1074:
applicability of the UN Charter and international law in the cybersphere. Key points of discussion were measures concerning responsible State behavior, and the protection of critical infrastructure and components of the global
Internet. To bring all parties together, the Netherlands has developed the Global Commission on the Stability of Cyberspace. This platform will include all stakeholders and academics to develop new ideas on norms and actions for cyberstability. James Lewis laid out two options to protect cybersecurity. One is to choose the path of disarmament, and ban specific cyberweapons. The other is to choose the path of arms control, and regulate the use of cyberweapons, agreeing on principles of how to use them responsibly, controlled by the laws of armed conflict.
1135:
United
Nations. This is because it was a truly multi-stakeholder effort, with the involvement of governments, the tech community and civil society. And finally, it serves as a reminder of the value of consensus. This may not sound spectacular, but it is. There are a lot of divergent opinions out there: About what the rules of the road should be, about who should bear responsibility for what happens, and about how to deal with transgressions. There should be no tampering with the public core of the internet. Internet infrastructure should be regarded as the backbone of modern society. Undersea cables and other vital elements should be off limits. The Global Commission rightly identifies these areas as sacrosanct.
1104:
proposals for norms and policy initiatives to improve the stability and security of cyberspace. In 2016 during the Munich
Security Conference (MSC) The Netherlands Minister of Foreign Affairs Bert Koenders announced the intention of his government to support the establishment of a GCSC. The GCSC, based in The Hague, will be chaired by Marina Kaljurand, former Foreign Minister of Estonia, and will be composed of over two dozen prominent independent commissioners, from over 15 countries, with the expertise and legitimacy to speak on different aspects of cyberspace. The Commission will develop proposals for norms and policies to enhance the stability of cyberspace.
572:"Developers and producers of products and services on which the stability of cyberspace depends should (1) prioritize security and stability, (2) take reasonable steps to ensure that their products or services are free from significant vulnerabilities, and (3) take measures to timely mitigate vulnerabilities that are later discovered and to be transparent about their process. All actors have a duty to share information on vulnerabilities in order to help prevent or mitigate malicious cyber activity."
180:
66:
25:
257:
617:
the effort was divided into two working groups, one, principally diplomatic, to specify what actions should be precluded; the other, involving subject-matter experts, to specify which infrastructures were deemed most worthy of protection. This latter working group specified a survey of cybersecurity
450:
Together with the Global Forum on Cyber
Expertise, the GCSC was a product of the 2015-2017 Dutch chairmanship of the London Process, and particularly the work of Wouter Jurgens who, as head of the cyber security department of the Dutch Ministry of Foreign Affairs, had responsibility for organizing
1164:
The public core of the open internet, namely its main protocols and infrastructure, which are a global public good, provides the essential functionality of the internet as a whole and underpins its normal operation. ENISA should support the security of the public core of the open internet and the
674:
and
Europol veteran Stéphane Duguin. This independent, non governmental organization has the mission to highlight the human aspect of cyberattacks. It works in close collaboration with relevant partners to reduce the harms from cyberattacks on people’s lives worldwide. The Institute builds on the
1307:
and cyber defense to assess which infrastructures were deemed most worthy of protection. On a scale of zero to ten, with zero being 'unworthy of special protection' and ten being 'essential to include in the protected class,' all surveyed categories ranked between 6.02 and 9.01. Accordingly, the
1134:
This report, compiled by a group of
Commissioners from all over the globe, does a number of important things. It consolidates a set of norms and principles for the behaviour of state and non-state actors in cyberspace. It confers a legitimacy that goes beyond the regular dialogues we have in the
1039:
Wouter
Jurgens is heading the cyber security department at the Ministry of Foreign Affairs of the Netherlands. He is responsible for the preparations of the 4th Cyber Space Conference to be held in The Netherlands in 2015. This ministerial conference is part of the London Process and will bring
1103:
The
Kingdom of the Netherlands, together with The Hague Centre for Strategic Studies (HCSS) and the EastWest Institute (EWI) recently announced the establishment of the Global Commission on the Stability of Cyberspace (GCSC): a global body formed to convene key global stakeholders to develop
1356:
Despite recent attempts to cast the main threat to the public core as resulting from cybercriminals, it is in fact states and their affiliates whose activities pose the greatest risks. The document cites an
International Telecommunication Union document, submitted by the Russian Federation,
1073:
The side event was moderated by Wouter
Jurgens, Head of the Cyber Security Department at the Dutch Ministry of Foreign Affairs. Uri Rosenthal, Dutch Special Envoy for International Cyber Policies discussed the Global Conference on CyberSpace. The GCCS2015 underlined the importance of the
626:. This definition of the "public core of the Internet" to include packet routing and forwarding, naming and numbering systems, the cryptographic mechanisms of security and identity, and physical transmission media, with more-specific details attending to each, has since been used by the
562:"States should create procedurally transparent frameworks to assess whether and when to disclose not publicly known vulnerabilities or flaws they are aware of in information systems and technologies. The default presumption should be in favor of disclosure."
