{"id":30896,"date":"2017-03-16T06:00:56","date_gmt":"2017-03-15T19:00:56","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=30896"},"modified":"2017-03-15T12:07:59","modified_gmt":"2017-03-15T01:07:59","slug":"normative-approach-preventing-cyberwarfare","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/","title":{"rendered":"A normative approach to preventing cyberwarfare"},"content":{"rendered":"
<\/figure>\n

A series of episodes in recent years\u2014including Russia\u2019s cyber interventions to skew the United States\u2019 2016 presidential election toward Donald Trump, the anonymous cyber-attacks that disrupted Ukraine\u2019s electricity system in 2015, and the \u2018Stuxnet\u2019 virus that destroyed a thousand Iranian centrifuges\u2014has fuelled growing concern about conflict in cyberspace. At last month\u2019s Munich Security Conference, Dutch Foreign Minister Bert Koenders announced the formation of a new non-governmental Global Commission on the Stability of Cyberspace<\/a> to supplement the UN Group of Governmental Experts (GGE).<\/p>\n

The GGE\u2019s reports in 2010, 2013, and 2015 helped to set the negotiating agenda for cybersecurity, and the most recent identified a set of norms that have been endorsed by the UN General Assembly. But, despite this initial success, the GGE has limitations. The participants are technically advisers to the UN Secretary-General rather than fully empowered national negotiators. Although the number of participants has increased from the original 15 to 25, most countries do not have a voice.<\/p>\n

But there is a larger question lurking behind the GGE: Can norms really limit state behaviour?<\/p>\n

Most experts agree that a global cyberspace treaty currently would be politically impossible (though Russia and China have made such proposals at the UN). But, beyond formal treaties, normative constraints on states also include codes of conduct, conventional state practices, and widely shared expectations of proper behaviour among a group (which create a common law). In scope, these constraints can vary from global, to plurilateral, to bilateral. So what can history tell us about the effectiveness of normative policy instruments?<\/p>\n

In the decade after Hiroshima, tactical nuclear weapons were widely regarded as \u201cnormal\u201d weapons, and the US military incorporated nuclear artillery, atomic land mines, and nuclear anti-aircraft weapons into its deployed forces. In 1954 and 1955, the Chairman of the Joint Chiefs of Staff told President Dwight Eisenhower that the defense of Dien Bien Phu in Vietnam and of offshore islands near Taiwan would require the use of nuclear weapons (Eisenhower rejected the advice).<\/p>\n

Over time, the development of an informal norm of non-use of nuclear weapons changed this. The Nobel laureate economist Thomas Schelling argued that the development of the norm of non-use of nuclear weapons<\/a> was one of the most important aspects of arms control over the past 70 years, and it has had an inhibiting effect on decision-makers. But for new nuclear states like North Korea, one cannot be sure that the costs of violating the taboo would be perceived as outweighing the benefits.<\/p>\n

Similarly, a taboo against using poisonous gases in warfare developed after World War I, and the 1925 Geneva Protocol prohibited the use of chemical and biological weapons. Two treaties in the 1970s prohibited the production and stockpiling of such weapons, creating a cost not only for their use, but also for their very possession.<\/p>\n

Verification provisions for the Biological Weapons Convention are weak (merely reporting to the UN Security Council), and such taboos did not prevent the Soviet Union from continuing to possess and develop biological weapons in the 1970s. Similarly, the Chemical Weapons Convention did not stop either Saddam Hussein or Bashar al-Assad from using chemical weapons against their own citizens.<\/p>\n

Nonetheless, both treaties have shaped how others perceive such actions. Such perceptions contributed to the justification of the invasion of Iraq in 2003 to the international dismantling of most Syrian weapons in 2014. With 173 countries having ratified the Biological Warfare Convention, states that wish to develop such weapons must do so secretly, and face widespread international condemnation if evidence of their activities becomes known.<\/p>\n

Normative taboos may also become relevant in the cyber realm, though here the difference between a weapon and a non-weapon depends on intent, and it would be difficult to forbid\u2014and impossible to prohibit reliably\u2014the design, possession, or even implantation for espionage of particular computer programs. In that sense, efforts to prevent cyber conflict cannot be like the nuclear arms control that developed during the Cold War, which involved elaborate treaties and detailed verification protocols.<\/p>\n

A more fruitful approach to normative controls on cyberwarfare may be to establish a taboo not against weapons<\/em> but against targets<\/em>. The US has promoted the view that the Law of Armed Conflict (LOAC), which prohibit deliberate attacks on civilians, applies in cyberspace. Accordingly, the US has proposed that, rather than pledging \u2018no first use\u2019 of cyber weapons, countries should pledge not to use cyber weapons against civilian facilities in peacetime.<\/p>\n

