Newspaper accuses Cameron of caving on E.U. immigration controls

(May 16th, 2016) The (London) Daily Mail calls the disclosure that British Prime Minister David Cameron  bowed to German Chancellor Angela Merkel’s demand to drop his European Union membership renegotiation “red line” demanding stronger immigration controls for the E.U., now being flooded with immigrants from the Mideast and North Africa, “explosive’’.

PM-669066
The paper says that tightening immigration controls  would have formed the core of the Cameron government’s renegotiation requirements but that “all talk of it vanished when David Cameron finally revealed his demands in a speech in November 2014.’’

“At the time there were a number of Tory MPs who expressed their anger. They knew that without such a plan to halt immigration, even for a while, any renegotiation, however well meant, was fundamentally pointless. Now we know for certain that the renegotiation was not even well meant. It was a sham from the start,’’ the paper asserted.
The Boston Global Forum last year named Chancellor Merkel a “World Leader for Peace, Security and Development’’.

See more 

Remark at the BGF-G7 Summit Initiative Conference – Tomomi Inada

Remark at the BGF-G7 Summit Initiative Conference – Tomomi Inada

Tomomi Inada, Chairman of  the Policy Research Council of Japan’s Liberal Democratic Party and  a Member of the Japanese House of Representatives, addressed The Boston Global Forum-G7 Summit Initiative Conference, held May 9 at the Harvard Faculty Club, in Cambridge, Mass.

In her remarks, she discussed the Asia/Pacific security environment to be discussed at the G7 Summit. She said that environment is worsening because of {in addition to North Korean threats} Chinese expansionism in the East and South China Seas and China’s rapid military buildup; its military budget, she said, is now “3.6 times’’ Japan’s.

But she said that Japan, in close collaboration with the United States, is “expanding its deterrent force’’ in the Asia/Pacific region.

She noted the importance of cybersecurity in Japan’s “national risk assessment’’ as “the threat of cyberattacks is increasing around the world.’’

“We need the rule of law in cyberbehavior,’’ Ms. Inada emphasized. We note that she is seen as a possible first woman prime minister of Japan.

At the conference, Gov. Michael Dukakis, its moderator and  the BGF’s chairman and a co-founder, presented to Tsutomo Himeno, the Japanese consul general for New England, the documents containing the final recommendations of the BGF-G7 Summit Initiative Committee, which mostly involved cybersecurity, the BGF’s focus this year. Mr. Himeno has forwarded them to the summit planners.

UNESCO chief says world needs more ‘soft power’

(May 15th, 2016) UNESCO Director General Irina Bokova told an event organized at the United Nations University in Tokyo that the ‘’world needs more soft power to diffuse tensions, prevent conflict and build coalitions around a positive agenda.’’ She discuss ed UNESCO’s broad mandate to ‘’build peace in the minds of men and women’’ and promoted the United Nations’ Sustainable Development Goals and the Paris agreement to address climate change and the poverty and insecurity stemming from it.

The-director-general-of-UNESCO-Irina-Bokova

The director-general recalled Japan’s deep role in promoting UNESCO’s core mandate to build peace, noting the founding of the first UNESCO club in Sendai, Japan, in the early 1950s. She highlighted the breadth of Japan’s contribution to the organization, including its leadership on education for sustainable development, support for Afghanistan’s largest literacy program and protection of cultural heritages.

She said that the central challenge is charting new ways to learn how to live together, drawing attention to UNESCO’s leadership in Global Citizenship Education. She underlined the importance of teaching history and the humanities, developing cultural competencies and using the full range of UNESCO’s networks to nurture more empathy, tolerance and solidarity.

See more

The Boston Global Forum (BGF) collaborates with UNESCO on global education and citizenship projects, especially through the Global Learning and Global Citizenship program at the University of California at Los Angeles (UCLA). Prof. Carlos Alberto Torres, Distinguished Professor of Education at UCLA, is the UNESCO Chair in Global Learning and Global Citizenship Education and member of the BGF’s Board of Thinkers.

Nguyen Anh Tuan, the BGF’s chief executive and co-founder, is Chair of the International Advisory Committee of the UNESCO-UCLA Chair on Global Citizenship Education. The Committee’s main responsibilities are supporting the research and development of the UNESCO-UCLA Chair.

BGF-G7 Summit Initiative Conference presents final proposals

The Boston Global Forum (BGF) held its BGF-G7 Summit Initiative Conference on Monday, May 9, at the Harvard University Faculty Club, in Cambridge, Mass., with prominent experts, and leaders from around the world, in person and online, discussing topics to be taken up at the G7 Summit on May 26-27 in Japan. The BGF has been working with Japanese officials to craft proposals to submit for consideration by the national leaders.

