Plenary session on international law and norms

6 Jun 2024 12:00h - 13:00h

Table of contents

Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.

Full session report

Delegates seek common ground on international law’s application to cyberspace

During a multilateral discussion on the application of international law and norms to cyberspace, delegates from various nations convened to explore common ground and address divergent views. The primary focus was on the relevance of international law, including the UN Charter, international human rights, and humanitarian principles, to both the offline and online worlds. Delegates acknowledged the applicability of these laws to cyberspace, underscoring the importance of principles such as state sovereignty, equality between states, non-interference, the right to self-defense, and the peaceful settlement of conflicts.

Despite the consensus on the general applicability of international law to cyberspace, the assembly was divided on the necessity of a new binding international instrument specifically tailored to cyber activities. Some delegates expressed concerns about the rapidly evolving nature of digital technologies and the potential burden of additional obligations on states, which are already party to numerous international instruments. Instead, there was a call for deeper discussions to enhance understanding of how existing international law applies to cyberspace.

The conversation also touched upon the voluntary norms of responsible state behaviour in cyberspace. Delegates recognised that these norms could contribute to reducing security risks. The United Nations Governmental Expert Group and the United Nations Open-Ended Working Group had identified 11 such norms, providing a solid foundation for further work. Delegations were invited to engage in discussions on the implementation of these norms and the potential necessity of defining additional voluntary norms.

Capacity building and confidence-building measures emerged as key priorities, particularly for developing nations that may lack the resources to fully engage in cyberspace governance. Delegates proposed a range of concrete measures, including the establishment of national cybersecurity operations centres, training for cybersecurity experts, sharing information on cyber threats, and promoting the use of reliable cybersecurity technology.

Gender balance in delegations and the inclusion of African perspectives in global cybersecurity dialogues were particularly emphasised, with a call for more women to be involved in negotiations to ensure a gender-balanced perspective. Additionally, there was a proposal for the implementation of a framework for sharing different views and concerns on issues related to international law and voluntary norms, aimed at identifying differences and exploring possibilities for convergence and harmonisation.

The session concluded with a sense of cautious optimism as delegates looked forward to furthering these critical conversations, with the chair encouraging delegates to continue seeking common language and understanding in the ongoing discussions.

Session transcript

Chair:
So let’s get started. The lunch time, 1300 hours, is on international law and norms. We have opened a list of speakers. You don’t need to come to register yourself. It’s enough to raise your name plate. At the same time, the chair encourages a free-flowing discussion, much like the one we had during the panel that we had this morning. The idea, obviously, is to find common language that can enjoy consensus, a common understanding, so that we can perhaps agree on a position on language and paper that can enjoy consensus. So with that said, the floor is open for any requests of the floor. with an aim to find that common ground that may unite us within these two areas that we have at this time which are international law, how it applies, and not deflorism. Chair recognizes the distinguished delegates of Green.

