Cyberspace Cooperation

The Global Cooperation in Cyberspace Initiative seeks to reduce conflict, crime and other disruptions in cyberspace and promote stability, innovation and inclusion.

Learn More

International Pathways to Cybersecurity

Overview

As part of the seventh annual Worldwide Security Conference, EWI will convene a special one-day consultation, International Pathways to Cybersecurity, on February 17, 2010. The consultation, to be held in Brussels, will assemble leading officials, specialists, business leaders and other public figures to understand, communicate and stimulate breakthroughs in international dialogue about Cybersecurity.

Partners in our cybersecurity initiative include the Financial Times, Dell and Deloitte.

The consultation is an invitation-only event for high-level participants. If you would like to participate, please contact us for more information.

 

EWI Leadership Tapped for Cybersecurity Summit

Overview

The Reliability of Global Undersea Communications Cable Infrastructure (ROGUCCI) Global Summit is convening leading scientists and engineers, the financial sector and other stakeholders to better understand the world's dependence on the connectivity between the continents. EWI Distinguished Fellow Karl Rauscher and Cybersecurity director Vartan Sarkissian are serving on the summit committee. EWI Chairman Francis Finlay and John Edwin Mroz will speak.

Nearly all international electronic communications traverse the sub-sea fiber optic web that crisscrosses the globe. The world has become highly reliant on this connectivity for daily operations of governments, businesses and individuals. "While technologists have made heroic advances in improving the performance of these systems, the relative pace of international cooperation has lagged in key areas," said Karl Rauscher, General Session Chair and EWI Distinguished Fellow.

The Summit, sponsored by the IEEE, the world's largest technical professional association, will include discussion of the international agreements needed to improve the stability of the submarine fabric that underpins cyberspace.

Click here to learn more about the IEEE ROGUCCI Summit

Critical Infrastructure Protection

Overview

The third meeting of EWI's Consortium on Security & Technology focused on critical infrastructure protection, including: physical resources, services, and information technology facilities, networks and infrastructure assets which, if disrupted or destroyed, would impact the health, safety, security and economic well-being of citizens and the ability of governments to function effectively.

Towards Rules for Governing Cyber Conflict

First Joint Russian-U.S. report on Cyber Conflict

The EastWest Institute released the first joint Russian-American report aimed at defining the “rules of the road” for cyber conflict.  Prepared by a team of Russian and U.S. experts convened by EWI, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace explores how to extend the humanitarian principles that govern war to cyberspace.

“Today, nearly all critical civilian infrastructure is online, from the electricity grids that support hospitals to the systems that guide passenger planes through the air,” says EWI Chief Technology Officer and Distinguished Fellow Karl Rauscher, who led the U.S. experts group.  “And, by and large, it is not protected by international norms.”        

Rauscher and Andrey Korotkov, the leader of the Russian experts group, are the principal co-authors of the report.  They led the cyber and traditional security experts through a point-by-point analysis of the Geneva and Hague Conventions. Ultimately, the group made five immediate recommendations for Russian and U.S.-led joint assessments, each exploring how to apply a key convention principle to cyberspace, each focused on a crucial question:

  • Can protected critical humanitarian infrastructure entities be “detangled” from non-protected entities in cyberspace?
  • Just as a Red Cross designates a protected entity in the physical world, is it feasible to use special markers to designate protected zones in cyberspace?
  • Should we reinterpret convention principles in light of the fact that cyber warriors are often non-state actors?
  • Are certain cyber weapons analogous to weapons banned by the Geneva Protocol?
  • Given the difficulties in coming up with an agreed definition for cyber war, should there be a third, “other-than-war” mode for cyberspace?

In the report, the five joint Russian-U.S. recommendations also include essential background information, required commitments, benefits of implementation, next steps and measures of success.

“Our hope is that these recommendations will provoke a broad international, cross-sector debate on the very hot topic of cyber conflict,” says Korotkov.