Hinh hoi nghi

 

Readers may hear and see the conference by clicking on this link.

Much of the conference was taken up by the focus of this year’s BGF-G7 Summit Initiative – “Building Ethics Norms for Cyberbehavior’’.  To advance this cause, BGF experts have crafted its “Ethics Code of Conduct for Cyber Peace and Security,’’ which has been informed by, among other things, a series of online dialogues in the past few months about cybersecurity and other issues to be taken up by the leaders at the summit.

The second part of the conference included discussions about other themes at the summit, especially Japanese concerns about aggressive actions by North Korea and China.

The BGF was honored by the participation of Inada Tomomi – a high official in  Japan’s ruling Liberal Democratic Party who could become that nation’s first woman prime minister.

We were also honored that  another participant, Tsutomu (“Tommy”) Himeno, the Japanese consul general for New England, lauded The Boston Global Forum for its work in the BGF-G7 Summit Initiative, which he sees as very useful in preparing the leaders’ agenda for May 26-27.

Gov. Michael Dukakis, moderator of the conference and  BGF chairman and co-founder, presented to Consul Himeno the documents containing the final recommendations of the BGF-G7 Summit Initiative Committee. Mr. Himeno has forwarded them to the summit planners.

Among the remarks by speakers at the BGF-G7 Summit Initiative conference:

Governor Dukakis: “No country is without sin’’ when it comes to cybersecurity violations.

Prof. Jose Barroso, former President of  the European Commission; former Prime Minister of Portugal and Member of The BGF-G7 Summit Committee, said that growing cybersecurity threats called for “binding agreements based on international law.’’ He added that other important matters to be taken up by the G7 Summit include “lack of investment confidence,’’ as well as “Muslim terrorism,’’ the refugee crisis and the related war in Syria and Russian attacks on Ukraine.

John Savage, An Wang Professor of Computer Science, Brown University, and Member of The BGF-G7 Summit Committee:

Three key (and interwoven) topics at the summit are “the global economy; trade and investment, and improving infrastructure.’’ All are profoundly affected by cybersecurity and the lack thereof. This further heightens the need for the public and private sectors to adopt and obey international cybersecurity norms to protect economic growth.

Prof. Derek Reveron, Professor of National Security Affairs and the EMC  Informationist Chair at the U.S. Naval War College and Member of The BGF-G7 Summit Committee: “Citizens feel struck in the middle’’ of  growing cyberinsecurity and interwoven “political, economic and social challenges,’’ of which one big player is transnational criminal gangs.  And, he noted, the discovery of government roles in cybersecurity  violations “undermines public confidence’’. The public, he said, wants and needs cyberbehavior norms in order to feel more secure as they go about their lives.

Ryan Maness, Research Fellow in Security and Resilience Studies, Northeastern University, and Member, The BGF-G7 Summit Initiative Committee: “Many fear that we’re experiencing a dangerous breakout trend’’ and that “cyberwars’’ are underway but things aren’t that bad yet.  Further, better “cyberhygiene’’ (common-sense practices – e.g., more careful password protection, etc.) would prevent many problems.

Tomomi Inada, Chairman of  the Policy Research Council of Japan’s Liberal Democratic Party and Member, Japanese House of Representatives, said that the security environment to be discussed at the summit is worsening because of {in addition to North Korean threats} Chinese expansionism in the East and South China Seas and China’s rapid military buildup; its military budget, she said, is now “3.6 times’’ Japan’s. But Japan, in collaboration with the United States, is “expanding its deterrent force’’ in the Asia/Pacific region. She noted the importance of cybersecurity in Japan’s “national risk assessment’’ as “the threat of cyberattacks is increasing around the world.’’

“We need the rule of law in cyberbehavior,’’ she emphasized.

Speakers at the conference included:

Gov.  Michael Dukakis.

Prof. Joseph S. Nye Jr., Member of Board of Thinkers, Harvard University Distinguished Service Professor; Member of Board of Thinkers, the Boston Global Forum.

Prof. Jose Barroso.

Prof.  Stephen M. Walt, Belfer Professor of International Affairs, International Security Program, Belfer Center for Science and International Affairs, Harvard University.

Prof. Ezra Vogel, Henry Ford II Professor of the Social Sciences Emeritus, Harvard University.