1040:
together ministers, policy makers, private sector and civil society to discuss, cyber security, freedom & privacy, economic growth & innovation as well as cyber issues related to international peace and security and capacity building.
492:"State and non-state actors should neither conduct nor knowingly allow activity that intentionally and substantially damages the general availability or integrity of the public core of the Internet, and therefore the stability of cyberspace."
1165:
stability of its functioning, including, but not limited to, key protocols (in particular DNS, BGP, and IPv6), the operation of the domain name system (such as the operation of all top-level domains), and the operation of the root zone.
1121:
704:
1308:
Commission defines the phrase 'the public core of the Internet' to include packet routing and forwarding, naming and numbering systems, the cryptographic mechanisms of security and identity, and physical transmission media.
964:, those behind state-sponsored attacks are usually either hopelessly optimistic, or indifferent, to the notion that their exploits will be re-used. The results of that faulty thinking are history: the likes of
1090:
1406:
542:"State and non-state actors should not tamper with products and services in development and production, nor allow them to be tampered with, if doing so may substantially impair the stability of cyberspace."
455:, which was held in The Hague April 16–17 of 2015, and formalizing its outcomes. Jurgens had been working for several years on the topic of governmental non-aggression in cyberspace, in collaboration with
949:. The group making the diplomatic push is called the Global Commission on the Stability of Cyberspace (GCSC). One of the group's motivations is that state-sponsored attacks nearly always have
1118:"Speech by the Minister of Foreign Affairs, Stef Blok, at the launch of the report by the Global Commission on the Security of Cyberspace (GCSC) at the Peace Forum in Paris, 12 November 2019"
1117:
1280:
1200:
We affirm our willingness to work together to prevent activity that intentionally and substantially damages the general availability or integrity of the public core of the Internet.
38:
532:"State and non-state actors must not pursue, support or allow cyber operations intended to disrupt the technical infrastructure essential to elections, referenda or plebiscites."
1245:
1528:
996:
1376:
916:
675:
GCSC's work by monitoring compliance with its norms and coordinating cyber-attack forensic and analytic efforts that broaden public understanding of norm violations.
1086:
1060:
1402:
1357:
suggesting that nation states need to safeguard the Internet core. The GCSC statement points out that Internet governance organisations are not run by governments.
1151:
646:. The statement reiterates the GCSC's findings that state actors are the primary threat to Internet stability, not private actors; that the GCSC believes that the
142:
200:
114:
44:
1480:
1343:
662:
In addition to the norms the commission published, several other organizations were created and efforts undertaken as byproducts of the commission's work.
520:
cites the Public Core norm in the 2019 report of the Secretary General and the report of the Secretary General’s High-level Panel on Digital Cooperation,
1468:
121:
1184:
76:
1504:
1428:
938:
718:
293:
128:
500:
is the GCSC's principal product, and has been included or referenced in many subsequent legislative and diplomatic work. It was included in the
335:"To develop norms and policies to enhance international security and stability and guide responsible state and non-state behavior in cyberspace"
90:
of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be
1220:
592:"Non-state actors should not engage in offensive cyber operations and state actors should prevent such activities and respond if they occur."
110:
1287:
670:
One of the most notable derivative outcomes of the GCSC's work was the formation of the CyberPeace Institute, headed by GCSC commissioner
716:
654:
is key to maintaining Internet stability, and that the Internet's critical infrastructure is principally operated by the private sector.
1538:
1252:
934:
719:
442:. It operated for three years, from 2017 through 2019, and produced the diplomatic norm for which it was chartered and seven others.
