A Digital Geneva Convention:
Why it is needed and how it can be created
Alaa Ajweh Financial Sector Lead Microsoft QSTP LLC.
A Digital Geneva Convention: Why it is needed and how it can be - - PowerPoint PPT Presentation
A Digital Geneva Convention: Why it is needed and how it can be created Alaa Ajweh Financial Sector Lead Microsoft QSTP LLC. Agenda The need for a Digital Geneva Convention 1 Where the discussions are today 2 3 The importance of
Alaa Ajweh Financial Sector Lead Microsoft QSTP LLC.
they fell victim to a successful cyberattack the prior year
cost of cyberattacks to companies each year
Data records compromised from top 8 breaches in 2015
Median # of days between infiltration and detection
estimated economic cost
by 2020
victims of cybercrime per year
REDUCED INNOVATION
CONTENT RELATED CRIME, AND EXTREMIST RECRUITING SIGNIFICANT ORGANIZED CRIME ELEMENT DISRUPTION AND DANGERS TO CRITICAL INFRASTRUCTURE AND SYSTEMS DECREASED TRUST INVASIONS OF PRIVACY
IMPACT GOES BEYOND FINANCES
50+ Countries with Defensive Capabilities 38+ Countries with Offensive Capabilities 95+ Countries Developing Legislative Initiatives 70+ Countries with Cybersecurity Strategies
Germany ~$1.1bn China
~$1.5bn
Russia
<$300m
USA
<$6.7bn
UK
~$2bn
~$200m Iran
~$1bn
ESTIMATED SPENDING ON CYBER OPERATIONS
USER PROTECTOR EXPLOITER LEGISLATOR
DDoS against Estonia Russo- Georgian war ‘Cast Lead’ and ‘Pillar of Defense’ (Israel/Palestine) GhostNet Operation Aurora Stuxnet India – Pakistan cyber war Jasmine Revolution Sony Heartbleed security bug Yahoo! Japan Pension Service Montenegro Russian banks Norway Sony OPM USA - ISIS US presidential elections North Korea Ukraine power grid ADP Czech MFA
2007 2011 2014 2016 2008 2009 2010 2012 2013 2015 2017
North Korea – South Korea RasGas
G20 G7 SCO UNGGE FIRST UNIDIR OSCE UNODC NATO
US-CHINA CYBER AGREEMENT (2015) US GOVERNMENT PROPOSALS (2015) UN GROUP OF GOVERNMENTAL EXPERTS REPORT (2015 and onwards) SHANGHAI COOPERATION ORGANIZATION PROPOSALS (2015) G20 LEADERS ANTALYA COMMUNIQUE (2015) ORGANIZATION FOR SECURITY AND CO- OPERATION IN EUROPE CONFIDENCE BUILDING MEASURES (2013 + 2016)
INCREASING MOVEMENT TOWARDS CONCRETE PROPOSALS
G7 NATIONS LUCCA DECLARATION (2017)
state’s behavior in cyberspace”.
prevent conflict and promote stability.
approach to binding agreements.
the private sector, especially the tech sector.
USER PROTECTOR LEGISLATOR EXPLOITER
PLATFORM AND INFRASTRUCTURE PROVIDERS TECHNOLOGY MANUFACTURERS DEFENDERS AND RESPONDERS ASSURANCE ORGANIZATIONS ASSURANCE ORGANIZATIONS CRITICAL INFRASTRUCTURE OPERATORS
Loss of trust in products and services Complicated response cycles and operational uncertainties Distorted threat models Reciprocity costs from state actions Regulatory costs from dynamic compliance environment
The Regime Complex for Managing Global Cyber Activities (Joseph S. Nye Jr., 2014)
groups and non-governmental
expert or holistic perspectives.
level, some even internationally.
Global Conferences
aka The London Pro aka The London Process ess
(GCCS) Global Forum on Cyber Expertise (GFCE) Munich Security Conference (MSC)
GOVERNMENTS
GFCE
Global Commission for the Stability of Cyberspace (GCSC) PRIVATE SECTOR CIVIL SOCIETY & NON- GOVERNMENTAL GROUPS
ATTRIBUTION ORGANIZATION TECH SECTOR ACCORDS BINDING GOVERNMENT AGREEMENTS
LEGALLY BINDING FRAMEWORK GOVERNING STATES’ BEHAVIOUR PRECEDENTS EXIST FOR NUCLEAR AND CHEMICAL WEAPONS. SHOULD AIM TO CONSTRAIN AND/OR PREVENT CYBER-CONFLICT CAN START AS VOLUNTARY OR POLITICALLY BINDING
Safety and security of private citizens
DO NOT ACT AGAINST: ACT IN ORDER TO:
Mass-market commercial tech products by inserting “backdoors” Systems key to global economy Intellectual property or confidential business information Journalists and private citizens involved in electoral processes Have clear policy re. vulnerabilities in mass market products and services Assist private sector detection, containment, response, and recovery Develop limited, precise, non- reusable cyber weapons Avoid mass damage to civilian infrastructure in cyber
Limit proliferation
weapons
… therefore, tech companies must act to create a trustworthy environment for users and to reassure states
…which means they need to be able to trust the technology underpinning cyberspace… …and to be able to trust those who make the technology… Individuals and organizations need to trust cyberspace before they fully commit to it… …and, in the face of growing state activity in cyberspace, individual companies can draw strength from a collective “tech sector” approach.
COLLABORATION TO BOLSTER FIRST-RESPONDER EFFORTS COORDINATION TO ADDRESS VULNERABILITIES ASSISTANCE TO PROTECT CUSTOMERS EVERYWHERE NO ASSISTANCE FOR OFFENSIVE CYBER OPERATIONS FIGHTING PROLIFERATION OF VULNERABILITIES SUPPORT FOR GOVERNMENTS’ RESPONSE EFFORTS
DEEP TECHNICAL EXPERTISE GEOGRAPHICALLY DIVERSE SUBJECT TO PEER REVIEW FOCUSED ON SEVERE ATTACKS
nothing
covert options
accusation
accusation
arget selection
Undertake to create politically binding then legally binding agreements committing governments to certain, acceptable behaviors in cyberspace. Drive forward a tech sector accord that commits the ICT industry to objectives and actions that will protect users and the wider internet, and will ensure the sector’s neutral status in any cyber-conflict. Support the establishment and operation of politically-neutral, independent, transparent and peer-reviewed attribution organization. Identify and provide avenues for multi-stakeholder input and involvement in the development of cyberspace policies and agreements.