Prof. Nazli Choucri, Professor of Political Science, MIT; Director of the Global System for Sustainable Development (GSSD), Member of The BGF-G7 Summit Committee.

Prof. John Savage.

Prof. Derek Reveron.

Prof.  Chris Demchak, RADM Grace M. Hopper Chair of Cybersecurity in the Strategic Research Center for Cyber Conflict Studies, U.S. Naval War College.

Tsutomu Himeno, Japanese Consul  General, Boston; Member of The BGF-G7 Summit Committee.

Prof. Eisuke Sakakibara (“Mr. Yen’’), Former Japanese Vice Minister of Finance.

Tomomi Inada.

Ambassador Ichiro Fujisaki, President of the America-Japan Society; Professor at Sophia University and Keio University; Former Japanese

Ambassador to the U.S.;  Member of The BGF-G7 Summit Committee.

Ambassador Shunji Yanai, Former Japanese Ambassador to the U.S.

Prof.  Koichi Hamada, Special Adviser to Japanese Prime Minister  Shinzo Abe.

Prof.  Fumiaki Kubo, Graduate Schools for Law and Politics, University of Tokyo.

Prof.  Matthew Smith, Computer Science Professor at the Rheinische Friedrich-Wilhelms-Universität, Bonn.

Prof. Ryan Maness.

Greg Palmer, Director of Azure Infrastructure and Cybersecurity for Microsoft  in New England.

Allan Cytryn, Senior Information Technology Executive, Risk Masters Inc.; Member of the BGF-G7 Summit Committee.

Margarita Levin Jaitner,  Research Fellow, Blavatnik Interdisciplinary Cyber Research Center (ICRC).

 

 

Prof. Joseph Nye cites nations’ self-interest in boosting cybersecurity

Prof. Joseph Nye cites nations’ self-interest in boosting cybersecurity

Prof. Joseph Nye, an internationally known political scientist, addressed The Boston Global Forum’s BGF-G7 Summit Initiative Conference on May 9 at the Harvard Faculty Club, Cambridge, Mass.  He is a member of the BGF’s Board of Thinkers and University Distinguished Service Professor at Harvard as well as former Dean of Harvard’s Kennedy School.

He lauded the BGF’s focus this year on promoting better  international understanding of the need to improve cybersecurity and, more broadly, cyberbehavior in general, in the public and private sectors. He recommended an appeal to  nations’ enlightened self-interest in “restricting’’ their cyberbehavior in order to limit  geopolitical uncertainty and, by implication, dangerous miscalculations.

He noted that the need for international cyberbehavior norms of the sort recommended by the Boston Global Forum becomes increasingly important as more and more nations develop powerful cybercapacity.

Professor Nye emphasized in his remarks the important role that Japan, the G7 Summit host this year, can play in promoting cyberbehavior norms.

 

 

Remark at the BGF-G7 Summit Initiative Conference – Prof. Jose Barroso

Remark at the BGF-G7 Summit Initiative Conference – Prof. Jose Barroso

Among the first remarks at the BGF-G7 Summit Initiative Conference were those of Prof. Jose Barroso, former President of  the European Commission; former Prime Minister of Portugal and Member of The BGF-G7 Summit Committee.

Referring to the BGF’s focus this year on cybersecurity, he said that growing cyberthreats called for “binding agreements based on international law’’  to establish acceptable cyberbehavior.

He added that other important matters to be taken up by the G7 Summit include “lack of investment confidence,’’ as well as “Muslim terrorism,’’ the refugee crisis affecting Europe and the related war in Syria and Russian attacks on Ukraine.

 

Three ways to improve cybersecurity

One of The Boston Global Forum’s cybersecurity experts, Prof. Derek S. Reveron of the U.S. Naval War College and Harvard’s Belfer Center for Science and International Affairs, will be one of the speakers at the BGF’s May 9 conference titled “Building Ethics Norms for Cyberbehavior.’’

6993252294_9856faf63e_z

His report for the conference is titled “Cybersecurity Deficits and International Norms.’’ It builds on the norms outlined by Prof. John Savage of Brown University.

