w

Power Politics Could Impede Progress on Responsible Regulation of Cyberspace

3 December 2019

Harriet Moynihan

Senior Research Fellow, International Law Programme
A new Chatham House paper examines the prospects of countries reaching agreement on issues of sovereignty and non-intervention in cyberspace in the face of persistent, low-level, state-to-state cyber attacks.

2019-11-29-Intl-Law-Cyberattacks.jpg

A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images.

In discussions to date about how international law applies in cyberspace, commentators have tended to focus their attention on how the rules on the use of force, or the law of armed conflict, apply to cyber activities conducted by states that give rise to physical damage, injury or death.

But in practice, the vast majority of state cyberattacks fall below this threshold. Far more common are persistent, low-level attacks that may leave no physical trace but that are capable of doing significant damage to a state’s ability to control its systems, often at serious economic cost.

Such cyber incursions might include network disruptions in the operation of another government’s websites; tampering with electoral infrastructure to change or undermine the result; or using cyber means to destabilize another state’s financial sector.

For these kinds of cyber operation, the principle of sovereignty, and the principle of non-intervention in another state’s internal affairs, are the starting point.

A UN Group of Government Experts (GGE) agreed in 2013 and 2015 that the principles in the UN Charter, including sovereignty and the prohibition on intervention in another state’s affairs, apply to states’ activities in cyberspace. The 2015 GGE also recommended eleven (non-binding) norms of responsible state behaviour in cyberspace.

However, states have not yet reached agreement on how to apply these principles. Until recently, there has also been very little knowledge of what states actually do in cyberspace, as they usually conduct cyber operations covertly and have been reluctant to put their views on record.

A new Chatham House research paper analyses the application of the principles of sovereignty and non-intervention to state cyberattacks that fall below the principle of use of force. As well as analysing the application of the law in this area, the paper also makes recommendations to governments on how they might best make progress in reaching agreement in this area.

Existing rules or new rules?

As the research paper makes clear, there is currently some debate, principally between countries in the West, about the extent to which sovereignty is a legally binding rule in the context of cyberspace and, if so, how it and the principle of non-intervention might apply in practice.

In the last few years, certain states have put on record how they consider international law to apply to states’ activities in cyberspace, namely the UK, Australia, France and the Netherlands. While there may be some differences in their approaches, which are discussed in the paper, there also remains important common ground: namely, that existing international law already provides a solid framework for regulating states’ cyber activities, as it regulates every other domain of state-to-state activity.

There is also an emerging trend for states to work together when attributing cyberattacks to hostile states, enabling them to call out malign cyber activity when it violates international law. (See, for example, the joint statements made in relation to the NotPetya cyber attack and malicious cyber activity attributed to the Russian government).

However, other countries have questioned whether existing international law as it stands is capable of regulating states’ cyber interactions and have called for ‘new legal instruments’ in this area.

This includes a proposal by the Shanghai Cooperation Organization (led by Russia and China) for an International Code of Conduct on Information Security, a draft of which was submitted to the UN in 2011 and 2015, without success. The UN has also formed a new Open-Ended Working Group (OEWG) under a resolution proposed by Russia to consider how international law applies to states’ activities in cyberspace.

The resolution establishing the OEWG, which began work earlier this year, includes the possibility of the group ‘introducing changes to the rules, norms and principles of responsible behaviour of States’ agreed in the 2013 and 2015 GGE reports. In the OEWG discussions at the UN in September, several countries claimed that a new legal instrument was needed to fill the ‘legal vacuum’ (Cuba) or ‘the gap of ungoverned areas’ (Indonesia).

It would be concerning if the hard-won consensus on the application of international law to cyberspace that has been reached at past GGEs started to unravel. In contrast to 2013 and 2015, the 2017 meeting failed to reach an agreement.

On 9 December, a renewed GGE will meet in New York, but the existence of the OEWG exploring the same issues in a separate process reflects the fact that cyber norms have become an area of geopolitical rivalry.

