{"id":15040,"date":"2014-08-04T12:15:53","date_gmt":"2014-08-04T02:15:53","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=15040"},"modified":"2014-08-05T10:07:51","modified_gmt":"2014-08-05T00:07:51","slug":"double-dutch-two-challenges-for-the-hague-cyberspace-conference","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/","title":{"rendered":"Double Dutch: two challenges for The Hague cyberspace conference"},"content":{"rendered":"

\"Uri<\/a><\/p>\n

As cybersecurity concerns edge higher on policy agendas worldwide, establishing \u2018rules of the road\u2019 for cyberspace has grown more challenging. International cyberspace meetings have multiplied, and the views expressed within them are, typically, divided<\/a>. In 2015, the Netherlands will host the fourth international cyberspace conference in The Hague. That summit is the next in a series of events\u2014previous conferences have been held in London, Budapest and Seoul\u2014that flow from then UK Foreign Secretary William Hague\u2019s proposal at the 2011 Munich Security Conference \u2018to consider how to reach international agreements about behaviour in cyberspace.\u2019 It\u2019s time for Australia to start thinking about what it can bring to the table in The Hague.<\/p>\n

Last Tuesday, a Dutch delegation led by Uri Rosenthal, special envoy for the 2015 International Conference on Cyberspace joined ASPI\u2019s International Cyber Policy Centre for a roundtable<\/a> discussion with a cross-section of representatives from the Australian government, private sector, NGOs and academia. Two strong themes ran throughout the meeting: the need to encourage multi-stakeholder views from industry and civil society in cyberspace discussions, and the importance of moving beyond simple awareness about cyberspace issues, to \u2018putting principles into practice\u2019 and building cyber capacity.<\/p>\n

The last meeting hosted by South Korea covered a range of issues<\/a>, with a particular focus on the role of developing nations in cyberspace debates. One major criticism of the Seoul conference was that there was a disproportionate degree\u2014in number and influence\u2014of government voices. ICPC Director Tobias Feakin wrote in a firsthand account<\/a> that \u2018there was a distinct lack of world leading industry figures alongside the Government representatives, meaning that it was a largely state-led focus for the headline panels\u2019. As is the nature of politics, foreign ministers used the conference as a soapbox to talk past each other.<\/p>\n

As Australian Foreign Minister Julie Bishop stated<\/a> in Seoul, \u2018governments are not generally the best or first place to look for solutions to the internet’s challenges.\u2019 The best means to build an open and secure Internet is through a multi-stakeholder approach, encouraging civil society, academia, industry and the private sector to be involved. But it\u2019s a paradoxical situation, wrote<\/a> Tim Maurer and Camino Kavanagh on Cyberdialogue<\/i>, \u2018that the conference hosted by governments supportive of broader participation in discussions on cyberspace, is increasingly being perceived as dominated by, and reinforcing of the role of governments.\u2019<\/p>\n

In light of the challenges posed by the Seoul conference, a clear aim for The Hague conference should be to foster a diverse community of stakeholders actively involved in shaping cyber policy. While this multi-stakeholder position is not universally held, it\u2019s hard to ignore the role that the private sector and civil society have had in building the Internet, and the role they\u2019ll have in the future<\/a> (PDF).<\/p>\n

Accompanying efforts to expand the discussion, another aim should be to move from awareness about cyberspace concerns to building cyber capacity. Transitioning from discourse to outcomes is likely to be an overarching objective for The Hague meeting. It\u2019s promising that the Netherlands has already shown leadership in this area. In their 2013 National Cyber Security Strategy<\/a> (PDF) for example, one aim is to develop a \u2018cyber diplomacy hub\u2019 that gathers multidisciplinary knowledge about conflict prevention and cyber operations to create new solutions for international cooperation.<\/p>\n

