{"id":3887,"date":"2018-06-20T00:00:00","date_gmt":"2018-06-20T10:18:08","guid":{"rendered":"https:\/\/staging.voelkerrechtsblog.org\/articles\/disentangling-the-cyber-security-debate\/"},"modified":"2020-12-09T13:11:11","modified_gmt":"2020-12-09T12:11:11","slug":"disentangling-the-cyber-security-debate","status":"publish","type":"post","link":"https:\/\/voelkerrechtsblog.org\/de\/disentangling-the-cyber-security-debate\/","title":{"rendered":"Disentangling the cyber security debate"},"content":{"rendered":"<p>In his insightful <a href=\"https:\/\/www.cambridge.org\/core\/journals\/leiden-journal-of-international-law\/article\/from-cyber-norms-to-cyber-rules-reengaging-states-as-lawmakers\/63A45029B685C11BBD9512AC0459FAE5\">LJIL article<\/a> Kubo Ma\u010d\u00e1k discusses the under-developed state of international cyber security law. He assesses that the absence of cyber security law-making has created a power vacuum that has been filled by non-state actor initiatives, such as the <a href=\"https:\/\/ccdcoe.org\/sites\/default\/files\/documents\/CCDCOE_Tallinn_Manual_Onepager_web.pdf\">Tallinn Manual<\/a>. He calls on states that now is the time to reclaim their central role in international lawmaking, in the short-term by articulating their opinio iuris more clearly, in the mid-term by overcoming their treaty aversion, and in the long-term by moving towards the adoption of a multilateral cyber security treaty.<\/p>\n<p>While I fully agree with Ma\u010d\u00e1k\u2019s central argument for more state engagement I would like to highlight a problem that states seem well-advised to address in their future engagement with international law in cyberspace.<\/p>\n<p><strong>The need to distinguish between <em>technical cyber security risks<\/em> and <em>content-based information security risks<\/em><\/strong><u><\/u><\/p>\n<p>States seem well-advised to distinguish more clearly between <em>technical cyber security<\/em> and <em>content-based<\/em> <em>information security risks<\/em>. I submit that with regard to technical cyber security the three-step development Ma\u010d\u00e1k points at is both feasible and desirable; that however with regard to <em>content-based information security risks<\/em> a multilateral treaty is hardly feasible and might even have severe downsides.<\/p>\n<p><strong>First type of risk: Technical cyber security risks<\/strong><\/p>\n<p><em>Technical cyber<\/em> security risks are risks for the confidentiality, availability and integrity (CIA) of information and communications technology (ICT). This category of cyber incidents typically involves deleting, altering or revealing data saved on ICT and is characterised by breaking into an ICT system, for example through hacking, phishing or inserting malware \u2013 for such security risks ICT is the actual target. Already the violation of the CIA of ICT realizes the intended serious adverse consequence. Such serious consequence can range from disabling an electrical grid through violating the integrity of the ICT (e.g. the <a href=\"https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/\">Black Energy<\/a> attack in 2015), to temporarily or permanently hindering the availability of information or data on the ICT (e.g. the ransomware <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/may\/12\/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20\">\u2018Wanna Cry\u2019<\/a> attack in 2017, or the Distributed Denial of Service attack on <a href=\"https:\/\/www.wired.com\/2007\/08\/ff-estonia\/\">Estonia 2007<\/a>) or to violate the confidentiality of the ICT (e.g. <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/4xa5g9\/all-signs-point-to-russia-being-behind-the-dnc-hack\">DNC hack<\/a> in 2016).<\/p>\n<h4><strong>Second type of risk: Content-based information security risks<\/strong><\/h4>\n<p>By contrast, <em>content-based information security<\/em> risks are security risks which are facilitated or amplified by cyber tools but for which ICT is <em>not <\/em>the actual target, Examples are disinformation (dissemination of \u2018fake news\u2018, employment of \u2018social bots\u2019, e.g. in the US presidential election or the Brexit referendum in 2016) or incitement to terrorism (e.g. on social media). For such security risks the target is ultimately human intelligence, the CIA of ICT remains fully intact. The serious adverse consequence materializes through the successful impact on human intelligence but is independent from the CIA of ICT.