View Post

Russia’s Vision for a Cybercrime Treaty

Joyce Hakmeh Commentary

In January 2022, the UN will hold the first meeting to negotiate a treaty on cybercrime. While most states are in the process of developing their positions around the scope and the principles of this new treaty, Russia has already submitted a draft proposal to the UN suggesting it to be used as the basis of the negotiations. This draft …

View Post

Cyber Diplomacy in 2021: Mid-term Review

Eneken Tikk Commentary

The spring of 2021 brought two landmark international cybersecurity events: all UN member states lined up behind the final report of the Open-ended Working Group, and the UN GGE of 25 government experts was able to produce a consensus report. These breakthroughs mark the beginning of a more nuanced dialogue and an era in which, to break truly common ground …

View Post

Cyber Norms: Specialisation from Fragmentation?

Evan Burke Commentary

What are the ‘rules of the road’ for cyberspace, and who sets them? The question has risen in prominence and priority as cyber threats have grown more severe. A lack of clarity about acceptable behaviour enables destabilising cyber activity, such as the recent Microsoft Exchange hack by suspected state-sponsored actors and the persistent ransomware attacks targeting hospitals around the world. …

View Post

Southeast Asia in the Global Digital War

Gayathry Venkiteswaran Commentary

China’s push for “cyber sovereignty” in global tech discussions is attracting an audience in regions like Southeast Asia. Here, states and the private sector are ready markets for technologies, but they are also engaged in delicate diplomacy with China and the US against the backdrop of geo-security interests. Understanding the dynamics of the region requires a nuanced critical approach.

View Post

Data Transfers in EU-India Relations

Anna-Maria Osula Commentary

Transborder data flow is the norm in today’s globalised and interconnected world and yields great social as well as economic benefits. Can the EU and India find a common language to ensure the protection of basic rights when processing personal data? The explosive use of technology is transforming our economies and societies. The total amount of data in the world …

View Post

Ritual Reverence to Deterrence in Cyberspace

Maria Mälksoo Commentary

The efficacy of deterrence as a method of conflict management is highly disputed. Yet, deterrence persists as a go-to security strategy and is flourishing in the spheres of cyber and information warfare. The EU is now embracing deterrence and its political appeal to advance its cybersecurity posture. But the prudence of this move remains unproven, and it is counterintuitive to …

View Post

Cyber Arms Control and Risk Reduction

Caitriona Heinl Commentary

Discussions at the UN have revealed that “implementation is currently one of our biggest challenges”. Specifically, states are conscious of the need to translate non-military cyber confidence-building measures (CBMs) into concrete actions that are implementable by all states, thus moving beyond awareness-raising. This is especially the case where CBMs are viewed by bodies such as the EU as a practical …

View Post

Hurdles to Protecting Global Critical Infrastructure

Anastasiya Kazakova Commentary

The ongoing UN dialogues about responsible behaviour in cyberspace have brought hope that a global solution can be reached to ensure peace in the cyber domain. However, there are already obstacles visible on the road ahead. This is particularly true for the overprotection of ICT infrastructure. With growing cyber insecurity amid the ongoing pandemic, it is more important than ever …

View Post

Geopolitics of the Global Semiconductor Value Chain

Jan-Peter Kleinhans Commentary

The semiconductor value chain is highly interdependent, with some areas overwhelmingly dominated by a few companies or countries. Given Europe’s position in the value chain, European policymakers working toward strategic autonomy would do well to consider questions of access, leverage and resilience in addition to ownership. Semiconductors, such as processors or memory chips, are the drivers of the accelerating digitalization …

View Post

A New UN Path to Cyber Stability

Aude Géry Commentary

The creation of a Programme of Action for advancing responsible state behaviour in cyberspace offers a path forward for the elaboration, implementation and monitoring of a framework of responsible state behaviour. It constitutes an interesting evolution and opportunity, borrowing from the advantages of both the GGE and the OEWG without taking on their historical legacies. On 1 October 2020, 40 …