackers available for hire. Such information would play a major role in strengthening cooperation to ensure the integrity of the supply chain and preventing the use of harmful hidden functions. From an international peace and security perspective, it would further clarify national doctrines in the recourse to cyber proxies, limit risks of misunderstanding, and contribute to avoiding unwanted escalation. I will finally mention that in line with Principle 5 of the Paris Call for Trust and Security in Cyberspace, the Paris Peace Forum will reconvene the Paris School Working Groups on Cyber Mercenaries and its network of expert stakeholders to focus on concrete use cases of responsible recourse to such technologies and services, as to inform state efforts in developing clear guidelines in this regard, in close cooperation with relevant intergovernmental processes and initiatives, and building on the outcomes that member states can read in the blueprint that you may find online. Thank you very much, Mr. Chair.
Chair:
Thank you very much, Paris Peace Forum. That was the last inscribed speaker from the stakeholder community. And I want to take this opportunity once again to thank all the contributions from the stakeholder representatives here today for your very thoughtful contributions. And I hope also that member states have listened carefully to your contributions. And I would encourage member states to also reach out to you, to each one of you, to discuss the issues that are before the working group, and see how you can also work together collaboratively, member states and the stakeholder community, in order to find common ground and take concrete steps forward. And of course, within the stakeholder community, I also would encourage you to work collaboratively with each other and put forward your ideas in a way that could feed into our work. And I find this ongoing discussion to be a very useful discussion. But more importantly, I think that the discussion and dialogue with the stakeholder community is here to stay as part of this process. And of course, as we think of a future mechanism, we have to see how we can not only maintain this aspect of the working group, but how we can make it better. So those are some comments that I wanted to share with you with regard to the stakeholder community session we have just had. Now it’s my intention to proceed to the discussion of the section on international law that we had started earlier this morning. And let me look at the speaker’s list from this morning. So we’ll continue with the speaker’s list and see how far we can go. We’ll start with Canada, to be followed by Germany. I’m not imposing time limits on member states. But once again, I ask member states making interventions on international law. law. To the extent possible, summarize your ideas, and feel free to circulate your more detailed statement to us, to the Secretariat, and we’ll put it on the website so it’s there for the record, but also it’s there for everyone to access and read. So, Canada, to be followed by Germany.
Canada:
Chair, Canada is pleased to speak to the topic of international law, an essential topic in our OEWG’s mandate. If you’ll allow me, Chair, two words. Momentum. Progress. Our OEWG’s momentum and progress on international law, in line with Resolution 75-240 and our past annual progress reports, should be captured in this year’s APR. This momentum and progress must be continued and reinforced for the remaining 15 months of our mandate. Our 2024 APR should record the increased quantity and quality of dialogue and exchange on international law amongst a growing number of Member States and members of the stakeholder community. Chair, we reaffirm here, but won’t reiterate, Canada’s views on the applicability of international law in cyberspace, which are well known, nor the growing consensus amongst Member States on elements of international law as captured in past reports. Similarly, we affirm, but won’t repeat here, our responses from December to your guiding questions, which we continue to see as very helpful and relevant. Nor, Chair, will we repeat our metaphor of building a birchbark canoe. Chair, more and more Member States are participating in our discussions on international law, in our open-ended working group, in numerous capacity-building activities, side events, and other discussions outside of the formal OEWG sessions. but which support our mandate and work. There are growing examples of cross-regional dialogue, exchanges, capacity building, and joint statements on international law, which as you have often noted, is necessary for our OEWG’s consensus and a confidence-building measure in itself. In that spirit, Canada aligns itself with the cross-regional joint statement on international law presented earlier today by Columbia. Canada is proud to support the cross-regional joint statement on internationally humanitarian law presented today by Senegal. IHL is clearly a topic that merits further focus in our APR and our ongoing work. And more states are publicly expressing their views through national statements, most recently, Czechia, and we congratulate them. Chair, Canada echoes the congratulations from others and commends the African Union and its member states on the development of their common African position, adopted by their Peace and Security Council, endorsed by their leaders at their summit last month in Addis Ababa. With one voice, Africa has made an enormous contribution to our OEWG’s work and dialogue on international law and cyberspace. Canada is honored to have been a partner in this process, supporting training for African officials and for their consultations at Addis Ababa and New York last year. In reviewing the common African position, Canada has identified many points of convergence with those put forward by a range of member states from many regions. This includes important affirmations on the importance of peaceful settlement of disputes, the applicability of international human rights law and of international humanitarian law, to name just a few. Canada, like others, is interested in. in learning more about the proposal in the Common African position for a possible UN General Assembly declaration on the application of international law in cyberspace. Chair, Canada expects the process that developed the Common African position may serve as a model and inspiration for other regions and sub-regions in developing their positions, and Canada stands ready to share our own experiences in support. For this year’s APR text, we suggest that references to national positions on international law be modified to national, regional, or sub-regional positions as appropriate. Chair, on your question of scenario-based discussions, we can only echo the chorus today of positive responses from all regions of the world, another point of consensus for our report section on international law and our ongoing work. The UNIDIR workshop last fall and several side events organized by cross-regional groups of member states, including this week, demonstrate the value of scenario-based discussions on select topics of international law and the significant appetite for such activities. Canada commends UNIDIR for its ongoing work on international law in support of our OEWG mandate, including continued capacity-building activities in the form of training workshops and structured support for the development of national, regional, and sub-regional positions on international law. We commend as well the ongoing work of the Organization of American States, cited earlier today by the representative of Chile. Chair, our OEWG’s commitment to focused discussion on select international law topics has proven very fruitful. We must continue this approach for the balance of our mandate. For our intersessionals in May, we would ideally devote two days to discussion of select international law topics. briefings by experts and group work on scenarios. If not possible in May, we should aim to program this later in the year or in 2025. We recognize the challenge for the current structure of the OEWG to provide for the more focused discussions on critical issues like international law, but we need these more focused discussions. Indeed, this challenge points to the essential need to build an action-oriented process with the capacity to develop topics in subgroups to study issues in details as part of a permanent follow-on mechanism to this OEWG, as foreseen in the proposal for a program of action. Chair, it goes without saying that capacity-building activities on international law and cyberspace should continue through the end of the mandate of this OEWG and beyond. In echoing Kenya, these activities should continue to be based on the needs identified by Member States and their own officials. Canada will continue to fund and support training courses for officials from Member States and to share our experiences on request, and we encourage all Member States to engage further in capacity-building activities on international law, which we have found to be mutually beneficial. Looking to the future, Canada believes that our OEWG’s APR this year and our final report next year can reflect the momentum and the progress on international law and the steady growth of our common understandings on the application of international law in cyberspace. And looking beyond our OEWG, dialogue on international law and accompanying capacity-building will certainly need to continue to be an important part of ongoing work at the UN. In this regard, the establishment of a program of action will enable us to maintain the momentum and progress on international law we have together created here in our OEWG. Thank you.
Chair:
Thank you very much, Canada, for your contribution and also for your reference to the Birchbark canoe. I am happy to note that the canoe is still afloat because we are all collectively in that canoe. So we have a responsibility to keep paddling and to move forward and not hit the rocks. So this is one of those discussions, international law, which has been a very challenging one right from the beginning. But you are right that we are getting deeper and deeper into the discussions and there is also different national positions that are being put forward and also sub-regional as well as regional positions in the form of the AU position, which really has given us a lot of material to reflect on, to look for commonalities and see how we can continue this discussion in a way that will contribute to our work in other aspects of the mandate. So once again thank you not only to Canada but to all of you because unbeknownst to all of you we are all in a very fragile canoe and I have said that we cannot take for granted the turbulent waters that we are navigating and so the canoe remains a useful metaphor for us. Who is next? Germany to be followed by Uruguay.
Germany:
Thank you Chair. Germany is in full alignment with the statement of the European Union and wishes to add the following remarks in its national capacity. Germany reaffirms its commitment to further advance the OEWG’s understanding on the outstanding issues on the application of international law and cyberspace. We therefore very much welcome deepening our exchanges under this agenda item today and during the dedicated discussions in the upcoming informal meeting. meeting in May. Leading this discussion here at the UN remains tremendously important because we strongly believe that the security risks of the cyber domain require a clearly defined joint understanding by all UN member states on the application of international law in cyberspace. Looking back at the discussions in this group so far, Jeremy notes an increasing convergence of states’ positions on the application of several key principles of international law, including adherence to the UN Charter, the sovereignty of states, the principle of non-intervention, and the prohibition of the use of force. These convergences, which are clearly evident in the respective statements of states, underscore a collective movement towards a consensus on the fundamental elements of the application of international law to the use of ICTs. The growing convergence of positions can also be seen in the many valuable contributions to the debate that have been published since the last session of the OEWG, and Germany would like to compliment the Czech Republic for having published their first national position paper last week. Germany would also like to commend the African Union for its recently published Common African position on the application of international law in cyberspace, which is an important step in broadening the discussion on the critical issue. With 55 states expressing their views on the application of international law in cyberspace is a decisive step towards clarifying the opinio juris of states in the field of international cyber law. Moreover, the work of the African Union in this regard demonstrates once again the important role that regional organizations such as the AU play in the work on cyber issues, including at the global level. It further underscores the importance of harnessing the regional experience at the UN level in our work within the OEWG. ongoing use of cyber means in international conflict. It is also important to further explore the rules of international humanitarian law in cyberspace. We see some progress in finding common understanding of the legal status quo in this area as well. As highlighted in the statement by our colleague from Senegal earlier, 13 states including Germany jointly submitted a working paper on the application of international humanitarian law to the use of ICTs in situations of armed conflicts. This is just one example showing that there is broad cross-regional acceptance of the position that international humanitarian law and its core principles are fully applicable to the use of ICTs. Additionally, Germany agrees with other states that scenario-based discussions also provide a pragmatic way to deepen our understanding of the application of international law in cyberspace and to build important national capacity in this regard. In our view, such scenario-based discussions could be held on the margins of a formal or informal working session of the OEWG. Germany had an excellent experience with this mode of implementation in the informal working group format within the OSCE. Lessons learned from the UNIDIR initiative titled application of international law to the behavior of states in the use of ICTs and other initiatives could also be utilized in such a format. While we have seen remarkable progress in the clarification of international law on the use of ICTs in the course of this working group, we believe that the issue deserves even more attention. In this regard, Germany would welcome the opportunity within the OEWG to facilitate a broader and more substantive discussion on this topic. For example, one of the next sessions of the OEWG could have an explicit thematic focus on the area of international law. Finally, Germany would like to reiterate the important work of civil society actors in shaping international law in the cyber domain. participation in this debate enormously enriches the discourse on international law in the cyber domain. Thank you, Chair.
Chair:
Thank you very much. Germany, Uruguay, to be followed by Vietnam.
Uruguay:
Thank you, Mr. Chairman. Uruguay joins in the statement made by Colombia on behalf of a group of countries. I take this opportunity to thank all delegations participating in the event which took place this morning together with Australia and the Philippines on the application of international law in various scenarios. First of all, we wish to highlight the report by UNIDIR on international law and the conduct of states on ICTs, which summarizes the conversations of 15 November 2023 in Geneva, where once again we recognize the importance of the principles of sovereignty, noninterference, prohibition of the use or threat of use of force, and peaceful settlement of disputes, which my country supports and promotes multilaterally. These principles, together with good faith in relations among countries, are central to the maintenance of international peace and security. Uruguay also understands that the obligation to preserve the confidentiality and protect information with a focus on the human rights of the individual must guide the actions of states. Mr. Chairman, Uruguay has a broad normative framework on cybersecurity, which include activities by our CERT and the protection of data of individuals. For my country, it is essential to make progress at the national as well as multilateral levels with regard to protecting the individual in the cyber domain. Uruguay believes that the The protection of human rights and fundamental freedoms must direct our discussions on this pillar. We also believe that international humanitarian law applies to cyber activities in armed conflict. And in this framework, we reaffirm once again the importance of the peaceful settlement of disputes in accordance with the mechanisms in the UN Charter. In this regard, we welcome Norm F, which states that no state should conduct ICT activities which run counter to the obligations entered under international law, especially as regards impacts on critical infrastructure. Mr. Chairman, on the formal work being done by the Working Group in this segment, my delegation supports organizing exchanges on international law with experts on the subject. We hope that there will be discussion groups based on possible scenarios – several delegations have referred to this today – that we can face as an international community given the malicious use of ICTs. And this has been expressed in – this was expressed in our statement by the distinguished colleague from Colombia. We trust that you, Mr. Chairman, will coordinate this type of forum when you deem it relevant. We also reaffirm the importance of including in a future permanent mechanism groups, capacity-building groups relating to international law, as well as the organization of training which may be conducted by UNIDIR, taking into account the mapping exercise which has already taken place and the complementarity with regional bodies which also vie for a more secure ICT environment such as that in the OAS. My delegation would like to highlight the important importance of linking this discussion with SDG 16, since the building of peaceful, inclusive and just societies is a commitment we have all taken on, and it is related to the promotion and respect of international law. In the present context, high levels of insecurity must be countered by strengthening the rule of law and promoting human rights, as we have stated. Thank you.
Chair:
Thank you very much. Uruguay. Vietnam, to be followed by United States. Vietnam, please.
Vietnam:
Thank you, Chair. Thank you for giving us the floor again to share our views on how international law applies to the cyberspace. Members of this working group have on many occasions reaffirmed that international law, including the UN Charter in its entirety, applies to states’ conduct in cyberspace. For Vietnam, international law helps to prevent and reduce interstate conflicts, govern states’ behaviors, and maintain international peace and security. Mr. Chair, I would like to express our strong support for the early completion of the draft Convention on Countering the Use of ICTs for Criminal Purposes. Recognizing the ever-growing threats posed by cybercriminal activities, the development of such a comprehensive legal framework provides a basis for harmonizing laws across nations and enhancing cooperation in investigating and prosecuting cybercriminals. It is equally important that the first UN Treaty on Countering Cybercrime will help enhance the understanding of the international community as a whole on how international law really applies to the cyberspace, in particular, how far states may lay their claims and enforce their access to the massive global ICT and data storage infrastructure, as well as the conditions for states to share the other resources of cyberspace, like technical expertise and data flows. Mr. Chair, the first-ever negotiation of a UN cyberconvention has enabled a large number of states to start policing and enforcing their domestic digital sphere. In safeguarding the nation’s domestic digital sphere upon which states may exercise its self-determination, it is our understanding that the principle of non-intervention will require every state and their official organs, entities, or persons, such as embassies, consulates, ambassadors, or high offices, to restrain from any efforts or attempt to influence the domestic public discourse of other countries. In the age of very large platforms, such restraint should apply to the above-mentioned officially verified accounts. Mr. Chair, furthermore, in acknowledgement of the rapid advancements of technology, we urge the international community to embark on early discussion on the establishment of a United Nations International Legal Framework for the Governance of Artificial Intelligence and Other Emerging Technologies. The transformative power of AI presents both unprecedented opportunities and potential risks that transcend national boundaries. As we navigate the complexities of the digital age, it is imperative that we establish a robust legal framework that establish guidelines for the responsible and ethical use of technology and promote peace, security, and cooperation among nations. But as far as we are well aware, the UN process would certainly take time to embark on any new topic or idea. In the meantime, every state should reserve its sovereign right to protect the integrity of its domestic digital space in the face of the massive private development of generative AI systems, which may or may not have put in place sufficient guardrails or safeguards to ensure individual rights, protect personal identities and intellectual properties, as well as enforce state policies. Last but not least, we hold a view that the application of international law in cyberspace is essential for promoting a safe, secure, stable, resilient, and ethical digital environment. It requires global collaboration and ongoing efforts to adapt legal frameworks to the dynamic nature of technology and cyber threats. And as already mentioned, we know this is a learning process for all of us, and we learn it together both easy and hard ways. Thank you, Chair, for your kind attention.
Chair:
Thank you very much, Vietnam, for your statement. You’re absolutely right that it’s a learning process for all of us. I feel like I’m in law school now. I feel like a student back in law school because all the different contributions that you are making is very, very thoughtful. And obviously, your lawyers have gotten involved along the way in drafting some of the statements, so it has been very useful just listening to the different statements and the different points of view. And I think it’s also equally important that you listen to each other as well. I give the floor now to the United States to be followed by Sri Lanka. United States, please.
United States:
Thank you, Chair. In response to your first guiding question, the convergence among states as to how international law applies to the use of ICTs only continues to grow. The African Union’s adoption of a common African position on how international law applies to the use of ICTs in cyberspace is a particularly notable demonstration of convergence on international law. The fact that 55 member states were able to reach consensus on a position paper on how core international law rules and principles apply in cyberspace is a significant achievement. We look forward to supporting AU member states as they develop national position statements, as the common African position exhorts them to do. We also welcome the Czech Republic’s recent publication of its national statement, as well as the two joint statements on international law delivered by Colombia and Senegal on behalf of cross-regional groups of states. These position statements and OEWG interventions, along with the many that have been made previously, reflect an undeniable process of convergence in states’ views on how core international law rules and principles govern state conduct in cyberspace. States are articulating their belief that they are constrained by existing international law in their use of ICTs, and their expectation that other states will abide by their existing international legal obligations when they use ICTs. Those states that continue to deny this convergence, or claim that it is impossible to apply existing international law to cyberspace, or have accountability for state conduct in cyberspace, do so for their own political reasons. The fact that one of the loudest voices claiming that there can be no accountability in cyberspace is a country currently engaged in kinetic and cyber warfare against one of its neighbors, should speak for itself when it comes to the good faith of these arguments. This self-interested messaging should not deter us from continuing to work together to bring ever greater clarity on states’ views on how international law applies to the use of ICTs, and to further develop common understandings on this vital question. ICTs are currently being used in armed conflict by states engaged in hostilities. The OEWG should be prioritizing its discussions on how IHL, including the principles of distinction, necessity, proportionality, and humanity, applies in cyberspace. Engaging on this question will promote international peace and security by providing additional clarity on how IHL regulates state conduct in cyberspace, including the legal constraints on when states may resort to force, furthering the ultimate goal of IHL, which is to mitigate human suffering. The paper on IHL presented by Senegal, on behalf of a cross-regional group of states, is an important contribution toward deepening our discussions on this topic. Scenario-based discussions can be a useful and effective tool for states to think through and develop their views on international law. They have the potential to foster constructive dialogue and permit states to go into greater detail than they can during general plenary sessions. Last week, the OAS and UNIDIR hosted a regional scenario-based workshop in Washington on the framework of responsible behavior in cyberspace that included discussions of norms in international law. And Australia, Colombia, and the Philippines hosted a similar discussion this morning. I applaud these and other efforts to promote scenario-based discussions and suggest that the Chair consider posing scenario-based questions to focus future OEWG interventions on international law. For many states, developing views on how international law applies to cyberspace first requires capacity building for lawyers on international law and possibly also on Internet fundamentals and computer networking terminology. The United States has long supported capacity building on international law. As mentioned in December, we have signed a cooperative agreement with UNIDIR to fund training on the framework, including international law, how it applies in cyberspace, and how countries can develop national positions on this issue. The cooperative agreement also includes funding for in-country assistance by UNIDIR for countries drafting these national positions. Recognizing that some capacity building occurs through exchanges of views on international law in the OEWG and on its margins, we note that it can be prohibitively expensive for many states to send legal experts to New York for one relatively brief agenda item, especially when these experts may be responsible for a wide range of legal issues. Longer sessions for focused discussions on international law would enable greater participation by experts from all states in this important conversation, as would permitting hybrid participation in informal intersessional meetings. Finally, as Japan and others have noted, the more flexible and action-oriented platform offered by the Future Program of Action will be well-suited to scenario-based and other detailed discussions of international law, as well as further development of common understandings of how it applies to states’ use of ICTs. We look forward to more inclusive discussions on this topic in the future. Thank you, Jim.
Chair:
Thank you, United States. Sri Lanka to be followed by Czechia.