Among his recommendations:

 

  • Convening sub-regional summits to outline the scope of cybersecuriy challenges and improve multilateral efforts to promulgate norms.
  • Establishing information-sharing centers where governments can share threat information, coordinate cybersecurity policies and implement best practices for governments and private-sector organizations, including companies, and individuals.
  • Assisting governments in developing countries to strengthen their government networks, improve protection of critical public infrastructure and educate citizens to raise their security posture  by improving human capital.
The BGF-G7 Summit Initiative: Ise-Shima Norms

The BGF-G7 Summit Initiative: Ise-Shima Norms

The Boston Global Forum welcomes this opportunity to provide input to the agenda or the G7 Ise-Shima Summit. Global Economy and Trade, Development, and Quality Infrastructure Investment are three themes of this summit. Given the importance of the Internet in all three areas, we encourage you to address the following actions concerning cybersecurity at the summit. These actions have as their goal to raise the general level of security in cyberspace.

 

Download Ise-Shima Norms 

Securing Cyberspace and the G7 Agenda

The Boston Global Forum welcomes this opportunity to provide input to the agenda for the G7 Ise-Shima Summit. Global Economy and Trade, Development, and Quality Infrastructure Investment are three themes of this summit. Given the importance of the Internet in all three areas, we encourage you to address the following actions concerning cybersecurity at the summit. These actions have as their goal to raise the general level of security in cyberspace.

*The lead author on this document was John Savage (Brown University) with contributions from
Michael Dukakis (Boston Global Forum), Nguyen Anh Tuan (Boston Global Forum), Allan Cytryn
(Risk Masters International.), Ryan Maness (Northeastern University), Derek Reveron (Naval War
College), and Thomas Patterson (Harvard University).

20160104_01_img01

1. Encourage the global adoption of the 2015 G20 cybersecurity norms, which include the 2015 GGE norms by reference, as the Ise-Shima Norms.

2. Endorse private and public efforts to improve ethical Internet behavior. The UCLA Global Citizenship Education Program and the Boston Global Forum’s Ethical Code of Conduct for Cyber Peace and Security are two such examples.

3. Engage vendors of cyberspace technology in the discussion of norms for responsible state behavior.

4. Establish domestic and international centers and mechanisms designed to reduce the risk of cyber conflict.

5. Encourage national cybersecurity experts to voluntarily publicize their best security practices.

6. Recognize that formulation of policy concerning cyberspace technologies requires the participation, on an equal footing, of respected academics and industry experts on the technologies in question.

These proposals stem from several developments.

First, over the last five years, small groups of governments have formulated international norms of state behavior, particularly for peacetime use. Negotiations have been held at the UN and many other forums. Now that a set of reasonable norms have been established it is appropriate to reach out to nations that have not participated in these discussions and encourage them to endorse them as well. In many cases, this will require some capacity development, which is encouraged by UN Resolution 70/237. The G7 nations can help increase confidence in computers and network technology by leading this effort, which could be called the Ise-Shima Challenge.

Second, global citizenship education has an important a role to play in building a sustainable peace and security in cyberspace. We encourage a significant effort in this regard.

Third, we observe that the success of many computer vendors requires that their customers have confidence in their products, which is undermined by unreported cyber vulnerabilities and by state launched weapons that result in mass events. Thus, some vendors, notably, Microsoft, have begun to formulate and promulgate norms of state behavior that are important from their point of view. States should take these nascent efforts seriously and engage these firms in norms formulation.

Fourth, given the large number of states that are developing cyber weapons, the risk of accidental or intentional cyber conflict is rising. All states should recognize this risk and work to mitigate it. Centers designed to reduce the risk of cyber conflict are needed in every country with offensive cyber capability. Operators in these centers must come to know each other so that they can properly assess national intentions during a cyber crisis. This issue has been highlighted in the latest 2015 GGE report.

The fifth recommendation on best practices is illustrated by a public talk given in January 2016 by Rob Joyce, head of NSA’s Tailored Access Operations Department. He offered advice on cybersecurity measures to protect a computing facility from the type of penetration in which his department engages. This event was a remarkable example of the security services of a major nation, the US, offering constructive advice to others. Each G7 nation could assume the same responsibility for improving the security of cyberspace by offering such examples of best practices.

Finally, policy formulation concerning cyberspace can be very challenging. Unless technology experts are at the table with policymakers when such policy is formulated, errors are easily made that may lead to poorly formulated international norms or domestic legislation. Thus, it is essential that academic and technology experts be engaged and treated as co-equals with policymakers during this process.

The appendices that follow provide specific recommendations that have been developed by a variety of parties and are aligned with the above objectives.

 Appendix A: The Ise-Shima Norms

The G7 nations should promote the development of social, legal and technological norms and agreements that will protect the information and communications infrastructures of the world’s nations and their people. In doing so, these norms will promote the abilities of these technologies to fulfill their promise to enhance the lives of all. These actions follow successful precedents in many areas where international, national and private efforts have worked together to enable the world to realize the benefits of new technologies in order to maximize their benefit to all and to mitigate differences between nations and peoples.

