Knowledge

Global Commission on the Stability of Cyberspace

Source đź“ť

1074:
applicability of the UN Charter and international law in the cybersphere. Key points of discussion were measures concerning responsible State behavior, and the protection of critical infrastructure and components of the global Internet. To bring all parties together, the Netherlands has developed the Global Commission on the Stability of Cyberspace. This platform will include all stakeholders and academics to develop new ideas on norms and actions for cyberstability. James Lewis laid out two options to protect cybersecurity. One is to choose the path of disarmament, and ban specific cyberweapons. The other is to choose the path of arms control, and regulate the use of cyberweapons, agreeing on principles of how to use them responsibly, controlled by the laws of armed conflict.
1135:
United Nations. This is because it was a truly multi-stakeholder effort, with the involvement of governments, the tech community and civil society. And finally, it serves as a reminder of the value of consensus. This may not sound spectacular, but it is. There are a lot of divergent opinions out there: About what the rules of the road should be, about who should bear responsibility for what happens, and about how to deal with transgressions. There should be no tampering with the public core of the internet. Internet infrastructure should be regarded as the backbone of modern society. Undersea cables and other vital elements should be off limits. The Global Commission rightly identifies these areas as sacrosanct.
1104:
proposals for norms and policy initiatives to improve the stability and security of cyberspace. In 2016 during the Munich Security Conference (MSC) The Netherlands Minister of Foreign Affairs Bert Koenders announced the intention of his government to support the establishment of a GCSC. The GCSC, based in The Hague, will be chaired by Marina Kaljurand, former Foreign Minister of Estonia, and will be composed of over two dozen prominent independent commissioners, from over 15 countries, with the expertise and legitimacy to speak on different aspects of cyberspace. The Commission will develop proposals for norms and policies to enhance the stability of cyberspace.
572:"Developers and producers of products and services on which the stability of cyberspace depends should (1) prioritize security and stability, (2) take reasonable steps to ensure that their products or services are free from significant vulnerabilities, and (3) take measures to timely mitigate vulnerabilities that are later discovered and to be transparent about their process. All actors have a duty to share information on vulnerabilities in order to help prevent or mitigate malicious cyber activity." 180: 66: 25: 257: 617:
the effort was divided into two working groups, one, principally diplomatic, to specify what actions should be precluded; the other, involving subject-matter experts, to specify which infrastructures were deemed most worthy of protection. This latter working group specified a survey of cybersecurity
450:
Together with the Global Forum on Cyber Expertise, the GCSC was a product of the 2015-2017 Dutch chairmanship of the London Process, and particularly the work of Wouter Jurgens who, as head of the cyber security department of the Dutch Ministry of Foreign Affairs, had responsibility for organizing
1164:
The public core of the open internet, namely its main protocols and infrastructure, which are a global public good, provides the essential functionality of the internet as a whole and underpins its normal operation. ENISA should support the security of the public core of the open internet and the
674:
and Europol veteran Stéphane Duguin. This independent, non governmental organization has the mission to highlight the human aspect of cyberattacks. It works in close collaboration with relevant partners to reduce the harms from cyberattacks on people’s lives worldwide. The Institute builds on the
1307:
and cyber defense to assess which infrastructures were deemed most worthy of protection. On a scale of zero to ten, with zero being 'unworthy of special protection' and ten being 'essential to include in the protected class,' all surveyed categories ranked between 6.02 and 9.01. Accordingly, the
1134:
This report, compiled by a group of Commissioners from all over the globe, does a number of important things. It consolidates a set of norms and principles for the behaviour of state and non-state actors in cyberspace. It confers a legitimacy that goes beyond the regular dialogues we have in the
1039:
Wouter Jurgens is heading the cyber security department at the Ministry of Foreign Affairs of the Netherlands. He is responsible for the preparations of the 4th Cyber Space Conference to be held in The Netherlands in 2015. This ministerial conference is part of the London Process and will bring
1103:
The Kingdom of the Netherlands, together with The Hague Centre for Strategic Studies (HCSS) and the EastWest Institute (EWI) recently announced the establishment of the Global Commission on the Stability of Cyberspace (GCSC): a global body formed to convene key global stakeholders to develop
1356:
Despite recent attempts to cast the main threat to the public core as resulting from cybercriminals, it is in fact states and their affiliates whose activities pose the greatest risks. The document cites an International Telecommunication Union document, submitted by the Russian Federation,
1073:
The side event was moderated by Wouter Jurgens, Head of the Cyber Security Department at the Dutch Ministry of Foreign Affairs. Uri Rosenthal, Dutch Special Envoy for International Cyber Policies discussed the Global Conference on CyberSpace. The GCCS2015 underlined the importance of the
626:. This definition of the "public core of the Internet" to include packet routing and forwarding, naming and numbering systems, the cryptographic mechanisms of security and identity, and physical transmission media, with more-specific details attending to each, has since been used by the 562:"States should create procedurally transparent frameworks to assess whether and when to disclose not publicly known vulnerabilities or flaws they are aware of in information systems and technologies. The default presumption should be in favor of disclosure." 1040:
together ministers, policy makers, private sector and civil society to discuss, cyber security, freedom & privacy, economic growth & innovation as well as cyber issues related to international peace and security and capacity building.
