recommended reading

U.S. and Russia among 22 nations supporting international cyber resolution

Russia and the United States are co-sponsoring a resolution to pre-empt cyberattacks that an influential international body is expected to adopt this week, according to a Belgium parliamentary member who introduced the decree. The proposal calls for member nations to exchange information about the way they intend to deploy cyber technology during military conflicts.

Russian support is notable because the former Soviet republic was blamed in 2007 for knocking out Internet access in neighboring Estonia. Both nations belong to the 56-member Organization for Security and Cooperation in Europe. OSCE parliamentarians are gathering this week in Serbia to select provisions for inclusion in the Belgrade Declaration, an annual statement that guides OSCE decisions. The organization, which represents North America, Europe and Central Asia, provides a venue for negotiations on conflict prevention and post-war rehabilitation.

"One advantage of OSCE is that we have Russia as a state," Belgian Parliamentarian Francois Xavier de Donnea told Nextgov in an interview Tuesday. "It is a place where the American and European countries can dialogue with the former Soviet Union and risks can be reduced."

Alexander Kozlovsky, deputy chairman of the Russian State Duma International Affairs Committee, signed the proposed provision, according to de Donnea.

"I think such a resolution could get unanimous support," de Donnea said.

Last month, defense ministers at NATO, which does not include Russia, approved a new policy on cyber defense to help allies protect their communications systems and deter cyberattacks.

Deputy Secretary of Defense William J. Lynn III said shortly after passage, "NATO is unanimous in acknowledging the need to elevate its treatment of network security," adding that the new strategic concept the alliance adopted last November "names cybersecurity as a leading priority for NATO in the 21st century."

But De Donnea said the ideal forum for worldwide discussion of cybersecurity threats is the United Nations.

"If the OSCE succeeds in conducting dialogues between states on norms in cybersecurity. . . it would be a major step toward a more global approach, which would be promoted by the United Nations," he said. The U.N. and OSCE do not share a budget but coordinate closely on field operations.

Last week, Homeland Security Secretary Janet Napolitano said she believes the OSCE can play a meaningful role in forming international measures for state behavior in cyberspace, but she was not specifically addressing the resolution at the time, aides said Tuesday.

"We welcome consideration of the establishment of a cybersecurity unit within the OSCE secretariat with existing resources and look forward to discussing this in more detail with other OSCE participating states and partners," she said during remarks at a joint meeting of the OSCE Permanent Council and OSCE Forum for Security Cooperation in Vienna.

Separately, the White House in May distributed a voluntary international strategy for cybersecurity that, like the OSCE proposal, urges cooperation in developing standards for acceptable conduct on the Internet.

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.