A Dose of Realism: The Contestation and Politics of Cyber Norms
Abstract
Norms for cyberspace remain highly contested internationally among governments and fragmented domestically within governments. Despite diplomatic activities at the United Nations over the past two decades, intersubjective agreement on norms governing coercive cyber power is still nascent. Agreed upon, explicitly stated norms are considered voluntary, defined vaguely, and internalized weakly. Implicit state practice is slowly emerging, yet poorly understood, and cloaked in secrecy. This raises the question: how do norms emerge for cyberspace? What has been the contribution of the UN process to the international community’s understanding of norms for cyberspace? Why did the process collapse in 2017, the very same year that two of the biggest cyber attacks to date—WannaCry and NotPetya—caused indiscriminate economic harm worldwide each with an estimated cost of several billion U.S. dollars? And why did member states, in an unprecedented move in the UN’s history, create two separate processes dedicated to the same issue in 2018? To answer these questions, this article analyses the various factors feeding into the dynamic process of norm contestation including an in-depth discussion of the process at the United Nations, the role of international law, and the main points of critiques.
Keywords
Cyberspace Contestation Cyber norms Cybersecurity Cyber securityNotes
Acknowledgements
Many thanks to Arun Sukumar, Duncan Hollis, Garrett Hinck, and Hannes Ebert in addition to two anonymous reviewers for providing feedback on an earlier draft of this article.
References
- Abbott K, Snidal D (2000) Hard and soft law in international governance. Int Org 54(3):421–456CrossRefGoogle Scholar
- Abbott K, Keohane R, Moravcsik A, Slaughter A, Snidal D (2000) The of legalization. Int Org 54(3):401–419CrossRefGoogle Scholar
- Abbott K, Green J, Keohane R (2016) Organizational ecology and institutional change in global governance. Int Org 70(2):247–277CrossRefGoogle Scholar
- Abdenur A, Gama C (2015) Triggering the norms cascade: Brazil’s initiatives for curbing electronic espionage. Glob Gov Rev Multilater Int Org 21(3):455–474Google Scholar
- Australian Signals Directorate (2018) Tweet. https://twitter.com/asdgovau/status/1056712961148895232?lang=en. Accessed 12 Feb 2019
- Baker S (2017) Steptoe cyber law podcast. Interview. https://www.steptoe.com/en/news-publications/interview-with-tim-maurer.html. Accessed 12 Feb 2019
- Barnes J E, Gibbons-Neff T (2019) U.S. carried out cyberattacks on Iran. https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html. Accessed 23 Aug 2019
- Brantly A, Keller WW, Jones SA (2016) The decision to attack: military and intelligence cyber decision-making. University of Georgia Press, AthensGoogle Scholar
- Broeders D (2016) The public core of the internet: an international agenda for internet governance. Amsterdam University Press, AmsterdamCrossRefGoogle Scholar
- Buchanan B (2017) The cybersecurity dilemma: hacking, trust and fear between Nations. Oxford University Press, OxfordCrossRefGoogle Scholar
- Burgess M (2018) We need a global cyberwar treaty, says the former head of GCHQ. WIRED. https://www.wired.co.uk/article/gchq-uk-robert-hannigan-cyberwar-definition. Accessed 12 Feb 2019
- Chesney R (2019) Crossing a cyber rubicon? Overreactions to the IDF’s strike on the Hamas Cyber Facility. https://www.lawfareblog.com/crossing-cyber-rubicon-overreactions-idfs-strike-hamas-cyber-facility. Accessed 23 Aug 2019
- Clapper J, Lettre M, Rogers M (2017) Foreign cyber threats to the United States. Joint Statement for the Record to the Senate Armed Services Committee. U.S. Congress. https://www.armed-services.senate.gov/imo/media/doc/Clapper-Lettre-Rogers_01-05-16.pdf. Accessed 22 Feb 2019
- Clarke R, Knake R (2011) Cyber war: the next threat to national security and what to do about it. HarperCollins, New YorkGoogle Scholar
- Cornish P (2015) Governing cyberspace through constructive ambiguity. Survival 57(3):153–176CrossRefGoogle Scholar
- Cybersecurity Tech Accord (2018) Cybersecurity tech accord. https://cybertechaccord.org/. Accessed 12 Feb 2019
- Diamond L (2016) Democracy in decline. Foreign Affairs, July/August 2016Google Scholar
- Dunn Cavelty M (2012) From cyber-bombs to political-fallout: threat representations with an impact. Int Stud Rev 15(1):105–122CrossRefGoogle Scholar