Sri Lanka:
To remind you that you and I both are victims of a jealous mistress and that’s the law. You have asked a very pertinent question as to whether there are unique features related to the use of information and information technology or communications technology that requires a distinction to be made in terms of how international law applies compared to other domains. The answer simply is in the affirmative, and permit me to offer a few points for the consideration of this distinguished assembly. Let me deal with territorial boundaries, the most obvious one. The first and most troublesome distinguished feature, perhaps, ICT allows for seamless transfer of data across national borders, making it challenging to determine jurisdiction and apply traditional territorial principles of international law. How do we resolve it? Secondly, the use of ICT introduces new legal challenges in addressing cybersecurity threats and combating cybercrime. International law needs, I say, to adapt to address these emerging issues effectively. Thirdly, with the proliferation of ICT, the collection, storage, and transfer of personal data has become more complex. International law, such as the General Data Protection Regulation, as we know, was enacted to safeguard privacy rights and regulate data processing, a matter that needs careful consideration. Then the troublesome aspect of state responsibility. With the proliferation of ICT, ICT enables state-sponsored cyber activities, such as cyber-sewerage or cyber-attacks. Determining state responsibility, therefore, for such actions and establishing appropriate legal consequences, I say is a unique challenge in the application of international law. The next I can think of is Internet governance. The decentralized nature of the Internet requires international cooperation and coordination in addressing issues of Internet governance, including domain name management. …internet protocols, and content regulation. So these are a few examples of how unique the features are… …and why ICCT necessitates a distinct approach to international law compared to other domains. The other aspects obviously are things like the digital divide, cross-border data flows, intellectual property rights. Now in the case of intellectual property rights, we know that ICT has made it easier to copy… …easier to distribute, easier to modify digital content, posing challenges to traditional intellectual property regimes. International law such as the World Intellectual Property Organization treaties… …addresses issues related to copyright, patent, trademarks in the digital area. Now these treaties must be encouraged. Then I get to internet freedom and human rights. The use of ICT has both facilitated and challenged the exercise of human rights online. There’s no question about it. Quite frankly, we have no control over it. International law recognizes, therefore, the importance of protecting the freedom of expression… …privacy, and other fundamental rights in the digital realm. Then we have state sovereignty in cyber operations, jurisdictions and cross-border disputes, international cooperation. So these are some aspects, Mr. Chairman, that highlight the unique feature of ICT and their implications. Now let me very quickly address the aspect of gaps in how international law applies to the use of ICT. Now these gaps are due to, obviously, due to the rapid advancements of technology. Let’s look at the jurisdictional challenges which I alluded to before. Determining jurisdiction in cross-border cases involving ICT can be very complex. Different countries may have different laws and regulations, making it challenging to enforce international legal standards consistently. Bridging this gap, I say, requires enhancing international cooperation, harmonizing laws… …and establishing mechanisms of resolving jurisdictional disputes. Then we have the aspect of the global nature of cyber threats, which requires a coordinated international response. Bridging the gap in cyber security and cyber crime enforcement involves strengthening international legal frameworks… …promoting information sharing and capacity building, and fostering cooperation among states… …law enforcement agencies, and international organizations. I have dealt with the aspect of state responsibility, and I can emphasize it once more. Privacy and data protection, internet governance, capacity building, which we will deal with tomorrow, international cooperation. Now bridging these gaps requires a multifaceted approach that involves legal, technical, and policy measures. Now we also, at the same time, must remember that there’s an urgent requirement for the harmonization of laws… …and the development and implementation of international treaties and agreements that play a crucial role in bridging gaps in international law… …enhancing international cooperation, and so on and so forth. So there are several approaches to bridging these gaps, which I will not allude to due to the constraints of time. I’m compelled, this morning, having listened to one of the distinguished delegates, to speak a word on the application of IHL. Mr. Chair, international humanitarian law, also known as the law of armed conflict, primarily governs the conduct of armed conflict… …and the protection of individuals affected by such conflict. Now while IHL does not directly apply to ICT law, as a separate and distinct legal framework, certain aspects of IHL can be relevant, I say, in the context of ICT. During armed conflict, ICT plays a significant role in modern warfare, including in areas such as cyber operations, information warfare, the use of autonomous weapons. In these situations, IHL principles, such as the principles of distinction, proportionality, and precaution in attack, may be applicable to the use of ICT in armed conflict. It is worth, I say, noting that the legal framework governing ICT primarily falls under international law, including international human rights law, international criminal law, and international law on state responsibility. So while IHL principles may apply in specific situations involving armed conflicts and ICT, they should be interpreted and applied in conjunction with other applicable legal frameworks. So in summary, IHL does, although it does not directly apply as a separate legal framework, certain aspects may be relevant in the context of ICT during armed conflict, or in situations where cyber operations and attacks are conducted as part of armed conflicts. I thank you, Mr. Chairman.
Chair:
Thank you very much, Ambassador Sri Lanka, for your statement. And I know that you bring to bear through this statement of yours all your vast experience as former Attorney General of Sri Lanka and, of course, on the bench of the Supreme Court as the Chief Justice. Thank you very much for your presence and your participation. I give the floor now to Chekia, to be followed by France. Chekia, please.
Czechia:
Thank you, Mr. Chair. Mr. Chair, distinguished delegates, the Czech Republic aligns itself with the EU statement and wishes to deliver additional comments in its national capacity. Mr. Chair, at the outset, we wish to extend our gratitude for providing us with your targeted guiding questions well in advance, allowing us ample time to elaborate on our thoughts. Also, we are pleased to inform you, as you may have already heard today from several colleagues, that last week the Czech Republic has published its national position on the application of international law in cyberspace. Mr. Chair, in recent years, we have witnessed a significant increase in the interest concerning the applicability of international law in cyberspace. Over the past months, with a growing number of states expressing their positions and numerous other initiatives underway, a notable convergence in understanding has emerged. This convergence not only relates to the interpretation of specific provisions, such as non-intervention, the prohibition of use of force, and the obligation to settle disputes peacefully, but also extends to discussions about due diligence and international humanitarian law. Capitalizing on this momentum has resulted in substantial advancements in this area. In light of these developments, we commend the African Union for publishing their common position on the applicability of international law to cyberspace, a significant contribution towards achieving a common understanding. In this context, the Czech Republic supports the joint statement delivered today by Colombia on behalf of Australia, Colombia, El Salvador, Estonia, and Uruguay. Furthermore, we anticipate that the joint statement on international humanitarian law presented today by Senegal on behalf of a cross-regional group of states, including the Czech Republic, will spark more substantial and detailed discussion on IHL. We believe this contribution, together with a side event on protecting civilians against digital threats during armed conflict, co-facilitated by Brazil, Switzerland, and the ICRC yesterday, will foster a deeper understanding of IHL applicability in cyberspace, significantly contributing to the ongoing dialogue. Chair, in light of the growing number of malicious activities conducted by non-state actors in cyberspace, and possibly a viable answer to one of the questions raised today by Uganda, we would also like to reiterate the importance of due diligence, as it applies in particular to activities of private individuals that violate the rights of other states, when harmful activities cannot be attributed to a particular state in accordance with the rules governing state responsibility or where only insufficient proof for such attribution exists. In our view, due diligence requires states to take all reasonable and feasible measures concerning activities in cyberspace falling under their jurisdiction. Thus, every state has an obligation to act against unlawful and harmful cyber activities emanating from or through its territory, provided that it is aware of or should reasonably be expected to be aware of such activities. In this regard, it is important to stress that we understand due diligence as an obligation of conduct, not of result. Therefore, as long as a state takes all reasonable measures in accordance with the due diligence obligation, it cannot be held responsible if it is unable to prevent, mitigate, or terminate wrongful cyber activities launched from or intransiting through its territory. Mr. Chair, addressing your second question, there are indeed unique features related to the use of ICTs, such as the borderless nature of cyberspace and rapid technological development. While these unique aspects prompt discussions to find a common understanding of how international law applies to the specifics of cyberspace, it is crucial not to misconstrue them. International law applies in cyberspace just as it does in other domains. Regarding your third question, the Czech Republic finds it premature to delve into discussion about bridging gaps in how international law applies to cyberspace. We are of the opinion that we are not yet in that phase of the conversation. Instead, our focus should be on encouraging more states to participate in the dialogue, thoroughly examining all perspectives on the matter, and determining if this process reveals any potential gaps in our common understanding. Concerning scenario-based discussions within the OEWG framework, we believe that dedicated sessions with extended time for such discussions, including experts’ input, could prove particularly beneficial for engaging in more profound discussions on concrete provisions. These hypothetical scenarios can assist states understand their perspective, interpretation of practical application of concrete international law provisions in cyberspace, reducing the risk of misunderstanding between states as they gain deeper insight into each other’s interpretations of such provisions, bringing us closer to reaching common understanding. The UNIDO workshop conducted last November, titled The Application of International Law to the Behavior of States in the Use of ICTs, serves as an excellent example of how such discussions could be conducted. Another exemplary instance is a series of workshops organized by NATO, CCDCOE, and Estonia, offering a combination of expert briefings followed by scenario-based discussions, bringing together participants from both governmental and academic spheres, resulting in a compendium titled Talent Workshops on International Law and Cyber Operations. This morning’s side event, International Law as an Effective Toolkit, co-organized by Australia, Uruguay, and the Philippines with cross-regional participation of both legal and policy colleagues that allowed us to discuss specific rules applicable to provided hypothetical scenarios, is another valuable contribution to our deliberations. The scenarios available in the Cyber Law Toolkit, as mentioned earlier by the Philippines, could be another source to leverage. Building upon this, we could further leverage the insights gained from the commendable initiative of the Ministry of Foreign Affairs of Mexico, Temple University’s Institute for Law, Innovation, and Technology, and Microsoft that culminated in a comprehensive compendium of views titled Advancing Opportunities and Responsibilities for a Peaceful, Safer, and Rights-Respecting Cyberspace, accompanied by a follow-up discussion held yesterday morning. Mr. Chair, the Czech Republic believes that a program of action could in the future serve as a platform to continue our discussions. In conclusion, we would like to reiterate our support and commitment to this OEWG. Thank you.
Chair:
Mr. President, Mr. Chairman, my delegation would like to align itself with the European Commission on International Law, and I certainly hope that more countries would do so, because that will contribute to our collective understanding and introduce greater understanding and transparency in how each of us look at international law and how it applies to the domain of ICT. Thank you for that, Czechia. France, to be followed by the Syrian Arab Republic. France, please.
France:
Mr. President, Mr. Chairman, my delegation would like to align itself with the statement delivered by the EU. We’d like to make the following comments in a national capacity. France, first and foremost, would like to reiterate the importance of international law and the fact that it is fully applicable to cyberspace and to the use of ICTs. Our discussions on this topic at the latest December session were very substantive. We’re delighted that discussions are ongoing, especially as regards International Humanitarian Law, IHL. France has regularly had an opportunity to reiterate that IHL does apply to all cyber operations undertaken within the context of armed conflicts or related to such conflicts. On this note, the working document on the application of International Humanitarian Law put forward by Switzerland and the joint statement put forward by Senegal from 13 states across from different regions have vocalized attention on this topic. We invite all delegations to partake in exchanges on the modalities of applying IHL in cyberspace. France stated its national position on IHL applicability back in 2019. Since then, we’ve been encouraging the crafting and presentation of national and regional positions on the use of ICTs under IHL. On this note, we welcome the adoption of a common African position on the application of international law in cyberspace and the presentation of a Czechist position. Last week, at the UNIDIR workshop which took place in January, a number of states, including France, highlighted the fact that sharing national positions was a way of garnering consensus and ensuring mutual understanding between states. Furthermore, we partook in recognizing the full applicability of international law to cyberspace and the use of ICTs. We hope that the fact that UNIDIR will be holding workshops for states which haven’t yet come up with national positions will help to share best practices and increase the number of states involved as well as the geographical representation of the national positions which have been published. France would like to welcome and align itself with the joint statement delivered by Colombia, Australia, El Salvador, Estonia and Uruguay on language that has garnered consensus. This is language on international law. In our view, this work stream is particularly important as it stresses the progress that’s already been made in our discussions and shows, as we’ve seen during previous exchanges, that there are many points of convergence among states. On these areas of convergence, when it comes to states considering the applicability of IHL to cyberspace and given the principle of the peaceful settlement of disputes, as well as the principle of non-intervention and the non-use or threat of use of force, given all these principles, we believe that crafting new legally binding norms at this stage would be premature, although we’re not excluding the possibility. Nonetheless, discussions within the OEWG or specific workshops, such as the One Unity organised in November of last year, such discussions do demonstrate that discussions involving states should continue as we could further pinpoint how this could apply in cyberspace. With this in mind, we are very much in favour of exchanges and discussions, specifically scenario-based discussions within the OEWG, so as to achieve substantive progress involving all states. Indeed, scenario-based discussions would help us to delve deeper into certain aspects of the law and to make tangible progress. The peaceful settlement of disputes, sovereignty and international humanitarian law is something we’ll be focusing on, drawing on the practices I just mentioned earlier. Mr Chairman, I’d like to link this aspect of our work to capacity building. We’ve seen this as all states within this discussion, their participation has been vital as it helps to beef up international cooperation. Capacity building activities should therefore contribute to states formulating and updating their national doctrines on the applicability of international law in cyberspace. As this is going to be a long-term project, this priority needs to be recognised in future mechanisms, action-oriented mechanisms, which is something the OEWG will be doing going forward, including 2025. Thank you very much.
Chair:
Thank you very much, France, for your contribution. Syrian Arab Republic, to be followed by Spain.
Syrian Arab Republic:
Thank you, Mr Chairman. Mr Chairman, we’ve made progress in our discussions on international law. However, to date, we do not have a clear joint grasp on the application of international law, specifically the UN Charter, in cyberspace, especially within the framework of very rapid developments in the sphere of ICTs. And given the transnational nature of such technologies, their spread and the inability to pinpoint who is behind some of the operations, there are many different concepts and they’re understood differently. For instance, pinpointing the source of ICT incidents, malicious attacks or incidents, for instance. Thus, we believe that we need further in-depth negotiations within the United Nations on these various aspects, so as to come to a common understanding which would lay the groundwork for an internationally legally binding instrument. My delegation believes that we shouldn’t make haste in our discussions on the application of international law in cyberspace. We need further work on the idiosyncrasies of international law. If we were to make haste, there would be doubts left hanging over the conclusions we draw and the decisions we make. Therefore, these conclusions, these decisions would be fragile and the entire endeavour would be counterproductive. For this reason, we believe that all relevant issues need further discussion at this stage. Conduct in cyberspace is of course very different from conduct in the physical world. Nonetheless, the purposes and principles of the UN Charter, when applied to the use of ICTs, should not prevent us from agreeing on international legally binding measures, but only after a painstaking study of international law. Scenario-based discussions related to the use of international law so as to govern activities in cyberspace confirmed that it’s going to be very difficult to regulate these activities, drawing on existing norms. The only way to bridge the gaps would be to come up with new rules and norms. Thus, we’d like to highlight just how important the first draft of the International Convention on this topic is. This is something that was put forward by the Russian Federation. This is the scaffolding for a UN Convention on International Cyber Security. This draft convention reaffirms the rules which must be upheld when using ICTs. This draft resolution has been published on the Working Group’s website. Thank you, Mr Chairman.
Chair:
I give the floor now to Spain, to be followed by Côte d’Ivoire, Spain.
Spain:
Thank you very much, Mr. Chairman. Spain joins in the statement by the European Union and would like to add a few elements in our national capacity. Together with other countries, we believe that cyberspace is not an exception, not a unique case in international law. We reiterate, as we have seen here in previous occasions, that international law without doubt is fully applicable to cyberspace. Specifically, we attach particular importance to developing the principle of life applied to space, as well as humanity, proportionality, and convergence between civilian and military objectives in the application of ICTs to armed conflict. In this regard, we support the initiative mentioned by Senegal representing a group of countries on humanitarian international law, since in fact Spain’s strategy for the period 2023 to 2026 explicitly defends greater protection of medical missions and health services when subject to cyberattacks. Furthermore, we welcome the publication of the position of the African Union on the application of international law to cyberspace, which shows that it is possible to achieve a consensus on this matter among a large group of countries. Spain is also at an advanced stage of preparing its own position, and we hope that we will be able to publish it prior to the July session. In this regard, we certainly support the many efforts made to bring together national positions, and in particular, we welcome the initiative by Colombia on behalf of a group of countries on greater convergence in the language of international law. Finally, we welcome efforts for capacity building in the subject, be it through specific sessions with experts or others, as these are decisive steps to bridge gaps of interpretation of the current legal regime. We hope that the next intersessional period in May will offer sufficient spaces to have substantive debates in this area. Thank you.
Chair:
Thank you very much. Spain. Cote d’Ivoire, to be followed by Colombia.
Côte d’Ivoire:
Thank you, Mr. Chairman. The growing number of services associated with digital technologies and interlinkages between technological tools and systems, combined with current security threats, have made cyberspace the fifth field of conflict, coming on top of land, the sea, airspace, and outer space. Thus, despite the idiosyncrasies of cyberspace, we should not distinguish or create an exception for cyberspace, which would make it the only area granted an exemption from international rules. The application of international law to cyberspace, therefore, in the opinion of my delegation, follows an undeniable logic. We are of the view that international law, including the UN Charter, de facto does govern the digital sphere. The principles enshrined in the UN Charter, i.e. the sovereignty of states, their sovereign equality, non-interference in the domestic affairs of other states and their peaceful settlement of disputes, as well as the responsibility of states and their duty to take a precautionary approach, are the foundation for pacifying and ensuring the stability of cyberspace. In a similar vein, international humanitarian law, IHL, and respect for human rights and fundamental liberties are necessary for the digital world to work smoothly. Violations of the aforementioned principles will, without a doubt, have deleterious consequences, contributing to increasing the level of conflict in cyberspace. Mr Chairman, drawing on the certainly mentioned above, Cote d’Ivoire has always expressed its commitment to cyberspace, which should be open, safe, stable, accessible and peaceful. With existing international norms painstakingly upheld therein. For instance, in our national cybersecurity strategy covering the period 2021-2025, we ensure that there is full respect for international humanitarian law and human rights law. Within the framework of the OEWG’s work, my country has steadfastly underscored the importance of recognising the application of international law to cyberspace. We welcome the headway that has been made on deepening the understanding of this principle by all states. Today, a significant milestone has been hit by African countries. They recently adopted a common African Union position on the application of international law to cyberspace. My delegation believes that this document can make a useful contribution to advancing our discussions on this topic. On this note, given the large number of relevant elements which can feed into our discussions, Cote d’Ivoire would like to highlight the following points. Adding a regional perspective to our understanding of this topic, reaffirming the validity of all of the fundamental rules enshrined in international law, their validity for cyberspace and states must uphold these. We also need to facilitate states upholding their due diligence duties by placing importance on international cooperation and information sharing, especially information sharing and cooperation between CERT, Computer Emergency Response Teams, and C-CERT, Computer Security Incident Response Teams. We also need to support the implementation of tools and digital platforms as well as to invest in R&D in this area so as to promote the peaceful settlement of disputes. We’d also like to stress the invitation to sign agreements on assistance for combating all forms of cybercrime so as to contribute to the protection of and the full enthronement of individual human rights, support for capacity building for both developing countries and the LDCs across areas such as the crafting of national cybersecurity and resilience strategies, as well as the provision of access to relevant technologies. An appeal to pay particular attention to stepping up international cooperation so as to better clarify international law and draft rules which would incorporate the development dimension. The proposal for the UN to adopt a declaration on the application of international law to cyberspace, all relevant stakeholders should take part in such negotiation. This includes international organizations and regional organizations as well. Thank you.
Chair:
Thank you very much. Cote d’Ivoire, Colombia, to be followed by Israel.
Colombia:
Thank you, Mr. Chairman. In addition to supporting our statement this morning on the application of international law in cyberspace, the Delegation of Colombia also supports the statement made by Senegal on behalf of a cross-regional group of countries on the application of international humanitarian law in the years of ICTs in situations of armed conflict. We will now speak in our national capacity and very briefly on some additional points. Mr. Chairman, the contributions and joint work among delegations from different areas reflect the commitment of states to make progress in the search of common understandings and areas of convergence in this important matter. My delegation hopes that the contributions that have been made will be inputs to the third APR and will contribute to implementing the responsible behavior of states in cyberspace. Mr. Chairman, at the national level, Colombia has started to work actively in preparing its position on the application of each of the principles of international law in cyberspace. In this task, very valuable have been the capacity-building programs that we have benefited from, as well as our talks bilaterally with our colleagues with Canada, given their experience. We believe that this practice is in itself a confidence-building measure which could be replicated in the framework of this working group among those countries which have presented their positions and those that have not yet done so. Given your question as to what are the specific capacities required more urgently at the national level, we have identified the importance of training on the application of international humanitarian law in cyberspace and the sectors of defense in charge of implementation. This capacity-building would further clarify our dialogue, would contribute to developing common understandings, and would contribute to consensus. Lastly, with regard to your question about scenario-based discussions, my delegation would like to share with you that in the framework of the fifth meeting on CBMs of the Organization of American States, and based on the joint work done between SICTER and UNIDIR, we carried out the workshop on norms, international law, and behavior of states in cyberspace, which by means of three hypothetical scenarios led to an interactive dialogue among delegates on the application of responsible behavior and principles of international law. This facilitates learning through the practical understanding of application in the context of international incidents using ICTs. It promotes transparency and confidence-building among participants. They exchanged views in small groups. We believe that this exercise could be replicated in the informal meetings in May, following the Chatham House rules. Thank you.
Chair:
Thank you very much, Colombia. Israel, to be followed by Burkina Faso.