286:
929:
The USA, China and Russia are doing all that they can to avoid development of a treaty that would make it hard for them to conduct
1553:
1026:
942:
722:
552:"State and non-state actors should not commandeer the general public’s ICT resources for use as botnets or for similar purposes."
509:
300:
711:
710:
708:
992:
135:
1369:
639:
1523:
912:
1052:
638:
On September 22, 2021, the GCSC released a three-page statement responding, in large part, to Russia's submission to the
1147:
721:
714:
712:
236:
218:
161:
52:
950:
709:
707:
1477:
715:
713:
396:
196:
1339:
717:
189:
720:
1465:
408:
87:
1177:
1533:
1321:
1501:
1437:
582:"States should enact appropriate measures, including laws and regulations, to ensure basic cyber hygiene."
1492:
630:
and others as a standardized description of the principal elements of Internet critical infrastructure.
256:
1548:
633:
471:
83:
505:
99:
1558:
435:
1213:
977:
1436:. Global Commission on the Stability of Cyberspace. November 20, 2017. p. 61. Archived from
980:
did huge damage well beyond their intended targets, imposing massive costs on the private sector.
452:
432:
352:
1340:"Stop worrying that crims could break the 'net, say cyber-diplomats – only nations have tried"
1304:
1543:
958:
688:
619:
1303:
As input to its process, a working group of the GCSC conducted a broad survey of experts on
775:
463:, Olaf Kolkman, James Lewis, and others who would subsequently become GCSC commissioners.
8:
954:
651:
424:
887:
765:
687:, a global survey of Internet infrastructure security experts was conducted in 2017 by
95:
1370:"Statement on the Interpretation of the Norm on Non-Interference with the Public Core"
1018:
474:, on February 18, 2017, with a three-year charter, and issued its final report at the
813:
513:
475:
91:
634:
Statement on the Interpretation of the Norm on Non-Interference with the Public Core
808:
789:
743:
734:
671:
647:
421:
386:
364:
1508:
1496:
1484:
1472:
973:
969:
913:"Diplomats, 'Net greybeards work to disarm USA, China and Russia's cyber-weapons"
195:
It may require cleanup to comply with Knowledge's content policies, particularly
605:
and the seven subsequent norms, the GCSC has published several other documents.
1286:. Global Commission on the Stability of Cyberspace. 21 May 2018. Archived from
823:
556:
517:
501:
642:
Council Working Group on International Internet-related Public Policy Issues,
586:
1517:
961:
841:
818:
794:
770:
692:
467:
460:
456:
946:
930:
760:
608:
566:
1322:"Risk Analysis of the Existing Internet Governance and Operational Model"
849:
546:
283:
1148:"Regulation (EU) 2019/881 of the European Parliament and of the Council"
953:
well beyond their intended targets. As explained today in a keynote at
876:
Koichiro Komiyama (Deputy Chair for Technical and Information Security)
752:
644:
Risk Analysis of the Existing Internet Governance and Operational Model
439:
428:
873:
Hugo Zylberberg (Deputy Chair for International Peace & Security)
297:
576:
1502:
Report of the GCSC Critical Infrastructure Assessment Working Group
1430:
Report of the GCSC Critical Infrastructure Assessment Working Group
486:
965:
82:
Please help to demonstrate the notability of the topic by citing
1403:"Le Cyberpeace Institute: une ONG pour défendre la "cyberpaix""
526:
290:
1489:
516:
included a call for compliance with the Public Core norm. The
16:
Commission developing diplomatic norms limiting cyber-offense
1087:"Launch of Global Commission on the Stability of CyberSpace"
557:
Norm for States to Create a Vulnerabilities Equities Process
627:
587:
Norm Against Offensive Cyber Operations by Non-State Actors
1281:"Definition of the Public Core, to which the Norm Applies"
1183:. French Ministry of Foreign Affairs. 12 November 2018.
624:
Definition of the Public Core, to which the Norm Applies
609:
Definition of the Public Core, to which the Norm Applies
893:
Alexander Klimburg (Hague Centre for Strategic Studies)
567:
Norm to Reduce and Mitigate Significant Vulnerabilities
547:
Norm Against Commandeering of ICT Devices into Botnets
188:
A major contributor to this article appears to have a
870:
Marilia Maciel (Deputy Chair for Internet Governance)
678:
77:
notability guidelines for companies and organizations
1529:
International organisations based in the Netherlands
1375:. Global Commission on the Stability of Cyberspace.