492:"State and non-state actors should neither conduct nor knowingly allow activity that intentionally and substantially damages the general availability or integrity of the public core of the Internet, and therefore the stability of cyberspace." 1165:
stability of its functioning, including, but not limited to, key protocols (in particular DNS, BGP, and IPv6), the operation of the domain name system (such as the operation of all top-level domains), and the operation of the root zone.
1121: 704: 1308:
Commission defines the phrase 'the public core of the Internet' to include packet routing and forwarding, naming and numbering systems, the cryptographic mechanisms of security and identity, and physical transmission media.
964:, those behind state-sponsored attacks are usually either hopelessly optimistic, or indifferent, to the notion that their exploits will be re-used. The results of that faulty thinking are history: the likes of 1090: 1406: 542:"State and non-state actors should not tamper with products and services in development and production, nor allow them to be tampered with, if doing so may substantially impair the stability of cyberspace." 455:, which was held in The Hague April 16–17 of 2015, and formalizing its outcomes. Jurgens had been working for several years on the topic of governmental non-aggression in cyberspace, in collaboration with 949:. The group making the diplomatic push is called the Global Commission on the Stability of Cyberspace (GCSC). One of the group's motivations is that state-sponsored attacks nearly always have 1118:"Speech by the Minister of Foreign Affairs, Stef Blok, at the launch of the report by the Global Commission on the Security of Cyberspace (GCSC) at the Peace Forum in Paris, 12 November 2019" 1117: 1280: 1200:
We affirm our willingness to work together to prevent activity that intentionally and substantially damages the general availability or integrity of the public core of the Internet.
38: 532:"State and non-state actors must not pursue, support or allow cyber operations intended to disrupt the technical infrastructure essential to elections, referenda or plebiscites." 1245: 1528: 996: 1376: 916: 675:
GCSC's work by monitoring compliance with its norms and coordinating cyber-attack forensic and analytic efforts that broaden public understanding of norm violations.
1086: 1060: 1402: 1357:
suggesting that nation states need to safeguard the Internet core. The GCSC statement points out that Internet governance organisations are not run by governments.
1151: 646:. The statement reiterates the GCSC's findings that state actors are the primary threat to Internet stability, not private actors; that the GCSC believes that the 142: 200: 114: 44: 1480: 1343: 662:
In addition to the norms the commission published, several other organizations were created and efforts undertaken as byproducts of the commission's work.
520:
cites the Public Core norm in the 2019 report of the Secretary General and the report of the Secretary General’s High-level Panel on Digital Cooperation,
1468: 121: 1184: 76: 1504: 1428: 938: 718: 293: 128: 500:
is the GCSC's principal product, and has been included or referenced in many subsequent legislative and diplomatic work. It was included in the
335:"To develop norms and policies to enhance international security and stability and guide responsible state and non-state behavior in cyberspace" 90:
of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be
1220: 592:"Non-state actors should not engage in offensive cyber operations and state actors should prevent such activities and respond if they occur." 110: 1287: 670:
One of the most notable derivative outcomes of the GCSC's work was the formation of the CyberPeace Institute, headed by GCSC commissioner
716: 654:
is key to maintaining Internet stability, and that the Internet's critical infrastructure is principally operated by the private sector.