Israel:
Thank you, Chair, for giving us the floor. We’ve already presented our perspective on the issue of application of international law to cyberspace. Please allow me to reiterate certain key points. Israel encourages discussions on the application of international law to cyberspace. We believe, however, that deepening our understanding of how international law applies is a continuing and a long-term process, one that involves states forming national views and exchanging position as we witness that the threat of landscape continues to develop. Israel’s position on the application of international law to cyberspace has been consistently expressed over the years in this open ended working group discussions as well in other international fora. We’re also happy to mention that we have recently presented the UNODA Secretariat with an official legal paper dealing with Israel’s perspective on key legal and practical issues concerning the application of international law to cyber operations. We reiterate our fundamental position that international law is applicable in cyberspace. However, given the unique features of cyberspace and the fact that many traditional rules of international law have been developed and adopted in a domain specific context, it is necessary to evaluate whether and how certain rules of international law relate or apply to the cyber domain. We in order to understand whether adjustments and clarifications are necessary. For example, data travels globally across networks and infrastructure located in multiple jurisdictions transcending national borders and lacking meaningful physical manifestations. Moreover, cyber infrastructure is to a large extent privately owned and decentralized both at the domestic and international levels. The cyber domain is also highly dynamic with technological developments and innovation advancing at a rapid pace. When considering the applicability of specific rules of international law to cyberspace, it is important to be mindful of such distinctive features and to carry out a meticulous examination of the rules at play and the context in which these rules emerged. Mr. Chair, the open-ended working group has played a key role in enabling states to present and publish their views on the application of international law. As the landscape continues to evolve, states will no doubt seek to continue to make their views known, relate to the international law aspects of new threats that are emerging, refine previous positions, and perhaps revise and update previous statements. In our view, the open-ended working group can and should continue to play a role in facilitating discussions on international law, but continue to provide a platform for states to present and publish their views on a voluntary basis. In this context, the suggestion for scenario-based discussions is a very valid and beneficial one. Finally, Mr. Chair, we feel that building a common understanding on how international law applies to the use of ICTs by states should be the first step before moving to the creation or adoption of any new rules and norms. Additionally, we wish to echo other speakers and also to reiterate again that in our view, Israel does not see any need for the development of or adoption of a legally binding instrument in this context. Thank you.
Chair:
Thank you, Israel, for your statement. Bukhira Faso to be followed by Malawi.
Burkina Faso:
Mr. President, Mr. Chairman, ladies and gentlemen, at the outset, the delegation of Burkina Faso, as we are taking the floor for the first time, would like to extend to you and to all other members of the Bureau our congratulations on your appointment. Rest assured you have our staunch support. We wish you every success as you discharge your duties. Mr. Chairman, my delegation fully shares the concerns shared by the various delegations since we began our work. These were concerns regarding the threats hanging over us in cyberspace, specifically Burkina Faso is facing an uptick in the use of digital tools by terrorist groups. These organizations are deftly using ICTs to spread their extremist ideology to recruit new members and to plan attacks. Turning now to our discussion of norms and the list, we’d like to align ourselves with the statement delivered by the Russian Federation. We suggest that rules and norms for international conduct should be adopted so as to promote responsibility and discourage malicious conduct in cyberspace. With due regard for respect of sovereignty of states in cyberspace, as well as to combat cybercrime and cyberterrorism, to protect critical infrastructure against attacks, to promote transparency and ensure states act responsibly. The responsible use of ICTs to avoid collateral damage and unforeseen consequences is also key. We need a common understanding of the various rules to ensure that there are no misunderstandings among states when we move on to implementation. Furthermore, the rules and norms must take into consideration the level of digital maturity of various states. Mr. Chairman, the establishment of points of contact, POCs, and computer emergency response teams, CERTs, underscores the importance of cooperation between states. At this stage, Burkina Faso is cooperating with regional CERTs. So as to strengthen the CERT mechanism and POCs, we will be partaking in various initiatives and taking technical steps to ensure technical information sharing. By way of conclusion, we believe that under UN auspices, funding should be allocated to build states’ capacity on the digital security front. This should be channeled specifically to developing countries. Thank you very much, Mr. Chairman.
Chair:
Thank you very much, Burkina Faso. I give the floor now to Malawi, to be followed by Venezuela. Malawi, please.
Malawi:
Thank you, Chair. Malawi is in full alignment with the African Union’s common position on the applicability of international law in cyberspace. Malawi affirms that international law and its principles do apply in the cyberspace, despite its unique features. We fully support this position and believe that it is crucial for the global community to uphold international law in the various aspects of cyber activities. Malawi does agree that more and more there is indeed demonstrated convergence of this position by many states, as if we are to go by the various statements made by various countries at these OEW sessions. We acknowledge that cyber security is a pressing concern for nations. and that despite our various levels of development, it is essential for us to work collectively to address its challenges. History has shown us that we are only as strong as our weakest link, and therefore it is imperative that we all collaborate, share information, and align ourselves with global developments and find common understanding on how international law can apply in cyberspace. Malawi also understands that each nation has a role to play at the national, regional, and global level. We are committed to doing our part in this collective endeavor. When it comes to reaching common ground on applicability of international law, we believe that capacity building is crucial in not only understanding its related aspects, but also to strengthening cybersecurity capacities and resilience. Malawi recognizes the importance of investing in human and technical capacities to face the evolving cyber threats. We therefore appreciate the support provided to us by the sponsors of the UN Women in Cyber, which has allowed some of us to participate in this important forum and be part of these important global discussions. In more ways than one, these sessions continues to be our training ground. Without their assistance, our presence here would not have been possible. We further extend our appreciation to UNIDIA and others for the continuous capacity building efforts on international law through their various training programs. As already stated by others, Malawi also believes that engaging legal experts from all countries of the world to these important topics would foster reaching a common understanding on this important area. We further support the proposed hybrid participation for wider participation to these meetings. Chair, we commend your guidance on the use of scenario-based discussions. These scenarios provide a focus platform for in-depth discussion and a better understanding of complex international legal issues, which can sometimes be challenging to comprehend without practical examples. We fully support the inclusion of these scenarios as they enhance our ability to develop our country positions and our understanding of cyber threats and cyberspace in general. In conclusion, Malawi reaffirms its commitment to the principles of international law and its applicability to cyberspace. We urge all members to collaborate, share knowledge, and strengthen our capacities to ensure a safer and more secure digital environment for all. Let us seize this opportunity to work together towards a future where the benefits of ICTs are realized while upholding the bedrock principles of international law. Thank you, Chair.
Chair:
Thank you very much, Malawi, for your statement. Venezuela to be followed by Liechtenstein.
Venezuela:
Good afternoon. As this is the first time that I take the floor, I would like to extend my regards to the chairman and his team. I’d like to reiterate, we’ve mentioned it so many times before, we’ll mention it again. We are very grateful for your work, your dedication, and overall, your very large patience. As I said before, I do not envy you your job. I was motivated by several factors to make this hopefully brief intervention. And one of them was something that I heard today, specifically for one of my colleagues and fellow states, that as far as they’re concerned, there is no distinction between cyberspace and physical space. There’s no such thing as cyberspace. only cyber activities. And reflecting on that point made me think about how is it that this concerns us in in Venezuela. And before I dwell into that concern we need to make absolutely clear that the Bolivarian Republic of Venezuela does believe and definitely wants to work towards guaranteeing the applicability of international law and international humanitarian law to cyberspace. And I think it is complete nonsense to say that anybody is saying or insisting that there is no accountability in cyberspace. It’s not an issue of there not being and rejecting outright this notion. What actually concerns us much more is a perceived automatic applicability of international law, specifically international humanitarian law. And what this automatic applicability implies because as much as we speak about the abstract notion, we have to take into consideration the realities of the international system and yes indeed even the political ones. The political realities and how they interact with international law. As in how international law applies to the real physical world and the gaps that already exist. Gaps that might get even more complicated if we go to what we perceive as qualitatively different space which is cyberspace to the physical space. Now then, so many have spoken today and before about the importance of scenario based discussions. We completely agree and as a matter of fact it is thinking on scenarios that has led us to this doubt on the automatic applicability of international humanitarian law to cyberspace. We do not wish to reject it and make it clear again. We want to make sure that it is clear that what we want is to make it real in the real world not in just as an abstract thought. And once we think of issues like scenario based based problems and discussions, then we start seeing the small cracks, shall we say. When we try to determine, for example, the responsibility of an attack in the physical space, let’s say, for example, a country, A, bombs a school or a hospital and kills everybody in it, we don’t need technical experts, like the ones we have in the OPCW, experts in chemistry and expert in all these things to determine who might be the actor. Now, the actor that causes this aggression might claim that it was the other part, the responsible for the bombing, for example. But sometimes you don’t need that much experts, a couple of journalists on the ground can make and determine and say, well, this was the most likely scenario. Nonetheless, even then, we have problems in interpreting and applying international law. And this is where exactly the physical space becomes very different from the cyber space. In the cyber space, we can have a group of unknown nationals in Mogadishu, for example, planning an attack on, let’s say, state B, then all of a sudden, and they don’t need to be the best hackers in the world, they can make it look as the attack is from Caracas. Caracas doesn’t even know what’s going on, and it is attacked and it is accused of attacking and destroying, causing damage to infrastructure in another country, country B, et cetera, et cetera. And here is where international humanitarian law automatically applies, especially something like Article 51, which is the right to defend. Now, the question here is, country B that claims was attacked by, again, in this hypothetical case, Caracas, even though Caracas doesn’t even know what’s going on, it has a right to defend itself, where? In the physical world or in the cyber world? The attack was in the cyber world. Article 51 does not specify that, and it does not specify that for a good reason. 1945, this was not an issue. It is an issue now, and this is our huge concern. The thing is, what even concerns us more is that this has to be discussed. But unfortunately, certain things that are not, or that do not have an international consensus and are being discussed, some states go ahead and apply their judgment regardless. Take, for example, unilateral coercive measures. a very large amount of countries believe that they are illegal. Nonetheless, some countries apply it against others, with quite problematic consequences. People dying because they don’t have food, they don’t have shelter, they don’t have the basic things that they had before, the effects of these measures. If that’s not a case of humanitarian international law, but I don’t know what is. Nonetheless, while it’s being discussed whether it is legal or not, it is being applied. And the same thing would happen to things that we do not have a consensus on, on cyberspace. While we’re discussing whether the response or the mode of defense of country B against country A in relation to a cyber attack based on Article 51, whether it’s applicable or not, and whether the response or the defense has to be in cyberspace or in physical space, the country in question will just proceed and do what it sees fit while we’re discussing. Why not? It already happens in the physical world. These are issues and these are concerns that the Bolivarian Republic has. And it has them based on what we mentioned here, the scenario-based discussions. It’s not so clear-cut and simple because this cyber world did not exist when the articles were written for the Charter of the United Nations. So, again, yes, we want to work towards applicability. We believe that there has to be accountability and there should be. We’re just concerned about the details and we should be concerned about them now. Thank you, Mr. Chairman.
Chair:
Thank you very much, Venezuela, for your very detailed and clear statement. In some ways, you have brought us into a scenario-based discussion already. And there is very clearly a demand for such a discussion. I think that was the one unanimous point of convergence that we have. But underlying this convergence to discuss this further through scenario-based discussions are also different points of view, which is entirely understandable. But it’s a discussion that we need to have. And I’m also very encouraged, Venezuela, by your remarks that you do want to talk about the applicability of international law and you do attach importance to accountability. And I think that’s also something that we need to address until after 6 o’clock. So we’ll press on with the statement from the ICRC. You have the floor.
ICRC:
Ambassador Garfu, Excellencies, dear colleagues, thank you very much, Chair, for giving us the floor at that late hour in the day. Under your leadership, Chair, this Working Group has built significant agreement on ICT threats in international security, including in situations of armed conflict. Against this background, the ICRC urges you to deepen discussions on the limits that international law and, in particular, international humanitarian law, imposes on the use of ICTs in situations of armed conflict. We believe progress has been achieved in this Working Group and more common ground is within reach. What convergences can we identify on IHR? Since 2021, this Group has repeatedly underscored that recalling international humanitarian law in the ICT environment by no means legitimizes or encourages armed conflict. Delegations have rightly emphasized that international humanitarian law does not prevent armed conflict. International law obligations to prevent armed conflict, to maintain peace and security, are set out in the UN Charter. IHR is different from Article 51 and the inherent right to self-defense. International humanitarian law provides limits that must be respected in the unfortunate and undesirable situation of an armed conflict, irrespective of whether or not the UN Charter has been breached. Today, the world faces over 120 armed conflicts, including between states, and the precious humanitarian consensus that wars have limits must persist even when new means and methods of warfare are used. Your population, the communities that states in this room represent, they need this protection. Discussions in this Group have encouraged a growing number of states to express their views on the application of international law, including international humanitarian law, to the use of ICTs. The cross-regional statements presented today by Senegal and by Colombia and the recently published Common African Position build common understandings and show that this is possible. The 55 African Union states have unanimously held that despite the fact that most rules of IHR emerged before the appearance of cyberspace, IHR applies to cyber operations that may be undertaken in the context of armed conflict. The ICRC encourages this working group to build on these regional and cross-regional and also national positions to include clear language on IHR in the progress report in July. However, there are also unique features of ICTs that need further considerations. Finding agreed language on the applicability of IHR to the use of ICTs in armed conflict should not preclude discussing at the same time how IHR limits apply to cyber operations. And the need for further study on this question is reflected in each annual progress report. For example, in our view, it is not sufficient to simply note the principle of distinction. If at the same time some states restrict the application of IHR in the ICT environment so much that most uses of ransomware, of viperware, and of DDoS operations are excluded because they don’t result in physical damage. Interpretations of international humanitarian law that focus solely on protection of objects against physical damage are insufficient in the ICT environment. Common understandings on the protection afforded by existing IHR can be achieved striking the right balance between principles of military necessity and humanity. At the same time, if the existing rules of international humanitarian law are interpreted in ways that undermine the protective function of IHR in the ICT environment by leaving unaddressed the new kinds of harm that result from the use of ICTs, then additional rules would be needed and would need to be developed to strengthen the existing legal framework and to ensure that IHR remains adequate in today’s ever more digitalized societies and armed conflicts. Finally, Chair, you inquired about scenarios for discussion in this group. The ICRC is available to provide you with decontextualized yet reality-based examples if needed. Thank you.
Chair:
Thank you very much, ICRC, for your statement. I think that’s also a very good statement for all of us to hear and to reflect on as we wrap up this discussion on international law. I don’t want to make a summary because the value of a discussion like this in the working group is in itself an exercise of reaching greater levels of understanding and clarity. And so each one of you, I’m sure, will be taking back your own reflections and lessons that you might have gleaned by listening to the various other statements. From my point of view, I want to say that this has been a very, very good discussion, probably the best discussion we have had on international law in recent times. I think I said that the last time as well with regard to international law. So what it shows is that with each discussion we are getting deeper, we’re grappling with some of the tough issues, and because of that we are listening to each other and we need to understand each other’s point of view. Even if we may deep in your hearts, you may disagree with the point of view expressed, but when you listen to a different point of view, you need to grapple with how you need to deal with that, how you would respond to that, and certainly that has been useful for all of us collectively. So that’s the first point. Second, I would give all of you an A-plus for engagement and enthusiasm. So many of you are asking for additional sessions to discuss international law, that we may well perhaps in the future mechanism need to establish a permanent mechanism for international law discussions. We can’t possibly spend a whole week discussing international law because we have a whole list of issues to discuss, and let us not forget that the mandate that we have also requires that there be a balance. So much as I would like to allocate two to three full days to discuss one topic, we need to keep in mind also the need to have some balance between the different agenda items. But maybe in the future we can all spend a month here in New York and discuss all the issues. The point I’m making is that there was a lot of engagement and enthusiasm and no doubt very thoughtful preparations back in capital as well. And of course the statement of common position from the AU plus two cross-regional statements and papers submitted this week and also the different statements made by many of you plus additional national statements submitted. All these votes very well, and I think that in itself is intangible, but I think it’s a good step forward for our discussions. There were also discussions on the need for additional legally binding obligations. We have not made a huge step forward on that front. Some aspects of the old debate are still there, but at least what I hear is that the possibility is not excluded, at least in the minds of some of you, and I think that offers us possibility to go further into that discussion. And international humanitarian law, I think the statement by the ICRC is also something that I would ask each one of you to reflect carefully, because if international humanitarian law is fundamentally about protecting people, how can we make sure that international humanitarian law can also be leveraged and mobilized to protect people in the context of conflict and prevent them from being subject to harm through ICT means? I think that’s a fair question, because the world these days is increasingly facing many situations of armed conflict. That’s a reality. So this debate about whether IHL applies is not an abstract debate. It’s a real debate, and I think there’s scope for scenario-based discussions, and the ICRC has offered to provide some input in terms of how we can have such a scenario-based discussion that is decontextualized and made hypothetical. But those are hard issues, distinguished delegates, and I think we need to address them. There was also many of you responded to the question on unique features, and I think this is the first time I think we’ve put that question, and I think that also generated a good debate. Yes, there are unique features, many of you said, but some of you said that doesn’t mean we need something additional. Others had an opposite view, so this debate and discussion needs to continue as well. And of course on capacity building, I think clearly that’s another area of convergence in the sense that we all agree this is an area where more needs to be done. Capacity needs to be built in terms of national positions, in terms of sub-regional or regional positions. There’s a lot of work to be done in the area of capacity building, and I’m also gratified that there are a few side events already in this area of international law and different programs already happening, as you saw in the mapping report as well. Finally, this point about a scenario-based discussion, I think we need to take this further. I’ll give some thought to how we can do that. UNIDIR has played a good role in this, in the form of the workshop that they convened last November, so we’ll see how we can build on that, how we can bring that into the OEWG context. Time is always the biggest challenge, because if we meet here for a week, we have a mandate of five to six different issues. As you can tell, if we take more time for one issue, it puts us behind the schedule for other issues. So that is a challenge, but let me give some thought to how we can best do this during the intersessional period as well. So let me leave it at that at this point, and certainly not an exhaustive summary, but I would also encourage each one of you to, as you form cross-regional groups, please go across the aisle, talk to people who have a different view, because now is the time to do that. So it is not the persuasive interventions you make here in this open format that will move the needle, but it’s the quiet outreach that you make to reach out and talk to different delegations who have a different view to see how we can find ways to deepen the conversation and find maybe one or two elements of commonality. But the question of international law is not something that we can very quickly resolve, because I think talking about international law itself is important as an exercise in confidence building and building trust, building understanding, but also it’s about transparency and accountability as well. And even after 75 years, we still have debates about the charter in the Security Council, in the General Assembly, in the context of many different regional situations. So that’s an ongoing thing. So this discussion on international law and how it applies into the ICT domain is not something that will find a definitive conclusion in the third APR in July or in the final annual progress report in 2025. It’s something that needs to continue, and we need to broaden the discussions and bring in experts as well. So I think if we can take back the point that let’s avoid a very binary debate about whether we need a new instrument or not, whether there are gaps or not. I mean, all of those very established positions are there, but I think as we go deeper, hopefully through a scenario-based approach, I would ask each one of you to keep an open mind and engage in that discussion. So on that note, friends, thank you very much. It’s 5.30, so let’s use the remaining 30 minutes to begin the next item on confidence-building measures. And I want to draw your attention to the questions that I have put forward, which is circulated to all of you, as you know. First, with regard to the additional CBMs, we have the initial list of voluntary global CBMs, and there is the question of what else, how do we operationalize the initial list of global CBMs, in particular through capacity-building and also through the global POC dietary? And I’ve also asked a question about additional CBMs that can be added to the initial list of voluntary CBMs. So please also respond to that. And, of course, there’s also a question related to the POC directory in terms of topics for further work by states on the POC directory. So I look forward to hearing your views. So let me open the floor now, and then we’ll see how far we can go. And we’ll continue, of course, certainly tomorrow. So confidence-building measures. The floor is open. I give the floor now to Saudi Arabia, to be followed by India. Saudi Arabia, the floor, please.
Saudi Arabia:
Mr. Chair, my delegation expresses its gratitude to you and to the Secretariat for your continued efforts within the work of the Open-Ended Working Group and security of and in the use of ICTs. The Kingdom views capacity-building as a pivotal strategic priority as part of the relevant efforts to strengthen cybersecurity internationally. We also see that the contribution of similar initiatives to the GCSCP have a contribution towards increasing opportunities to enable effective cooperation, coordination between member states regarding cybersecurity issues by sharing best practices. As for the proposed units and the recommendations regarding other units as part of the GCSCP, we see the importance of avoiding duplication within this portal, while we have other existing portals under the UN. Therefore, we propose that we work on assessing and benefiting from existing platforms by UNIDIR and other relevant entities and to identify similarities between them and the proposed platform and to suggest the best means to harmonize these different platforms. Thank you, Mr. Chair.
Chair:
Thank you very much, Saudi Arabia. India, to be followed by the European Union.