<\/p>\n<h4><strong>Indiscriminate discussion of content-based information security and technical cyber security risks<\/strong><\/h4>\n<p>Although both security risk are evidently substantially different both risks are often used synonymously in the international legal discourse and in public media \u2013 see <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/dec\/02\/fake-news-botnets-how-russia-weaponised-the-web-cyber-attack-estonia\"><span style=\"text-decoration: none;\">here<\/span><\/a> and <a href=\"https:\/\/www.enisa.europa.eu\/publications\/info-notes\/disinformation-operations-in-cyber-space\"><span style=\"text-decoration: none;\">here<\/span><\/a>, adding to a general sentiment of <em>cyber insecurity<\/em> as <a href=\"https:\/\/cltc.berkeley.edu\/scenario\/scenario-one\/\"><span style=\"text-decoration: none;\">the new normal<\/span><\/a>. The distinction is rarely explicitly made \u2013 notable exceptions can be found <a href=\"http:\/\/cpi.ee\/wp-content\/uploads\/2017\/12\/2017-Tikk-Kerttunen-Demise-of-the-UN-GGE-2017-12-17-ET.pdf\"><span style=\"text-decoration: none;\">here<\/span><\/a> and <a href=\"http:\/\/cyberregstrategies.com\/wp-content\/uploads\/2017\/03\/ILA_SG_Cyber_Terrorism_FINAL_REPORT.pdf\"><span style=\"text-decoration: none;\">here<\/span><\/a>. This synonymous discussion of both risks is problematic for substantial legal progress for several reasons.<\/p>\n<h4><strong>Contestation exacerbated<\/strong><\/h4>\n<p>Most importantly, it risks hindering international consensus-building on cyber security norms by entangling the more consensual area of <em>technical cyber security risks <\/em>with the highly politicised and contentious area of<em> content-based information security risks.<\/em><\/p>\n<p>With regard to <em>technical cyber security risks <\/em>recent state practice shows that states gradually realize their commonly shared interests in stepping up cyber resilience and increasing cooperation, for example with regard to protecting ICT-dependent critical infrastructure, to preventing and mitigating international botnet operations or to cooperating in cases of internationally spreading cyber incidents, such as WannaCry). States have increasingly concluded bilateral Memoranda of Understanding (MoU) on <em>technical cyber security risks<\/em>, notably also sidelining the two blocks of the alleged \u2018<a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2446666\">digital divide\u2019<\/a>, such as the <a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2015\/09\/25\/fact-sheet-president-xi-jinpings-state-visit-united-states\">US-China Memorandum of Understanding of 2015<\/a>. India is systematically building a <a href=\"https:\/\/cis-india.org\/internet-governance\/files\/CyberSecurityAgreements_Infographic_04.pdf\">worldwide net<\/a> of bilateral agreements to increase ICT resilience and cooperation, and also other countries, such as Singapore, follow suit (see <a href=\"https:\/\/www.csa.gov.sg\/news\/press-releases\/singapore-signs-memorandum-of-cooperation-on-cybersecurity-capacity-building-with-the-united-kingdom\">here<\/a> and <a href=\"https:\/\/www.csa.gov.sg\/news\/press-releases\/singapore-signs-joint-declaration-of-intent-on-cybersecurity-cooperation-with-germany\">here<\/a>). The European Union Directive on Security of Network and Information Systems (NIS) tackles <em>technical cyber security risks<\/em> by establishing a network of computer security incident response teams (CSIRT) and a cooperation group for strategic cooperation. The protection of CIA of ICT is also one of the core purposes of the <a href=\"https:\/\/www.rusemb.org.uk\/fnapr\/6394\">Draft Convention on Cooperation in Combating Information Crimes<\/a> proposed by Russia in 2018 (Art. 1 [b]).<\/p>\n<p>By contrast, it is highly contested between states how to address <em>content-based information security risks<\/em>. Regulation of <em>content-based information security risks <\/em>touches upon content control and hence upon highly divergent and politicised stances on Internet governance, human rights and the concept of <em>information sovereignty.