- Efrony D, Shany Y (2018) A rule book on the shelf? Tallinn manual 2.0 on cyberoperations and subsequent state practice. Am Soc Int Law 112(4):583–657CrossRefGoogle Scholar
- Egloff FJ, Wenger A (2019) Public attribution of cyber incidents.’ CSS Analyses in Security Policy No. 244. https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/CSSAnalyse244-EN.pdf. Accessed 23 Aug 2019
- Eichensehr KE (2014) The cyber-law of nations. Geo LJ 103:317Google Scholar
- Erskine T, Carr M (2016) Beyond ‘Quasi-Norms’: the challenges and potential of engaging with norms in cyberspace. International cyber norms: legal, policy and industry perspectives. NATO CCD COE Publications, TallinnGoogle Scholar
- Farrell H (2015) Promoting norms for cyberspace. Council on Foreign Relations Cyber-Brief. https://www.cfr.org/report/promoting-norms-cyberspace. Accessed 16 Sept 2019
- Farrell H, Glaser S (2017) The role of effects, saliencies and norms in US Cyberwar doctrine. J Cybersecur 3(1):7–17Google Scholar
- Fidler D (2018) The UN secretary-general’s call for regulating cyberwar raises more questions than answers. Net politics, council on foreign relations. https://www.cfr.org/blog/un-secretary-generals-call-regulating-cyberwar-raises-more-questions-answers. Accessed 12 Feb 2019
- Finnemore M (1993) International organizations as teachers of norms: the United Nations educational, scientific, and cultural organization and science policy. Int Org 47(4):565–597CrossRefGoogle Scholar
- Finnemore M (1999) Are legal norms distinctive? NYU J Int Law Polit 32(3):699–706Google Scholar
- Finnemore M (2011) Cultivating international cyber norms. America’s cyber future: security and prosperity in the information age. CNAS. https://citizenlab.ca/cybernorms2011/cultivating.pdf. Accessed 12 Feb 2019
- Finnemore M, Hollis D (2016) Constructing norms for global cybersecurity. Am J Int Law 110(3):425–479CrossRefGoogle Scholar
- Finnemore M, Sikkink K (1998) International norm dynamics and political change. Int Org 52(4):887–917CrossRefGoogle Scholar
- Fischerkeller M (2018) Persistent engagement and tacit bargaining: a strategic framework for norms development in cyberspace’s agreed competition. Institute for Defense Analyses. https://www.ida.org/research-and-publications/publications/all/p/pe/persistent-engagement-and-tacit-bargaining-a-strategic-framework-for-norms-development-in-cyberspaces-agreed-competition. Accessed 16 Sept 2019
- Fischerkeller M, Harknett R (2018) Persistent engagement and tacit bargaining: a path toward constructing norms in cyberspace. Lawfare. https://www.lawfareblog.com/persistent-engagement-and-tacit-bargaining-path-toward-constructing-norms-cyberspace. Accessed 12 Feb 2019
- France Diplomatie (2018) Cybersecurity: Paris call of 12 November 2018 for trust and security in cyberspace. https://www.diplomatie.gouv.fr/en/french-foreign-policy/digital-diplomacy/france-and-cyber-security/article/cybersecurity-paris-call-of-12-november-2018-for-trust-and-security-in. Accessed 12 Feb 2019
- G7 (2017) G7 declaration on responsible states behavior in Cyberspace. Lucca. https://s3.amazonaws.com/ceipfiles/pdf/CyberNorms/Multilateral/G7+Declaration+on+Responsible+States+Behavior+in+Cyberspace+4-11-2017.pdf. Accessed 12 Feb 2019
- Goddard S (2018) Embedded revisionism: networks, institutions, and challenges to world order. Int Org 72(4):763–797CrossRefGoogle Scholar
- Goodman R, Jinks D (2013) Socializing states: promoting human rights through international law. Oxford University Press, OxfordCrossRefGoogle Scholar
- Greenberg A (2018) The untold story of NotPetya, the most devastating cyberattack in history. WIRED. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/. Accessed 12 Feb 2019
- Grigsby A (2017) The end of cyber norms. Survival 59(6):109–122Google Scholar
- Hathaway O, Crootof R, Levitz P, Nix H (2012) The law of cyber-attack. Calif L Rev 100:817Google Scholar
- Hollis D (2014) Re-thinking the boundaries of law in cyberspace: a duty to hack? Cyberwar: law and ethics for virtual conflicts. In: Ohlin J et al (eds) Oxford University Press, Oxford. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2424230
- Hollis D (2015) The existential function of interpretation in international law. In: Bianchi A et al (eds) interpretation in international law. Oxford University Press, Oxford, pp 78–110CrossRefGoogle Scholar