Aside from the application of international law, states are also adopting divergent approaches to the domestic regulation of cyberspace within their own territory. The emerging trend towards a ‘splinternet’ – i.e. between states that believe the internet should be global and open on the hand, and those that favour a ‘sovereignty and control’ model on the other  – is also likely to make discussions at the GGE more challenging.

Distinct from the international law concept of sovereignty is the notion of ‘cybersovereignty’, a term coined by China to describe the wide-ranging powers it assumes under domestic law to regulate its citizens’ access to the internet and personal data within its territory. This approach is catching on (as reflected in Russia’s recently enacted ‘Sovereign Internet Law’), with other authoritarian states likely to follow suit.

The importance of non-state actors

In parallel with regional and UN discussions on how international law applies, a number of initiatives by non-state actors have also sought to establish voluntary principles about responsible state behaviour in cyberspace.

The Global Commission on the Stability of Cyberspace, a multi-stakeholder body that has proposed principles, norms and recommendations to guide responsible behaviour by all parties in cyberspace, recently published its final report. The Cybersecurity Tech Accord  aims to promote collaboration between tech companies on stability and resilience in cyberspace. President Macron’s ‘Paris Call for Trust and Security in Cyberspace’ has to date received the backing of 67 states, 139 international and civil society organizations, and 358 private-sector organizations.

It remains to be seen in the long term whether the parallel processes at the UN will work constructively together or be competitive. But notwithstanding the challenging geopolitical backdrop, the UN GGE meeting next week at the least offers states the opportunity to consolidate and build on the results of past meetings; to increase knowledge and discussion about how international law might apply; and to encourage more states to put their own views of these issues on the record.




w

War Crimes and Their Prosecution

Invitation Only Research Event

5 March 2020 - 9:00am to 10:30am

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Michelle Butler, Barrister, Matrix Chambers
Charles Garraway, Visiting Fellow, Human Rights Centre, University of Essex
Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House

 

The International Criminal Court cannot act when crimes are being genuinely prosecuted in a state. The meeting will discuss whether the ICC complementarity rules apply when a state puts restrictions on the prosecution of war crimes committed in particular circumstances or within a particular time period. In this context, the discussion will also cover the extent to which such restrictions are precluded by international obligations such as those in the Geneva Conventions with regard to the investigation and prosecution of war crimes.

Event attributes

Chatham House Rule

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




w

Seventy Years of the Geneva Conventions: What of the Future?

24 March 2020

Seventy years after the adoption of the Geneva Conventions, there are challenges that remain to be addressed. This briefing takes three pertinent examples, and discusses possibilities for addressing them.

Emanuela-Chiara Gillard

Associate Fellow, International Law Programme

GettyImages-913468402.jpg

Rescue of the wounded in Duma city by Syrian Red Crescent paramedics, 2 February 2018. Photo: Samer Bouidani/NurPhoto/Getty

Summary

  • The 70th anniversary of the adoption of the 1949 Geneva Conventions was commemorated in 2019. But violations of the Conventions and of the 1977 Additional Protocols are widespread.
  • Contemporary conflicts have been marked by violations of some of the foundational rules of international humanitarian law (IHL) relating to the protection of the wounded and sick and of providers of medical assistance.
  • A further area of IHL that has come under strain and scrutiny are the rules regulating humanitarian relief operations and their application to sieges and blockades.
  • War has a huge impact on children, and the treatment of children in armed conflict is another area of the law that requires further attention.
  • In the current political climate, it is unlikely that new treaties will be negotiated to address emerging issues or uncertainties in the law.
  • Other measures must be explored, including the adoption of domestic measures to implement existing law; support for processes that interpret the law; and initiatives to promote compliance with the law by organized armed groups.
  • One overarching challenge is the interplay between IHL and counterterrorism measures. It can undermine the protections set out in IHL, and hinder principled humanitarian action and activities to promote compliance with the law by organized armed groups.




w

Glucocerebrosidases catalyze a transgalactosylation reaction that yields a newly-identified brain sterol metabolite, galactosylated cholesterol [Glycobiology and Extracellular Matrices]

