Session
Organizer 1: Douzet Douzet, University Paris 8
Organizer 2: Stéphane Taillat, Ecoles de St Cyr Coëtquidan
Organizer 3: Alix Desforges, University Paris 8
Speaker 1: Marina Kaljurand, Government, Eastern European Group
Speaker 2: Saran Samir, Civil Society, Asia-Pacific Group
Speaker 3: Kulesza Joanna, Civil Society, Eastern European Group
Speaker 4: Bill Woodcock, Technical Community, Western European and Others Group (WEOG)
Speaker 5: David Sanger, Civil Society, Western European and Others Group (WEOG)
Panel - 90 Min
The panel will include speakers from the Global Commission on the Stability of Cyberspace and outside experts from academia and civil society, including major media. Among the commissionners : Marina Kaljurand is a diplomat and the Chair of the Global Commission. She served as Estonia Foreign Minister and participated in UNGGE discussions. Samir Saran is the President of the Observer Research Foundation (ORF), one of Asia’s most influential think tanks, a member of the Global Commission and the chair of CyFy. Bill Woodcock is executive director of Packet Clearing House and has led a working group on defining the Public Core of the Internet within the Global Commission. These three Commissioners have been active in promoting cyber stability and writing the Call to Protect the Public Core of the Internet. Joanna Kulesza is Professor of international law and Internet governance at the University of Lodz, Poland. She specializes in state responsibility and international liability. David Sanger is journalist at the New York Times and is publishing a new book on state offensive actions in cyberspace, “The Perfect Weapon.War Sabotage and Fear in the Cyber Age” (2018). He has excellent insights on states contribution to proliferation and cyber instability. All speakers have been contacted and have confirmed their participation.
Speakers in this session will reflect both geographical, gender, stakeholder and disciplinary diversity. They include representatives from government, technical community, media, think-tanks and academia coming from Estonia, India, Poland, the United States and France.
1) Framing The stability of cyberspace is at risk. There are many flaws and vulnerabilities in the technology that underpins the global Internet. But there are also malicious actors and many other actors - none the least states - developing offensive capabilities that create conditions of instability. This puts the benefits of cyberspace and the future of the digital economy in jeopardy. The attack against Dyn in 2016 was a telling moment. So were WannaCry and NotPetya. The rapid and dramatic propagation of the malware emphasized the systemic risk to which our companies and societies are exposed. The NotPetya attack was designed to look like ransomware but it turned out to be a wiper (a malware designed to wipe the hard drive of the computer it infects) designed for sabotage. The uncontrollable propagation of the attack randomly affected a wide range of companies, including telecommunication and hospitals. And it hurt many companies that were not even initially a target. These attacks reveal the cybersecurity dilemma we are caught in when dealing with offensive actions in cyberspace. On the one hand we recognize cyber threats as new security challenge creating a systemic risk. These threats are highly complex and transfrontier. They can spread fast, they can have a massive impact and they are hard to stop. It is therefore in everybody's interest to stop the contagion that could be disastrous. And that pulls us into the direction of greater international cooperation, information sharing, greater international regulation. The basis for such trust-building efforts is shared interests; the ultimate goal is stability. But on the other hand, cyber capabilities are also used as a tool by nations and non state actors to maintain or increase their power and influence. They can be used for intelligence, espionage, deterrence, and warfare. So we also view cyberthreats as a geopolitical threat emanating from rival powers and economic competitors. And that pulls us in the opposite direction: limited cooperation and information sharing, arms race leading to proliferation. More than 30 nations have now acknowledged their development of offensive tools and military organizations to utilize them. This second perception of risks tends to prevail today. It creates distrust between states and limits their ability to reach agreement on international norms of responsible behavior to ensure the security and stability of cyberspace. And this, in turn, increases the systemic risk for the general availability and integrity of the Internet. This is the reason why the Global Commission on the Stability of Cyberspace (GCSC) was established. The Commission comprises 26 prominent Commissioners representing a wide range of geographic regions as well as government, industry, technical and civil society stakeholders. Its mission is to enhance international peace, security, and stability by proposing norms and initiatives to guide responsible state and non-state behavior in cyberspace. In November 2017, in New Delhi, the Global Commission issued a Call to Protect the Public Core of the Internet (https://cyberstability.org/wp-content/uploads/2017/11/call-to-protect-t…). 2) Agenda and policy questions First Step: Assess the risk of cyber instability in the wake of state - and non state - sponsored offensive activities and address the role and responsibility of States in ensuring cyber stability Second Step: Exposing and discussing the Global Commission on the Stability of Cyberspace Call to Protect the Public Core of the Internet Third Step: Exploring further ideas and norms proposals to protect the general availability and integrity of the Internet
The discussion will include 3 steps. Each speaker will present a key research finding to open the discussion between speakers, then speakers will engage with onsite and online audience participants. The moderators will facilitate the discussion and closely manage time.
This panel will assess the impact of cyber arms proliferation on cyber stability and examine the ethical and legal responsibilities of states in ensuring cyber stability. It will point to policy solutions to promote cyber stability and discuss the Call to Protect the Public Core of the Internet recently proposed by the Global Commission on the Stability of Cyberspace (cyberstability.org).
The moderators will actively seek online participation for each of the 3 steps of the discussion, along with participation from the onsite audience. Online and onsite moderators will coordinate to ensure full participation of the audience through comments and questions addressed to the panelists.