250:
The Global Commission on the Stability of Cyberspace
618:experts, delegated implementation of the survey to
1319:
1275:
1273:
993:"4th Global Conference on CyberSpace in The Hague"
512:to include the protection of the public core. The
111:"Global Commission on the Stability of Cyberspace"
1178:"Paris Call for Trust and Security in Cyberspace"
1053:"Side Event on Cybersecurity and the Way Forward"
945:, is using diplomacy to find another way to stop
577:Norm on Basic Cyber Hygiene as Foundation Defense
1515:
466:The GCSC was launched by Dutch Foreign Minister
418:Global Commission on the Stability of Cyberspace
1490:Definition of the "Public Core" of the Internet
1270:
957:by GCSC commissioner and executive director of
706:
514:Paris Call for Trust and Security in Cyberspace
487:Norm to Protect the Public Core of the Internet
453:4th Global Conference on CyberSpace ministerial
1057:United Nations Office for Disarmament Affairs
527:Norm to Protect the Electoral Infrastructure
1400:
427:organization, dedicated to the creation of
53:Learn how and when to remove these messages
1089:. The Hague Security Delta. 7 March 2017.
933:, but an effort led by the governments of
858:
536:
255:
1401:Untersinger, Martin (26 September 2019).
622:, and integrated its results to form the
237:Learn how and when to remove this message
219:Learn how and when to remove this message
162:Learn how and when to remove this message
1337:
1327:. International Telecommunication Union.
1211:
910:
1320:Russian Federation (9 September 2021).
835:
665:
510:European Union Agency for Cybersecurity
1516:
1382:from the original on 22 September 2021
1346:from the original on 27 September 2021
1226:from the original on 27 September 2021
1338:Sharwood, Simon (24 September 2021).
1190:from the original on 5 September 2021
1120:. Dutch Ministry of Foreign Affairs.
613:Early in the process of defining the
596:
1246:"The Age of Digital Interdependence"
1154:from the original on 20 January 2022
1115:
173:
59:
18:
1466:Official web site of the Commission
1059:. United Nations. 23 October 2015.
522:The Age of Digital Interdependence.
508:, which extends the mandate of the
353:4th Global Conference on CyberSpace
13:
1212:Guterres, AntĂłnio (4 March 2019).
702:
679:Critical infrastructure assessment
657:
481:
14:
1570:
1539:Internet governance organizations
1459:
1409:from the original on 29 July 2021
1214:"Report of the Secretary-General"
1150:. European Union. 17 April 2019.
1124:from the original on 13 July 2021
1093:from the original on 13 July 2021
1063:from the original on 26 June 2021
1029:from the original on 26 June 2021
995:. Diplomat Magazine. 2015-04-05.
951:commercial and human consequences
867:Liis Vihul (Deputy Chair for Law)
34:This article has multiple issues.
1251:. United Nations. Archived from
740:Latha Reddy (Co-chair 2017-2019)
728:
199:. Please discuss further on the
178:
64:
23:
1421:
1394:
1362:
1331:
1313:
1238:
1116:Blok, Stef (12 November 2019).
999:from the original on 2021-06-26
919:from the original on 2021-06-25
698:
615:Norm to Protect the Public Core
603:Norm to Protect the Public Core
498:Norm to Protect the Public Core
42:or discuss these issues on the
1554:Internet-related organizations
1478:Final report of the Commission
1205:
1170:
1140:
1109:
1079:
1045:
1011:
985:
947:state-sponsored online warfare
911:Sharwood, Simon (2018-03-22).
904:
880:
691:, headed by GCSC commissioner
1:
1305:communications infrastructure
1025:. The University of Toronto.
1023:MUNK School of Global Affairs
897:
685:Definition of the Public Core
846:Wolff Heintschel von Heinegg
7:
1524:Global policy organizations
326:Multistakeholder Commission
10:
1575:
472:Munich Security Conference
445:
84:reliable secondary sources
73:The topic of this article
404:
392:
380:
370:
358:
348:
340:
330:
322:
314:
306:
279:
271:
263:
254:
75:may not meet Knowledge's
478:, on November 13, 2019.