Team Green:
Thank you very much, Mr. President, for giving me the floor. My delegation would first like to share the following remarks on the application of international law and the non-contradictory voluntary norms of responsible behavior of states in the civil space. Regarding the first point, my delegation recognizes that international law, including the UN Charter, in its entirety, international human rights, international human rights, apply to cyberspace. Consequently, the principles of state sovereignty, of equality between states, of non-interference in state affairs, of right to self-defense, of peaceful settlement of conflicts, of respect for humanitarian principles, are all applicable, both in the online world and in the online world. However, we do not consider it pertinent to go towards the development of a new juridically binding instrument for cyber activities. There are two reasons why we have such conviction. First, we have mentioned several times the evolutionary nature of digital technologies. This character makes it difficult for any effort aimed at resuming cyber activities by an international treaty. Secondly, the development of new legal instruments will inevitably create additional obligations for the States, which, as you know, are already part of several other regional and even sub-regional international instruments. So, given these two aspects, we should rather deepen our discussions in order to achieve a better understanding of the way in which existing international law applies to cyberspace. In other words, positive international law contains sufficient rules on how to designate cyberspace and we should simply deepen discussions to see how these rules are applicable to cyberspace. Mr President, regarding the voluntary and non-contravenous norms of responsible behaviour of States, we assume that they can, due to their voluntary nature, contribute to the reduction of security risks in cyberspace. The Governmental Expert Group and the United Nations Non-Limited Working Group have already identified 11 norms of responsible behaviour of States, which is already a good basis for our work. We therefore invite delegations to deepen discussions on the ways in which to implement these norms and, if necessary, on the need or not to define additional voluntary norms. Mr President, I would now like to insist on the importance… capital to revitalize multilateralism, but also to promote more what we have just called multipartyism. Indeed, around the member states, the regulation of the cyber space requires the contribution of other actors, such as regional and sub-regional organizations, the digital economy, the academic world, and civil society. In addition, our country proposes the implementation of a framework of sharing different views and concerns on issues related to international law and voluntary norms. This will allow us to identify our differences on these issues, but also to explore the possibilities of convergence and harmonization of our respective productions. And we could even be inspired by the experiences in force, which consist, how to say, of establishing notification tools for the state’s annual reports to increase transparency in the sector, i.e. on the basis of what is being done regarding, for example, light and small-caliber weapons. There is a system of annual or bi-annual reports, which means that states can take into account their activities in the cyber space. This is a way to strengthen confidence and transparency in the cyber space. My country remains actively engaged in this field and will initiate in the coming weeks visa initiatives to achieve a third approach. I would like to thank you for your attention.

Chair:
appointed. Ideas expressed following delegations who jump in may decide to directly address some of the ideas that are expressed, including by the delegation of grey and the ones that come. I think that is the best way for us to try to find that common language when we try to find where that commonality is, where we explore it together. The chair now recognizes the distinguished delegates of the Green. You have the floor.

Team Green:
The States have the right to transform the cyber attack into a battle. Mr. President, my delegation welcomes and congratulates the extension of the principles of sovereignty on the ground. My delegation urges the members of the public to support the creation of a new international instrument. The main reasons are the lack of agreement on the terminology of life, on the topology of information and publication, and on the rights and obligations of the States. The existence of non-regulatory questions or refusals of international law, as well as a greater re-government of states, are the main reasons for the extension of the principles of sovereignty on the ground. of the new rules must be constantly being elaborated. Mr. President, we have therefore presented this resolution to formulate new rules for the security of data at the exit of cyberspace. Also, in this regard, my delegation salutes and congratulates the co-parliament of the Russian delegation, which also calls us to be promoters and the other delegations to co-parliament this resolution. We firmly believe in our global initiative on data security. The GCCNL must put in place the framework in a general way for the adoption of policies and formulas in a public and interoperable way on a global scale for the security of access to our data, and that we need to increase our cooperation through effective technologies. Congratulations.

Chair:
We are starting to face some areas of divergence. Thus, the chair encourages delegations to try to find, as the delegate really properly put it, how to bridge those gaps. So with that, the floor is open for any other requests.

Team Yellow:
Thank you, Mr. President, for your kind words. In addition, the elements of my delegation have just been discussed at the beginning, and we would also like to point out that it is good to have international rights, and we would also like to point out that it is good to have international rights, the measures and the strengthening of capacities in the same framework. But it would also be better to think about the infrastructure for the facilitation of cybersecurity, that is, the institutional framework, the judicial and other institutions. Thank you. Thank you. It requires us all to think out of the box. It requires that we do something out of the common way of doing things. And what is this common way of doing things? The provision has been given to all but 11 norms of state responsibility. For this level of state responsibility, my delegation take note that we take time for it to be internalized, to be accepted, to be implemented to some extent that will affect the changes we need. And now, while my delegation is really underscoring that international law is very important, and then taking note of the fear of sovereignty, the fear of those who have fear of the sovereignty to be ceded, we are proposing as a matter of urgency for what we call the supranationality particularities. We will explain it, supranational particularity, but our proposition is that the 11 norms of responsible state behavior, including the provisions of the law of international law, and these principles of international law regarding the outer space, our cyber security, which include the use of force, use of the human right, human right attribution and due process, and so on and so forth, should be merged with these 11 norms, and then be separated as a convention, as we say in the morning, and give it the right of supranationality. This is what we know how to do. This is what we need in this domain, and we all are sent to it, and that law guides us. If we agree on this particular issue, we are not taking up the pigeon on the union of sovereignty. It is for us, for our safety, our common safety, global common safety. We extract this law, and then we regiment them for implementation, rather than leaving them all as norms. Norms will never help us. We support it, it is good, but we want to make it very stronger. We are not advocating for a new law, but we are emphasizing the need for us to go to what we are, the basis, and then reinforce it. Thank you, Mr. Chair.