β-Glucocerebrosidase (GBA) hydrolyzes glucosylceramide (GlcCer) to generate ceramide. Previously, we demonstrated that lysosomal GBA1 and nonlysosomal GBA2 possess not only GlcCer hydrolase activity, but also transglucosylation activity to transfer the glucose residue from GlcCer to cholesterol to form β-cholesterylglucoside (β-GlcChol) in vitro. β-GlcChol is a member of sterylglycosides present in diverse species. How GBA1 and GBA2 mediate β-GlcChol metabolism in the brain is unknown. Here, we purified and characterized sterylglycosides from rodent and fish brains. Although glucose is thought to be the sole carbohydrate component of sterylglycosides in vertebrates, structural analysis of rat brain sterylglycosides revealed the presence of galactosylated cholesterol (β-GalChol), in addition to β-GlcChol. Analyses of brain tissues from GBA2-deficient mice and GBA1- and/or GBA2-deficient Japanese rice fish (Oryzias latipes) revealed that GBA1 and GBA2 are responsible for β-GlcChol degradation and formation, respectively, and that both GBA1 and GBA2 are responsible for β-GalChol formation. Liquid chromatography–tandem MS revealed that β-GlcChol and β-GalChol are present throughout development from embryo to adult in the mouse brain. We found that β-GalChol expression depends on galactosylceramide (GalCer), and developmental onset of β-GalChol biosynthesis appeared to be during myelination. We also found that β-GlcChol and β-GalChol are secreted from neurons and glial cells in association with exosomes. In vitro enzyme assays confirmed that GBA1 and GBA2 have transgalactosylation activity to transfer the galactose residue from GalCer to cholesterol to form β-GalChol. This is the first report of the existence of β-GalChol in vertebrates and how β-GlcChol and β-GalChol are formed in the brain.




w

WYSIWYG Web Builder 7.0 released!

We are pleased to announce a major new release with more than 150 new features and improvements!




w

WYSIWYG Web Builder 7.5 available now!

WYSIWYG Web Builder 7.5 is a major update with more than 50 new features and improvements (compared to version 7.2.1). Our christmas gift to you!




w

WYSIWYG Web Builder 8.0 released!

We are pleased to announce a major new release with more than 150 new features and improvements!




w

WYSIWYG Web Builder 8.5 available now!

WYSIWYG Web Builder 8.5 is a major update with more than 50 new features and improvements (compared to version 8.2.1).




w

WYSIWYG Web Builder 9.0 released!

We are pleased to announce a major new release with more than 150 new features and improvements!




w

WYSIWYG Web Builder 9.1 update

WYSIWYG Web Builder 9.1 fixes known problems, adds new features and includes other improvements.




w

WYSIWYG Web Builder 9.2 update

WYSIWYG Web Builder 9.2 fixes known problems, adds new features and includes other improvements.




w

WYSIWYG Web Builder 9.3 update

WYSIWYG Web Builder 9.3 fixes known problems, adds new features and includes other improvements.




w

WYSIWYG Web Builder 9.4 update

WYSIWYG Web Builder 9.4 fixes known problems, adds new features and includes other improvements.




w

WYSIWYG Web Builder 10.0 released!

We are pleased to announce a major new release with more than 100 new features and improvements!




w

WYSIWYG Web Builder 10.1 update

WYSIWYG Web Builder 10.1 fixes known problems, adds new features and includes other improvements.




w

WYSIWYG Web Builder 10.2 update

WYSIWYG Web Builder 10.2 fixes known problems, adds new features and includes other improvements.




w

WYSIWYG Web Builder 10.3 update

WYSIWYG Web Builder 10.3 fixes known problems, adds new features and includes other improvements.




w

WYSIWYG Web Builder 10.4 update

WYSIWYG Web Builder 10.4 fixes known problems, adds new features and includes other improvements.




w

WYSIWYG Web Builder 11.0 released!

We are pleased to announce a major new release with more than 150 new features and improvements!




w

WYSIWYG Web Builder 12.0 released!