I. The G7 nations should encourage adoption of norms set forth by the G20, the United Nations’ Group of Government Experts (GGE), and the Boston Global Forum’s Ethics Code of Conduct for Cybersecurity (ECCC).

1. Key G20 norms

·Nation-state conduct in cyber space should conform to international law and the UN charter.

·No country should conduct or support cyber-enabled intellectual property theft for commercial purposes.

2. Key GGE norms

·No country should intentionally damage the critical infrastructure of another state or impair infrastructure that serves the public and would undermine the human rights guaranteed by the U.N. Declaration.

·No country should act to impede the response of Computer Security Incident Response Teams (CSIRTs) to cyber incidents, nor should CSIRTs be used to create cyber incidents.

·Countries should cooperate with requests from other nations to investigate cybercrimes and mitigate malicious activity emanating from their territory.

3. Key ECCC norms

·Countries should not establish or support policies or actions harmful to cyberspace.

·Countries should not engage in the unlawful taking of the assets or confidential information of private individuals or organizations.

·Nations should not use cyberspace to wrongly damage the reputation of other nations, organizations, or individuals.

II. The G7 nations should engage hardware and software vendors in developing cyber norms, following the six guidelines in the Microsoft report, “International Cyber Security Norms: Reducing Conflict in an Internet-Dependent World.”

1. Countries should not target information and communications technology (ICT) companies to insert vulnerabilities (backdoors) or take action that would undermine public trust in products and services.

 2. Countries should have a clear principle-based policy for handling product and service vulnerabilities that reflects a strong mandate to report them to vendors rather than stockpiling, buying, or selling them.

3. Countries should exercise restraint in developing cyber weapons and should ensure that any which are developed are limited, precise, and not reusable.

4. Countries should commit to nonproliferation activities related to cyber weapons.

5. Countries should limit their engagement in cyber offensive operations to avoid creating a mass event.

6. Countries should assist private sector efforts to detect, contain, respond to, and recover from events in cyberspace.

III. The G7 nations should develop cyber risk reduction measures.

1. Create domestic threat reductions centers equipped with secure communications with other such national centers to mitigate risks before, during and after cyber-incidents.

2. Assess and improve the cyber security of national critical infrastructures.

3. Take steps to reduce the number of domestic compromised computers, particularly those that have been marshalled into botnets.

4. Improve domestic cybersecurity through advisory and legislative measures.

IV. The G7 nations should promote the development, identification, sharing and adoption of “best practices” in the cybersecurity area.

V. The G7 nations should support cyber security capacity building in developing countries.

1. Investments should be made in developing countries to secure their infrastructures as this is essential to securing the connected global infrastructure and preventing a widening gap in the capabilities of nations. In the interconnected world, these investments are essential to reducing costs resulting from cyber-crime and espionage and to increasing the confidence and trust of businesses to operate in developing countries.

2. Investments should be made and cooperation undertaken between developed and developing countries to re-envision methods of education and learning, utilizing the global information and telecommunication infrastructure to enhance the accessibility of suitable educational opportunities for people everywhere.

Appendix B

2015 GGE Norms

(Excerpt from UN A/70/174*)

The 2015 UN GGE committee consisted of experts from 20 representing Belarus, Brazil, China, Columbia, Egypt, Estonia, France, Germany, Ghana, Israel, Japan, Kenya, Malaysia, Mexico, Pakistan, the Republic of Korea, the Russian Federation, Spain, the United Kingdom of Great Britain and Northern Ireland, and the United States of America. The two G7 countries not represented are Canada and Italy.

“13. … (T) present Group offers the following recommendations for consideration by States for voluntary, non-binding norms, rules or principles of responsible behaviour of States aimed at promoting an open, secure, stable, accessible and peaceful ICT environment:

a) Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security;

b) In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences;

c) States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs;

d) States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect;

e) States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression;

f) A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public;

g) States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions;

* Retrieved from http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174 on May 7, 2016. 

h) States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty;

i) States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions;

j) States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure;

k) States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cybersecurity incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.