1538: 1252: 934: 719: 442:. It operated for three years, from 2017 through 2019, and produced the diplomatic norm for which it was chartered and seven others. 286: 929:
The USA, China and Russia are doing all that they can to avoid development of a treaty that would make it hard for them to conduct
1553: 1026: 942: 722: 552:"State and non-state actors should not commandeer the general public’s ICT resources for use as botnets or for similar purposes." 509: 300: 711: 710: 708: 992: 135: 1369: 639: 1523: 912: 1052: 638:
On September 22, 2021, the GCSC released a three-page statement responding, in large part, to Russia's submission to the
1147: 721: 714: 712: 236: 218: 161: 52: 950: 709: 707: 1477: 715: 713: 396: 196: 1339: 717: 189: 720: 1465: 408: 87: 1177: 1533: 1321: 1501: 1437: 582:"States should enact appropriate measures, including laws and regulations, to ensure basic cyber hygiene." 1492: 630:
and others as a standardized description of the principal elements of Internet critical infrastructure.
256: 1548: 633: 471: 83: 505: 99: 1558: 435: 1213: 977: 1436:. Global Commission on the Stability of Cyberspace. November 20, 2017. p. 61. Archived from 980:
did huge damage well beyond their intended targets, imposing massive costs on the private sector.
452: 432: 352: 1340:"Stop worrying that crims could break the 'net, say cyber-diplomats – only nations have tried" 1304: 1543: 958: 688: 619: 1303:
As input to its process, a working group of the GCSC conducted a broad survey of experts on
775: 463:, Olaf Kolkman, James Lewis, and others who would subsequently become GCSC commissioners. 8: 954: 651: 424: 887: 765: 687:, a global survey of Internet infrastructure security experts was conducted in 2017 by 95: 1370:"Statement on the Interpretation of the Norm on Non-Interference with the Public Core" 1018: 474:, on February 18, 2017, with a three-year charter, and issued its final report at the 813: 513: 475: 91: 634:
Statement on the Interpretation of the Norm on Non-Interference with the Public Core
808: 789: 743: 734: 671: 647: 421: 386: 364: 1508: 1496: 1484: 1472: 973: 969: 913:"Diplomats, 'Net greybeards work to disarm USA, China and Russia's cyber-weapons" 195:
It may require cleanup to comply with Knowledge's content policies, particularly
605:
and the seven subsequent norms, the GCSC has published several other documents.
1286:. Global Commission on the Stability of Cyberspace. 21 May 2018. Archived from 823: 556: 517: 501: 642:
Council Working Group on International Internet-related Public Policy Issues,
586: 1517: 961: 841: 818: 794: 770: 692: 467: 460: 456: 946: 930: 760: 608: 566: 1322:"Risk Analysis of the Existing Internet Governance and Operational Model" 849: 546: 283: 1148:"Regulation (EU) 2019/881 of the European Parliament and of the Council" 953:
well beyond their intended targets. As explained today in a keynote at
876:
Koichiro Komiyama (Deputy Chair for Technical and Information Security)
752: 644:
Risk Analysis of the Existing Internet Governance and Operational Model
439: 428: 873:
Hugo Zylberberg (Deputy Chair for International Peace & Security)
297: 576: 1502:
Report of the GCSC Critical Infrastructure Assessment Working Group
1430:
Report of the GCSC Critical Infrastructure Assessment Working Group
486: 965: 82:
Please help to demonstrate the notability of the topic by citing
1403:"Le Cyberpeace Institute: une ONG pour défendre la "cyberpaix"" 526: 290: 1489: 516:
included a call for compliance with the Public Core norm. The
16:
Commission developing diplomatic norms limiting cyber-offense