- Hollis D, Waxman M (2018) Promoting international cybersecurity cooperation: lessons from the proliferation security initiative. Temp Int Comp LJ 32:147Google Scholar
- Hosenball M, Zengerle P (2015) The U.S. isn’t going to blame China for the catastrophic hack of the federal government’s personal records. Reuters. https://www.businessinsider.com/r-us-unlikely-to-blame-china-publicly-over-opm-data-breach-officials-2015-7. Accessed 12 Feb 2019
- Hurel LM, Cruz Lobato L (2018) Unpacking cyber norms: private companies as norm entrepreneurs. J Cyber Policy 3(1):61–76CrossRefGoogle Scholar
- Hurwitz R (2014) The play of states: norms and security in cyberspace. Am Foreign Policy Interests 36(5):322–331CrossRefGoogle Scholar
- Ikenberry J (2011) The future of the liberal world order: internationalism after America. Foreign Aff 90(3):56–68Google Scholar
- International Organization for Standardization (2018) ISO/IEC 27000. https://www.iso.org/standard/73906.html. Accessed 12 Feb 2019
- Jose B (2018) Norm contestation: insights into non-conformity with armed conflict norms. Springer, New YorkCrossRefGoogle Scholar
- Katzenstein P (1996) The culture of national security: norms and identity in world politics. Columbia University Press, New YorkGoogle Scholar
- Kavanagh C, Stauffacher D (2014) Confidence building measures and international cyber security. ICT4Peace, GenevaGoogle Scholar
- Kennedy D (2006) Of war and law. Princeton University Press, PrincetonGoogle Scholar
- Kerry J (2015) An open and secure internet: we must have both. remarks, Seoul, South Korea. https://2009-2017.state.gov/secretary/remarks/2015/05/242553.htm. Accessed 12 Feb 2019
- Khalip A (2018) U.N. chief urges global rules for cyber warfare. Reuters. https://www.reuters.com/article/us-un-guterres-cyber/u-n-chief-urges-global-rules-for-cyber-warfare-idUSKCN1G31Q4. Accessed 12 Feb 2019
- Koh H (2015) Remarks—international law in cyberspace. https://2009-2017.state.gov/s/l/releases/remarks/197924.htm. Accessed 5 May 2019
- Kreps S, Schneider J (2018) Escalation Firebreaks in the Cyber. Moving beyond Effects-Based Logics, Conventional and Nuclear Domains. https://doi.org/10.2139/ssrn.3104014 (Accessed 23 August 2019) Google Scholar
- Lantis JS (2017) Theories of international norm contestation: structure and outcomes. Oxford Research Encyclopedia of Politics. https://oxfordre.com/politics/view/10.1093/acrefore/9780190228637.001.0001/acrefore-9780190228637-e-590. Accessed 16 Sept 2019
- Lin H (2012) Cyber conflict and international humanitarian law. Int Rev Red Cross 94(886):515–531CrossRefGoogle Scholar
- Lindsay J (2015) Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. J Cybersecur 1(1):53–67Google Scholar
- Lynn W (2010) Defending a new domain. Foreign Affairs, September/October 2010 Issue. https://www.foreignaffairs.com/articles/united-states/2010-09-01/defending-new-domain. Accessed 12 Feb 2019
- Mačák K (2017) From cyber norms to cyber rules: re-engaging states as law-makers. Leiden J Int Law 30(4):877–899CrossRefGoogle Scholar
- Mandiant (2013) APT1: exposing one of China’s Cyber espionage units. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf. Accessed 5 May 2019
- Markoff M (2017) Explanation of position at the conclusion of the 2016–2017 UN Group of Governmental Experts (GGE) on developments in the field of information and telecommunications in the context of international security. United Nations, New York. https://s3.amazonaws.com/ceipfiles/pdf/CyberNorms/Multilateral/GGE_2017+US+State+Department+Position.pdf. Accessed 12 Feb 2019
- Markoff M, Nicholas P, Finnemore M, Hollis D, Maurer T (2017) Cyber norms revisited: cybersecurity and the way forward. Carnegie Endowment for International Peace. https://carnegieendowment.org/2017/02/06/cyber-norms-revisited-international-cybersecurity-and-way-forward-event-5490. Accessed 12 Feb 2019
- Maurer T (2011) Cyber norm emergence at the United Nations: an analysis of the activities of the UN regarding cyber-security. Harvard Belfer Center for Science and International Affairs. https://www.belfercenter.org/sites/default/files/legacy/files/maurer-cyber-norm-dp-2011-11-final.pdf. Accessed 12 Feb 2019
- Maurer T (2018) Cyber mercenaries: the state, hackers, and power. Cambridge University Press, CambridgeCrossRefGoogle Scholar