India:
Mr. Chair, the focus of CBMs is on fostering open dialogue and cooperation among states to prevent misunderstandings and reduce unintended consequences of cyber activities. CBMs include information exchange, joint capacity building, and establishing communication channels for addressing cyber incidents promptly. CBMs, when adequately resourced and engaged, strengthen overall ICT security and the peaceful use of the ICT. They enable the implementation of norms by fostering trust, predictability, and stability in ICT use. There is a call to define foundational values to build confidence among nations, taking into account virtual and physical boundaries. CBMs might be relevant globally, but implemented regionally, and harmonizing regional CBMs is key for common international action. States should cooperate on countering terror propaganda online, including removing harmful content and alerting other states of concerning cyber activities. Differentiating cyber terrorism from other incidents is also important. States should consider data jurisdiction factors like ownership and data subjects in cyberspace. They should also refrain from attacking or targeting critical infrastructure. There should be emphasis on conducting joint drills or exercises involving computer emergency response teams, and sharing digital forensic evidence to mitigate cybercrime and malicious activities. The OEWG may explore mechanisms for swift information exchange and response between law enforcement agencies and governments to counter terrorist and criminalize EDUs. Establishing rapid and reliable communication channels for incident response is essential. India’s proposal for a global cybersecurity cooperation portal can be used as a forum where member states can post their requests for support and timely response from member states. It will help to build trust between member states and cyberspace. The one-to-one communication and broadcasting communication options that the portal can provide will lead member states to come forward as a community to respond to cyber threats and attacks faced by other member states. The portal will provide and facilitate exchange of information on capacity building programs, cyber attacks, best practices, and points of contact for quick response, and will also act as a repository of cybersecurity resources. This will help member states to explore strengths and opportunities that each member state can offer to other member states. This can even initiate fresh cooperation between member states and increase their trust in other member states. Cyber awareness activities may be carried out through the portal, and member states can share educational materials that are age, gender, or education level based, and videos in UN languages. This will help to bridge the digital divide and will make cyberspace more inclusive. India has also been quick to respond to the call for nominations of technical and diplomatic points of contact for the global POC directory, and we hope that the mechanism will soon be operationalized. I thank you, Mr. Chair.
Chair:
Thank you very much, India. Now, before I give the floor to the next speaker, I want to share a piece of good news with all of you. We have 23 countries who have made nominations to the POC directory as of today, 23 of them. This is a good start. Now, let me share with you the list of countries who have done so. Argentina, Australia, Bulgaria, Cambodia, Canada, China, Colombia, Czechia, Ecuador, Estonia, Germany, Ghana, India, Ireland, Jordan, Kuwait, Peru, Portugal, Qatar, Russian Federation, Singapore, Tunisia, Ukraine. So I’d like to thank all these countries who have made nominations, and certainly we still have time. The deadline that the Secretariat had suggested was 15 April, and I know that all of you are working with your capital and agency processes to get the nominations out, but I thought I should share the list as a piece of good news and also in the spirit of transparency because if the POC directory is to be global, we need all of you on board. So I hope that we can encourage each other. So each of these 23 countries, please bring a friend on board as soon as possible so we can double that number to 46, and then we repeat the process. Each one brings another friend until we get to 193. And bringing a friend on board is not just a question of sending a WhatsApp message, but it’s also about outreach and partnership to see what countries might need. Some countries might need more help, advice, even capacity building in terms of getting things ready to get on board this POC directory. So I think we are on the right track. I just wanted to mention that since India did say that they have nominated their points of contact, and I thought I should share the list with everyone. So that’s the piece of good news. I think all of you deserve a drink today. You can have one on my behalf. I give the floor now to the European Union, to be followed by Chile speaking on behalf of a group. EU, please.
European Union:
Thank you, Chair, for giving me the floor. The candidate countries, North Macedonia, Montenegro, Serbia, Albania, the Republic of Moldova, Bosnia and Herzegovina, and Georgia, and the EFTA countries, Iceland and Norway, member of the European Economic Area, as well as San Marino, align themselves with this statement. Mr. Chair, with cyber security attracting increasing interest and the barriers to access to cyber capabilities decreasing, the risk of a conflict resulting from miscommunication and misunderstanding is also growing. Against this background, discussions within recent sessions of the Open-Ended Working Group and the 2022 and 2023 Annual Progress Report have achieved progress on the way to operationalizing CBMs at the global level, particularly on the establishment of a global intergovernmental POC directory and by collecting input from stakeholders on CBMs through regular dedicated intersessional meetings. The EU and its member states are currently in the process of nominating POCs for the global directory. In parallel, regional organizations continue to make important progress in elaborating and implementing cyber CBMs based on regional needs and interests, which the EU is proud to support. In our view, the best way to accelerate the universal implementation of the CBMs listed in the initial list of voluntary global CBMs is through information sharing at regional and sub-regional level, supported by regional and cross-regional initiatives, as well with the development of cooperative measures like assistance in building resilience and other capacity-building initiatives that would strengthen the collective capacity to deal with the cyber threat. During the past sessions, we have heard from different regional organizations and the way they use different capacity-building processes, such as the support provided for setting up CERTs, cybercrime registration, and cybersecurity strategies to almost simultaneously promote the development of CBMs, including point of contact and CERT-to-CERT cooperation. To their experience, regional organizations are well positioned to identify gaps, provide practical tools, and share best practices and examples to further develop CBMs. The scope of the existing challenges and the variety of financial and human resources needed to address them require framing development of CBMs as a multilevel and multistakeholder engagement involving all parts of government and the private sector. For example, given that protection of ICT-enabled infrastructure and adequate response capacities in case of attacks is evolving into one of the main norms of behavior in cyberspace, cooperation models among the incident respondents community emerges as one of the key confidence-building elements and that can only speed up the operation of CBMs. Many non-state stakeholders are already driving initiatives with the aim of building trust and confidence between states and non-state actors. The ability of non-state organizations to actively engage in the open-ended working group process and exchange views with states in itself creates trust between member states and the relevant organizations and experts, which is critical for the implementation of the framework. Therefore, the BSC directory would also gradually expand to include the contact information of relevant stakeholders to support more rapid crisis management, information sharing, and context awareness when cyber incidents take place, while at the same time bolstering participation with targeted outreach and capacity building to those with limited resources or technical expertise to raise awareness of the BSC, while also tackling cooperation between member states. Mr. Chair, building confidence is a long-term commitment to cultivate deeper dynamic relationship between CBMs, norms, and capacity building. The EU and its member states look forward to continuing the change in the open-ended working group on how confidence-building measures would provide and add value, enhancing security and stability in cyberspace. Thank you.
Chair:
Thank you very much, Chile, for your statement. Sorry, European Union, for the group statement. I give the floor now to Chile, also on behalf of the group.
Chile:
Mr. Chairman, thank you very much for giving us the opportunity to exchange views on capacity building measures. I will make this statement on behalf of the following countries of the Americas – Antigua and Barbuda, Argentina, Brazil, Canada, Colombia, Costa Rica, Ecuador, El Salvador, United States, Guatemala, Honduras, Mexico, Paraguay, Peru, Dominican Republic, Uruguay, and my own delegation, Chile. We would like to emphasize the dialogue among countries as one of the most important confidence-building measures. It is the basis for successful cooperation. We recognize the efforts of this open-ended working group and your chairmanship in the framework of preparing the third annual report, the APR 2024, which will be circulated for the consideration of our group in July. We would like to take this March session to reiterate our shared position on CBMs and to highlight the matters that we consider to be priorities and which require concrete actions. We believe that CBMs include measures of transparency, cooperation, and stability. They contribute to preventing conflict. They avoid erroneous perceptions and misunderstandings, and they reduce tensions. They are a concrete expression of international cooperation. They can strengthen security, resilience, and the peaceful uses of ICTs, in general favoring the application of norms on state-responsible behavior. They promote confidence and guarantee greater clarity, foreseeability, and stability in the use of ICTs by states. As has been previously mentioned, we recognize that the working group is in itself a CBM. In this regard, we attach importance to the development and implementation of CBMs, pointing out to the work done at the level of regional organizations. In particular, we wish to refer to the work done by the working group to prepare a group of CBMs and cyberspace by the OAS. This has made it possible to adopt measures in our region specifically on cyber diplomacy, including the designation of national POCs and foreign ministries. We welcome the recent fifth meeting, which took place on 26th and 27th February this year, and we congratulate the Dominican Republic and Canada for having taken on the chairmanship and vice chairmanship of that group. We recognize and value the implementation of the Global Directory of Points of Contact, which is an important step forward in confidence-building at the global scale. The directory can facilitate the application of other global CBMs, which can promote resilient, open, safe, stable, accessible, peaceful, free, and interoperable cyberspace for all. We believe that POC networks established at the regional level, as in the case of the OAS, could help the work of the directory. We also believe that capacity building and CBMs are two aspects which complement each other. Creating capacity is essential for concrete measures for CBMs. This is essential, and we must take into account the various regional positions and the specific needs of countries so that they may have on the issue. In this regard, we believe that it is important to have a work strategy in coordination with regional and sub-regional organizations. We also recognize the role of the many stakeholders, such as academia, private sector, civil society, NGOs, the technical community, among others, in implementing CBMs. And we encourage countries to work with these actors to have their experience and knowledge. States have the necessary tools to voluntarily apply CBMs, and they have the necessary forms. In this regard, we encourage states to use voluntarily the National Survey models to implement Resolution 7237 of the UN General Assembly, which could help to structure the information to be submitted to the Secretary General of their views and evaluations. We think that possible measures such as cooperation between the response teams, cooperation among states in terms of capacity building to close the digital divide, critical infrastructure experiences with regard to norms and application of international law and cyberspace, cooperation with stakeholders – these are all examples of concrete actions we can undertake to implement them nationally and globally. With regard to the universal implementation of CBMs listed in the initial list, we encourage states which have more experience and progress with the implementation to assist those countries which require help to make progress in their national capacities. The exchange of experiences, lessons learned, among others, are valuable elements which can help make concrete progress with continuity over time. Mr. Chairman, CBMs have historically played a role in our region, which has a valuable tradition as a zone of peace. The development of CBMs in the area of ICTs is a continuation of that history, which has made it possible to create spaces of cooperation, dialogue, and exchange of experiences which contribute in our region to having a resilient, open, safe, stable, and accessible, peaceful, free and interoperable cyberspace for all. Thank you.
Chair:
Thank you very much, Chile, for your statement on behalf of the group. Can I give the floor now to Hungary, please?
Hungary:
Thank you very much, Chair. Again, Hungary aligns itself with the statement of the European Union. Adding to that, similar to other EU member states, Hungary is also in the process of nominating a national POC or POCs to the global directory. You know, of course, that this is not always a straightforward issue, because we need to carefully explain the added value of the directory to our technical experts, similarly active in other networks regionally or otherwise, in a global setting. Thanks for the Chair’s team for sharing a clear timeline of events for 2024 and are looking forward to the very first global POC directory meeting in May, hopefully in a hybrid format, in order to allow the highest possible number of existing and future POCs to participate in this meeting. It is reassuring that, as it was mentioned actually today during a side event organized in the German House by an open, informal cross-regional group, the global POC directory agreed by consensus will remain with us, independent of the outcome of our discussion on a future regular institutional dialogue. So that’s a good thing that we can celebrate here again. Here I wish to highlight again the recommendation from our side to consider building an alumni community of cyber experts and future ex-POCs of the directory. We think that it can have an added value for our future cooperation. We shared a view expressed by the European Union that the recently launched POC directory could gradually be expanded to include the contacts of relevant other stakeholders, not necessarily incorporated in the directory itself, but those stakeholders who are in a position to contribute to deal with the consequences of unintended conflicts and lend support for national-level crisis management or sharing information with them. However, we need to be aware of the voluntary nature of the participation in the directory and the specific capacity of non-governmental stakeholders to participate in the discussions on the international security aspects of ICT developments. Thank you very much, Mr. Chair.
Chair:
Thank you very much, Hungary, for your statement and also for your suggestions. Friends, we are close to 6 o’clock, so I intend to adjourn the meeting at this point. And we have about 20 speakers, so we’ll continue the discussion tomorrow. And of course, the floor remains open. We can take in more speakers tomorrow morning. I wish you all a pleasant evening, and the meeting is adjourned. Thank you.
Speakers
AN
Access Now
Speech speed
155 words per minute
Speech length
529 words
Speech time
205 secs
Report
Your message is fundamentally well-constructed and does not appear to contain significant grammatical or spelling errors consistent with UK English standards. However, I will provide an edited version that refines the clarity and flow of the text, with particular attention paid to UK spelling and grammar: “We greatly value the opportunity to contribute to the vital discussions within this respected forum.
As 2024 unfolds, we are facing a global situation marred by the widening digital divide, leading to heightened cybersecurity risks amid societal digital transformation. This situation has bred an environment where malicious cyber attacks, such as invasive spyware and hack-by-hire operations, increasingly threaten fundamental human rights and the integrity of critical electoral processes.
With International Women’s Day nearing, we wish to highlight the disturbing findings of our recent report on spyware, including the Pegasus attacks, which targeted over 35 significant civil society members. These figures include a prominent women’s political participation advocate and a human rights lawyer fighting for women’s and workers’ rights.
Such attacks are enabled by a profit-driven sector that exploits cyber vulnerabilities, an aggression against women that we must recognise and address. We urge the Open-Ended Working Group (OEWG) to identify those within the hack-for-hire industry, such as spyware developers and distributors, as significant threats in its upcoming 2024 report.
These agents not only infringe upon individual rights but also threaten the internet’s overall security and stability. Furthermore, we commend the draft checklist by the Chair, which reflects international consensus on the OEWG’s endeavours and human rights standards. We propose that this checklist should pose direct questions to states about how they are observing the United Nations Human Rights Council’s resolutions on human rights on the internet and the right to privacy in the digital age, echoing previous recommendations by the Freedom Online Coalition’s 2014 Working Group on Cybersecurity.
We support the establishment of robust legal frameworks that protect cybersecurity researchers and the development of protocols for responsible vulnerability disclosure to advance cybersecurity research efforts. In summary, to enhance trust and foster collaboration, we advocate for the creation of platforms for open dialogue that include civil society and the private sector.
Our RightsCon Summit Series serves as an example of such an initiative, with the next session scheduled for February 2025 in East Asia. These discussions are pivotal in building confidence and crafting a collective response to the pressing cyber threats we face.
We express our gratitude for your consideration of our insights and remain committed to ongoing collaboration to address these urgent cybersecurity challenges.” Despite the use of some long-tail keywords, note that the focus on summary quality and accurate reflection of the main text take precedence over keyword density.
BF
Burkina Faso
Speech speed
116 words per minute
Speech length
379 words
Speech time
196 secs
Report
In his address to the assembly, the representative from Burkina Faso began by commending the members of the Bureau for their exemplary leadership and pledged Burkina Faso’s unwavering support. The speech quickly pivoted to address the pervasive issue of cybersecurity, highlighting the increasingly sophisticated use of digital technologies by terrorist groups.
These nefarious entities have exploited information and communications technologies (ICTs) to spread extremist ideologies, recruit members, and coordinate terrorist attacks, raising significant alarm in Burkina Faso. Echoing concerns of the Russian Federation, the representative advocated for the creation of international rules of conduct in cyberspace.
The proposed framework aims to foster responsible behaviour and thwart malicious cyber activities, with the sovereignty of cyberspace being a foundational element. The need to combat cybercrime and cyberterrorism was stressed, alongside the importance of protecting crucial infrastructure from cyber attacks.
The speech emphasised that rules governing cyberspace should be flexible and considerate of the varying levels of digital advancement across countries. The delegation underscored the importance of ensuring these rules are universally understood to avoid confusion and misinterpretation in their application.
Burkina Faso’s commitment to enhance cybersecurity through cooperation was evident as the speech detailed the nation’s active engagement with regional Computer Emergency Response Teams (CERTs) and Points of Contact (POCs). By sharing information on technical challenges and participating in collaborative initiatives, Burkina Faso is dedicated to enhancing information sharing and technical safeguards.
Concluding the speech, the critical role of the United Nations was underscored in securing financial resources for building digital security capabilities, particularly for developing countries. This support is seen as vital by Burkina Faso to create a level playing field in terms of cyber preparedness and resilience.
Overall, the address articulated a strong call to action for the international community. It outlined the threats posed by the abuse of cyberspace and put forth a clear path towards a secure, cooperative, and fair digital environment, under the auspices of the United Nations.
C
Canada
Speech speed
153 words per minute
Speech length
1167 words
Speech time
458 secs
Report
The detailed summary of Canada’s input to the Open-Ended Working Group (OEWG) underscores the paramount importance of international law within the group’s purview. Canada highlighted its ambition to sustain the momentum and progress achieved, as documented in Resolution 75-240 and subsequent annual reports.
With 15 months left in the OEWG’s mandate, there is a strong emphasis on the need for ongoing positive developments, looking ahead to the 2024 Annual Progress Report to reflect broader and more in-depth discussions on international law. Recognising a noteworthy increase in international engagement, Canada pointed out the heightened level of dialogue on international law amongst Member States and stakeholders, achieved through informal meetings in addition to the OEWG’s formal sessions.
This engagement is celebrated as a clear indicator of the expanding circle of participants and activities that support the OEWG’s aims. The Canadian delegation expressed unity with Colombia’s joint statement regarding international law and endorsed Senegal’s remarks on international humanitarian law.
Both statements represent collective regional dialogues and capacity-building activities that enhance the understanding of the application of international law. Commending the African Union and its Member States, Canada acknowledged the significant impact of their consolidated viewpoint on cyberspace’s legal framework.
Canada’s support in this area, through training and consultancy for African officials, underpins the harmony between Africa’s stance and the positions of other Member States from various regions. In line with Africa’s stance, Canada stressed the significance of peacefully resolving disputes and the relevance of international human rights and humanitarian laws.
The call for a UN General Assembly declaration on international law in cyberspace, a key feature of the African consensus, was met with keen interest, prompting Canada to offer its expertise to support other regions in developing their perspectives. For the improvement of the OEWG’s next APR, Canada proposed incorporating regional and sub-regional perspectives on international law and highlighted the value of scenario-based discussions.
The positive reception of these discussions during the UNIDIR workshop and various Member State-organised side events underscores their utility in fostering dialogue around international law. Canada also made a case for setting aside dedicated time for in-depth examination of international law topics in the OEWG’s intersessional meetings, suggesting a two-day dedicated session complete with expert briefings and group scenario activities.
Should this not be achievable in May, it was recommended that the session be deferred to a later date or the following year. The summary emphasised the need for action-oriented formats within current structures, such as subgroup studies, to ensure a legacy beyond the OEWG’s term.
Concluding its address, Canada reaffirmed its dedication to capacity-building initiatives and its commitment to funding training for officials on international law and cyberspace. These efforts are crucial for maintaining the enduring momentum and successful outcomes of both the annual and final reports.
Lastly, Canada appealed for the creation of a program of action to continue discourse on international law within the UN, positioning it as a vital extension of the OEWG’s foundational efforts.
CF
Center for Excellence of RSIS
Speech speed
180 words per minute
Speech length
673 words
Speech time
225 secs
Report
During the seventh OEWG session, a Singaporean policy research think tank emphasised the growing importance of confidence-building measures (CBMs) for combating cyber threats, particularly in protecting critical information infrastructure (CII) and addressing emerging artificial intelligence (AI) concerns. They identified a notable gap in the dialogue: the lack of CII protection practitioners’ contributions to OEWG discussions.
Drawing from their involvement in reviewing Singapore’s Operational Technology Cybersecurity Master Plan, they observed a domestic engagement with CII practitioners but saw a deficiency at the international level. To bridge this gap, they proposed establishing study groups or panels for collective capacity building and threat information sharing, aligning this suggestion with the goals outlined in paragraphs 12, 13, 17, and 23C of the Second Annual Progress Report.
On the topic of AI, the think tank endorsed the balanced view that AI harbours both security-enhancing potential and new threats, echoing Switzerland’s position. They supported Argentina’s call for a multi-stakeholder study group to examine the AI threat landscape holistically.
The think tank, drawing from its expertise, offered to facilitate such groups, advising a focus on responsible state behaviour in AI responses, governance, and international standards. The think tank concluded by affirming their dedication to aiding the OEWG and all stakeholders—including those not accredited—in making informed decisions regarding the evolving cyber threat landscape.
They advocated for open dialogue and collaboration, asserting their role in international discussions aimed at consensus-building and informed policymaking in response to the complexity of cyber threats in our digital age.
CF
Center for International Law
Speech speed
186 words per minute
Speech length
599 words
Speech time
193 secs
Report
The Centre for International Law (CIL) took the opportunity to express its appreciation to the Chair for facilitating its engagement in the Open-Ended Working Group (OEWG) discussions. The OEWG is a crucial platform for shaping the international legal framework concerning state use of Information and Communication Technologies (ICT) in cyberspace.
The Centre stressed the importance of understanding and applying international law in cyberspace, which is essential for building a consensus that contributes to maintaining peace, security, and stability. During the discussions, a consensus emerged on the relevance of the United Nations Charter to cyberspace and the applicability of foundational international law principles, such as the prohibition of the use of force and the doctrine of non-intervention.
National representatives’ statements highlighted these areas of agreement and identified other aspects of the legal framework related to cyberspace that necessitate further dialogue. Artificial Intelligence (AI) featured prominently in the discussions, being recognized for its transformative potential and dual-use nature.
The CIL observed that despite AI’s disruptive capabilities, international law, which is technologically neutral, remains applicable. Consequently, AI, including autonomous and generative applications, falls under existing legal frameworks encompassing treaties, customary international law, and general principles that govern state behaviour.