398:Advancing Cyberstability
859:Research Advisory Group
537:Norm to Avoid Tampering
725:
594:
584:
574:
564:
554:
544:
534:
494:
959:Packet Clearing House
799:Wolfgang Kleinwächter
724:
689:Packet Clearing House
620:Packet Clearing House
590:
580:
570:
560:
550:
540:
530:
490:
197:neutral point of view
836:Former commissioners
783:Abdul-Hakeem Ajijola
776:Anriette Esterhuysen
737:(Co-chair 2017-2018)
666:CyberPeace Institute
1534:Internet governance
864:Sean Kanuck (Chair)
757:Christopher Painter
652:Internet governance
601:In addition to the
425:Internet governance
251:
1507:2021-06-26 at the
1495:2023-01-09 at the
1483:2023-01-09 at the
1471:2023-01-09 at the
1219:. United Nations.
888:EastWest Institute
726:
597:Other publications
409:Cyberstability.Org
249:
79:
1549:Internet security
886:Bruce McConnell (
814:Jonathan Zittrain
749:Motohiro Tsuchiya
506:Cybersecurity Act
476:Paris Peace Forum
414:
413:
318:November 13, 2019
275:February 18, 2017
247:
246:
239:
229:
228:
221:
192:with its subject.
172:
171:
164:
146:
74:
57:
1566:
1453:
1452:
1450:
1448:
1442:
1435:
1425:
1419:
1418:
1416:
1414:
1398:
1392:
1391:
1389:
1387:
1381:
1374:
1366:
1360:
1359:
1353:
1351:
1342:. The Register.
1335:
1329:
1328:
1326:
1317:
1311:
1310:
1300:
1298:
1292:
1285:
1277:
1268:
1267:
1265:
1263:
1257:
1250:
1242:
1236:
1235:
1233:
1231:
1225:
1218:
1209:
1203:
1202:
1197:
1195:
1189:
1182:
1174:
1168:
1167:
1161:
1159:
1144:
1138:
1137:
1131:
1129:
1113:
1107:
1106:
1100:
1098:
1083:
1077:
1076:
1070:
1068:
1049:
1043:
1042:
1036:
1034:
1019:"Wouter Jurgens"
1015:
1009:
1008:
1006:
1004:
989:
983:
982:
926:
924:
915:. The Register.
908:
809:Isaac Ben-Israel
790:Marietje Schaake
786:Virgilio Almeida
744:Michael Chertoff
735:Marina Kaljurand
705:
683:As input to the
672:Marietje Schaake
648:multistakeholder
429:diplomatic norms
422:multistakeholder
387:Michael Chertoff
365:Marina Kaljurand
259:
252:
248:
242:
235:
224:
217:
213:
210:
204:
190:close connection
182:
181:
174:
167:
160:
156:
153:
147:
145:
104:
68:
67:
60:
49:
27:
26:
19:
1574:
1573:
1569:
1568:
1567:
1565:
1564:
1563:
1559:Internet ethics
1514:
1513:
1509:Wayback Machine
1497:Wayback Machine
1485:Wayback Machine
1473:Wayback Machine
1462:
1457:
1456:
1446:
1444:
1440:
1433:
1427:
1426:
1422:
1412:
1410:
1399:
1395:
1385:
1383:
1379:
1372:
1368:
1367:
1363:
1349:
1347:
1336:
1332:
1324:
1318:
1314:
1296:
1294:
1293:on 8 March 2021
1290:
1283:
1279:
1278:
1271:
1261:
1259:
1255:
1248:
1244:
1243:
1239:
1229:
1227:
1223:
1216:
1210:
1206:
1193:
1191:
1187:
1180:
1176:
1175:
1171:
1157:
1155:
1146:
1145:
1141:
1127:
1125:
1114:
1110:
1096:
1094:
1085:
1084:
1080:
1066:
1064:
1051:
1050:
1046:
1032:
1030:
1017:
1016:
1012:
1002:
1000:
991:
990:
986:
935:The Netherlands
922:
920:
909:
905:
900:
883:
861:
838:
746:(Co-chair 2019)
731:
723:
703:
701:
681:
668:
660:
658:Derivative work
636:
611:
599:
589:
579:
569:
559:
549:
539:
529:
489:
484:
482:Published norms
448:
383:
373:
361:
296:
289:
243:
232:
231:
230:
225:
214:
208:
205:
194:
183:
179:
168:
157:
151:
148:
105:
103:
81:
69:
65:
28:
24:
17:
12:
11:
5:
1572:
1562:
1561:
1556:
1551:
1546:
1541:
1536:
1531:
1526:
1512:
1511:
1499:
1487:
1475:
1461:
1460:External links
1458:
1455:
1454:
1420:
1393:
1361:
1330:
1312:
1269:
1237:
1204:
1169:
1139:
1108:
1078:
1044:
1010:
984:
902:
901:
899:
896:
895:
894:
891:
882:
879:
878:
877:
874:
871:
868:
865:
860:
857:
856:
855:
854:Hugo Zylerberg
852:
847:
844:
837:
834:
833:
832:
829:
826:
824:Jane Holl Lute
821:
816:
811:
806:
803:
800:
797:
792:
787:
784:
781:
778:
773:
768:
763:
758:
755:
750:
747:
741:
738:
730:
727:
700:
697:
680:
677:
667:
664:
659:
656:
635:
632:
610:
607:
598:
595:
588:
585:
578:
575:
568:
565:
558:
555:
548:
545:
538:
535:
528:
525:
518:United Nations
502:European Union
488:
485:
483:
480:
447:
444:
436:non-aggression
412:
411:
406:
402:
401:
394:
390:
389:
384:
381:
378:
377:
374:
371:
368:
367:
362:
359:
356:
355:
350:
346:
345:
342:
338:
337:
332:
328:
327:
324:
320:
319:
316:
312:
311:
308:
304:
303:
281:
277:
276:
273:
269:
268:
265:
261:
260:
245:
244:
227:
226:
186:
184:
177:
170:
169:
72:
70:
63:
58:
32:
31:
29:
22:
15:
9:
6:
4:
3:
2:
1571:
1560:
1557:
1555:
1552:
1550:
1547:
1545:
1542:
1540:
1537:
1535:
1532:
1530:
1527:
1525:
1522:
1521:
1519:
1510:
1506:
1503:
1500:
1498:
1494:
1491:
1488:
1486:
1482:
1479:
1476:
1474:
1470:
1467:
1464:
1463:
1443:on 2021-06-26
1439:
1432:
1431:
1424:
1408:
1404:
1397:
1378:
1371:
1365:
1358:
1345:
1341:
1334:
1323:
1316:
1309:
1306:
1289:
1282:
1276:
1274:
1258:on 2019-09-04
1254:
1247:
1241:
1222:
1215:
1208:
1201:
1186:
1179:
1173:
1166:
1153:
1149:
1143:
1136:
1123:
1119:
1112:
1105:
1092:
1088:
1082:
1075:
1062:
1058:
1054:
1048:
1041:
1028:
1024:
1020:
1014:
998:
994:
988:
981:
979:
975:
971:
967:
963:
962:Bill Woodcock
960:
956:
952:
948:
944:
940:
936:
932:
918:
914:
907:
903:
892:
889:
885:
884:
875:
872:
869:
866:
863:
862:
853:
851:
848:
845:
843:
842:William Saito
840:
839:
830:
827:
825:
822:
820:
819:Nigel Inkster
817:
815:
812:
810:
807:
804:
802:Scott Charney
801:
798:
796:
795:Bill Woodcock
793:
791:
788:
785:
782:
779:
777:
774:
772:
771:Khoo Boon Hui
769:
767:
764:
762:
759:
756:
754:
751:
748:
745:
742:
739:
736:
733:
732:
729:Commissioners
696:
694:
693:Bill Woodcock
690:
686:
676:
673:
663:
655:
653:
649:
645:
641:
631:
629:
625:
621:
616:
606:
604:
593:
583:
573:
563:
553:
543:
533:
524:
523:
519:
515:
511:
507:
503:
499:
493:
479:
477:
473:
469:
468:Bert Koenders
464:
462:
461:Bill Woodcock
458:
457:Uri Rosenthal
454:
443:
441:
437:
434:
430:
426:
423:
419:
410:
407:
403:
400:
399:
395:
391:
388:
385:
379:
375:
369:
366:
363:
357:
354:
351:
347:
343:
339:
336:
333:
329:
325:
321:
317:
313:
309:
305:
302:
299:
295:
292:
288:
285:
282:
278:
274:
270:
266:
262:
258:
253:
241:
238:
223:
220:
212:
202:
198:
193:
191:
185:
176:
175:
166:
163:
155:
144:
141:
137:
134:
130:
127:
123:
120:
116:
113: –
112:
108:
107:Find sources:
101:
97:
93:
89:
85:
78:
71:
62:
61:
56:
54:
47:
46:
41:
40:
35:
30:
21:
20:
1544:Internet law
1445:. Retrieved
1438:the original
1429:
1423:
1413:22 September
1411:. Retrieved
1405:. Le Monde.