- Maurer T, Morgus R (2014) ‘Cybersecurity’ and why definitions are risky. The CSS Blog Network, ETH Zurich. https://isnblog.ethz.ch/intelligence/cybersecurity-and-the-problem-of-definitions. Accessed 12 Feb 2019
- Maurer T, Taylor K (2018) Outlook on international cyber norms: three avenues for future progress. Just Security. https://www.justsecurity.org/53329/outlook-international-cyber-norms-avenues-future-progress/. Accessed 12 Feb 2019
- Maurer T, Thompson B, Taylor K (2017) Cyber norms index. Carnegie Endowment for International Peace. https://carnegieendowment.org/publications/interactive/cybernorms. Accessed 12 Feb 2019
- McKune S (2015) An analysis of the international code of conduct for information security. Citizen Lab. https://openeffect.ca/code-conduct/. Accessed 12 Feb 2019
- Meredith S (2018) Microsoft calls for ‘new Digital Geneva Convention’ after spate of high-profile cyberattacks. CNBC. https://www.cnbc.com/2018/01/26/microsoft-calls-for-new-digital-geneva-convention-after-spate-of-high-profile-cyberattacks.html. Accessed 12 Feb 2019
- Microsoft (2017) The need for a digital Geneva convention. https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/. Accessed 23 Aug 2019
- Microsoft (2018) International cybersecurity norms. https://www.microsoft.com/en-us/cybersecurity/content-hub/international-cybersecurity-norms-overview. Accessed 12 Feb 2019
- Microsoft (2018) International cybersecurity norms: Part 2. https://www.microsoft.com/en-us/cybersecurity/content-hub/international-cybersecurity-norms-part-2. Accessed 12 Feb 2019
- Mitrany D (1943) A working peace system. RIAA, LondonGoogle Scholar
- Nakashima E, Goldman A (2015) In a first, Chinese hackers are arrested at the behest of the U.S. government. Washington Post. https://www.washingtonpost.com/world/national-security/in-a-first-chinese-hackers-are-arrested-at-the-behest-of-the-us-government/2015/10/09/0a7b0e46-6778-11e5-8325-a42b5a459b1e_story.html?utm_term=.47f611561cfd. Accessed 12 Feb 2019
- Noble Z (2015) Report: China has arrested alleged OPM hackers. FCW. https://fcw.com/articles/2015/12/02/china-cyber-opm-arrest.aspx. Accessed 12 Feb 2019
- Nye J (2018) Normative restraints on cyber conflict. Cyber Secur 4(1):331–342Google Scholar
- Percy S (2007) Mercenaries: the history of a norm in international law. Oxford University Press, OxfordCrossRefGoogle Scholar
- Putin V (2016) Decree of the president of the Russian Federation No. 646 of December 5, 2016—Doctrine of Information Security of the Russian FederationGoogle Scholar
- Rawls J (1971) A theory of justice. Harvard University Press, CambridgeGoogle Scholar
- Rid T, Buchanan B (2015) Attributing cyber attacks. J Strateg Stud 38(1–2):4–37CrossRefGoogle Scholar
- Rodriguez M (2017) Statement by Miguel Rodriguez, representative of Cuba, at the final session of group of governmental experts on developments in the field of information and telecommunications in the context of international security. United Nations, New York. https://s3.amazonaws.com/ceipfiles/pdf/CyberNorms/Multilateral/GGE_2017+Cuban-Expert-Declaration.pdf. Accessed 12 Feb 2019
- Russian Ministry of Foreign Affairs (2011) Convention on international information security—concept. https://carnegieendowment.org/files/RUSSIAN-DRAFT-CONVENTION-ON-INTERNATIONAL-INFORMATION-SECURITY.pdf. Accessed 23 Aug 2019
- Sanger D (2018) U.S. Declines to sign declaration discouraging use of cyberattacks. New York Times. https://www.nytimes.com/2018/11/12/us/politics/us-cyberattacks-declaration.html. Accessed 12 Feb 2019
- Schelling T (2008) Arms and influence. Yale University Press, New HavenGoogle Scholar
- Schmitt MN (ed) (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, CambridgeGoogle Scholar
- Schmitt MN (2015a) In defense of due diligence in cyberspace. Yale LJF 125:68–81Google Scholar
- Schmitt MN (2015b) The notion of ‘objects’ during cyber operations: a riposte in defence of interpretive and applicative precision. Israel Law Review 48(1):81–109Google Scholar
- Siemens (2018) Time for action: building a consensus for cybersecurity. https://www.siemens.com/innovation/en/home/pictures-of-the-future/digitalization-and-software/cybersecurity-charter-of-trust.html. Accessed 12 Feb 2019
- Smeets M (2018) Integrating offensive cyber capabilities: meaning, dilemmas, and assessment. Def Stud 18(4):395–410CrossRefGoogle Scholar
- Smith B (2017) The need for a digital Geneva convention. Microsoft Blog. https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/. Accessed 12 Feb 2019
