Skip to content
Network of Centers Logo Ausschnitt
20 October 2015

Global Cyberspace Cooperation Summit VI 2015 in New York

This year’s EastWest Institute’s Global Cyberspace Cooperation Summit in New York City convened policymakers, business leaders, technical experts, civil society and academia with the objective to work on issues that have direct impact on digital security and stability as well as sound governance and management towards a safer, more secure Internet. The EastWest Institute, an international non-profit, non-partisan “think and do” tank, provided with the annual cyber summit a forum for building international, private-public action to foster cooperation in cyberspace.

Is cooperation possible in Cyberspace?

As the interconnectedness and dependence in and on cyberspace increase, so do the risks and uncertainties posed to network and information security. Despite the significance the digital world has in most aspects of everyday life, the realms of cyber foreign relations are still comparatively new and poorly understood. Thus, it is to be welcomed that representatives of major cyber powers such as USA, Europe, Japan and Russia discussed at the first plenary panel how cooperation in the tense environment is possible and how they could help the Internet realize its full potential for economic and social benefit. However, Joseph Nye, Harvard University Distinguished Service Professor, concluded in advance that it was unlikely to see a “single overarching regime for cyberspace any time soon.” Despite the different topoi of norm development for cyber activities (e.g. human rights, privacy, content control, standards, cyberwar, espionage), the work of the UN GGE forum was itself testimony to recognition of the need to collaborate. It became clear that perspectives are rooted in a traditional framing of international relations but also that turning actors toward clarity about the nature of the problem could lead to problem-solving pathways.

Breakthrough Groups

Both in plenary panels and in breakthrough groups, the summit’s participants worked on actionable recommendations for more cooperation on cyberspace. Aligned with the EWI Initiative’s objectives, eight breakthrough and special interest groups explored possible solutions for their respective subject.

The group focusing on promoting measures of restraints in cyber armaments developed further recommendations that would stimulate the creation of a standing forum involving private sector and civil society for norms research and advocacy. Concentrating on modernizing international procedures against cyber-enabled crimes, another breakthrough group concentrated on better cooperation between law enforcement and the private sector on a global basis by increasing the transparency of corporate response policies and developing a standard format for information requests under mutual legal assistance procedures. Strengthening critical infrastructure resilience and preparedness is the work program of a further group that tries to develop a community-based platform where owners and operators of critical infrastructure can share information related to cyber incidents. As strong authentication is a major issue for internet security, examining two-factor authentication was also a topic of a breakthrough group, which in particular reviewed the work of the FIDO Alliance (Fast IDentity Online). Another major challenge for cybersecurity is an ICT marketplace with sufficient integrity. The objective of the group working on increasing the global availability and use of secure ICT products and services was to develop and promote standards and best practices that improve product and service integrity by fostering trusted supply chains and procurement practices for buyers and vendors. Issues surrounding governing and managing the Internet were also a very important subject. The group analysed emerging approaches for improving potential effectiveness and tries to propose models that demonstrate better performance than existing governance models which encounter questions regarding their legitimacy and accountability. The very difficult balancing of enforcement of local laws and customs and the Internet’s potential for prosperity, flourishing of imagination, social interaction and freedom of expression took on the group titled managing objectionable electronic content across national borders. The group focusing on government access to plaintext information explored the tradeoffs that entails access of authorized government agencies to encrypted information and sought for criteria when weighing against potential law enforcement or intelligence benefits.

Global Encryption, the Internet and the State, Privacy

The plenary panels, with speakers also from China, India and Africa, discussed more broadly with the large audience. Here again one could observe the respective tradeoffs when the panel examined the proper balancing between information security and legitimate government access to globally encrypted user data. The interplay of the Internet and the State was the subject of the third plenary panel. The Internet with its boundary-crossing nature challenges the state’s autonomy within national realms. While the Internet governance discourse seeks a “delusive” compromise between multilateral and multistakeholder models, the panel draw the attention to the need to exploring other models that are aligned with constituent values. At the panel young cyber leaders look ahead, young professionals shared their reflections on the summit and the most pressing problems for the future. The art of balancing was once again in the focus at the last panel concentrating on privacy in the age of surveillance.