Australia is well placed to help build cyber capacity in regional states. Recent efforts<\/a> in conjunction with Malaysia as part of the ASEAN Regional Forum workshop on cybersecurity earlier this year show how regional engagement, matched with practical confidence building, can promote an open and secure cyberspace. Five areas for Australia to assist in regional cyber capacity building have previously been outlined here<\/a>.<\/p>\n

Australia can also encourage multi-stakeholder views in time for The Hague conference. Many non-government voices within Australia have a role in cyberspace debates and encouraging them to outline their role and aspirations is a good start. That could be achieved in a consultative process, the outcomes of which the Australian Government and private stakeholders could take together to The Hague conference.<\/p>\n

The key question for the 2015 conference is whether it can it bring together diverse, and potentially irreconcilable, views on cyberspace, and manage opposing opinions while delivering real outcomes. It\u2019s a big ask, made even more pressing due to rising cyber threats and increasing Internet penetration. At the least, the conference objectives are ambitious. And with the future state of cyberspace at stake, that\u2019s a good thing.<\/p>\n

Simon Hansen is a research intern in ASPI\u2019s International Cyber Policy Centre. Image credit: Luke Wilson, ASPI.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

As cybersecurity concerns edge higher on policy agendas worldwide, establishing \u2018rules of the road\u2019 for cyberspace has grown more challenging. International cyberspace meetings have multiplied, and the views expressed within them are, typically, divided. In …<\/p>\n","protected":false},"author":214,"featured_media":15042,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[17,95,731,467,900],"class_list":["post-15040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australia","tag-cyber-security","tag-internet-governance","tag-multilateralism","tag-netherlands"],"acf":[],"yoast_head":"\nDouble Dutch: two challenges for The Hague cyberspace conference | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Double Dutch: two challenges for The Hague cyberspace conference | The Strategist\" \/>\n<meta property=\"og:description\" content=\"As cybersecurity concerns edge higher on policy agendas worldwide, establishing \u2018rules of the road\u2019 for cyberspace has grown more challenging. International cyberspace meetings have multiplied, and the views expressed within them are, typically, divided. In ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-04T02:15:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-08-05T00:07:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Uri-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1650\" \/>\n\t<meta property=\"og:image:height\" content=\"1100\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Uri-2.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Uri-2.jpg\",\"width\":1650,\"height\":1100,\"caption\":\"Uri Rosenthal, special envoy for the 2015 International Conference\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/\",\"name\":\"Double Dutch: two challenges for The Hague cyberspace conference | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/#primaryimage\"},\"datePublished\":\"2014-08-04T02:15:53+00:00\",\"dateModified\":\"2014-08-05T00:07:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Double Dutch: two challenges for The Hague cyberspace conference\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Double Dutch: two challenges for The Hague cyberspace conference | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/","og_locale":"en_US","og_type":"article","og_title":"Double Dutch: two challenges for The Hague cyberspace conference | The Strategist","og_description":"As cybersecurity concerns edge higher on policy agendas worldwide, establishing \u2018rules of the road\u2019 for cyberspace has grown more challenging. International cyberspace meetings have multiplied, and the views expressed within them are, typically, divided. In ...","og_url":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-08-04T02:15:53+00:00","article_modified_time":"2014-08-05T00:07:51+00:00","og_image":[{"width":1650,"height":1100,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Uri-2.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Uri-2.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Uri-2.jpg","width":1650,"height":1100,"caption":"Uri Rosenthal, special envoy for the 2015 International Conference"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/","url":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/","name":"Double Dutch: two challenges for The Hague cyberspace conference | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/#primaryimage"},"datePublished":"2014-08-04T02:15:53+00:00","dateModified":"2014-08-05T00:07:51+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/double-dutch-two-challenges-for-the-hague-cyberspace-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Double Dutch: two challenges for The Hague cyberspace conference"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15040"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=15040"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15040\/revisions"}],"predecessor-version":[{"id":15050,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15040\/revisions\/15050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/15042"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=15040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=15040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=15040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}