The report is the first product of an ongoing EWI Track 2 bilateral program that seeks to open dialogue, build sustainable trust and have a positive impact on cybersecurity. In addition to engaging Russia and the United States, EWI is also working with a range of experts from the Cyber40, the world’s most digitally-advanced countries. Next up?  Bilateral and multilateral working group sessions to implement the recommendations, followed by the Second Worldwide Cybersecurity Summit in London in June. 

“We do this work very much in the spirit of the reset,” says Rauscher. “These recommendations carry great potential for engaging the international community, because when Russia and the U.S. speak together, the world listens.”

Click here for the wide media coverage of the report.

Скачать текст на русском.

Mobilizing for International Action

Against the backdrop of new revelations about cyber attacks and espionage, the EastWest Institute released a report on the Second Worldwide Cybersecurity Summit: Mobilizing for International Action, which drew more than 450 government, industry and technical leaders from 43 countries to craft new cybersecurity solutions.

“Cyber threats have taken on a new dimension over the last year, from Wikileaks and Stuxnet to large-scale theft of customer data,” said EWI Vice President Greg Austin, who leads the initiative. “At the summit, government and business leaders emphasized that, despite new countermeasures, we are not winning the war on cyber crime. We need stronger policies to protect our digital economy.”

Held in London on June 1-2, the summit was a part of EWI’s ongoing worldwide cybersecurity initiative, which builds international, private-public partnerships to protect cyberspace.

The report details the work of small international “breakthrough groups” of experts pursuing practical steps for everything from securing the undersea cables that carry over 99% of intercontinental Internet traffic to ensuring emergency communications after disasters. 

“These groups have made concrete progress towards innovative cyber solutions,” said EWI’s Chief Technology Officer Karl F. Rauscher. In particular, he says, he is encouraged by private sector commitments to explore the default inclusion of software in network equipment that would enable government-authorized users to make priority calls.  

The report also outlines the direction of EWI’s cybersecurity initiative in the months leading up to the Third Worldwide Cybersecurity Summit, to be held in New Delhi in October 2012. In addition to follow-up meetings of the breakthrough groups, bilateral dialogues will continue between Russian and U.S. experts on charting “rules of the road” for cyber conflict (the group has already produced an attention-getting report). Talks will also continue between Chinese and U.S. experts, whose report on reducing spam was released at the summit.

“EWI’s China-U.S. bilateral report on Fighting Spam to Build Trust is a rare breakthrough in international cooperation,” said IEEE Communications Society President Dr. Byeong Gi Lee. IEEE was the summit’s technical co-sponsor.

The summit report shares insights from a range of high-profile participants, including Sir Michael Rake, Chairman BT Group plc, who warned about cyber technology arms race, and Microsoft’s Corporate Vice President of Trustworthy Computing Scott Charney, who spoke about the challenges of securing the global cyber supply chain.

Founded in 2010, EWI’s cybersecurity initiative has gained the support of the United States, Chinese, Russian and Indian governments, among other members of the Cyber40, an informal grouping of the world’s most digitally-advanced nations. Its corporate sponsors include AT&T, Microsoft, Deloitte, BAE Systems, Goldman Sachs, Huawei and Vodafone.

EWI President John Mroz credits this unusually high-level, diverse international participation to a recognition of the urgency of the cybersecurity threat and the need for the policy, business and technology communities to forge solutions.

“The largest roadblock to cyber solutions is a lack of trust,” says Mroz. “EWI’s trademark for three decades has been bringing the people who need to work together into the same room to craft solutions to particular issues of common concern. Nowhere is this needed more than in the cybersecurity arena.”

Click here for more information on the 2011 Second Worldwide Cybersecurity Summit in London

EWI’s Worldwide Cybersecurity Initiative is made up of a diverse group of professionals, ranging from top government and military advisors to business and technical consultants. If you are interested in contacting one of our cybersecurity experts, please e-mail us at communications@ewi.info

Building Trust in Cyberspace

The EastWest Institute released Building Trust in Cyberspace, a report featuring highlights of its 3rd Worldwide Cybersecurity Summit held in New Delhi on October 30-31, 2012. More than 300 participants from 22 countries heard from cyber experts from across the globe representing both the private and public sectors. 