- Sukumar A (2017) The UN GGE failed. Is international law in cyberspace doomed as well? Lawfare. https://www.lawfareblog.com/un-gge-failed-international-law-cyberspace-doomed-well. Accessed 12 Feb 2019
- Sunstein C (2007) Incompletely theorized agreements in constitutional law. Soc Res 74(1):1–24Google Scholar
- Tikk-Ringas E (2016) International cyber norms dialogue as an exercise of normative power. Georget J Int Affairs 1:47–59CrossRefGoogle Scholar
- UK government (2011) London conference on cyberspace: Chair’s statement. https://www.gov.uk/government/news/london-conference-on-cyberspace-chairs-statement. Accessed 23 Aug 2019
- US Cyber Command (2018) Achieve and maintain cyberspace superiority: command vision for U.S. cyber command. https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010. Accessed 22 Feb 2019
- UN General Assembly (1999) Developments in the field of information and telecommunications in the context of international security. United Nations, A/RES/53/70. http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/53/70. Accessed 12 Feb 2019
- UN Group of Governmental Experts (2015) Developments in the field of information and telecommunications in the context of international security. United Nations General Assembly. https://s3.amazonaws.com/ceipfiles/pdf/CyberNorms/Multilateral/UN+Group+of+Governmental+Experts+on+Developments+in+the+Field+of+Information+and+Telecommunications+in+the+Context+of+International+Security+Report+2015+7-22-2015.pdf. Accessed 12 Feb 2019
- UNIDIR (2019) Cyber stability conference—strengthening global engagement. United Nations Institute for disarmament research. http://unidir.org/files/medias/pdfs/cyber-stability-conference-2019-summary-report-eng-0-849.pdf. Accessed 25 Aug 2019
- U.S. Department of Justice (2016) Seven Iranians working for islamic revolutionary guard corps-affiliated entities charged for conducting coordinated campaign of cyber attacks against U.S. financial sector. Press release. https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-charged. Accessed 22 Feb 2019
- U.S. Department of State (2018) Recommendations to the president on deterring adversaries and better protecting the American People from cyber threats. Office of the Coordinator for Cyber Issues. https://www.state.gov/s/cyberissues/eo13800/282011.htm. Accessed 22 Feb 2019
- U.S. Office of the Director of National Intelligence (2017) Background to ‘assessing russian activities and intentions in recent US elections’: the analytic process and cyber incident attribution. https://www.dni.gov/files/documents/ICA_2017_01.pdf. Accessed 23 Aug 2019
- White House (2015) FACT SHEET: president Xi Jinping’s state visit to the United States. https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states. Accessed 23 Aug 2019
- White House (2015) Statement by the press secretary on the executive order entitled “imposing additional sanctions with respect to North Korea”. Press release. https://obamawhitehouse.archives.gov/the-press-office/2015/01/02/statement-press-secretary-executive-order-entitled-imposing-additional-s. Accessed 22 Feb 2019
- White House (2018a) National cyber strategy of the United States of America. https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf. Accessed 12 Feb 2019
- White House (2018b) Statement from the press secretary. https://www.whitehouse.gov/briefings-statements/statement-press-secretary-25/. Accessed 22 Feb 2019
- Wiener A (2007) the dual quality of norms and governance beyond the state: sociological and normative approaches to ‘interaction’. Crit Rev Int Soc Polit Philos 1:47–69CrossRefGoogle Scholar
- Wiener A (2008) The invisible constitution of politics: contested norms and international encounters. Cambridge University Press, CambridgeCrossRefGoogle Scholar
- Wiener A (2014) A theory of contestation. Springer, BerlinCrossRefGoogle Scholar
- Wiener A (2017) Agency of the governed in global international relations: access to norm validation. Third World Themat TWQ J 5:709–725CrossRefGoogle Scholar
- Wright (2018) Speech—Cyber and international law in the 21st century. https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century. Accessed 22 Feb 2019
- Zimmermann L, Deitelhoff N, Lesch M (2017) Unlocking the agency of the governed: contestation and norm dynamics. Third World Themat TWQ J 5:691–708CrossRefGoogle Scholar