1087:"Launch of Global Commission on the Stability of CyberSpace" 557:
Norm for States to Create a Vulnerabilities Equities Process
627: 587:
Norm Against Offensive Cyber Operations by Non-State Actors
1281:"Definition of the Public Core, to which the Norm Applies" 1183:. French Ministry of Foreign Affairs. 12 November 2018. 624:
Definition of the Public Core, to which the Norm Applies
609:
Definition of the Public Core, to which the Norm Applies
893:
Alexander Klimburg (Hague Centre for Strategic Studies)
567:
Norm to Reduce and Mitigate Significant Vulnerabilities
547:
Norm Against Commandeering of ICT Devices into Botnets
188:
A major contributor to this article appears to have a
870:
Marilia Maciel (Deputy Chair for Internet Governance)
678: 77:
notability guidelines for companies and organizations
1529:
International organisations based in the Netherlands
1375:. Global Commission on the Stability of Cyberspace. 250:
The Global Commission on the Stability of Cyberspace
618:experts, delegated implementation of the survey to 1319: 1275: 1273: 993:"4th Global Conference on CyberSpace in The Hague" 512:to include the protection of the public core. The 111:"Global Commission on the Stability of Cyberspace" 1178:"Paris Call for Trust and Security in Cyberspace" 1053:"Side Event on Cybersecurity and the Way Forward" 945:, is using diplomacy to find another way to stop 577:Norm on Basic Cyber Hygiene as Foundation Defense 1515: 466:The GCSC was launched by Dutch Foreign Minister 418:Global Commission on the Stability of Cyberspace 1490:Definition of the "Public Core" of the Internet 1270: 957:by GCSC commissioner and executive director of 706: 514:Paris Call for Trust and Security in Cyberspace 487:Norm to Protect the Public Core of the Internet 453:4th Global Conference on CyberSpace ministerial 1057:United Nations Office for Disarmament Affairs 527:Norm to Protect the Electoral Infrastructure 1400: 427:organization, dedicated to the creation of 53:Learn how and when to remove these messages 1089:. The Hague Security Delta. 7 March 2017. 933:, but an effort led by the governments of 858: 536: 255: 1401:Untersinger, Martin (26 September 2019). 622:, and integrated its results to form the 237:Learn how and when to remove this message 219:Learn how and when to remove this message 162:Learn how and when to remove this message 1337: 1327:. International Telecommunication Union. 1211: 910: 1320:Russian Federation (9 September 2021). 835: 665: 510:European Union Agency for Cybersecurity 1516: 1382:from the original on 22 September 2021 1346:from the original on 27 September 2021 1226:from the original on 27 September 2021 1338:Sharwood, Simon (24 September 2021). 1190:from the original on 5 September 2021 1120:. Dutch Ministry of Foreign Affairs. 613:Early in the process of defining the 596: 1246:"The Age of Digital Interdependence" 1154:from the original on 20 January 2022 1115: 173: 59: 18: 1466:Official web site of the Commission 1059:. United Nations. 23 October 2015. 522:The Age of Digital Interdependence. 508:, which extends the mandate of the 353:4th Global Conference on CyberSpace 13: 1212:Guterres, AntĂłnio (4 March 2019). 702: 679:Critical infrastructure assessment 657: 481: 14: 1570: 1539:Internet governance organizations 1459: 1409:from the original on 29 July 2021 1214:"Report of the Secretary-General" 1150:. European Union. 17 April 2019. 1124:from the original on 13 July 2021 1093:from the original on 13 July 2021 1063:from the original on 26 June 2021 1029:from the original on 26 June 2021 995:. Diplomat Magazine. 