Cooperation is not only possible, but also necessary

Taken all outcomes together, the bottom line of the discussions on the panel and the work in the breakthrough groups is that cooperation on cyberspace faces a myriad of specific challenges, but also that cooperation is not only possible, but also necessary. As Scott Charney, Microsoft’s Corporate Vice President for Trustworthy Computing, noted at the summit, “The answer lies in globally accepted cybersecurity norms of behavior for states, vendor transparency, and increased user control.”

The Internet can still be conceived as a revolutionary medium that underpins almost human activities and requires pioneering effort and pragmatic explorations. There is probably no workable “one-size-fits-all” approach. Sometimes, agreeing to disagree could be a starting point for more productive discussions. It is a mistaken belief that there are unambiguous norms in cyberspace. The entanglement of interests and binding rights became clear when Karsten Geiser, head of the Cyber Policy Coordination Staff in Germany’s Federal Foreign Office, made the point that a code of conduct on a voluntary basis would not be compatible with binding human rights.

It was also noted that a major challenge in cyberspace discussions was the failure to take action on agreed common interests and principles and that the discussion should focus on critical infrastructure protection as one global issue. That the United States and China are negotiating an agreement that could become the first arms control accord for cyberspace and which addresses attacks on critical infrastructure during peacetime and that they are close to set up a high-level joint dialogue mechanism on fighting cybercrime is an eminently positive signal.

A fundamental finding of the summit, which should not be underestimated, is that cooperation is all about trust building on multiple levels and with multiple stakeholders. It might be difficult to find the proper vocabulary for that purpose. Yet, solutions to the most pressing issue related with cyberspace and cybersecurity can only emerge through close dialogue and cooperation among all relevant actors.

Plenary Panel I: Is cooperation Possible in Cyberspace? From left to right: Joseph S. Nye (Harvard University), Thomas Fitschen (Federal Foreign Office of Germany), Udo Helmbrecht (European Agency for Network and Information Security - ENISA), Ilya Rogachev (Ministry of Foreign Affairs of the Russian Federation), Léonard Rolland (Ministry of Foreign Affairs and International Development of France), Christopher Painter (U.S. Department of State), Ryuichi Hirano (Cabinet Secretary of Japan).

Plenary Panel I: Is cooperation Possible in Cyberspace? From left to right: Joseph S. Nye (Harvard University), Thomas Fitschen (Federal Foreign Office of Germany), Udo Helmbrecht (European Agency for Network and Information Security – ENISA), Ilya Rogachev (Ministry of Foreign Affairs of the Russian Federation), Léonard Rolland (Ministry of Foreign Affairs and International Development of France), Christopher Painter (U.S. Department of State), Ryuichi Hirano (Cabinet Secretary of Japan).

This post is part of a weekly series of articles by doctoral canditates of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and asssociated research projects, please contact info@hiig.de.

This post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact info@hiig.de.

Hannfried Leisterer, Dr.

Former associate doctoral Researcher: Global Constitutionalism and the Internet

Sign up for HIIG's Monthly Digest

HIIG-Newsletter-Header

You will receive our latest blog articles once a month in a newsletter.

Explore Research issue in focus

Platform governance

In our research on platform governance, we investigate how corporate goals and social values can be balanced on online platforms.

Further articles

Three groups of icons representing people have shapes travelling between them and a page in the middle of the image. The page is a simple rectangle with straight lines representing data used for people analytics. The shapes traveling towards the page are irregular and in squiggly bands.

Empowering workers with data

As workplaces become data-driven, can workers use people analytics to advocate for their rights? This article explores how data empowers workers and unions.

A stylised illustration featuring a large "X" in a minimalist font, with a dry branch and faded leaves on one side, and a vibrant blue bird in flight on the other. The image symbolises transition, with the bird representing the former Twitter logo and the "X" symbolising the platform's rebranding and policy changes under Elon Musk.

Two years after the takeover: Four key policy changes of X under Musk

This article outlines four key policy changes of X since Musk’s 2022 takeover, highlighting how the platform's approach to content moderation has evolved.

The picture shows a tractor cultivating a field from above. One side of the field is covered in green, the other is dry and earthy. This is intended to show that although sustainable AI can be useful in the fight against climate change, it also comes at a high ecological cost.

Between vision and reality: Discourses about Sustainable AI in Germany

This article explores Sustainable AI and Germany's shift from optimism to concern about its environmental impact. Can AI really combat climate change?