However, the CIL articulated critical questions regarding the sufficiency of these principles in tackling the unique challenges AI presents. Issues such as AI’s impact on legal processes, evidence collection and analysis, and the attribution of cyber operations were highlighted. The Centre also stressed the necessity for states to understand their responsibilities in preventing or mitigating AI-enabled malicious operations, which calls for a deep understanding of AI’s distinctive attributes and multi-disciplinary collaborative efforts.
Furthermore, the growing threats posed by misinformation and disinformation campaigns in cyberspace were noted by several delegations. The CIL acknowledged that stakeholders have a significant role in addressing these contemporary issues. In light of this, the Centre is partnering with the American University, Washington College of Law, and other bodies to host the Third Annual Symposium on Cyber and International Law.
The symposium’s theme for this year centres on cyber and information conflict, exploring the interactions between these domains and their impact on international law, including state liability and international human rights implications. The CIL encouraged delegates to review their comprehensive statement for additional detail and extended gratitude to the Chair for providing a space for meaningful dialogue and progress in the understanding and implementation of international law in the digital arena.
C
Chair
Speech speed
133 words per minute
Speech length
3908 words
Speech time
1763 secs
Arguments
Cybersecurity threats such as ransomware and deepfakes are affecting vulnerable groups, especially the youth.
Supporting facts:
- Young people are highly familiar with the internet and are therefore more exposed to various cyber threats.
- Deepfake technology can be used to create fake explicit images, impacting students and youth.
Topics: Cybersecurity, Deepfakes, Online Safety
The establishment of a permanent mechanism for ICT security should include a focus on youth.
Supporting facts:
- Youth perspectives can provide valuable insights into creating safe online spaces.
- Youth for Privacy advocates for the inclusion of youth-focused thematic dialogue in ICT security.
Topics: ICT Security, Youth Empowerment
There is a need for educational programs focused on cybersecurity, data privacy, and ethics in ICT use.
Supporting facts:
- Equipping young people with knowledge and skills in these areas is crucial for their safe participation in the digital economy.
- Such educational initiatives can empower the youth to contribute effectively to the digital world.
Topics: Education, Cybersecurity Training, Data Privacy, Ethical ICT Use
Private sector stakeholders like Safe PC Solutions are integral in addressing ICT threats.
Supporting facts:
- Safe PC Solutions provides feedback on revised critical questions related to ICT threats.
- Safe PC Solutions is working on a white paper to identify supply chain risks.
Topics: ICT Security, Private Sector Engagement
AI adoption is rapidly increasing, raising questions about governance and security policies.
Supporting facts:
- AI tools like Microsoft 365 Copilot and READ.AI are becoming widely used.
- CIOs and CISOs are concerned about governance related to AI.
Topics: Artificial Intelligence, Cybersecurity, Governance
Supply chain integrity is a major concern that requires enhanced international cooperation.
Supporting facts:
- Safe PC Solutions is developing methods to identify risks in the ICT supply chain.
- Collaboration with RightPilot is mentioned to gain perspective from Middle Eastern states.
Topics: Supply Chain Security, International Cooperation
Developing IT security risk tools and workshops can help UN member states.
Supporting facts:
- There is a proposal to produce a working paper and conduct a workshop for risk mitigation.
- Safe PC Solutions is already partnering with RightPilot for this initiative.
Topics: Capacity Building, Risk Management, UN Collaboration
International law’s application to state use of ICT is crucial for peace and stability
Supporting facts:
- The UN Charter’s applicability and principles such as use of force and non-intervention are agreed upon
Topics: International Law, ICT, Cybersecurity
Consensus and divergences in international law application to cyberspace are illuminated through national positions
Supporting facts:
- National positions reflect areas of consensus and pinpoint where dialogue is needed
Topics: OEWG, Cyberspace, International Law
AI’s transformative impact on ICT calls for an understanding of international law’s application to it
Supporting facts:
- International law is technology neutral and principles like non-intervention apply to AI
Topics: Artificial Intelligence, ICT, International Law
Legal analysis and state conduct with respect to AI in cyberspace require multidisciplinary engagement
Supporting facts:
- AI’s unique features necessitate an in-depth understanding for legal attribution and evidence
Topics: AI, Cyberspace, International Law, State Responsibility
Misinformation and disinformation in cyber operations are emergent concerns
Supporting facts:
- Delegations cited misinformation and disinformation as existing cyber threats
Topics: Misinformation, Cyber Operations, Disinformation
Information conflict and its convergence with cyber operations have significant international law implications
Supporting facts:
- The symposium discusses the convergence of cyber and information operations and its legal implications
Topics: Information Conflict, Cyber Operations, International Law
The evolution of ICT and potential for cyber attacks on nuclear command and control is concerning.
Supporting facts:
- Cyber attacks could exploit vulnerabilities in security networks, hospitals, schools, and infrastructure.
- Security systems are fallible and software breaches have occurred even in sophisticated institutions.
Topics: Cybersecurity, Nuclear Weapons, Information and Communication Technology
The application of the UN Charter and international humanitarian law to cyber warfare should be examined.
Supporting facts:
- ICT networks are critical in armed conflict.
- International humanitarian law emphasizes the distinction between civilians and combatants, and prohibits unnecessary suffering.
Topics: International Law, Armed Conflict, Cyber Warfare
Cybersecurity is crucial in preventing accidental nuclear launches and ensuring the safety of weapon systems.
Supporting facts:
- Nuclear war threat is linked to the security of weapon systems.
- Accidental nuclear weapon launches could pose existential threats.
Topics: Cybersecurity, Nuclear Weapons
Youth participation, including expertise in ICTs, is essential for creating a secure technological environment.
Supporting facts:
- Young people have grown up in the digital age.
- They hold unique skills that could aid in preventing the misuse of ICT in conflicts.
Topics: Youth Empowerment, ICT Expertise
Nation states should adhere to voluntary norms of responsible behavior in the ICT environment
Supporting facts:
- Resolution 7323 outlines that ICT activities alone are not grounds for state action
- Illicit acts against states in the ICT environment need regulation
Topics: ICT norms, international relations, cybersecurity
There is a need for an international framework for ICT security regulation
Supporting facts:
- An appropriate framework should establish elements of an international system
- The framework should include bases for regulated international relations under national laws
Topics: ICT regulation, international framework, cybersecurity
The international community should address artificial intelligence in the context of ICTs
Supporting facts:
- AI is an emerging factor in international information security
Topics: Artificial Intelligence, ICTs
Paris Peace Forum highlighted the dangers of proliferating cyber-intrusive and disruptive capabilities
Supporting facts:
- The trend of proliferating cyber capabilities could empower more malicious actors and increase the threat landscape
- 25 states joined the Palmar process to tackle proliferation and irresponsible use of commercial cyber intrusion capabilities
Topics: Cybersecurity, International Peace and Security
Paris Peace Forum supports cooperation amongst states
Supporting facts:
- Paris Peace Forum commends the initiative by France and the UK to create a common understanding on cyber threats
- Encourages states to share national positions on responsible use of cyber tools
Topics: Cybersecurity
Chair values the contributions and engagement of stakeholder community
Supporting facts:
- Stakeholder contributions recognized as thoughtful
- Chair encourages member states to reach out and work with stakeholders
Topics: Stakeholder Participation, Cybersecurity
Chair aims for continued dialogue and collaboration with stakeholders
Supporting facts:
- Stakeholder dialogue as a permanent aspect of the working group process
- Future mechanism to include and possibly enhance stakeholder engagement
Topics: Stakeholder Participation, Policy Making
Uruguay supports the application of international law in ICTs
Supporting facts:
- Uruguay participated in an event with Australia and the Philippines on the application of international law in various scenarios.
- Uruguay highlights a UNIDIR report and recognizes the importance of principles such as sovereignty, noninterference, prohibition of the use or threat of use of force, and peaceful settlement of disputes.
Topics: Cybersecurity, International Law
Uruguay values the importance of protecting human rights in the cyber domain
Supporting facts:
- Uruguay believes in the obligation to preserve confidentiality and protect information with a focus on human rights.
- Uruguay asserts that protecting human rights and freedoms must guide discussions on cybersecurity.
Topics: Human Rights, Cybersecurity
Uruguay has a comprehensive national cybersecurity framework
Supporting facts:
- Uruguay mentions activities by their CERT and the protection of individual data.
Topics: Cybersecurity
International humanitarian law should apply to cyber activities in armed conflict
Supporting facts:
- Uruguay believes in the application of international humanitarian law in the context of cyber activities during armed conflicts.
Topics: International Humanitarian Law, Cybersecurity
Uruguay supports multilateral progression and international exchanges on cyber law
Supporting facts:
- Uruguay endorses the organization of exchanges on international law and is in favor of discussions based on potential scenarios of ICT misuse.
Topics: Multilateral Relations, International Law
Israel encourages discussions on international law in cyberspace.
Supporting facts:
- Israel has consistently expressed its position in open ended working group discussions and other international fora.
Topics: Cybersecurity, International Law
Understanding the application of international law to cyberspace requires a continuing and long-term process.
Supporting facts:
- Israel emphasizes the need for national views exchanges and acknowledges the evolving threat landscape.
Topics: Cybersecurity, International Law
Israel submitted an official legal paper on the application of international law to cyber operations to the UNODA Secretariat.
Supporting facts:
- The paper deals with Israel’s perspective on key legal and practical issues concerning cyber operations.
Topics: Cybersecurity, International Law, UNODA
International law applies to cyberspace, but adaptations may be needed due to cyberspace’s unique features.
Supporting facts:
- Cyberspace features include global data travel, private ownership of infrastructure, decentralization, and rapid technology development.
Topics: Cybersecurity, International Law
The Open-ended Working Group facilitates states’ presentation and publication of their views on applying international law.
Supporting facts:
- The platform is seen as a venue for scenario-based discussions and for states to refine and update positions on international law.
Topics: Cyberspace, Open-ended Working Group
Consensus on the application of international law should precede the creation of new rules or legally binding instruments.
Supporting facts:
- Israel believes in building a common understanding before moving to create or adopt new rules.
Topics: International Law, ICT
Israel sees no need for the development or adoption of a legally binding instrument for cyberspace law.
Supporting facts:
- Israel underscores the sufficiency of current international law application and the unnecessary nature of a binding instrument.
Topics: Cyberspace, International Law
Saudi Arabia emphasizes capacity-building as a strategic priority for strengthening international cybersecurity.
Supporting facts:
- The delegation thanks the Chair and Secretariat for their efforts in the Working Group.
- They stress the significance of capacity-building for strong cybersecurity.
Topics: Cybersecurity, Capacity-Building
Saudi Arabia advocates for the effective sharing of best practices among member states to bolster cybersecurity.
Supporting facts:
- The Kingdom recognizes the contribution of various initiatives to global cybersecurity efforts.
- There’s an emphasis on cooperation and coordination for sharing best practices.
Topics: Cybersecurity, International Cooperation
Saudi Arabia proposes evaluating and leveraging existing UN platforms to prevent duplicative efforts within the GCSCP.
Supporting facts:
- Saudi Arabia wants to avoid duplication with existing UN platforms.
- They suggest harmonization of different platforms.
Topics: Cybersecurity, UN Coordination
Increasing interest and accessibility of cyber capabilities raises the risk of conflict due to miscommunication.
Supporting facts:
- Barriers to access to cyber capabilities are decreasing
- Risk of conflict from miscommunication and misunderstanding is growing
Topics: Cybersecurity, International Conflict
Operationalizing CBMs globally is progressing through a POC directory and stakeholder input.
Supporting facts:
- Establishment of a global intergovernmental POC directory
- Collecting input from stakeholders on CBMs through dedicated intersessional meetings
Topics: Global Cooperation, Cybersecurity
EU supports regional cyber CBMs aligned with specific regional needs and interests.
Supporting facts:
- EU is in the process of nominating POCs for the global directory
- Important progress by regional organizations in implementing cyber CBMs
Topics: EU Policy, Regional Cooperation, Cybersecurity
Sharing information and cooperative measures at regional levels are key to universal CBM implementation.
Supporting facts:
- Information sharing at regional and sub-regional level
- Development of cooperative measures like resilience building and capacity-building initiatives
Topics: Regional Cooperation, Information Sharing, Cybersecurity
Regional organizations play a significant role in developing CBMs through capacity-building processes.
Supporting facts:
- Support for setting up CERTs and cybersecurity strategies
- Promotion of development of CBMs including POC and CERT-to-CERT cooperation
Topics: Regional Organizations, Capacity Building, Cybersecurity
Multi-level and multistakeholder engagement is required for CBM development including government and private sector.
Supporting facts:
- Need for varied financial and human resources
- Engagement of all parts of government and private sector
Topics: Multistakeholder Engagement, Public-Private Partnership, Cybersecurity
Cooperation among incident response communities is a key confidence-building element.
Supporting facts:
- Protection of ICT-enabled infrastructure is a main norm
- Response capacities are essential for addressing attacks
Topics: Incident Response, Cybersecurity Cooperation
Non-state stakeholders and their participation in OEWG enhance trust between member states and relevant organizations.
Supporting facts:
- Active engagement of non-state organizations in OEWG process
- Exchange of views with states creates trust
Topics: Stakeholder Engagement, Cybersecurity
Broadened POC directory and cooperative initiatives are critical for effective cyber incident management.
Supporting facts:
- Expansion of BSC directory to include contact information of relevant stakeholders
- Targeted outreach and capacity building for rapid crisis management
Topics: Cyber Incident Management, Collaboration
Building confidence in cyber space is a long-term commitment that requires integration of CBMs, norms, and capacity building.
Supporting facts:
- EU looks forward to continuing dialogue in OEWG on CBMs
- Enhancement of security and stability in cyberspace
Topics: Cyber Confidence Building, Long-term Commitment
Report
The symposium provided a comprehensive platform for in-depth discussions on pivotal ICT issues, from the detrimental impact of cyber threats on younger demographics to proposals for global collaboration and legal adherence. A significant concern raised was the negative repercussions of cybersecurity dangers like ransomware and the rapid advancement of deepfake technology.
The forum recognised that such threats disproportionately affect the youth, who are intricately woven into the digital fabric. Despite these challenges, the dialogue underscored the potential of young individuals in creating safer online environments, leveraging their unique perspectives and insights.
In terms of prevention, there was a pronounced call for substantive educational strategies centred on equipping the youth with essential knowledge in cybersecurity, data privacy, and ethical ICT usage, in line with SDG 4 and SDG 16’s focus on education, peace, and sturdy institutions.
The mitigation of ICT threats highlighted the importance of private sector participation, with Safe PC Solutions standing out for its efforts in risk identification, particularly in supply chain management. The vulnerability of supply chains necessitates global collaborative efforts for effective protection.
The forum also touched on the integration and governance of Artificial Intelligence (AI) within cyber policies. As AI applications like Microsoft 365 Copilot and READ.AI gain traction, the development of adaptive governance and security policies is crucial. The challenges of misinformation and disinformation within cyber operations were recognised as emerging threats, with symposiums delving into their complex relationship with information conflicts and the implications for international law.
Countries such as Uruguay, Israel, and the European Union provided distinct perspectives on cyber operations and their legal governance. Uruguay’s commitment to upholding human rights within the cyber sphere, alongside its stance on the rule of law, was noted favourably.
Similarly, Israel underscored the adequacy of the existing legal framework for cyberspace and questioned the necessity of binding new instruments. Meanwhile, the EU concentrated on the virtues of cooperation and building skills through regional cyber CBMs and capacity-building initiatives. The youth were identified as pivotal players in the future of cybersecurity, with calls for greater involvement and representation, drawing from their inherent digital savvy.
The proposal put forth aims to integrate young experts into policy domains such as the Point of Contact directory, to infuse fresh insights and skill sets into the myriad ICT challenges. The symposium concluded on a consensus-seeking note, emphasising the need for strengthened international cooperation on legal applications to cyber activities.
Discussions pointed to the urgent requirement for a multilateral approach to tackle diverse cybersecurity concerns and the vital importance of stakeholder engagement in shaping comprehensive and robust cyber policies. In summary, the collective aspiration advocates for a synergistic methodology that synchronises actions for a fortified technological framework, promoting responsible state conduct, and equipping the next wave of cyber-literate individuals.
The confluence of cybersecurity on various planes—ethical, educational, and regulatory—was highlighted, with a pressing call for cooperation among nations, the establishment of capacity-building initiatives, and the adoption of inclusive policies that integrate societal sectors, with a specific emphasis on the dynamic involvement of the youth.
CH
Chatham House
Speech speed
174 words per minute
Speech length
582 words
Speech time
201 secs
Report
The statement delivered at the forum highlighted the intricate and evolving nature of cyber threats within the contemporary digital landscape. The convergence of cybercrime and state-backed cyber espionage poses considerable risks on both national and international scales. Cybercriminal syndicates often collaborate with state entities, intensifying the complexity of cyberattacks.
Furthermore, the issue of states turning a blind eye to cybercrime emanating from their territory aggravates the attribution difficulties and hampers accountability within the cyber domain. An increase in advanced cyber capabilities, coupled with an abundance of potential targets, has escalated vulnerabilities.
These security threats to critical infrastructure (CI) and other sectors are not solely the purview of state actors, but also involve criminal motivations, calling for expansive discussions and cooperative measures between governments and stakeholders. The Palmao process was commended as a significant initiative encouraging global cooperation against the deployment of commercial cyber intrusion tools.
Considering that the threat spectrum includes a wide array of actors, a multifaceted dialogue bringing together diverse expertise and perspectives is crucial. Research is pivotal in countering cyber threats. Institutions like Chatham House and UNIDIR are collaborating to explore the linkage between Information and Communication Technologies (ICT), international security, and cybercrime.
Collaborative efforts with the Royal United Services Institute are aimed at understanding the facilitators of commercial cyber intrusion tools proliferation and developing countermeasures. Additionally, a Netherlands-backed project aims to implement the 10 Cyber Capacity Building Principles, promoting responsible state behaviours in cyberspace.
The research activities are essential for developing global understanding and framing effective counter-cyber threat strategies. Their capacity-building potential was underscored, and the speaker acknowledged the audience’s recent input, which will be considered for the forthcoming presentation of research findings in July.
The final note of the statement underlined that conventional crime-focused responses are insufficient to tackle the amplified threat and impact of cybercrimes on global security. The speaker urged for an integrated approach, marrying different cyber processes in order to formulate a multidimensional and coherent cyber defence strategy.
There was strong advocacy for widespread and varied involvement in cyber discussions and an overarching strategy that embraces comprehensive capacity building to combat the intensifying cyber threats facing the world today. [Several strategic keywords are naturally embedded within the summary, such as ‘cyber threats’, ‘international security’, ‘critical infrastructure’, ‘capacity building’, ‘information and communication technologies’, ‘cyber defence strategy’, ‘state-sponsored cyberattacks’, ‘commercial cyber intrusion tools’, and ‘cybercrime’.
The UK spelling and grammar conventions have been maintained, ensuring accuracy and consistency throughout the text.]
C
Chile
Speech speed
126 words per minute
Speech length
854 words
Speech time
407 secs
Report
The speaker, representing an alliance of American countries, underscored the critical importance of confidence-building measures (CBMs) for fostering effective dialogue and cooperation among nations, particularly in the realm of information and communication technologies (ICTs). These CBMs are seen as pivotal for maintaining peace and stability.
The alliance includes nations such as Antigua and Barbuda, Argentina, Brazil, Canada, and Chile. They commend the progress made by the open-ended working group and anticipate the forthcoming APR 2024 report. This report is viewed as essential for stimulating cybersecurity discourse within international relations and will be a key point of reference in discussions scheduled for July.
CBMs were described as multifaceted tools essential for fostering transparency, cooperation, and stability while reducing conflicts by preventing misunderstandings and easing tensions. They are considered fundamental in enhancing security and building resilience, encouraging the peaceful use of ICTs in accordance with norms of responsible state behaviour.
The working group itself is an example of a CBM, reflecting the dedication to develop and implement such measures. The Organisation of American States (OAS) and its work in cyber diplomacy, including the establishment of points of contact (POCs) within foreign ministries, was highlighted as a key example of this commitment.
The fifth meeting of the OAS was acknowledged, with specific praise for the contributions of the Dominican Republic and Canada. The Global Directory of Points of Contact was recognised as a critical advancement, promoting global confidence. This directory is instrumental in facilitating the worldwide application of CBMs, supporting the vision of a resilient, open, secure, accessible, peaceful, and interoperable cyberspace.
Emphasising the connection between capacity building and CBMs, the coalition stressed the importance of tailoring capacity-building efforts to suit the diverse requirements of different regions. They advocated for strategic coordination with regional organisations, including various stakeholders such as academia, the private sector, civil society, NGOs, and technical experts.
States were encouraged to utilise tools like National Survey models and to voluntarily apply CBMs in conformity with UN General Assembly Resolution 7237. This aids in structuring the information provided to the Secretary-General. The discussion addressed the practical application of CBMs through examples such as cyber response team cooperation, bridging the digital divide, sharing infrastructure insights, adhering to norms, and applying international law in cyberspace.