2015-04-05. 951:commercial and human consequences 867:Liis Vihul (Deputy Chair for Law) 34:This article has multiple issues. 1251:. United Nations. Archived from 740:Latha Reddy (Co-chair 2017-2019) 728: 199:. Please discuss further on the 178: 64: 23: 1421: 1394: 1362: 1331: 1313: 1238: 1116:Blok, Stef (12 November 2019). 999:from the original on 2021-06-26 919:from the original on 2021-06-25 698: 615:Norm to Protect the Public Core 603:Norm to Protect the Public Core 498:Norm to Protect the Public Core 42:or discuss these issues on the 1554:Internet-related organizations 1478:Final report of the Commission 1205: 1170: 1140: 1109: 1079: 1045: 1011: 985: 947:state-sponsored online warfare 911:Sharwood, Simon (2018-03-22). 904: 880: 691:, headed by GCSC commissioner 1: 1305:communications infrastructure 1025:. The University of Toronto. 1023:MUNK School of Global Affairs 897: 685:Definition of the Public Core 846:Wolff Heintschel von Heinegg 7: 1524:Global policy organizations 326:Multistakeholder Commission 10: 1575: 472:Munich Security Conference 445: 84:reliable secondary sources 73:The topic of this article 404: 392: 380: 370: 358: 348: 340: 330: 322: 314: 306: 279: 271: 263: 254: 75:may not meet Knowledge's 478:, on November 13, 2019. 398:Advancing Cyberstability 859:Research Advisory Group 537:Norm to Avoid Tampering 725: 594: 584: 574: 564: 554: 544: 534: 494: 959:Packet Clearing House 799:Wolfgang Kleinwächter 724: 689:Packet Clearing House 620:Packet Clearing House 590: 580: 570: 560: 550: 540: 530: 490: 197:neutral point of view 836:Former commissioners 783:Abdul-Hakeem Ajijola 776:Anriette Esterhuysen 737:(Co-chair 2017-2018) 666:CyberPeace Institute 1534:Internet governance 864:Sean Kanuck (Chair) 757:Christopher Painter 652:Internet governance 601:In addition to the 425:Internet governance 251: 1507:2021-06-26 at the 1495:2023-01-09 at the 1483:2023-01-09 at the 1471:2023-01-09 at the 1219:. United Nations. 888:EastWest Institute 726: 597:Other publications 409:Cyberstability.Org 249: 79: 1549:Internet security 886:Bruce McConnell ( 814:Jonathan Zittrain 749:Motohiro Tsuchiya 506:Cybersecurity Act 476:Paris Peace Forum 414: 413: 318:November 13, 2019 275:February 18, 2017 247: 246: 239: 229: 228: 221: 192:with its subject. 172: 171: 164: 146: 74: 57: 1566: 1453: 1452: 1450: 1448: 1442: 1435: 1425: 1419: 1418: 1416: 1414: 1398: 1392: 1391: 1389: 1387: 1381: 1374: 1366: 1360: 1359: 1353: 1351: 1342:. The Register. 1335: 1329: 1328: 1326: 1317: 1311: 1310: 1300: 1298: 1292: 1285: 1277: 1268: 1267: 1265: 1263: 1257: 1250: 1242: 1236: 1235: 1233: 1231: 1225: 1218: 1209: 1203: 1202: 1197: 1195: 1189: 1182: 1174: 1168: 1167: 1161: 1159: 1144: 1138: 1137: 1131: 1129: 1113: 1107: 1106: 1100: 1098: 1083: 1077: 1076: 1070: 1068: 1049: 1043: 1042: 1036: 1034: 1019:"Wouter Jurgens" 1015: 1009: 1008: 1006: 1004: 989: 983: 982: 926: 924: 915:. The Register. 908: 809:Isaac Ben-Israel 790:Marietje Schaake 786:Virgilio Almeida 744:Michael Chertoff 735:Marina Kaljurand 705: 683:As input to the 672:Marietje Schaake 648:multistakeholder 429:diplomatic norms 422:multistakeholder 387:Michael Chertoff 365:Marina Kaljurand 259: 252: 248: 242: 235: 224: 217: 213: 210: 204: 190:close connection 182: 181: 174: 167: 160: 156: 153: 147: 145: 104: 68: 67: 60: 49: 27: 26: 19: 1574: 1573: 1569: 1568: 1567: 1565: 1564: 1563: 1559:Internet ethics 1514: 1513: 1509:Wayback Machine 1497:Wayback Machine 1485:Wayback Machine 1473:Wayback Machine 1462: 1457: 1456: 