<\/em> While the concept of sovereignty is recognized in cyberspace its exact contours and implications for Internet governance are far from a shared understanding. Multi-lateral, multi-stakeholder and hybrid \u2018in-between\u2019 approaches to Internet governance deviate significantly as to the extent of content limitation by states. Despite partial <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2979896\">convergent tendencies<\/a> it is almost certain that substantial disagreement on Internet governance and its political implications will remain in the future. Tellingly, even where international consensus exists on which <em>content-based security risks<\/em> need to be counteracted \u2013 for example with regard to child pornography or certain forms of hate speech \u2013 there is disagreement on how to counteract these <em>content-based security risks<\/em>; the <a href=\"https:\/\/rm.coe.int\/CoERMPublicCommonSearchServices\/DisplayDCTMContent?documentId=0900001680081561\">Budapest Convention of the Council of Europe on Cybercrime<\/a> of 2001 for example requires state to state requests for assistance or the consent of the concerned private party to access stored computer data (Art. 31 [1], 32 [b]); by contrast, the <a href=\"https:\/\/www.rusemb.org.uk\/fnapr\/6394\">Draft Convention on Cooperation in Combating Information Crimes<\/a> of 2018 would allow data gathering <em>suo motu <\/em>without prior request to another state party or the consent of the concerned private party (Art. 44).<\/p>\n<p>It seems hence rather futile to expect substantial consensus-building on <em>information security<\/em> risks in the international sphere.<\/p>\n<h4><strong>Risks for right to freedom of expression and information<\/strong><\/h4>\n<p>Moreover, moving quickly towards a new multilateral treaty that includes <em>content-based information security risks<\/em> might plausibly have detrimental effects on the right to freedom of information and freedom of expression online. Under human rights law restrictions of the rights under Art. 19 ICCPR must be <a href=\"http:\/\/tbinternet.ohchr.org\/_layouts\/treatybodyexternal\/Download.aspx?symbolno=CCPR%2FC%2FGC%2F34&amp;Lang=en\">sufficiently clear, accessible and predictable<\/a>.<\/p>\n<p>Presently, it seems hard to envision a new multilateral treaty for cyberspace that could satisfy this requirement. An open-ended clause akin to the proposed draft code of conduct for information security introduced by Russia and China in the UN General Assembly in <a href=\"https:\/\/ccdcoe.org\/sites\/default\/files\/documents\/UN-110912-CodeOfConduct_0.pdf\">2011<\/a> (and an updated version in <a href=\"https:\/\/ccdcoe.org\/sites\/default\/files\/documents\/UN-150113-CodeOfConduct.pdf\">2015<\/a>) with states vowing to <em>\u2018<\/em><em>curb the dissemination of information that incites terrorism, secessionism or extremism or that undermines other countries\u2019 political, economic and social stability, as well as their spiritual and cultural environment\u2019<\/em> would fall short of being sufficiently clear, accessible and predictable. Notably, the concern of insufficient clarity, accessibility and predictability has also been <a href=\"http:\/\/www.ohchr.org\/Documents\/Issues\/Opinion\/Legislation\/OL-DEU-1-2017.pdf\">raised<\/a> against the <a href=\"http:\/\/www.bmjv.de\/DE\/Themen\/FokusThemen\/NetzDG\/NetzDG_EN_node.html\">German network enforcement act of 2017<\/a>, aimed to tackle hate speech and \u2018fake news\u2019. As international legal scholars currently discuss election meddling through disinformation as a prohibited intervention under Art. 2 (7) UN Charter (see <a href=\"https:\/\/poseidon01.ssrn.com\/delivery.php?ID=634087103098022021106093125026118070055022030067038035066069078118003107076072117073107013020035005031116084113018098000006117017036066065011123116084079009000115067053049066071001089030089110064115105074022111123023100088127069081017019003098071070118&amp;EXT=pdf\">here<\/a> and <a href=\"http:\/\/opiniojuris.org\/2016\/07\/25\/russia-and-the-dnc-hack-a-violation-of-the-duty-of-non-intervention\/\">here<\/a>) clear legal criteria to ascertain the intervention threshold have not yet evolved.<\/p>\n<p>These examples show that it is extremely difficult to strike a fine balance between the right to freedom of information and expression and the security need to limit content disseminated via ICT. A broad one-size-fits-all restriction clause in a new multilateral information security treaty could plausibly grant a <em>carte blanche<\/em> for surveillance and content control to authoritarian states.<\/p>\n<p>With respect to human rights it seems hence more promising to slightly deviate from the three-step development Ma\u010d\u00e1k points at and to adopt a more tailored and evolutionary approach with regard to <em>information security risks<\/em> and to, inter alia, strengthen \u2018soft\u2019 parametres, such as transparency, media and information literacy and self-regulation of private intermediaries (see the <a href=\"https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/final-report-high-level-expert-group-fake-news-and-online-disinformation\">High Level Expert Group<\/a> on Fake News and Online Disinformation of March 2018 for the European Commission calling for a \u2018self-regulatory approach based on a clearly defined multi-stakeholder engagement process\u2019), and simultaneously clarify the application of already existing mutlilateral treaties, such as the ICCPR, to content-related risks in cyberspace.