This approach to norms has been adopted by the GGE. The taboo would be reinforced by confidence-building measures such as promises of forensic assistance and non-interference with the workings of Computer Security Incident Response Teams (CSIRTs).<\/p>\n

The GGE report of July 2015 focused on restraining attacks on certain civilian targets, rather than proscribing particular code. At the September 2015 summit between US President Barack Obama and Chinese President Xi Jinping, the two leaders agreed to establish an expert commission to study the GGE proposal. Subsequently, the GGE report was endorsed by the leaders of the G20 and referred to the UN General Assembly.<\/p>\n

The attack on the Ukrainian power system occurred in December 2015, shortly after the submission of the GGE report, and in 2016, Russia did not treat the US election process as protected civilian infrastructure. The development of normative controls on cyber weapons remains a slow\u2014and, at this point, incomplete\u2014process.<\/p>\n","protected":false},"excerpt":{"rendered":"

A series of episodes in recent years\u2014including Russia\u2019s cyber interventions to skew the United States\u2019 2016 presidential election toward Donald Trump, the anonymous cyber-attacks that disrupted Ukraine\u2019s electricity system in 2015, and the \u2018Stuxnet\u2019 virus …<\/p>\n","protected":false},"author":500,"featured_media":30898,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,713,168,356,92],"class_list":["post-30896","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyberattack","tag-norms","tag-nuclear-weapons","tag-united-nations"],"acf":[],"yoast_head":"\nA normative approach to preventing cyberwarfare | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A normative approach to preventing cyberwarfare | The Strategist\" \/>\n<meta property=\"og:description\" content=\"A series of episodes in recent years\u2014including Russia\u2019s cyber interventions to skew the United States\u2019 2016 presidential election toward Donald Trump, the anonymous cyber-attacks that disrupted Ukraine\u2019s electricity system in 2015, and the \u2018Stuxnet\u2019 virus ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-15T19:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-15T01:07:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/dart-2109542_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1358\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joseph S. Nye\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joseph S. Nye\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/dart-2109542_1920.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/dart-2109542_1920.jpg\",\"width\":1920,\"height\":1358},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/\",\"name\":\"A normative approach to preventing cyberwarfare | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/#primaryimage\"},\"datePublished\":\"2017-03-15T19:00:56+00:00\",\"dateModified\":\"2017-03-15T01:07:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/edb0a4c6105071db2b5d7d716d4d7eed\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A normative approach to preventing cyberwarfare\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/edb0a4c6105071db2b5d7d716d4d7eed\",\"name\":\"Joseph S. Nye\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3e5157ecfa6b59807d2cf04084bc0ed9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3e5157ecfa6b59807d2cf04084bc0ed9?s=96&d=mm&r=g\",\"caption\":\"Joseph S. Nye\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/joseph-s-nye-jr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A normative approach to preventing cyberwarfare | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/","og_locale":"en_US","og_type":"article","og_title":"A normative approach to preventing cyberwarfare | The Strategist","og_description":"A series of episodes in recent years\u2014including Russia\u2019s cyber interventions to skew the United States\u2019 2016 presidential election toward Donald Trump, the anonymous cyber-attacks that disrupted Ukraine\u2019s electricity system in 2015, and the \u2018Stuxnet\u2019 virus ...","og_url":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-03-15T19:00:56+00:00","article_modified_time":"2017-03-15T01:07:59+00:00","og_image":[{"width":1920,"height":1358,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/dart-2109542_1920.jpg","type":"image\/jpeg"}],"author":"Joseph S. Nye","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Joseph S. Nye","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/dart-2109542_1920.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/dart-2109542_1920.jpg","width":1920,"height":1358},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/","url":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/","name":"A normative approach to preventing cyberwarfare | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/#primaryimage"},"datePublished":"2017-03-15T19:00:56+00:00","dateModified":"2017-03-15T01:07:59+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/edb0a4c6105071db2b5d7d716d4d7eed"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/normative-approach-preventing-cyberwarfare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"A normative approach to preventing cyberwarfare"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/edb0a4c6105071db2b5d7d716d4d7eed","name":"Joseph S. Nye","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3e5157ecfa6b59807d2cf04084bc0ed9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3e5157ecfa6b59807d2cf04084bc0ed9?s=96&d=mm&r=g","caption":"Joseph S. Nye"},"url":"https:\/\/www.aspistrategist.ru\/author\/joseph-s-nye-jr\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30896"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/500"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=30896"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30896\/revisions"}],"predecessor-version":[{"id":30900,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30896\/revisions\/30900"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/30898"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=30896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=30896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=30896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}