1446: 1444: 1440: 1433: 1427: 1426: 1422: 1412: 1410: 1399: 1395: 1385: 1383: 1379: 1372: 1368: 1367: 1363: 1349: 1347: 1336: 1332: 1324: 1318: 1314: 1296: 1294: 1293:on 8 March 2021 1290: 1283: 1279: 1278: 1271: 1261: 1259: 1255: 1248: 1244: 1243: 1239: 1229: 1227: 1223: 1216: 1210: 1206: 1193: 1191: 1187: 1180: 1176: 1175: 1171: 1157: 1155: 1146: 1145: 1141: 1127: 1125: 1114: 1110: 1096: 1094: 1085: 1084: 1080: 1066: 1064: 1051: 1050: 1046: 1032: 1030: 1017: 1016: 1012: 1002: 1000: 991: 990: 986: 935:The Netherlands 922: 920: 909: 905: 900: 883: 861: 838: 746:(Co-chair 2019) 731: 723: 703: 701: 681: 668: 660: 658:Derivative work 636: 611: 599: 589: 579: 569: 559: 549: 539: 529: 489: 484: 482:Published norms 448: 383: 373: 361: 296: 289: 243: 232: 231: 230: 225: 214: 208: 205: 194: 183: 179: 168: 157: 151: 148: 105: 103: 81: 69: 65: 28: 24: 17: 12: 11: 5: 1572: 1562: 1561: 1556: 1551: 1546: 1541: 1536: 1531: 1526: 1512: 1511: 1499: 1487: 1475: 1461: 1460:External links 1458: 1455: 1454: 1420: 1393: 1361: 1330: 1312: 1269: 1237: 1204: 1169: 1139: 1108: 1078: 1044: 1010: 984: 902: 901: 899: 896: 895: 894: 891: 882: 879: 878: 877: 874: 871: 868: 865: 860: 857: 856: 855: 854:Hugo Zylerberg 852: 847: 844: 837: 834: 833: 832: 829: 826: 824:Jane Holl Lute 821: 816: 811: 806: 803: 800: 797: 792: 787: 784: 781: 778: 773: 768: 763: 758: 755: 750: 747: 741: 738: 730: 727: 700: 697: 680: 677: 667: 664: 659: 656: 635: 632: 610: 607: 598: 595: 588: 585: 578: 575: 568: 565: 558: 555: 548: 545: 538: 535: 528: 525: 518:United Nations 502:European Union 488: 485: 483: 480: 447: 444: 436:non-aggression 412: 411: 406: 402: 401: 394: 390: 389: 384: 381: 378: 377: 374: 371: 368: 367: 362: 359: 356: 355: 350: 346: 345: 342: 338: 337: 332: 328: 327: 324: 320: 319: 316: 312: 311: 308: 304: 303: 281: 277: 276: 273: 269: 268: 265: 261: 260: 245: 244: 227: 226: 186: 184: 177: 170: 169: 72: 70: 63: 58: 32: 31: 29: 22: 15: 9: 6: 4: 3: 2: 1571: 1560: 1557: 1555: 1552: 1550: 1547: 1545: 1542: 1540: 1537: 1535: 1532: 1530: 1527: 1525: 1522: 1521: 1519: 1510: 1506: 1503: 1500: 1498: 1494: 1491: 1488: 1486: 1482: 1479: 1476: 1474: 1470: 1467: 1464: 1463: 1443:on 2021-06-26 1439: 1432: 1431: 1424: 1408: 1404: 1397: 1378: 1371: 1365: 1358: 1345: 1341: 1334: 1323: 1316: 1309: 1306: 1289: 1282: 1276: 1274: 1258:on 2019-09-04 1254: 1247: 1241: 1222: 1215: 1208: 1201: 1186: 1179: 1173: 1166: 1153: 1149: 1143: 1136: 1123: 1119: 1112: 1105: 1092: 1088: 1082: 1075: 1062: 1058: 1054: 1048: 1041: 1028: 1024: 1020: 1014: 998: 994: 988: 981: 979: 975: 971: 967: 963: 962:Bill Woodcock 960: 956: 952: 948: 944: 940: 936: 932: 918: 914: 907: 903: 892: 889: 885: 884: 875: 872: 869: 866: 863: 862: 853: 851: 848: 845: 843: 842:William Saito 840: 839: 830: 827: 825: 822: 820: 819:Nigel Inkster 817: 815: 812: 810: 807: 804: 802:Scott Charney 801: 798: 796: 795:Bill Woodcock 793: 791: 788: 785: 782: 779: 777: 774: 772: 771:Khoo Boon Hui 769: 767: 764: 762: 759: 756: 754: 751: 748: 745: 742: 739: 736: 733: 732: 729:Commissioners 696: 694: 693:Bill Woodcock 690: 686: 676: 673: 663: 655: 653: 649: 645: 641: 631: 629: 625: 621: 616: 606: 604: 593: 583: 573: 563: 553: 543: 533: 524: 523: 519: 515: 511: 507: 503: 499: 493: 479: 477: 473: 469: 468:Bert Koenders 464: 462: 461:Bill Woodcock 458: 457:Uri Rosenthal 454: 443: 441: 437: 434: 430: 426: 423: 419: 410: 407: 403: 400: 399: 395: 391: 388: 385: 379: 375: 369: 366: 363: 357: 354: 351: 347: 343: 339: 336: 333: 329: 325: 321: 317: 313: 309: 305: 302: 299: 295: 292: 288: 285: 282: 278: 274: 270: 266: 262: 258: 253: 241: 238: 223: 220: 212: 202: 198: 193: 191: 185: 176: 175: 166: 163: 155: 144: 141: 137: 134: 130: 127: 123: 120: 116: 113: â€“  112: 108: 107:Find sources: 101: 97: 93: 89: 85: 78: 71: 62: 61: 56: 54: 47: 46: 41: 40: 35: 30: 21: 20: 1544:Internet law 1445:. Retrieved 1438:the original 1429: 1423: 1413:22 September 1411:. Retrieved 1405:. Le Monde. 