We are pleased to announce a major new release with more than 125 new features and improvements!




w

A Quantitative Tri-fluorescent Yeast Two-hybrid System: From Flow Cytometry to In cellula Affinities

David Cluet
Apr 1, 2020; 19:701-715
Technological Innovation and Resources




w

Integrative Metabolic Pathway Analysis Reveals Novel Therapeutic Targets in Osteoarthritis

Beatriz Rocha
Apr 1, 2020; 19:574-588
Research




w

Flow-induced reorganization of laminin-integrin networks within the endothelial basement membrane uncovered by proteomics

Eelke P. Béguin
Apr 24, 2020; 0:RA120.001964v1-mcp.RA120.001964
Research




w

Seminal Plasma Proteome as an Indicator of Sperm Dysfunction and Low Sperm Motility

Yunlei Li
Apr 20, 2020; 0:RA120.002017v1-mcp.RA120.002017
Research




w

Robust summarization and inference in proteome-wide label-free quantification

Adriaan Sticker
Apr 22, 2020; 0:RA119.001624v1-mcp.RA119.001624
Research




w

Human Hepatocyte Nuclear Factor 4-{alpha} Encodes Isoforms with Distinct Transcriptional Functions

Élie Lambert
May 1, 2020; 19:808-827
Research




w

Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation

Nora Linscheid
Apr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878
Research




w

Characterization of signaling pathways associated with pancreatic {beta}-cell adaptive flexibility in compensation of obesity-linked diabetes in db/db mice

Taewook Kang
Apr 7, 2020; 0:RA119.001882v1-mcp.RA119.001882
Research




w

Discovery of a Redox Thiol Switch: Implications for Cellular Energy Metabolism

Xing-Huang Gao
May 1, 2020; 19:852-870
Research




w

Proteome and phosphoproteome analysis of brown adipocytes reveals that RICTOR loss dampens global insulin/AKT signaling

Samuel W Entwisle
Apr 6, 2020; 0:RA120.001946v2-mcp.RA120.001946
Research




w

Selection of features with consistent profiles improves relative protein quantification in mass spectrometry experiments

Tsung-Heng Tsai
Mar 31, 2020; 0:RA119.001792v1-mcp.RA119.001792
Research




w

Profiling Cell Signaling Networks at Single-cell Resolution

Xiao-Kang Lun
May 1, 2020; 19:744-756
Review




w

MaxQuant software for ion mobility enhanced shotgun proteomics

Nikita Prianichnikov
Mar 10, 2020; 0:TIR119.001720v1-mcp.TIR119.001720
Technological Innovation and Resources




w

An Improved Boosting to Amplify Signal with Isobaric Labeling (iBASIL) Strategy for Precise Quantitative Single-cell Proteomics

Chia-Feng Tsai
May 1, 2020; 19:828-838
Research




w

Acquiring and Analyzing Data Independent Acquisition Proteomics Experiments without Spectrum Libraries

Lindsay K Pino
Apr 20, 2020; 0:P119.001913v1-mcp.P119.001913
Perspective




w

A Compact Quadrupole-Orbitrap Mass Spectrometer with FAIMS Interface Improves Proteome Coverage in Short LC Gradients

Dorte B. Bekker-Jensen
Apr 1, 2020; 19:716-729
Technological Innovation and Resources




w

Rising to the challenge in the worst circumstances

In this era when we need to do everything possible to keep essential businesses operational, the people of the information security community have banded together in an inspirational effort to protect us all.




w

XG Firewall is now available on AWS

We are extremely pleased to announce the availability of XG Firewall on Amazon Web Services (AWS) public cloud infrastructure.




w

Following the money in a massive “sextortion” spam scheme

Cryptocurrency profits from sextortion spam funneled into wallets tied to other cybercrime and dark web market activity.







w

How to remove unused devices from Sophos Central

We take you through the steps to clear your old devices from Sophos Central, so you've got more time to focus on the devices that matter.