Chair:
Thank you very much, Distinguished Delegate of Yellow. It seems that immediately this has activated the thinking of the Delegation of Pink, perhaps, in response to this, Distinguished Delegate of Pink.

Team Pink:
Once again, on behalf of our team, we would like to say thanks for the privilege of affording us to share our thoughts and to make some recommendations based on what we catalog in our presentation. On behalf of our team, we would like to present five cutting-edge points to your good office for consideration and elevation to the United Nations. One has to do with the implementations of existing norms. We see that committing actively to implement the 11 rules, norms, and principles of responsible state behavior in cyberspace to protect critical infrastructure and enhance cyber security across Africa. Two, the development of new norms. Remain open to developing new norms to address emerging cyber security challenges unique to African states, while also focusing on existing legal framework. Thank you. our international corporations and exchange of views. Advocating for the United Nations and ECOWAS to serve as the primary platform for MemoState to identify specific topics for further discussion, ensuring African perspectives, and integral to global cybersecurity dialogues. Number four, capacity building and assistance. Supporting the development of checklists to assist enhancing the ICD security infrastructure, particularly importance for African countries with limited resources to effectively implement international cybersecurity norms. Last but not the least, the inclusions of diverse perspectives. Pushing for the inclusion of experts on regional organization, businesses, NGO, academia, and OEWG discussions to ensure equitable geographical representations and diverse expertise in shaping the national cybersecurity laws and law. Thank you.

Chair:
Thank you very much, Mr. Ntlaligat for these points. We are going to an area of several ideas being on the table. Chair encourages us to start now thinking where the bridges are as we go forward. Before that, the Chair recognizes the extension of Orange, if you have anything to say.

Team Orange:
Thank you, Chair. The ECOWAS region and all other regions is subject to the application of international law. national law and norms in the context of cyber threats and security. This includes the principles of responsible states’ behavior in cyberspace, the prohibition of indiscriminate attacks, and the obligation to put in place effective measures to protect civilian populations from the dangers of military cyber operations. It is important for ECOWAS member states to actively participate in international processes, such as the United Nations Open-Ended Working Group. Capacity building and dialogue on the application of international law to ICTs are crucial to enable and empower states, particularly those in the developing world, to express their informed views on the subject. In this regard, the Orange Group will highlight some key areas. It deems essential to this thematic area. There is a need to intensify international cooperation to clarify international law better. The contribution of regional perspectives is important for a holistic understanding of the subject. States need to fulfill their obligations of due diligence through the sharing of information, in particular between response teams, certainty sets, and the events of a computer emergency. There is a need to support the implementation of digital tools or platforms and to invest in research and development with a view to promote the peaceful resolution of disputes. There is also a need to support capacity building in developing and de-developed countries, both at the political and technical levels. The Orange Group would like to emphasize that voluntary norms would not exempt states from their international obligations, nor should they violate them. they create obstacles to international cooperation or the transfer of technologies? The voluntary rules do not replace or alter states’ obligations under international law. Thank you, Mr. Chair. Just to also add, I would like to encourage all member states to have a gender balance in the nominations of their respective delegates. I say this because I happen to be the only female amongst the participants, and we should try to involve more women at these negotiations to have a gender balance perspective. Thank you.

Chair:
Thank you very much for reminding us of that, and not just that, but also reminding us that we need to have that gender consideration as we draft that common language, and we need to put that in that final language. Thank you very much, Distinguished Delegate for the Forum. Chair now recognizes Distinguished Delegate for the purple.