1396: 1386:22 September 1384:. Retrieved 1364: 1355: 1350:27 September 1348:. Retrieved 1333: 1315: 1302: 1295:. Retrieved 1288:the original 1260:. Retrieved 1253:the original 1240: 1230:22 September 1228:. Retrieved 1207: 1199: 1194:22 September 1192:. Retrieved 1172: 1163: 1158:22 September 1156:. Retrieved 1142: 1133: 1126:. Retrieved 1111: 1102: 1095:. Retrieved 1081: 1072: 1065:. Retrieved 1056: 1047: 1038: 1031:. Retrieved 1022: 1013: 1001:. Retrieved 987: 928: 921:. Retrieved 906: 831:Olaf Kolkman 761:Ilya Sachkov 699:Participants 684: 682: 669: 661: 643: 637: 623: 614: 612: 602: 600: 591: 581: 571: 561: 551: 541: 531: 521: 497: 495: 491: 470:at the 53rd 465: 449: 433:governmental 417: 415: 397: 341:Headquarters 334: 264:Abbreviation 233: 215: 206: 187: 158: 149: 139: 132: 125: 118: 106: 50: 43: 37: 36:Please help 33: 881:Secretariat 850:Sigrid Kaag 828:Samir Saran 780:Xiadong Lee 393:Publication 376:Latha Reddy 298:Singaporean 272:Established 88:independent 1518:Categories 898:References 805:Elina Noor 753:Joseph Nye 440:cyberspace 307:Founded at 122:newspapers 96:redirected 39:improve it 955:Black Hat 943:Singapore 931:cyber-war 766:Jeff Moss 650:model of 344:The Hague 315:Dissolved 209:July 2022 201:talk page 152:July 2022 86:that are 45:talk page 1505:Archived 1493:Archived 1481:Archived 1469:Archived 1407:Archived 1377:Archived 1344:Archived 1221:Archived 1185:Archived 1152:Archived 1122:Archived 1091:Archived 1061:Archived 1027:Archived 997:Archived 978:NotPetya 917:Archived 382:Co-Chair 372:Co-Chair 360:Co-Chair 280:Founders 1447:26 June 1297:25 June 1128:13 July 1097:13 July 1067:26 June 1033:26 June 1003:26 June 966:Stuxnet 923:25 June 446:Origins 405:Website 349:Origins 331:Purpose 136:scholar 100:deleted 1262:1 June 939:France 420:was a 310:Munich 291:French 138:  131:  124:  117:  109:  92:merged 1441:(PDF) 1434:(PDF) 1380:(PDF) 1373:(PDF) 1325:(PDF) 1291:(PDF) 1284:(PDF) 1256:(PDF) 1249:(PDF) 1224:(PDF) 1217:(PDF) 1188:(PDF) 1181:(PDF) 974:Petya 970:Flame 284:Dutch 143:JSTOR 129:books 98:, or 1449:2021 1415:2021 1388:2021 1352:2021 1299:2021 1264:2019 1232:2021 1196:2021 1160:2021 1130:2021 1099:2021 1069:2021 1035:2021 1005:2021 976:and 941:and 925:2021 628:OECD 496:The 451:the 416:The 323:Type 267:GCSC 115:news 640:ITU 504:'s 438:in 431:of 301:MFA 294:MFA 287:MFA 1520:: 1354:. 1301:. 1272:^ 1198:. 1162:. 1132:. 1101:. 1071:. 1055:. 1037:. 1021:. 972:, 968:, 937:, 927:. 695:. 459:, 94:, 48:. 1451:. 1417:. 1390:. 1266:. 1234:. 1007:. 890:) 240:) 234:( 222:) 216:( 211:) 207:( 203:. 165:) 159:( 154:) 150:( 140:· 133:· 126:· 119:· 102:. 80:. 55:) 51:(

Index

improve it
talk page
Learn how and when to remove these messages
notability guidelines for companies and organizations
reliable secondary sources
independent
merged
redirected
deleted
"Global Commission on the Stability of Cyberspace"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
close connection
neutral point of view
talk page
Learn how and when to remove this message
Learn how and when to remove this message

Dutch
MFA
French
MFA
Singaporean
MFA
4th Global Conference on CyberSpace
Marina Kaljurand

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