The statement called for experienced states to mentor others requiring assistance in building national capacities, endorsing the exchange of experiences as a means to make substantial progress. In conclusion, the speaker reflected on the historical significance of CBMs in their region, celebrating it as a zone of peace.
The adaptation of CBMs to the sector of ICTs is viewed as a continuation of this history, fostering spaces of cooperation and dialogue and contributing to a unified vision of a peaceful and interoperable cyberspace. The alliance advocated joint responsibility, melding historic experience with current efforts to forge a secure cyber future collectively.
C
Colombia
Speech speed
131 words per minute
Speech length
457 words
Speech time
210 secs
Report
The Colombian Delegation reinforced its commitment to two pivotal statements during the meeting presided over by Mr. Chairman. Firstly, Colombia backed the initiative for the broader integration of international law into cyberspace, a topic that was emphasised that morning. Secondly, Colombia lent its support to Senegal’s declaration on the adherence to international humanitarian law in ICTs amid armed conflicts.
This support underlines a cross-regional consensus and underscores the universally acknowledged significance of these legal structures in contemporary technological situations. Furthermore, expressing its own views, Colombia highlighted the noticeable dedication of states to collaborate in fostering a shared understanding and locating consensus on cyberspace governance and management.
Colombia views such international collaboration as essential for developing comprehensive strategies in cyberspace. Domestically, Colombia has proactively participated in shaping its stance on the application of international law principles in the digital realm. Capacity building has been a key element in this process, and bilateral discussions with the experienced Canadian counterparts have proved highly constructive.
Colombia suggests emulating these bilateral dialogues within the working group to bolster capacity-building initiatives. In response to Mr. Chairman’s inquiry about essential domestic capabilities, Colombia emphasises the imperative need for training in the implementation of international humanitarian law within cyber sectors, especially within defence departments.
Enhanced training is pivotal for nurturing a consensus and achieving a uniform understanding between nations. Additionally, Colombia reported the effectiveness of its practical, scenario-driven workshop, a joint achievement with SICTER and UNIDIR. This workshop was part of the fifth meeting on CBMs by the Organization of American States, and through three hypothetical scenarios, it promoted concrete insights into applying responsible state actions and international laws in cyber occurrences.
Colombia champions the adoption of this hands-on, immersive approach for future informal sessions, proposing adherence to the Chatham House Rule to stimulate candid and unrestrained discussions. In summary, the interventions from the Colombian Delegation are indicative of Colombia’s active role in international discourse, focus on capacity-building, and innovative employment of scenario-based training.
These endeavours contribute significantly to forging a robust, collaborative cyber landscape internationally.
C
Czechia
Speech speed
168 words per minute
Speech length
1030 words
Speech time
368 secs
Report
The Czech Republic aligns with the European Union’s stance and aims to offer additional perspectives on the application of international law in cyberspace, valuing the Chair’s foresight in providing guiding questions. The country is proud of its recent publication detailing its national position on this topic, recognising it as part of a global increase in interest and dialogue on this essential issue.
There is a noticeable convergence in interpretations of certain international law provisions like non-intervention, prohibition of force, peaceful dispute resolution, due diligence, and the application of international humanitarian law (IHL). The Czech Republic notes the significant progress made thanks to this unified understanding and commends the African Union for their efforts towards regional consensus.
Furthermore, the Czech Republic endorses Colombia’s joint statement on behalf of several nations and looks forward to a statement by Senegal on IHL, with cross-regional support including from the Czech Republic, to promote a more detailed debate. A collaborative event by Brazil, Switzerland, and the International Committee of the Red Cross (ICRC) focusing on digital threats to civilians in conflicts is also expected to enhance the understanding of IHL in cyberspace.
Regarding the Chair’s second question addressing the peculiar aspects of Information and Communication Technologies (ICTs), such as cyberspace’s expansive, borderless nature and rapidly advancing technology, the Czech Republic emphasises that, despite these characteristics, international law principles remain relevant and applicable.
The Czech Republic believes that rather than attempting to address ‘gaps’ in the application of international law to cyberspace, it is more productive to encourage states to engage more deeply in discussions and explore all viewpoints thoroughly. Scenario-based discussions in the Open-Ended Working Group (OEWG) are considered beneficial by the Czech Republic.
The country proposes involving experts’ input and extending sessions, drawing on successful past experiences such as UNIDO’s workshop, exercises by NATO, and the Cyber Defence Centre of Excellence (CCDCOE) in Estonia. Additionally, a side event by Australia, Uruguay, and the Philippines that applied international law to hypothetical scenarios, as well as the Cyber Law Toolkit, are acknowledged as valuable contributions.
In conclusion, the Czech Republic contemplates a future Program of Action to sustain the dialogue’s momentum. It reaffirms its support for the OEWG’s efforts and remains devoted to furthering a shared understanding and effective measures in the sphere of cyber governance and law.
(Note: The initial text provided contained proper UK spelling and grammar, and no substantial grammatical errors, misspellings, or missing details were identified. Corrections and enhancements made were focussed on improving flow and contextual clarity without altering the original meaning or intent.)
CD
Côte d’Ivoire
Speech speed
141 words per minute
Speech length
667 words
Speech time
284 secs
Report
The representative from Côte d’Ivoire delivered a detailed statement to the United Nations, acknowledging the essential role of cyberspace in current global affairs and recognising it as the fifth domain of conflict, alongside land, sea, air, and space. The envoy highlighted that cyberspace, despite being distinct, should not be immune to international law.
The speech clarified that the principles of the UN Charter inherently apply to digital platforms, including state sovereignty, equal rights for all states, non-intervention in domestic concerns, peaceful resolution of disputes, state obligations, and a precautionary stance. Upholding these tenets is pivotal for fostering stability and peace in the digital landscape.
Adhering to international humanitarian law (IHL) and human rights is also crucial for cyberspace governance. The delegate warned against ignoring these standards, as it could intensify digital conflicts. Côte d’Ivoire’s dedication to these principles was exemplified by its cybersecurity strategy for 2021-2025, which aims to align with international humanitarian and human rights laws in its cyberspace operations.
The statement commended the progress in understanding the application of international law in cyberspace, especially praising the contributions of the Open-Ended Working Group (OEWG) in this arena. A notable accomplishment was establishing a unanimous African Union (AU) stance on this issue, which could greatly influence further discussions.
The Côte d’Ivoire stance was elaborated with several crucial recommendations to enrich dialogue: – Introduce regional insights to interpret how international law pertains to cyberspace. – Reconfirm the validity of international legal norms in the digital space and states’ obligations to uphold them.
– Improve states’ abilities to practise due diligence by fostering international cooperation and sharing information between national and international cyber response teams (CERTs and C-CERTs). – Promote investment in research, development and technologies that facilitate peaceful conflict resolution. – Advocate for treaties to combat cybercrime and protect individual human rights everywhere.
– Support capacity-building in developing and least developed countries regarding national cybersecurity strategies and relevant technologies. – Call for a more unified international effort to elucidate international legal principles and draft rules which consider developmental factors. In conclusion, the Côte d’Ivoire delegation urged the United Nations to consider implementing a declaration to endorse the application of international law in cyberspace, involving a broad range of stakeholders such as international and regional organisations.
The address underlines Côte d’Ivoire’s commitment to creating a regulated, stable and fair cyberspace worldwide, emphasising the link between international law, cybersecurity and human rights in our digital era.
DF
Diplo Foundation
Speech speed
160 words per minute
Speech length
388 words
Speech time
145 secs
Arguments
Diplo Foundation emphasizes the importance of mapping roles and responsibilities for implementing UN norms in cyber diplomacy.
Supporting facts:
- Diplo Foundation has been working in capacity building for small and developing countries for 20 years.
- The Geneva Manual is an effort by the Diplo Foundation to establish roles in responsible behavior in cyberspace.
Topics: Cyber Diplomacy, UN Norms Implementation
There is a need for open dialogue and collaboration among stakeholders to protect critical infrastructure.
Supporting facts:
- Over 50 representatives of stakeholders and independent experts are involved in the dialogue.
- The Geneva Dialogue has created the Geneva Manual detailing stakeholder roles and expectations.
Topics: Critical Infrastructure Protection, Stakeholder Collaboration
Recommendations for a checklist to map roles and responsibilities in norms implementation to help understand what is expected from various stakeholders.
Supporting facts:
- The Geneva Manual already outlines such roles for industry, civil society, and others.
- The checklist is suggested to be part of the norms implementation from the UN Open Annual Working Group’s second annual progress report.
Topics: Cybersecurity Norms, Stakeholder Responsibilities
Capacity building is crucial and should be inclusive, holistic, and neutral, involving local and regional organizations.
Supporting facts:
- Diplo Foundation has made its contribution to a mapping exercise for capacity building.
- A global roundtable on ICT security capacity building is commended as a valuable opportunity.
Topics: Capacity Building, Inclusivity in Education
Report
The Diplo Foundation has earned significant positive acclaim for its sustained contributions over 20 years to the increasingly important domains of cyber diplomacy, internet governance, and cybersecurity. Its dedication to capacity building is critical in assisting small and developing nations to effectively engage with the intricacies of digital diplomacy and governance.
At the core of the Diplo Foundation’s endeavours is the Geneva Manual, a seminal piece that delineates roles and duties to promote responsible behaviour among stakeholders in cyberspace. This manual stands as a detailed blueprint for the application of UN norms, aiming to ensure that global cyber participants act ethically and maintain security.
Furthermore, through the Geneva Dialogue, the Diplo Foundation has underscored its commitment to encouraging cooperative engagement among a wide array of stakeholders. This initiative has established a dialogue platform that involves over 50 representatives and experts, uniting their expertise to secure critical infrastructure, a vital goal aligned with Sustainable Development Goal 9, focusing on resilient infrastructure advancement, innovation, and industrialisation.
A key recommendation emerging from the UN Open Annual Working Group’s second annual progress report highlights the need for a checklist to outline stakeholder responsibilities explicitly. This tool is instrumental in fostering a thorough understanding and implementation of cybersecurity norms, supporting SDG 16’s objective of promoting peaceful and inclusive societies.
In terms of capacity building, the Diplo Foundation champions a strategy that is inclusive, comprehensive, and impartial. Its endorsement of an international, cross-disciplinary dialogue on ICT security capacity building is recognised as a substantial contribution towards enhancing worldwide cyber-defence strategies.
These efforts are in concordance with the aims of SDG 4 to provide equitable and quality education for all. In summary, the Diplo Foundation advocates for educational outreach, inclusive dialogue, and the formulation of precise operational guidelines within the realms of cybersecurity and cyber diplomacy.
Through the Geneva Manual and Geneva Dialogue, alongside contributions to international policy discussions and collaborative roundtables, the Foundation aligns with multiple SDGs, especially with the educational goals of SDG 4 and the peace and governance goals of SDG 16. The consistently positive sentiment towards the Foundation’s initiatives reflects the importance of their work in advancing global cooperation and understanding in addressing cybersecurity challenges, thus contributing to a more secure, stable, and equitable digital landscape.
EU
European Union
Speech speed
123 words per minute
Speech length
644 words
Speech time
313 secs
Report
The chair acknowledges the supportive stance of various candidate countries including North Macedonia, Serbia, and Georgia, as well as the EFTA nations Iceland and Norway, along with San Marino, towards the statement concerning cyber security. This statement highlights the increasing global interest in cyber capabilities and the reduced barriers to acquiring them, which raises the risk of conflicts due to miscommunication and misunderstanding.
Progress has been made toward the global operationalisation of Confidence-Building Measures (CBMs), notably in the recent sessions of the Open-Ended Working Group. A significant step is the creation of a global intergovernmental Point of Contact (POC) directory. The European Union, in unison with its member states, is actively involved in this initiative by appointing POCs, crucial for mitigating cyber security risks and enhancing international cooperation.
The statement underscores the importance of regional organisations in adapting and implementing cyber CBMs to regional needs and interests, with the EU’s support. Promoting regional collaboration is seen as an effective method for the universal adoption of the proposed voluntary global CBMs.
Sharing information on regional and sub-regional levels, supported by regional programmes and cross-regional partnerships, is essential for the swift implementation of these measures. Furthermore, cooperative efforts such as capacity-building initiatives are endorsed to increase cyber resilience between states. Regional organisations’ efforts in capacity building are highlighted, such as assistance in setting up Computer Emergency Response Teams (CERTs), cybercrime recording, and the development of cybersecurity strategies.
These activities are crucial for advancing CBMs by improving POC protocols and encouraging CERT-to-CERT collaboration, thereby supporting cyber resilience growth. The statement emphasises the need for a multi-level and multi-stakeholder strategy for CBM development, which encompasses challenges and resources beyond governmental scope, involving the private sector due to the intricacy of cybersecurity ecosystems.
It suggests focusing on the protection of ICT-enabled infrastructure and development of response capacities as key areas of cooperation among incident response teams. It also acknowledges the role of non-state actors in fostering trust and confidence and their critical involvement in the Open-Ended Working Group process.
Their participation facilitates the sharing of expertise, essential for the effective implementation of CBMs. A proposition to extend the POC directory to incorporate non-governmental contacts is made, enabling quicker crisis management and information sharing in the event of cyber incidents.
The statement calls for broadened outreach and capacity-building initiatives, aiming to increase awareness of the BSC and assist those with limited means or technical knowledge. In summary, the EU is committed to sustaining a dynamic interplay between CBMs, norms, and capacity building in the cyber domain.
This is key to developing confidence and security in cyberspace. The EU and its member states are keen to pursue discussions within the Open-Ended Working Group, investigating how CBMs can further contribute to stability and security in the cyber realm, demonstrating their continuous dedication to collaborative, informed, and strategic actions within the global cybersecurity environment.
F
France
Speech speed
134 words per minute
Speech length
720 words
Speech time
324 secs
Report
The French delegation emphatically reaffirms its support for the European Union’s previous statement, underscoring its commitment to upholding international law within the realm of cyberspace and the utilisation of Information and Communication Technologies (ICTs). Reflecting on the productive negotiations that took place in December, France is supportive of the ongoing discussions pertaining to International Humanitarian Law (IHL), and stresses that cyber operations associated with or conducted during armed conflicts should be governed by IHL principles.
The contributions of Switzerland and the statement by the 13 states led by Senegal, which have garnered international focus on this issue, were acknowledged by France, which advocates for robust engagement in talks focusing on the practical implementation of IHL in cyberspace.
France calls for a transparent dialogue regarding the practicalities involved. Referencing its own declaration from 2019 on the application of IHL, France commends both African nations and the Czech Republic for publicising their positions, suggesting that the openness in sharing national perspectives is instrumental in creating consensus and enhancing mutual understanding—outcomes reflected in the UNIDIR workshop findings.
France supports the consensus language on international law put forward by Colombia, Australia, El Salvador, Estonia, and Uruguay, noting its importance in identifying progress and common grounds among states. However, France believes that it is premature to establish new legally binding norms, while still remaining open to this possibility in the future.
The debates within the Open-Ended Working Group (OEWG) should persist, according to France, which cites the One Unity workshop as evidence of the usefulness of state-level discourse. The French delegation promotes scenario-based exercises within the OEWG, envisaging that such strategies will enhance understanding of legal complexities and contribute to practical progress.
In terms of capacity building, France highlights the crucial role of inclusive state participation, arguing it fortifies international cooperation. There is a strong desire for capacity-building initiatives to support states in evolving their national frameworks concerning the enactment of international law in digital spheres.
France envisions this as a long-term undertaking, proposing its incorporation into future, results-driven modalities of the OEWG, maintaining focus on these critical issues up to and beyond 2025. This comprehensive summary reflects France’s judicious stance on advancement and careful deliberation—promoting continued discussions and teamwork, while sensibly evaluating the state of readiness for concrete legal structures.
It conveys an awareness that reaching a global consensus on cyberspace governance is a gradual endeavour that requires ongoing commitment and international collaboration.
G
Germany
Speech speed
159 words per minute
Speech length
765 words
Speech time
289 secs
Arguments
Germany is committed to advancing understanding on the application of international law in cyberspace.
Supporting facts:
- Germany aligns with the statement of the European Union.
- Germany values the discussion of these issues within the UN.
Topics: Cyber Security, International Law, ICT
There is increasing convergence among states regarding key international law principles applying to cyberspace.
Supporting facts:
- Convergences noted in states’ statements.
- Consensus is forming on the fundamental elements of international law in ICT use.
Topics: UN Charter adherence, State sovereignty, Non-intervention principle, Prohibition of use of force
The African Union’s position paper is a notable contribution to broadening the discussion on international law in cyberspace.
Supporting facts:
- The Common African position paper published by AU represents 55 states.
- The AU’s work demonstrates the role of regional organizations in global cyber issues.
Topics: African Union, Cyber Law, Regional Cooperation
Scenario-based discussions are effective in deepening understanding and building national capacity on the application of international law in cyberspace.
Supporting facts:
- Germany sees value in scenario-based discussions.
- Experience from OSCE and UNIDIR initiatives can be leveraged.
Topics: Capacity Building, Scenario-based exercises, Cyber Law Application
International humanitarian law and its core principles are applicable to ICT use in armed conflicts.
Supporting facts:
- Joint working paper submission by 13 states including Germany.
- Broad cross-regional acceptance of this position.
Topics: International Humanitarian Law, Armed Conflicts, ICT Use
Civil society actors play an important role in shaping international law in the cyber domain.
Supporting facts:
- Civil society participation enriches the discussion.
- Importance of diverse perspectives on cyber law.
Topics: Civil Society, Cyber Law Evolution, Stakeholder Engagement
Report
Germany and the European Union are actively steering international initiatives to refine and elucidate the application of international law within cyberspace’s expansive boundaries. In synchrony with the EU’s position, Germany accentuates the importance of engaging in dialogues under the aegis of the United Nations, aiming to collectively enhance the understanding of how extant international law intersects with cyber operations.
There is a noticeable momentum towards consensus among states on the key tenets that dictate the use of Information and Communication Technologies (ICT) in the realm of international relations. Indicators of a positive trend include agreements on fundamental principles such as the unwavering adherence to the UN Charter, the respect for state sovereignty, the commitment to the non-intervention principle, and the prohibition of force in cyberspace.
This convergence suggests a recalibration of established international law to incorporate digital statecraft and state interactions in the cyber domain. The African Union (AU) is a key regional player in broadening the discourse on cyber law, with its common position paper—endorsed by 55 states—signalling the AU’s influential role within global cyber policy discussions.
Such a move underlines the vitality of regional coalitions in shaping international cybersecurity strategies and legal norms. Scenario-based exercises are recognised for their value in applying international law to cyber context, an approach Germany endorses based on insights from OSCE and UNIDIR-led initiatives.
These participatory discussions are deemed pivotal for boosting national understanding and fortifying capacities, as they facilitate the conversion of theoretical legal tenets into actionable, scenario-focused strategies that can directly influence national policymaking. The reiteration of international humanitarian law’s (IHL) relevancy to ICT usage amid armed conflicts comes with wide-ranging, cross-regional support—a joint stance underscored by a collaborative paper featuring Germany and 12 other state contributors.
This reflects a significant embracing of the notion that the core humanitarian values entrenched in conventional warfare must seamlessly extend to encompass the cyber battleground. Civil society’s contribution to cyber law dialogue is praised for its fruitful impact. The array of insights and expertise from these independent entities is recognised as vital in forging a comprehensive and robust international cyber law framework.
To summarise, there is a unified and affirmative disposition among multiple stakeholders towards reinforcing the clarity and application of cyber law on a global scale. The collective effort of state governments, regional blocs, and civil society organisations reflects a concerted commitment to ensuring that cyberspace is governed by time-honoured international legal norms, thereby upholding peace, security, and collaborative progress in our increasingly digital world.
HA
Hitachi America
Speech speed
129 words per minute
Speech length
365 words
Speech time
169 secs
Report
In a recent address on stakeholder engagement concerning state affairs, a delegate emphasised the critical need for collaborative and prudent action in the face of emerging technologies, such as artificial intelligence (AI) and quantum computing. Expressing appreciation for the chair’s role in promoting inclusive dialogue, the delegate highlighted the dual-use nature of these advancements, which could either benefit or harm society based on their use.
The centrality of threat measures and risk assessments, particularly those affecting human life, was underscored by the delegate, who called for a partnership between stakeholders and states to effectively address these issues. Such collaboration is key in developing defences against threats to the supply chain and ransomware attacks, thereby ensuring the security of vital infrastructure sectors.
A broad strategy was advocated, one that encompasses the entire threat lifecycle—from detecting backdoors and ensuring data integrity to initiating swift emergency responses and pursuing continuous enhancements. Complimenting the practical measures, the delegate endorsed the proposed checklist of 11 norms for responsible state conduct in cyberspace, praising its comprehensiveness and practicability.
To further improve these norms, the addition of measures considering the persistent influence of new technologies on human life, in peace and wartime alike, was recommended, with particular attention to the protection of essential services such as healthcare, energy, and water.