1396:
1386:22 September
1384:. Retrieved
1364:
1355:
1350:27 September
1348:. Retrieved
1333:
1315:
1302:
1295:. Retrieved
1288:the original
1260:. Retrieved
1253:the original
1240:
1230:22 September
1228:. Retrieved
1207:
1199:
1194:22 September
1192:. Retrieved
1172:
1163:
1158:22 September
1156:. Retrieved
1142:
1133:
1126:. Retrieved
1111:
1102:
1095:. Retrieved
1081:
1072:
1065:. Retrieved
1056:
1047:
1038:
1031:. Retrieved
1022:
1013:
1001:. Retrieved
987:
928:
921:. Retrieved
906:
831:Olaf Kolkman
761:Ilya Sachkov
699:Participants
684:
682:
669:
661:
643:
637:
623:
614:
612:
602:
600:
591:
581:
571:
561:
551:
541:
531:
521:
497:
495:
491:
470:at the 53rd
465:
449:
433:governmental
417:
415:
397:
341:Headquarters
334:
264:Abbreviation
233:
215:
206:
187:
158:
149:
139:
132:
125:
118:
106:
50:
43:
37:
36:Please help
33:
881:Secretariat
850:Sigrid Kaag
828:Samir Saran
780:Xiadong Lee
393:Publication
376:Latha Reddy
298:Singaporean
272:Established
88:independent
1518:Categories
898:References
805:Elina Noor
753:Joseph Nye
440:cyberspace
307:Founded at
122:newspapers
96:redirected
39:improve it
955:Black Hat
943:Singapore
931:cyber-war
766:Jeff Moss
650:model of
344:The Hague
315:Dissolved
209:July 2022
201:talk page
152:July 2022
86:that are
45:talk page
1505:Archived
1493:Archived
1481:Archived
1469:Archived
1407:Archived
1377:Archived
1344:Archived
1221:Archived
1185:Archived
1152:Archived
1122:Archived
1091:Archived
1061:Archived
1027:Archived
997:Archived
978:NotPetya
917:Archived
382:Co-Chair
372:Co-Chair
360:Co-Chair
280:Founders
1447:26 June
1297:25 June
1128:13 July
1097:13 July
1067:26 June
1033:26 June
1003:26 June
966:Stuxnet
923:25 June
446:Origins
405:Website
349:Origins
331:Purpose
136:scholar
100:deleted
1262:1 June
939:France
420:was a
310:Munich
291:French
138:
131:
124:
117:
109:
92:merged
1441:(PDF)
1434:(PDF)
1380:(PDF)
1373:(PDF)
1325:(PDF)
1291:(PDF)
1284:(PDF)
1256:(PDF)
1249:(PDF)
1224:(PDF)
1217:(PDF)
1188:(PDF)
1181:(PDF)
974:Petya
970:Flame
284:Dutch
143:JSTOR
129:books
98:, or
1449:2021
1415:2021
1388:2021
1352:2021
1299:2021
1264:2019
1232:2021
1196:2021
1160:2021
1130:2021
1099:2021
1069:2021
1035:2021
1005:2021
976:and
941:and
925:2021
628:OECD
496:The
451:the
416:The
323:Type
267:GCSC
115:news
640:ITU
504:'s
438:in
431:of
301:MFA
294:MFA
287:MFA
1520::
1354:.
1301:.
1272:^
1198:.
1162:.
1132:.
1101:.
1071:.
1055:.
1037:.
1021:.
972:,
968:,
937:,
927:.
695:.
459:,
94:,
48:.
1451:.
1417:.
1390:.
1266:.
1234:.
1007:.
890:)
240:)
234:(
222:)
216:(
211:)
207:(
203:.
165:)
159:(
154:)
150:(
140:·
133:·
126:·
119:·
102:.
80:.
55:)
51:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.