Many of the participants emphasized the importance of the conference's location. "We are all in the room today because we recognize that India is an essential partner on cybersecurity," said Ross Perot, Jr., chairman of the EastWest Institute.

The report contains results of an informal poll of participants, where 93 percent expressed the view that the cybersecurity risk is higher than one year ago. A preview of EWI's 4th Worldwide Cybersecurity Trustbuilding Summit, which will be held in Silicon Valley in 2013, is also included.

High-ranking Indian officialsamong them, Deputy National Security Advisor Latha Reddy and Secretary R. Chandrashekhar of the Department of Telecommunicationsnot only participated in the summit but also helped frame key issues on the agenda. In addition, EWI partnered with the National Association of Software and Service Companies (NASSCOM), the Federation of Indian Chambers of Commerce and Industry (FICCI) and the Data Security Council of India (DSCI), which sponsored three breakthrough groups. The topics were chosen in consultation with the Indian government and private sector leaders. 

Key summit sponsors included Deloitte, Goldman Sachs, Huawei, Knightsbridge Cybersystems, Microsoft, Reliance Industries Limited, Stroz Friedberg, and Vodafone. (For a full list of sponsors, see the opening section of the report.)

Top authorities from both industry and government agreed that the rapid pace of technological change has triggered a corresponding leap in exposure to vulnerabilities that can be exploited by cyber criminals. This has also raised fears about government intrusion that could threaten privacy and individual freedoms. 

Michael Chertoff, chairman of the Chertoff Group and former U.S. Secretary of Homeland Security, pointed out how complicated many of these issues have become. "You cannot have privacy without security," he said, while acknowledging the legitimate fears that some governments will attempt to control Internet content.

Building Trust in Cyberspace illustrates how, as was the case with the previous summits in Dallas and London, the New Delhi summit helped spur the process of producing concrete recommendations for industry and government. If implemented, those recommendations will help make cyberspace and the real world more stable and secure. 

Click here for video highlights of the summit.

For information on the 3rd Worldwide Cybersecurity Summit, please visit www.cybersummit2012.com

Cyber Detente Between the United States and China

Click here to download a Chinese translation of this report (prepared by the Center for National Security and Strategic Studies at the National University for Defense Technology in Changsa, Hunan)

It’s no secret that the United States and China have a contentious relationship when it comes to their cyber capabilities and intentions. But according to a new report released by the EastWest Institute, these two countries have common cyber concerns that could bring them to the table to lay the groundwork for diplomatic exchanges and solutions, avoiding an escalation of aggressive strategies from either country.

In Cyber Detente Between the United States and China: Shaping the Agenda, co-authors Greg Austin, EWI professorial fellow, and Franz-Stefan Gady, EWI associate, point out that through Track 2 processes some very useful preparatory work has already taken place. However, they argue that the diplomacy—both official and unofficial—needs to be more intense, to cover more concrete problems and to involve a larger number of people on both sides, especially from the military and private sector. The paper calls for a fresh appraisal of the impact of both countries’ military cyber policies.

“We should have no illusions that the two countries will agree quickly to a set of military confidence building measures in cyberspace,” said Austin. “But there is some room to lay the foundations to begin to bridge the bilateral divides by addressing issues that are closer to the civilian domain rather than exclusively military.

The paper recommends three specific proposals: a joint study on both countries’ critical information infrastructure; inclusion of China in the existing infrastructure of the 24/7 Network of Contacts for High-Tech Crime of the G-8; and reaching a common understanding of what constitutes cyber espionage.

“The challenge here, among many, is to deepen the conversations and reduce mistrust through enhanced transparency and predictability,” said Gady.

The release of the report coincides with the convening of the Third Worldwide Cybersecurity Summit in New Delhi on October 30-31, where leading experts will discuss these and many related issues. The first Worldwide Security Conference took place in Dallas in 2010, and the second in London in 2011.