Acknowledgement was given to the efforts of 13 countries that contributed a working paper on March 1st, aimed at elucidating the applicability of international humanitarian law—a step deemed integral to maintaining confidence in these laws. The delegate offered suggestions for refining the clarity of the norm checklist, particularly regarding capacity building.
They highlighted the balance between timely disclosure and threat mitigation, along with the need for regulatory compliance coordination that meshes with global standards and certifications. Emphasising on capacity development, the delegate called for industry best practices, singling out ‘security by design’ and the adoption of zero trust architecture to safeguard all facets of the digitised supply chain.
These practices encompass hardware, cloud services, small suppliers, and end consumers alike. The speech concluded with the delegate underscoring the importance of public-private partnerships, exemplified by the global round table initiative, in establishing a peaceful, secure, and resilient environment. Such collaborations foster trust and ensure that AI and other technologies are harnessed for the greater good of humanity.
In essence, the delegate’s address conveyed the necessity for a unified, proactive cybersecurity strategy that integrates preventative frameworks, normative guidelines, and collective engagement. This strategy is aimed at protecting the digital ecosystem while unlocking the potential of new technologies for the benefit of all.
H
Hungary
Speech speed
111 words per minute
Speech length
366 words
Speech time
197 secs
Arguments
Hungary aligns with the EU statement and is nominating national POCs to the global directory
Supporting facts:
- Hungary is in the process of nominating national POCs
- Alignment with the European Union statement
Topics: International Cooperation, Cybersecurity
Hungary emphasizes the need for a clear timeline and supports the hybrid format for the global POC directory meeting
Supporting facts:
- Hungary looks forward to the first global POC directory meeting in May
- Preference for a hybrid meeting format
Topics: Cybersecurity, International Relations, Technology Access
The global POC directory’s consensus and independence are celebrated by Hungary
Supporting facts:
- Hungary celebrates the global POC directory’s independence
- Consensus on the POC directory is welcomed
Topics: International Security, Cybersecurity
Hungary suggests building an alumni community of cyber experts and ex-POCs
Supporting facts:
- Recommendation to consider an alumni network
- Potential added value for future cooperation
Topics: Cybersecurity, Capacity Building
Hungary endorses the idea of expanding the POC directory to include other relevant stakeholders
Supporting facts:
- Support for the inclusion of non-governmental stakeholders
- Need for contribution in national-level crisis management
Topics: Inclusive Institutions, Stakeholder Engagement
The need for acknowledgment of the voluntary nature of the POC directory’s participation
Supporting facts:
- Participation in the directory is voluntary
- The capacity of non-governmental stakeholders is specific
Topics: Volunteerism, Cybersecurity
Report
Hungary is proactively engaging in international cooperation, strengthening its commitment to enhancing global cybersecurity mechanisms. By aligning with the European Union’s position, Hungary solidifies its stance on cooperative strategies in response to cyber threats. The nation is taking substantive actions by nominating national Points of Contact (POCs) to the emerging global POC directory, showcasing its preparedness to assume a significant role in this global initiative.
Looking ahead to the inaugural global POC directory meeting in May, Hungary advocates for an accessible, inclusive meeting setup by supporting a hybrid format. This approach promotes broader participation and spotlights Hungary’s progressive thinking in facilitating effective communication and engagement in an era where digital interactions are increasingly pivotal.
Hungary’s perspective on the global POC directory is overwhelmingly positive, as evidenced by its celebration of the directory’s independence and the wide consensus it has garnered. This acknowledgment of the directory’s autonomy and collective endorsement highlights Hungary’s dedication to upholding democratic values within the cybersecurity domain.
Furthermore, Hungary introduces a forward-thinking strategy for capacity building, suggesting the development of an alumni network for cybersecurity experts and former POCs. This proposal reflects Hungary’s commitment to a sustainable cybersecurity framework, aiming to harness collective knowledge for ongoing collaboration and security enhancement.
In aiming to fortify resilient institutions, Hungary also supports the inclusion of non-governmental stakeholders in the POC directory. Recognising the unique capabilities these entities bring, particularly in national-level crisis management, Hungary takes a comprehensive approach to cybersecurity that values diverse contributions and expertise.
Hungary is mindful of the voluntary aspect of participation in the POC directory, acknowledging the intricate abilities and motivations that drive various actors’ involvement in cybersecurity initiatives. This insight indicates a thoughtful approach to collaborative engagement and a respect for voluntarism in the sphere of international security.
In summary, Hungary’s actions and attitudes exemplify an active approach to cybersecurity cooperation on the international stage. With an optimistic view, Hungary is dedicated to assisting in cultivating a robust, inclusive, and inventive global cybersecurity landscape—a commitment that aligns with the country’s Sustainable Development Goals related to industry, innovation, infrastructure, and partnerships.
Hungary’s method, merging positive contributions with supportive advocacy for consensus-based and diverse processes, presents an encouraging model for participation in enhancing international security and building strong institutional frameworks.
I
ICRC
Speech speed
153 words per minute
Speech length
708 words
Speech time
278 secs
Report
In a late-hour address, Ambassador Garfu lauded the incipient consensus reached by the Chair-led Working Group on the security threats posed by Information and Communication Technologies (ICTs) in international security and during armed conflicts. The Ambassador, speaking for the International Committee of the Red Cross (ICRC), called on the group to delve deeper into how international law, particularly International Humanitarian Law (IHL), limits ICT use in armed conflict situations.
Ambassador Garfu highlighted the Working Group’s progress in creating a foundational understanding of IHL principles in cyberspace. Emphasising that recognising IHL in ICT use doesn’t mean legitimising or instigating armed conflict, the Ambassador delineated IHL from the UN Charter’s preventative goals and the right to self-defence under Article 51.
The Ambassador emphasised the enduring necessity of the principle that war has constraints, particularly with over 120 active conflicts worldwide. As states adopt new warfare methods, including cyber capabilities, this principle is crucial for global population protection. Praising the Working Group for providing a platform for states to voice how international law governs ICTs, the Ambassador cited the openness of Senegal and Colombia, along with the African Union’s stance on IHL’s applicability to cyber operations, as steps towards shared understanding.
The ICRC urged using these positions to explicitly incorporate IHL’s ICT application in their July progress report. The speech pointed out that ICTs pose distinct challenges that require further analysis. Mere recognition of IHL principles like the principle of distinction was said to be inadequate without addressing non-physical damage from cyber-attacks such as ransomware or DDoS attacks.
The concern was that prevailing IHL interpretations focused on physical damage did not embrace ICT nuances. In closing, the ICRC underlined the necessity of determining how to balance military necessity and humanity in the digital era, suggesting the possible need for new rules to supplement existing IHL for addressing the complexities of digitised societies and warfare.
Offering to provide the Chair and Working Group with practical examples for further discussion, the ICRC demonstrated its commitment to sustaining a strong legal framework that protects societies from the changing nature of conflict due to technological advancements.
I
India
Speech speed
157 words per minute
Speech length
502 words
Speech time
192 secs
Report
Mr. Chair, Confidence-building measures (CBMs) are crucial for fostering trust, predictability, and cooperation in cyber activities among states. These measures aim to prevent misunderstandings and the harmful consequences of misinterpreted cyber operations through the exchange of information, joint capacity development, and robust communication channels to resolve cyber incidents promptly and effectively.
CBMs enable states to enhance their information and communications technology (ICT) security, contributing to maintaining international peace and the responsible use of cyberspace. They also support the implementation of agreed-upon norms by building trust, increasing transparency, and ensuring stability in ICT applications.
The community has called for establishing foundational values to bolster confidence among nations, which requires understanding the intersection of virtual presence and traditional territorial sovereignty. While CBMs have global relevance, they may be most effective when implemented through tailored regional strategies, which can then be aligned for a cohesive international approach.
There is a specific call for closer cooperation to counter terrorist propaganda online. This involves states adopting collaborative measures to remove harmful content and communicate quickly with other nations when suspicious cyber activities are identified, distinguishing cyber terrorism from other incidents.
Another focus is the shared responsibility to protect critical infrastructure, with an emphasis on states exercising restraint in targeting these essential systems. Practical steps such as joint training exercises and sharing digital forensic intelligence are suggested for states to work together against cybercrime and malicious cyber activities.
The discussion suggests establishing mechanisms within the Open-Ended Working Group (OEWG) framework for efficient, cross-border information exchange and timely responses to terrorism and illegal electronic data system disruptions. India has proposed establishing a dedicated cybersecurity cooperation portal as part of this global cooperative effort.
This platform would enable member states to request and offer support, strengthening bonds within the international cyberspace community. The portal would provide capabilities for managing cyber threats, support capability building, and serve as a repository of best practices and cybersecurity resources.
The portal would also promote cyber awareness by offering educational materials in official United Nations languages and aiming to narrow the digital divide. India has shown commitment by promptly nominating technical and diplomatic points of contact for the proposed global directory, indicating readiness for the initiative.
In conclusion, Mr. Chair, investing in CBMs is crucial for enhancing global cybersecurity, building trust among states, and establishing a strong foundation for cybersecurity resilience. India’s proactive role and initiatives demonstrate a model for global cyberspace cooperation. I thank you, Mr.
Chair. [Note: The text was checked for grammatical errors, sentence structure, typos, and UK spelling and corrected accordingly. No long-tail keywords were forcefully inserted as it would compromise the quality of the summary.]
I
Israel
Speech speed
145 words per minute
Speech length
559 words
Speech time
231 secs
Report
Israel has actively engaged in international dialogue regarding the intersection of international law and the digital domain, advocating that international law applies to cyberspace while urging for a careful application. To further the global conversation, Israel submitted a detailed legal document to the UNODA Secretariat, detailing its stance on the legal and practical challenges of cyber operations.
Israel recognises the unique attributes of cyberspace, such as the transnational data flow, mixed ownership of cyber infrastructure, and swiftly evolving technology, which distinguish it from traditional domains of international law. This underpins Israel’s call for a thorough examination of how existing international laws translate to the cyber world, suggesting that certain norms may need adaptation or clarification to effectively address the digital realm’s peculiar nature.
Israel emphasises the instrumental role of the open-ended working group in offering a forum for states to share their perspectives, respond to emerging cyber threats, and revise their legal positions as needed. Supporting the group’s ongoing dialogue and endorsing scenario-based discussions are seen by Israel as conducive to enhancing mutual understanding.
Israel advocates the development of a shared knowledge base on the application of international law to state use of Information and Communication Technologies (ICTs) before any consideration of new regulations or legally binding agreements. Their viewpoint is that a collective understanding of the relevance of existing laws to cyberspace is essential before moving forward with new legal frameworks.
In summary, Israel recognises the importance of international law in cyberspace but insists on a careful and detailed deliberation process. They prefer grounding the discussion in a comprehensive understanding of the current legal context, ensuring that any developments in the legal application to cyberspace are careful and reflect the dynamic nature of the digital landscape.
M
Malawi
Speech speed
150 words per minute
Speech length
590 words
Speech time
235 secs
Report
Malawi has firmly expressed its support for the African Union’s stance that international law applies to the domain of cyberspace. This position resonates with the views of many countries during the Open-Ended Working Group (OEWG) sessions. In its statement, Malawi emphasises the necessity for worldwide compliance with international law, acknowledging the distinct nature of the cyber environment.
Adherence to these laws is regarded as critical in combatting the complex cyber threats that cross international borders and impact nations at different developmental stages. The Malawian delegation observed that the growing consensus at the OEWG sessions marks a crucial step towards promoting international cooperation and enhancing cybersecurity.
Malawi recognises that global cyber resilience depends on the protection of the most vulnerable countries, and therefore, emphasises the need for a unified approach, which includes the exchange of vital information and keeping pace with international advancements in cyberspace governance.
At the national, regional, and global levels, Malawi acknowledges the responsibility of states to participate in these collective security efforts and commits to fulfilling its role with diligence. The country especially emphasises the importance of capacity building and the need to improve understanding of international law, along with bolstering cybersecurity defences to counter new cyber threats.
Malawi is appreciative of the support rendered by initiatives like UN Women in Cyber, which has facilitated the involvement of Malawian representatives in key global conversations, and the work of UNIDIR in advancing legal understanding through various programmes. To facilitate a broader dialogue on cyberspace governance, Malawi advocates the inclusivity of legal experts from diverse global backgrounds, aiming for a unified interpretation of governing principles.
The country supports the concept of hybrid participation to ensure more inclusive and extensive involvement in discussions. Moreover, Malawi highlights the usefulness of scenario-based discussions, as initiated by the OEWG chair, acknowledging how such practical exercises can clarify complex legal issues in international law and aid in shaping national stances on cyber threats.
In the greater scheme of digital security, Malawi reiterates its commitment to upholding the principles of international law in cyberspace. The delegation concludes with a call for all member states to collaborate in creating a secure digital sphere, and to embrace the benefits of Information and Communication Technologies (ICTs) while staunchly maintaining the foundational principles of international law.
NA
National Association for International Information Security
Speech speed
94 words per minute
Speech length
301 words
Speech time
193 secs
Report
The speaker begins by highlighting the importance of voluntarily adopted norms for responsible state behaviour in the realm of information and communication technology (ICT). They stress that a clear comprehension of these norms is vital in expanding and fortifying the international regulatory framework that governs ICTs.
At the heart of the discourse is the argument for the need of an international convention focused on information security. The envisioned framework is proposed to lay the groundwork for the conduct of international relations in the ICT sphere, with these interactions being regulated by national laws.
Additionally, such a convention is anticipated to be a conduit for fostering international collaboration in the management of ICTs and global data relationships. The emphasis then shifts to deliberating on effective methods for regulating disputes stemming from ICT-related discord, particularly against the backdrop of increasing interconnectedness in global digital infrastructure.
The speaker notes the role of non-binding norms in allowing the international community to appraise and scrutinise states’ actions regarding ICT engagements. The speaker references General Assembly resolution 7323, which provides a stance on handling transboundary ICT undertakings. It clarifies that simply initiating ICT activities in another state’s territory does not automatically elicit a response from that state, underscoring the multifaceted nature of international ICT operations and underlining the pressing need for explicit regulatory frameworks.
The presentation addresses the difficulties encountered in regulating unlawful actions against states, wherein the ambiguity of attribution—identifying the offender—is often a significant challenge alongside the complexity of outcomes arising from such actions. It is further pointed out that the core issues tied to state conduct in ICT stem from the manner in which states evaluate specific ICT incidents.
A comprehensive state assessment is deemed essential to contribute constructively to international peace and stability. A dearth of such evaluations, as suggested by the speaker, could precipitate a surge in irresponsible state conduct in the ICT sector due to a lack of accountability.
Finally, the speaker deliberates on the incorporation of artificial intelligence (AI) into the ICT landscape, accentuating the necessity for states to utilise AI responsibly. With technology continually advancing, it is implied that the principles guiding its responsible use must similarly progress to protect the integrity of international relations and global security.
In conclusion, the speaker’s remarks convey a clear message: the international community faces pivotal challenges to ensure that states’ utilisation of ICTs, inclusive of cutting-edge technologies like AI, adhere to established norms that promote peaceful cooperation and responsible management in the digital era.
The comprehensive analysis presented depicts an intricate, nuanced, and dynamic situation that demands ongoing dialogue and cooperation between states.
NA
Nuclear Age Peace Foundation
Speech speed
165 words per minute
Speech length
451 words
Speech time
164 secs
Report
Stella Rose of the Nuclear Age Peace Foundation, while also serving as a youth advisor for Reverse the Trend, highlighted the urgency to address cyber vulnerabilities in nuclear command and control systems at the Open-Ended Working Group (OEWG). As information and communication technologies (ICTs) evolve quickly, she warned of the increased risks of cyber attacks potentially leading to inadvertent nuclear conflicts.
Rose implored the OEWG to embed the principles of the UN Charter and international humanitarian law within the governance framework of ICTs, especially in scenarios of armed conflict. She stressed the importance of adhering to humanitarian principles, such as distinguishing between combatants and non-combatants, maintaining the proportionality of force, avoiding attacks on those not engaged in combat, and the prohibition of causing unnecessary suffering.
She outlined that in the age of cyber warfare, the exploitation of significant vulnerabilities places civilian infrastructure – including essential services like healthcare, education, and utilities – in jeopardy, thereby posing threats to civilian populations. Underlining the importance of cybersecurity within the nuclear sphere, Rose cautioned that the security of nuclear weapons systems can no longer be taken for granted.
She contended that even the most advanced security systems are susceptible to breaches, which makes relying on good fortune a reckless approach, considering the grave consequences of an accidental nuclear launch. Rose called for a response based on vigilance, accountability, and transparency, aiming to prevent disasters facilitated by technology in warfare contexts.
A central aspect of Rose’s argument was the active engagement of youth in tackling the nexus between ICTs and international security. She pointed to the unique position young people occupy as digital natives, capable of contributing crucial insights and skills to bolster the ICT environment.
Rose advocated for the incorporation of knowledgeable youth into the global Points of Contact directory and called for initiatives to enhance their understanding of ICT challenges. In her concluding remarks, Rose emphasised the need for collective efforts to build a world that protects humanity from the existential threats posed by technology in wartime.
She called for embracing and leveraging the expertise of the younger generation to ensure a secure and peaceful future that they will inevitably inherit and sustain. This summary incorporates the detailed and forward-thinking essence of Rose’s speech, highlighting her key arguments, evident concerns, and the significance of her conclusions.
The summary also recognises the vital role young people play in cybersecurity and international peace initiatives, signifying Rose’s focus on intergenerational cooperation to overcome the challenges of the digital era. The text adheres to UK spelling and grammar, with no detected grammatical errors, sentence formation issues, or typographical mistakes.
It provides an accurate reflection of the main analysis text while integrating long-tail keywords pertinent to the subject matter without compromising the summary’s quality.
PP
Paris Peace Forum
Speech speed
183 words per minute
Speech length
500 words
Speech time
164 secs
Report
The speaker, addressing the Chair and the distinguished delegates at the open-ended working group, commences by expressing appreciation for the efforts to include various stakeholders during the sessions. The intervention focuses on the worrying increase in the commercial availability of cyber-intrusive tools, posing a threat to global peace and security.
There is particular concern over the trade of such tools on underground and semi-regulated markets, potentially enabling a broader spectrum of actors to engage in unlawful cyber activities. The speaker extols the initiative by 25 countries, which, on invitation from France and the United Kingdom, participate in the Palmar process—a collective effort to restrain the spread and misuse of commercial cyber-intrusive capabilities.
The process is lauded as a beneficial contribution to the shared goals of the open-ended working group since it advances a mutual understanding among participating nations. It is viewed as offering essential guidance for putting into practice norms I and J of the International Framework of Responsible State Behaviour.
In accordance with the Chair’s guiding questions on rules, norms, and principles for the session, the speaker emphasizes the need for states to disclose their stances on the responsible employment of commercial cyber tools and their policies concerning the use of hackers.
Such transparency, it is contended, would foster international cooperation, secure the integrity of supply chains, and avert the employment of concealed functionalities with malicious purposes. From the standpoint of safeguarding international peace and security, this openness is also expected to clarify state doctrines on employing cyber proxies, potentially reducing misunderstandings and the risk of unintended escalatory incidents.
The speaker also informs the group of the Paris Peace Forum’s commitment to reinstating the Paris School Working Groups on Cyber Mercenaries. The aim of this group and its expert network is to investigate practical cases to determine responsible conduct regarding engagement with these technologies and services, shaping precise guidelines to assist states.
This engagement is designed to be in synergy with ongoing intergovernmental processes and initiatives. The results, including actionable guidelines, will be available in a blueprint online. To conclude, the speaker reasserts the necessity of bolstering international collaboration to mitigate the risks associated with the widespread commercialisation of cyber capabilities.
By promoting the development of a shared understanding, revealing national positions on contentious cyber practices, and striving to forge solid guidelines, the speaker articulates that the aspiration is to safeguard global peace and security, setting the stage for a more secure and responsible digital environment.
SS
Safepc Solutions
Speech speed
127 words per minute
Speech length
470 words
Speech time
222 secs
Report
The representative from Safe PC Solutions took the chance to convey gratitude for the private sector’s involvement in the discussions led by the OEWG, highlighting the profound influence of swiftly advancing AI technologies on the information and communication technology (ICT) sector.
They pinpointed AI’s role in evolving ICT solutions, referencing Microsoft 365’s Copilot, READ.AI, and Google’s Gemini as prominent illustrations. These integrations raise critical governance and security questions for organisations, necessitating detailed discussions and policy development to manage AI effectively.
The presenter also accentuated the importance of maintaining supply chain integrity amidst technological evolution and escalating threats. They recommended stronger inter-state collaboration to shield the supply chain from the introduction of malicious functions in ICT hardware and software. Safe PC Solutions is crafting a white paper that will provide insight into identifying risks within the supply chain, a document rendered critical by the increasing dependence on AI technology.
The company’s proactive approach encompasses mapping the supply chain, threat assessment, impact evaluation, risk prioritisation, strategy formulation for risk mitigation, and ongoing scrutiny and reassessment of risk management strategies. In concluding remarks, the speaker echoed the sentiment for collective action and suggested creating a working paper and an IT security risk toolkit.