Team Purple:
I would like to start our first presentation. Madam Vice-President, Distinguished Guests, my delegation would like to first of all support the strong proposal of integrating gender in the delegations, and my delegation would like to assure that in the next session the delegation will be here with respect to gender. Mr. President. Ma délégation soutient qu’en plus des accords et conventions existantes. Les États doivent avoir la liberté de nouer des accords afin d’accouvrir la stabilité et la sécurité dans l’utilisation d’éthique. Cela leur permet également de favoriser l’échange d’informations, les exercices conjoints, les réponses coordonnées aux supermenaces. Sur cette question, d’ailleurs, la délégation de PINC a fait une forte proposition que, également, nous voulons soutenir et pensons, après cette session, à pouvoir fortement collaborer avec eux afin d’atteindre une bonne application des normes internationales. D’ailleurs, sur l’application de ces normes convenues, ma délégation voudrait proposer le renforcement des capacités, le renforcement des capacités nationales d’attribution des incidents et des réponses à ceci, la réalisation d’exercices de gestion des crises d’origine cyber et le développement de l’expertise technique nécessaire pour partager les connaissances sur les menaces émergentes. Monsieur le Président, ma délégation voudrait rappeler, lors de sa première prise de parole, que l’échange d’informations et le renforcement des capacités constituent des points essentiels de négociation, car nous pensons que les états en voie de développement ne devraient pas être exécutés par un manque de capacités et que, I think that all the states of the IJNU should help them, should show more solidarity so that these states can have the necessary capacity to be at the same level of training, to have the capacity to react to other countries in order to deal with cyber threats. My delegation proposes the integration of agreed standards into national policies and strategies on cyber security and to think of concrete measures to implement them. At this point, the orange delegation has done well to propose the application of the agreed standards. And I would like to remind you that my country supports that all the standards that are agreed should be applied and should be taken into account in national strategies. And we are convinced that the CDAO will make the necessary arrangements so that these member countries can apply the standards that will be agreed by the IJNU. Distinguished delegated information channels between our member states are crucial to ensure the maintenance of stability and security in the use of TICTU. And to achieve this essential objective, which aims to improve better practices, my delegation will support any initiative aimed at improving collaboration on the protection of critical infrastructures and cooperation between alert and response teams to cyber attacks. Here is the economy of our proposals. to the President, here is also our wish to collaborate with all countries in order to once again strengthen the capacities of all countries, in order to exchange information and to share the best practices in terms of response, but also in order for the norms that will be convened here to find an application at the national level and taken into account in our national strategy. Thank you very much.

Chair:
Thank you very much, Distinguished Delegate from PURPLE. Is it possible, dear colleagues, to start having some early participation? Is it possible to agree on such statements as something that we’ve already agreed on and see how we can build on it? International law applies to cyberspace. Is that something as a statement that is acceptable to all delegations? We’re not closing the discussion here, obviously, nothing is agreed until everything is agreed, but it seems to the Chair that there are some early harvest yields here at the beginning. Does this statement enjoy something that would be supported by all? The Chair thinks that PURPLE is first to be followed by GREY, PURPLE or PURPLE-Yamaha.

Team Purple:
Thank you, Mr. President. I would like to strongly support your proposal on the application of the agreed norms and that we must all accept that if a State negotiates, signs and ratifies a Convention, its internal application should not pose a problem. I would like to strongly support this position and ask all the distinguished delegates to be able to go in this direction to gain some time. But I would also like to remind you that almost all of the delegations have also made the sharing of capacity reinforcement an essential element in their speech. So, in addition to the application of internal standards, we should also validate capacity reinforcement. Thank you.

Chair:
Thank you very much, distinguished delegate. We’ll get to capacity building during the next plenary session, which is planned for after lunch. But for now, it’s good to hear, as you say, that there are areas of early parts, areas where there is convergence. Distinguished delegate Grey, you have the floor.