w

Protecting the Cloud: Securing user remote access to AWS

How to create secure access to services hosted in AWS with Sophos XG Firewall.




w

A New Type of Learning Community

Setting high standards is expected from all educators. Yet, I think I may have taken this to an extreme in my 2019 spring senior seminar course in algebraic combinatorics. Students walked in to class, got a copy of the syllabus … Continue reading




w

Learning During the Pandemic: What we wish our professors and mentors knew

Student Authors: Mayleen Cortez, Brooke Keene-Gomez, Lucy Martinez, Amaury V. Miniño, Jenna Race, Kelemua Tesfaye, and Stephanie. Blog post compiled by Melissa Gutiérrez González, Pamela E. Harris, and Alicia Prieto Langarica. In this blog we center the voices of mathematics students as … Continue reading




w

Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean

Invitation Only Research Event

8 March 2019 - 9:00am to 5:30pm

Bridgetown, Barbados

Event participants

Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House

This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. 

As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.

The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




w

European Approaches to Remote Warfare

Research Event

15 May 2019 - 9:00am to 6:00pm

Brussels, Belgium

With continuing instability at Europe's borders, along with uncertainty on future US support for NATO, many European countries are increasing their allocations to defence budgets and to collective European strategic defence. In addition, with non-state armed groups creating instability and threatening civilian lives and livelihoods in proximity to the EU’s borders, various operations have been carried out in conflict theatres in the Middle East, North Africa and the Sahel under the auspices of NATO, the UN, the EU or by single EU member states.

Although European military personnel have been deployed in many regions, with countries becoming more reluctant to deploy ‘boots on the ground’, warfare has been increasingly conducted through remote means. This has led to criticism on the limited transparency and accountability mechanisms at work in these operations, while some have questioned the military effectiveness of such tactics or the capacity and willingness of states to ensure that targets are struck accurately and without impact on civilian populations.

Against this background, the EU has started allocating resources to military research and development projects with a focus on unmanned systems and related technologies. Under the auspices of the European Defence Fund such funding is set to increase, while potential bilateral programmes between some states have also been explored. Despite concerns raised by the European Parliament, the development of these policies and technologies has taken place without significant consideration of what the legal, ethical and military-strategic impact of these instruments might be.    

This event will bring together a range of experts, policymakers and civil society organizations to discuss the technology horizon of European defence investments and policy developments around remote warfare. Participants will discuss the implications of the new EU defence fund, legal, ethical, and transparency issues in military research and development and the position of the EU as a global actor. 

This event is being organized in partnership with PAX Netherlands.

THIS EVENT IS NOW FULL AND REGISTRATION HAS CLOSED.

Nilza Amaral

Project Manager, International Security Programme




w

How Regulation Could Break the Internet: In Conversation with Andrew Sullivan

Research Event

19 June 2019 - 6:00pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Andrew Sullivan, President and CEO Internet Society
Chair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy

Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable.  

On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.

On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure.  

This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




w

Peter Watkins

Associate Fellow, International Security Programme

Biography

Peter Watkins became an associate fellow for Chatham House in June 2019. Before that, from 2014 to 2018, he was Director General (DG) in the UK Ministry of Defence (MoD) responsible for strategic defence policy, including key multilateral and bilateral relationships (such as NATO), nuclear, cyber, space and prosperity (latterly this post was known as the DG Strategy and International).

Previously he served as DG of the Defence Academy, Director of Operational Policy, Director responsible for the UK share of the multinational Typhoon combat aircraft programme and as Defence Counsellor in the UK Embassy in Berlin.

He is a frequent participant in conferences on defence and security in the UK and overseas.

He was awarded the CB (2019) and CBE (2004) for services to defence. He has an MA from Cambridge University.

Areas of expertise

  • European security
  • Deterrence policy
  • Nuclear policy
  • Stabilisation and peacekeeping
  • International armaments cooperation

Past experience

2006-07Fellow, Weatherhead Center for International Affairs, Harvard University
1993-94Senior course member, NATO Defense College