For information on the 4th Worldwide Cybersecurity Trustbuilding Summit, please visit cybersummit.info.

Priority International Communications

During recent tragedies like Japan’s tsunami and nuclear meltdown in 2011, the London bombings in 2005, and the 2008 Mumbai and 9/11 terrorist attacks, some critical communications failed to make it through congested networks. According to a report released today by the EastWest Institute, Priority International Communications (PIC) capability is needed to help prevent the loss of lives and property in such crisis situations.

 
Based on inputs from leading telecommunications industry experts, the report sets forth straightforward steps needed to set up an international capability for both government officials and private sector leaders. As emerging networks’ technologies and services continue to demand greater and greater bandwidth, these congestion scenarios will likely occur more frequently.
 
“Surprisingly, only a few countries have national priority-communications capability in place,” said EWI Chief Technology Officer Karl Rauscher, a co-author of the report. “There is no international system for giving important calls priority. This is a missed opportunity, particularly as standards-based technical solutions have existed for the past decade.”
 
The report presents four immediately-actionable recommendations that, if implemented, would allow government-authorized users to communicate even when networks are jammed. These authorized users include public or private sector individuals with critical roles in times of crises. They are critical infrastructure operators (communications, energy, financial services and transportations); public safety officials (healthcare, local government, emergency management) and individuals with national security responsibilities.
 
Stuart Goldman, co-author of the PIC report, stressed that both the private and public sectors must champion the need for functional international communications in emergencies. “A PIC capability could make the crucial difference between whether or not life-sustaining functions are operating during a major crisis, when public networks are most congested,” he said.
 
The release of the report coincides with the convening of the Third Worldwide Cybersecurity Summit in New Delhi on October 30-31, where leading experts will discuss these and other key recommendations. The study is based on consultations that have occurred during and after two previous Worldwide Cybersecurity Summits—the first took place in Dallas in 2010, and the second in London in 2011.

The Internet Health Model for Cybersecurity

The Internet puts people, systems, and networks in constant contact worldwide, and it needs a global, coordinated effort to protect digital systems from online threats—just like the public health community’s efforts to defend our bodies from illness.

That’s the argument of a new report released by a team of experts convened by EWI and sponsored by Microsoft Corporation. The report examines how the model of international public health can inform efforts to track and block malware and other malicious actors.

“For years, we have talked about computers being infected by viruses,” said EWI President John Mroz. “With this breakthrough report, we have the opportunity to treat the health of the entire Internet as a shared problem needing cooperative solutions.”

Cybersecurity problems like malware, botnets, and vulnerabilities need to be monitored and analyzed, the paper argues, just like the U.S. Centers for Disease Control and the World Health Organization monitor epidemic and study pathogens. Just as hand-washing and immunization can help prevent illness, education about threats to computer systems and measures to defend them have broad application.

“A public health model encompasses several interesting concepts that can be applied to internet security,” said Scott Charney, vice president of Trustworthy Computing at Microsoft. “As use and reliance on the Internet continues to grow, improving Internet health requires all ecosystem members to take a global, collaborative approach to protecting people from potential dangers online.”

Contributors to the report included experts from numerous countries, representing universities, telecommunications companies, government computer emergency teams, and think tanks, among other groups.

The public health model isn’t a perfect fit, the authors note. Computers have no naturally occurring immune system, for example, and human viruses don’t attack on purpose. Still, the study finds that the systemic perspective of public health provides useful suggestions for how to promote Internet health.

This study of Internet health is part of a broader program of EWI-sponsored groups who gather to build concrete recommendations to solve prominent cybersecurity problems. Among others, the groups have produced already-released recommendations to increase the reliability of undersea cables and forthcoming research on international priority communications—systems that allow emergency services to operate when communication networks are overloaded, such as during a natural or national security disaster.

After successful meetings in Dallas in 2010 and London in 2011, the EastWest Institute’s Worldwide Cybersecurity Initiative will hold its third Worldwide Cybersecurity Summit in New Delhi in October 2012.

Pages

Subscribe to RSS - Cyberspace Cooperation