14. The Group observed that, while such measures may be essential to promote an open, secure, stable, accessible and peaceful ICT environment, their implementation may not immediately be possible, in particular for developing countries, until they acquire adequate capacity.” In addition, the 2015 GGE encouraged states to implement confidence-building measures to include

a) identification of domestic technical and policy points of contact “to address serious ICT incidents,”

b) risk reduction measures,

c) sharing of general threat information, known technological vulnerabilities, and best security practices,

and d) identification of critical domestic infrastructures and the legal, technical and assessment steps that nations have taken to protect them. This GGE also encouraged states to exchange law enforcement and cybersecurity personnel as well as to facilitate exchanges between academic and research institutions. The creation of national computer emergency response teams is also encouraged along with exchanges of personnel between such groups. Appendix C

G20 Cybersecurity Norms

Excerpt from the G20 Leaders’ Communiqué Antalya Summit, 15-16 November 2015*

“A26. We are living in an age of Internet economy that brings both opportunities and challenges to global growth. We acknowledge that threats to the security of and in the use of ICTs, risk undermining our collective ability to use the Internet to bolster economic growth and development around the world.

1. We commit ourselves to bridge the digital divide. In the ICT environment, just as elsewhere, states have a special responsibility to promote security, stability, and economic ties with other nations.

2. In support of that objective, we affirm that no country should conduct or support ICT-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.

3. All states in ensuring the secure use of ICTs, should respect and protect the principles of freedom from unlawful and arbitrary interference of privacy, including in the context of digital communications. …

4. (W)e welcome the 2015 report of the UN Group of Governmental Experts in the Field of Information and Telecommunications in the Context of International Security, affirm that international law, and in particular the UN Charter, is applicable to state conduct in the use of ICTs. …

5. (We) commit ourselves to the view that all states should abide by norms of responsible state behaviour in the use of ICTs in accordance with UN resolution A/C.1/70/L.45. †

6. We are committed to help ensure an environment in which all actors are able to enjoy the benefits of secure use of ICTs. “

†G20 Members: Argentina, Australia, Brazil, Canada, China, France, Germany, India, Indonesia, Italy, Japan, Korea, Mexico, Russia, Saudi Arabia, South Africa, Turkey, United Kingdom, United States, and European Union. All G7 member states are members of the G20. Their names are in boldface.

* Retrieved from http://www.gpfi.org/sites/default/files/documents/G20- Antalya-Leaders-Summit-Communiqu–.pdf May 7, 2016.

† UN resolution A/C.1/70/L.45 incorporates the GGE Norms by reference.

 REFERENCES

Bloom, Les and John E. Savage. “On Cyber Peace.” The Atlantic Council, August 2011, Accessed 3/4/2016 at http://www.atlanticcouncil.org/images/files/publication_pdfs/403/080811_ACUS_OnCyb erPeace.PDF

Boston Global Forum. “Ethics Code of Conduct for Cyber Peace and Security,” December 12, 2015. Accessed 3/14, 2016 at https://bostonglobalforum.org/2015/11/the-ethics-code-of-conduct-for-cyber-peace-andsecurity-eccc-version-1-0/

Nicholas, Paul. “Six Proposed Norms to Reduce Conflict in Cyberspace.” 1/20/2015. Accessed 3/4/2016 at http://blogs.microsoft.com/cybertrust/2015/01/20/six-proposed-norms/

Painter, Christopher. “G20: Growing International Consensus on Stability in Cyberspace.” State.gov, 12/3/2015. Accessed 3/5/2016 at https://blogs.state.gov/stories/2015/12/03/g20-growing-international-consensus-stabilitycyberspace

Valeriano, Brandon and Ryan C. Maness. “The Coming Cyberpeace: The Normative Argument against Cyberwarfare.” Foreign Affairs.5/13/2015. Accessed 3/3/2016. https://www.foreignaffairs.com/articles/2015-05-13/coming-cyberpeace

The 2015 GGE norms are stated in paragraph 13 of “Developments in the field of information and telecommunications in the context of international security,” UN Report A/70/174, July 22, 2015. Accessed 5/7/2016 http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174. The full set of GGE reports can be found at https://www.un.org/disarmament/topics/informationsecurity/

The 2015 G20 norms are stated in paragraph 26 of “G20 Leaders’ Communiqué, Antalya Summit 2015”, November 15-16, 2015. Accessed 5/7/2016 at http://www.gpfi.org/publications/g20-leaders-communiqu-antalya-summit-2015.

“The Ethics Code of Conduct for Cyber Peace and Security (ECCC),” Boston Global Forum, 9/3/2015. Accessed 5/7/2016 at https://bostonglobalforum.org/2015/11/the-ethics-code-of-conduct-for-cyber-peace-andsecurity-eccc-version-1-0/