<\/p>\n<h4><strong>Conclusion and outlook<\/strong><\/h4>\n<p>At the present stage one can only hypothesize which direction the future international discourse on international law and cyberspace will take. It is uncertain to what extent states will pick up non-state actor initiatives, such as the rules of the Tallinn Manual \u2013 <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3172743\">a recent case study<\/a> draws a rather skeptical interim conclusion. Also the forum for future global discussion is uncertain &#8211; after the failure of the UN GGE 2017 to conclude on a report the continuation of the UN GGE remains an option, but also an open-ended working group, a cyber committee of the General Assembly or the creation of an inclusive body for interaction of both state and non-state actors within the OECD have been discussed (see <a href=\"https:\/\/www.justsecurity.org\/53329\/outlook-international-cyber-norms-avenues-future-progress\/\">here<\/a> and <a href=\"https:\/\/www.ejiltalk.org\/reinventing-multilateral-cybersecurity-negotiation-after-the-failure-of-the-un-gge-and-wannacry-the-oecd-solution\/\">here<\/a>).<\/p>\n<p>Yet, regardless of the forum the example of the UK Attorney General <a href=\"https:\/\/www.gov.uk\/government\/speeches\/cyber-and-international-law-in-the-21st-century\">statement of 23 May<\/a> shows states\u2019 engagement with international law and cyberspace will rather increase than decrease; more states begin to realize that &#8211; just like Ma\u010d\u00e1k had argued \u2013 it is in their self-interest to articulate their cyber opinio iuris. To what extent states will distinguish more clearly between <em>technical cyber security risks <\/em>and <em>content-based information security risks <\/em>remains to be seen (see <a href=\"http:\/\/www.consilium.europa.eu\/media\/21479\/resilience_deterrence_defence_cyber-security_ec.pdf\">here<\/a>) \u2013 however, and this is the main argument here, they would be well-advised to do so.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Leonhard Kreuzer is a PhD candidate at the Free University Berlin and a Research Fellow at the Max Planck Institute for Comparative Public Law and International Law, Heidelberg, Germany.<\/em><\/p>\n<p><i><em>This post continues our cooperation with the Leiden Journal of International Law (LJIL). It is a reply to Kubo Ma\u010d\u00e1k&#8217;s<\/em><\/i><em> article\u00a0<\/em>\u2018<em>From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers<\/em>\u2019\u00a0<em>(2017) 30 LJIL 877-899.<\/em><\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>Cite as: Leonhard Kreuzer, \u2018Disentangling the Cyber Security Debate\u2019, <em>V\u00f6lkerrechtsblog<\/em>, 20 June 2018, doi:\u00a0<a id=\"url_site_link\" href=\"https:\/\/doi.org\/10.17176\/20180620-183041-1\">10.17176\/20180620-183041-1<\/a>.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>In his insightful LJIL article Kubo Ma\u010d\u00e1k discusses the under-developed state of international cyber security law. He assesses that the absence of cyber security law-making has created a power vacuum that has been filled by non-state actor initiatives, such as the Tallinn Manual. He calls on states that now is the time to reclaim their [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6639],"tags":[],"authors":[4936],"article-categories":[6000],"doi":[],"class_list":["post-3887","post","type-post","status-publish","format-standard","hentry","category-uncategorized","authors-leonhard-kreuzer","article-categories-article"],"acf":{"subline":""},"meta_box":{"doi":""},"_links":{"self":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/3887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/comments?post=3887"}],"version-history":[{"count":0,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/3887\/revisions"}],"wp:attachment":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/media?parent=3887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/categories?post=3887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/tags?post=3887"},{"taxonomy":"authors","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/authors?post=3887"},{"taxonomy":"article-categories","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/article-categories?post=3887"},{"taxonomy":"doi","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/doi?post=3887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}