This initiative aims to aid UN member states in tackling supply chain risks in the ICT sector. A call to action was extended to other stakeholders and member states, specifically in the Middle East via a partnership with RightPilot, to contribute to this endeavour.
The ultimate goal is to foster broader participation and cultivate a framework propelling international cooperation and reinforcing security in the increasingly intricate domain of ICT, with particular attention to the challenges and opportunities presented by AI. Throughout the summary, attention is given to the use of UK spelling and grammar, ensuring an accurate reflection of the analysis while incorporating long-tail keywords to enhance the richness of the content without compromising quality.
SA
Saudi Arabia
Speech speed
118 words per minute
Speech length
193 words
Speech time
98 secs
Report
The delegation expresses its gratitude to the Chair and the Secretariat for their tireless work with the Open-Ended Working Group regarding the security of information and communication technologies (ICTs). The Kingdom places a high priority on capacity-building, deeming it crucial for strengthening global cybersecurity.
This stance acknowledges that developing competencies directly improves the security of international ICT systems. In discussing the role of initiatives within the Global Cybersecurity Capacity-building Programme (GCSCP), the delegation highlights their positive impact on fostering meaningful participation and enabling states to share best practices, thereby augmenting collective cybersecurity defenses.
The delegation proceeds with caution concerning new proposals and suggestions for the GCSCP, aiming to prevent duplicative efforts across various United Nations (UN) entities involved in similar projects. A streamlined, coherent strategy that avoids wasting resources is seen as imperative.
Therefore, the delegation suggests a comprehensive review of the offerings by existing UN frameworks, specifically the United Nations Institute for Disarmament Research (UNIDIR), to identify and harmonise any overlapping functions with those planned for the GCSCP. This would facilitate the consolidation of efforts into a singular, potent UN-backed cybersecurity campaign.
In conclusion, the delegation reaffirms its commitment to international cybersecurity collaboration, emphasizing strategic planning to synergise current resources and frameworks to bolster global capacity-building in cybersecurity without duplicating similar UN efforts. The delegation concludes by thanking the Chair for considering their perspective.
S
Spain
Speech speed
130 words per minute
Speech length
335 words
Speech time
155 secs
Report
Spain reaffirms its adherence to the European Union’s stance on the governance of cyberspace, upholding that international law is applicable even in this digital realm. The Spanish delegation, building upon the EU’s statement, emphasises key principles for applying international law in the context of armed conflict within cyberspace.
These principles are as follows: the observance of humanity’s laws, ensuring proportionality in cyber response actions, and maintaining a clear division between civilian and military targets. The delegation draws attention to Spain’s national strategy covering 2023-2026, which calls for the advanced protection of medical services against cyber threats – a pressing issue given their increased susceptibility to attacks and their crucial function during times of conflict.
Spain also commends the African Union for its stance on international law’s relevance to cyberspace, viewing it as a significant stride towards establishing widespread consensus among various countries and reinforcing the notion that common ground is achievable. In preparation for the July session, Spain is finalising its own cyberspace law position paper, aiming to contribute to the international conversation by sharing its national perspective.
The Spanish representatives appreciate initiatives that promote linguistic coherence within international law, such as Colombia’s efforts, to ensure clear communication and uniform legal interpretation across different nations. Furthermore, Spain endorses capacity-building initiatives designed to bring clarity to the existing legal frameworks governing cyberspace.
The nation highlights the value of expert-led sessions and educational activities in minimising interpretations’ divergence across various legal jurisdictions. Conclusively, Spain looks forward to the May intersessional period, anticipating productive debates on the application and interpretation of international law in cyberspace.
The country acknowledges the collective progress achieved and the ongoing collaboration among international partners to fortify governance in this continually evolving digital domain.
SL
Sri Lanka
Speech speed
144 words per minute
Speech length
1051 words
Speech time
439 secs
Arguments
ICT enables seamless data transfer across borders, posing jurisdiction challenges.
Supporting facts:
- ICT allows for the transfer of data across national borders, making it challenging to determine jurisdiction.
- The application of traditional territorial principles of international law is troublesome due to the nature of ICT.
Topics: Cybersecurity, International Law
Legal challenges arise in cybersecurity and combating cybercrime due to ICT.
Supporting facts:
- The use of ICT introduces new legal challenges in addressing cybersecurity threats.
- There is a need for international law to adapt to these emerging issues.
Topics: Cybercrime, Cybersecurity
Protection and regulation of data are complex with ICT proliferation.
Supporting facts:
- GDPR was enacted to safeguard privacy rights and regulate data processing in response to ICT proliferation.
- The collection, storage, and transfer of personal data has become more complex.
Topics: Data Protection, Privacy Rights
Determining state responsibility for cyber activities is challenging.
Supporting facts:
- State-sponsored cyber activities complicate the application of international law.
- Establishing legal consequences for cyber operations is uniquely challenging.
Topics: State Responsibility, Cyber Operations
ICT requires international cooperation in Internet governance.
Supporting facts:
- The decentralized nature of the Internet necessitates coordination for governance issues.
- Issues include domain name management and content regulation require international efforts.
Topics: Internet Governance, International Cooperation
ICT impacts intellectual property rights enforcement.
Supporting facts:
- ICT makes it easier to copy, distribute, and modify digital content.
- International treaties such as WIPO address intellectual property in the digital area.
Topics: Intellectual Property Rights, Digital Content
Human rights online are both facilitated and challenged by ICT.
Supporting facts:
- ICT has a significant impact on the exercise of human rights online.
- International law recognizes the need to protect digital realm freedoms.
Topics: Human Rights, Freedom of Expression
There are gaps in international law regarding ICT application.
Supporting facts:
- Rapid advancements in technology lead to gaps in how international law applies to ICT.
- Jurisdictional challenges in cross-border cases involving ICT can be complex.
Topics: International Law, Legal Gaps
Report
The analysis presents a multifaceted exploration of the ongoing tensions and transformations within international law as it attempts to grapple with the pervasive influence of Information and Communication Technology (ICT). Core to the discussion is the conundrum of jurisdictional efficacy in a digital era where data effortlessly crosses national boundaries, challenging the territorially focused principles of traditional international law.
Cybersecurity threats, ever-evolving, highlight the inadequacy of existing legal frameworks and prompt urgent calls for an adaptive and robust international response to cybercrime. Particularly, the General Data Protection Regulation (GDPR) has been advanced as a legislative response to the complexities inherent in data protection, aimed at regulating the intricate processes involving the collection, storage, and transfer of personal data.
This emphasises a broader recognition of the role of international law in safeguarding privacy rights in a landscape awash with freely flowing, global personal information. State involvement in cyber operations adds urgency to the need for explicit norms and legal repercussions, hastening the search for a consensus on the principles of state responsibility.
Additionally, the decentralised nature of Internet governance, dependent on a network of disparate actors and systems, mandates augmented international cooperation in areas such as domain name management and the regulation of online content. The impact of ICT on intellectual property rights (IPR) is undeniable; digital content can be duplicated and disseminated with ease not seen in earlier eras.
Thus, international legal instruments such as the World Intellectual Property Organization (WIPO) treaties have become more prominent, acting as safeguards for the rights of content creators in the digital age. Human rights, and notably the right to freedom of expression, have been significantly moulded by the advent of ICT.
Here, the international legal system wrestles with the dual mandate of enabling and protecting these rights within the fast-evolving digital realm. Acknowledging the gaps in current international law, the analysis suggests a pervasive need for legal evolution to contend with the broad implications of ICT.
This necessitates international cooperation and a harmonisation of laws, alongside a promotion of information sharing, to enforce legal standards effectively. In addition, the conjunction of ICT and armed conflict has propelled international humanitarian law (IHL) into the spotlight. While not directly applicable to issues of ICT, principles of IHL, such as distinction and proportionality, offer a framework that may be adapted to address the unique challenges of modern digital warfare.
The overarching conclusion from the analysis is that the international legal framework is at a critical juncture. There is an imperative need for innovative and collaborative approaches to overcome the pressing challenges posed by ICT. This pivot towards a refreshed, collective approach in shaping international law is deemed essential for maintaining peace, justice, and strong institutions, in alignment with Sustainable Development Goal (SDG) 16.
The sentiment also aligns with the ethos of SDG 17, which advocates for partnerships in pursuing the global agenda. In summary, while ICT has catalysed significant global interconnectivity and offered many opportunities, it has also generated complex legal dilemmas. This has spurred a dynamic discourse on the evolution and harmonisation of international law to ensure a secure, just, and well-regulated digital future.
SA
Syrian Arab Republic
Speech speed
119 words per minute
Speech length
409 words
Speech time
206 secs
Report
The speaker began by commending the efforts made in understanding international law concerning cyberspace. However, they emphasised the persistent lack of clarity on how it’s applied within the UN Charter, which becomes increasingly pressing due to the rapid advances in Information and Communication Technologies (ICTs) that cross national borders and complicate the identification of cyber operation origins.
Attribution of cyber incidents remains a contentious issue, demonstrating the necessity for more comprehensive debates at the United Nations. The speaker’s delegation advocates for a measured and thorough approach to these discussions to prevent forming fragile and possibly harmful premature conclusions.
Recognising the need for a universally accepted framework, there is a strong urge for foundational work towards an international legally binding instrument that effectively oversees cyberspace activities. The delegation insists that, despite the uniqueness of cyber challenges, the UN Charter’s aims and principles should not be an impediment, but should guide the development of robust cyber regulation measures based on a deep understanding of international law and cyber context.
Current attempts to apply international law to cyber activities using scenario-based methods reveal the limitations of existing norms, indicating that developing new, cyber-specific regulations and norms is essential. The representative also draws attention to the Russian Federation’s initiative which has resulted in a draft for an International Convention on Cyber Security.
They highlight this draft as a significant step that offers guidance for ICT use and fosters progress towards a UN convention for cyberspace regulation. The speaker concludes by pointing out the draft resolution’s availability on the Working Group’s website and its critical role in propelling discussions on international cybersecurity legislation forward.
Throughout the summary, UK spelling and grammar have been maintained, ensuring that the text accurately reflects the substance of the main analysis while integrating relevant long-tail keywords related to international law, cyber security, and United Nations debates.
US
United States
Speech speed
156 words per minute
Speech length
875 words
Speech time
336 secs
Report
During discourse on the application of international law to information and communication technologies (ICTs) in cyberspace, it was noted that states are increasingly aligning their views, indicating a move towards global consensus on this critical issue. This is exemplified by the African Union’s unanimous agreement on a common position, signifying the dedication of all 55 member states towards integrating international legal rules within the cybersphere.
The formation of national position statements and shared legal frameworks via interventions by Colombia and Senegal on behalf of various state groups further underscore the collective acknowledgment of the importance of international law in moderating state behaviour in cyberspace. This united stance counters the viewpoints of some states that question the pertinence or applicability of international law to cyberspace, often perceived as politically motivated, particularly when these states are engaged in both kinetic and cyber warfare.
The discussion criticises these opposing states, suggesting that their denial of accountability and consensus benefits their self-interests, especially when they partake in aggression against neighbouring countries. This contradicts the broader international agreement, and such disparities should not hinder global efforts to define and develop common understandings of how international law regulates ICT use by states.
International humanitarian law (IHL) emerges as a fundamental tenet for lawful cyber operations during armed conflicts, promoting reliance on principles like distinction, necessity, proportionality, and humanity. These principles aim to limit state actions and reduce human suffering in cyber warfare.
The pivotal role of scenario-based discussions for states to refine their perspectives on international law in relation to cyberspace was highlighted. Such discussions encourage constructive dialogue, allowing for more in-depth exploration than general plenaries. Successful events by the Organisation of American States (OAS), UNIDIR, Australia, Colombia, and the Philippines have spurred dialogue on responsible norms and behaviours in the cyber sphere.
A significant challenge noted is the need for states’ capacity building, particularly in legal expertise pertinent to cyberspace. The United States has led efforts in this field, partnering with UNIDIR to fund training programmes and support the drafting of national cyberspace law positions.
There is a suggestion to modify the format of the Open-Ended Working Group (OEWG) interventions to enhance discussions on international law applications in cyberspace. Recommendations include longer sessions involving international law and incorporating hybrid participation to enhance global accessibility. The expectation for future discourse, particularly with the Future Program of Action’s adaptable platform, is for more comprehensive and inclusive debates.
This forms part of the aspiration for deeper common understandings concerning the application of international law to states’ ICT use. In conclusion, a profound consensus is building within the international community on the relevance of international law in cyberspace, marked by coordinated positions and structured dialogue.
There is also a call to action for initiatives to build capacities and improve the accessibility of global participation in these increasingly crucial conversations.
U
Uruguay
Speech speed
140 words per minute
Speech length
590 words
Speech time
252 secs
Report
Uruguay has formally agreed with a position presented by Colombia, on behalf of a group of countries, and has acknowledged the joint efforts with Australia and the Philippines at a significant event focused on the application of international law in various contexts.
This followed a United Nations Institute for Disarmament Research (UNIDIR) report, summarising the discussions from a Geneva dialogue on 15 November 2023. Uruguay emphasised its commitment to core international principles—state sovereignty, non-interference, the non-use of force, and peaceful dispute resolution—as vital to sustaining international peace and security.
The country has also expressed its dedication to protecting human rights in the realm of cybersecurity, advocating for actions by states to be guided by respect for privacy and individual rights. Uruguay’s comprehensive legal infrastructure, which includes its national Computer Emergency Response Team (CERT) and personal data protection legislation, exemplifies its approach to enhancing security at both national and international levels, with particular emphasis placed on human rights within cyber contexts.
In addition, Uruguay recognised the importance of international humanitarian law in cyber operations during armed conflicts and supported the provisions of Norm F, which deters states from engaging in information and communications technology (ICT) activities that would undermine their international commitments, especially in relation to critical infrastructure.
They suggested organising expert-led discussions on international law under the Working Group’s aegis, to facilitate knowledge-sharing on the potential misuse of ICT. The nation has faith in the Chairman’s capacity to efficiently coordinate these forums. Looking to the future, Uruguay is in favour of incorporating international law capacity-building into a persistent mechanism and endorses training programmes possibly spearheaded by UNIDIR.
These would bolster existing efforts and complement the work of regional entities such as the Organization of American States (OAS), endeavouring to enhance ICT safety. Lastly, the extended summary highlights Uruguay’s acknowledgment of the connection between these conversations and Sustainable Development Goal 16, which aims to establish peaceful, inclusive, and just societies.
This acknowledgment underlines Uruguay’s broader objective to fortify the rule of law and advance human rights, especially amid widespread insecurity. In conclusion, the detailed summary encapsulates Uruguay’s commitment to seamlessly blend cybersecurity with human rights and international law, reflecting the country’s progressive stance on collective security and cooperation within the digital landscape.
The text uses UK spelling and grammar throughout, in line with the requirements.
V
Venezuela
Speech speed
138 words per minute
Speech length
1195 words
Speech time
519 secs
Report
Good afternoon. The speaker commenced by cordially welcoming the chairman and his team, appreciating their patience and dedication, despite the formidable nature of their tasks. The impetus for the speaker’s input was a contentious assertion by a colleague that cyberspace and physical space are indistinguishable, rendering all activities as cyber activities, without recognising a discrete cyberspace.
This view sharply contradicts the stance of the Bolivarian Republic of Venezuela, which firmly supports the application of international law and international humanitarian law within cyber operations, as opposed to a merged concept of cyberspace. However, the speaker voiced unease regarding the automatic extension of these laws into the cyber realm.
The application of international law to cyberspace is complex, considering the intricate dynamics of international relations that could become even more convoluted given the unique characteristics of cyberspace. The conversation progressed to the necessity of scenario-based discussions, which Venezuela considers vital.
For illustration, the speaker posited a hypothetical situation where a basic cyber attack could be perpetrated by one entity but falsely attributed to another, accentuating the challenge of properly assigning responsibility in the cyber domain. Under such circumstances, the speaker suggested that the aggrieved state might wrongly retaliate against an innocent nation, based on the right of self-defence outlined in Article 51 of the UN Charter, which was established before the digital age and raises questions about the legitimacy of self-defence in the cyber versus physical realms.
The speaker highlighted the significance of these nuances, noting that while debates persist, some states might enforce their interpretations of laws, much like unilateral coercive measures seen in the physical world, which Venezuela deems as illegal and controversial at the international level.
Such actions prompt humanitarian concerns and may pave the way for unilateral digital responses in the absence of a legal consensus. In conclusion, the speaker reaffirmed Venezuela’s pledge to promote accountability in cyberspace but emphasised a meticulous approach to the integration of international humanitarian law into this domain.
Venezuela’s apprehensions are based on the understanding that cyber regulations need to be responsive to current realities, fundamentally distinct from when international laws were first established. The speaker called for an immediate and detailed examination of these legal complexities in relation to cyberspace.
Thank you, Mr Chairman.
V
Vietnam
Speech speed
147 words per minute
Speech length
612 words
Speech time
250 secs
Report
Vietnam vehemently reaffirms its belief that international law, including the full scope of the United Nations Charter, dictates state conduct in cyberspace. The nation emphasises that these legal frameworks are crucial in preventing interstate conflicts and maintaining global peace and security.
The Vietnamese delegation ardently supports the swift finalisation of the Convention on Countering the Use of Information and Communication Technologies (ICTs) for Criminal Purposes. Vietnam views this treaty as fundamental in the battle against cybersecurity threats, providing a standardised legal framework to enhance international cooperation in detecting and prosecuting cybercriminals.
The Convention is considered essential by Vietnam for clarifying how international law applies within cyberspace, particularly regarding state interaction with global ICT infrastructures and the sharing of cyber resources—such as expertise and data. Given the rise in cybercrime, Vietnam campaigns for rigorous adherence to the principle of non-intervention to uphold digital sovereignty.
They argue this principle should be universally respected by state agencies and representatives, including verified individuals on digital platforms, to prevent interference in other nations’ internal affairs. Concerning technological advancements and the swift evolution of artificial intelligence (AI), Vietnam urges the commencement of talks to create a comprehensive UN-led legal framework governing AI and similar emergent technologies.
Given the transformative impact of such technologies, there’s a critical need for robust legal guidelines to ensure ethical and responsible use while promoting global cooperation. Vietnam stresses the temporary duty of states to safeguard their digital sovereignty while international conversations on these new legal structures continue.
This includes protection against unchecked private development of generative AI systems that could compromise individual rights, intellectual property, and the enactment of state policies. In closing, Vietnam insists that consistently applying international law in cyberspace is vital for a secure, resilient, and ethically managed digital landscape.
This necessitates a concerted global endeavour to align legal mechanisms with the rapidly advancing technological environment and evolving cyber threats. Vietnam recognises the complexity of this collective learning process, which symbolises a journey of trial, adaptation, and mutual advancement among the world’s nations.
YF
Youth for Privacy
Speech speed
195 words per minute
Speech length
388 words
Speech time
120 secs
Report
As a delegate of Youth for Privacy, actively engaged in the Open-Ended Working Group on ICTs, the organisation continues to advocate for the cybersecurity interests of young people. In a thorough address, three primary concerns were raised to highlight the importance of youth involvement in developing internet security protocols.
The first concern addressed is the increased vulnerability of the youth to cyber threats. Despite their technological proficiency, young people often become victims of sophisticated cyber dangers, such as ransomware and deepfakes, which leverage their dependence on digital environments. An alarming instance was spotlighted: the potential abuse of deepfake technology by fellow students to generate explicit images, which could then be dispersed within social circles.
This tangible threat demonstrates that such technologies have a profound effect on the personal lives of youths, extending beyond state-centric cyber operations. Progressing to the second concern, Youth for Privacy calls for the integration of a youth-centric theme within a proposed enduring framework for ICT security.
The need for this emphasis arises from the organisation’s core objective to defend the privacy rights of younger demographics. Establishing thematic dialogues focused on youth issues within the framework would ensure that their distinct views and challenges are accounted for within the wider cybersecurity discussions.
The third concern centres on educational initiatives as key to enhancing capacity-building strategies. The organisation advocates for bespoke programmes that equip young people with knowledge and best practices in cybersecurity, data protection, and the ethical use of ICTs. Providing such educational resources is imperative for the youth to safely navigate and positively contribute to the digital economy.
Concluding the address, the Youth for Privacy representative delivered a compelling call to action, promoting the integration of young people’s perspectives as essential to formulating the guiding principles of ICT utilisation. These perspectives are not seen as supplementary but rather as integral to creating a digital era that is secure, inclusive, and favourable to growth.
The final message to the delegates is one of collaboration and acknowledgment—encouraging them to recognise and utilise the potential of the youth as key partners in the mindful development of the digital sphere. Upon review, the summary is in line with UK spelling and grammar conventions and accurately reflects the key points of the main analysis text.
The summary incorporates relevant long-tail keywords such as ‘cybersecurity interests of young people’, ‘youth-centric theme in ICT security’, and ‘educational resources in cybersecurity’, without compromising the quality of the content.