Team Grey:
We are all in agreement on the need to put them at the national level. We are also in agreement on the application of the current international law, the United Nations Charter, the International Human Rights Act, etc. So, as many points of convergence between our delegations. Now, there is one point on which we do not yet have consensus. That is, should we start negotiations on the development of new instruments? juridique internationale, c’est-à-dire une convention internationale générale, globale, sur la cybersécurité. Donc, je trouve qu’actuellement, à l’heure où nous sommes, on est sur le point sur lequel nos délégations n’ont pas encore trouvé un consensus. Merci beaucoup.

Chair:
Thank you very much, Distinguished Delegate de Grey. I wanted to start where we seem to be drawing on consensus and hope to build on that. And thank you for broadening it slightly. The Chair’s suggestion was to say international law applies to cyberspace. You reminded both the Chair and the colleagues that we can broaden that to say international humanitarian law applies, international human rights law applies within that segment. So let’s put into kind of a close with the safe zone this statement that international law applies to cyberspace, and propose as well that we have a follow-up sentence that expresses that all these other areas of international law also apply to international human rights law. With perhaps just reading the room by nods of the head, it’s not necessary to perhaps take, or can the Chair take this to be the case that there is also agreement to complement this statement that international law applies more with a broader statement that international human rights law applies, international humanitarian law applies. Is this something that can enjoy consensus once we get to it? Chair, I recognize that you’re trying to get yellow.

Team Yellow:
Yeah, thank you, Mr. Chair, Vice President, thank you very much. We are striking a balance very seriously. All of that have a link with the cyberspace, humanitarian law, international law, as the case may be. When you read, take note of the principles, use of force. human rights, and so on and so forth, they are all related when it is being interpreted in a generic way, so it applies. However, our concern is that the norms which distinguished delegate of Gray mentioned too. If you look at specificity, the norms seem to speak to cyber security in terms of the gravity of this issue. And therefore, we’re not talking about a rewrite of the law, but we’re making an appendage to the law, an appendage. Accepting all that international law talks about it, we don’t make an appendage to say, okay, we refer to we refer to, where is the document? Sorry, my delegation. Okay, we refer to those 11 norms, you know, by just a statement or by which my delegation is thinking of sponsoring. We’re going to sponsor a statement on that within this assembly for us to consider an addition, just not an addition, let me be very specific. It’s just an appendage to what we’ve agreed on international law with regard to the principles already highlighted that we include all of these norms under it, not like a norm now. But an appendage to what has been agreed for it to receive stronger possibility, you know, stronger possibility, because everything about cyberspace now is pushed into these seven norms. And we don’t want the norms to stand the way it is even as we respect it, but we want it to be attached as a law. Thank you, Mr. Chairman.

Chair:
Thank you for bringing in that, because that was indeed the Chair’s intent to bring in a statement and consider if there is a common understanding, how we view norms. And it is the Chair’s belief that norms are a part of that international law discussion. Now it’s a matter of how we train the language, and specifically on those 11 norms that have been suggested. So the floor is open exactly on this. How do we find common ground? in formulating this body’s or those bodies’ view on norms. Do you recognize this thing or something?

Team Grey:
Thank you very much, Mr. President. Concerning the norms, I think we should first recall their voluntary nature. They are not contraindicated norms, in any case, justifiably contraindicated, but norms of conduct, in a way, that have a voluntary nature. It is different from the rules of international law, which have a justifiably contraindicated nature. So, for me, we could limit ourselves to the appeal that was made during the previous works, and which is the consensus of all States, that is, voluntary norms of responsible conduct of States in the civil space. Thank you very much.

Chair:
Indeed, thank you very much for reminding us of thisdistinguished delegate of grey. Any time we’ve mentioned these norms, we have emphasized as well their voluntary nature. Some delegations have expressed greater interest in implementing them, both internationally in some form, but certainly nationally. But is this something that can fly, as it were, in delegations, to emphasize, well, you say the norms, their voluntary nature, put it in front of them, that will never affect it? There is mention. Again, this seems to be something that could be,distinguished delegate pink for some examples.

Team Pink:
Once again, thank you, Mr. Chair, for affording us the opportunity. Yeah, our team, we have observed some few, I mean, few of the norms that contravene our culture and the norms of Africans. But the issue of respect for human rights and privacy to the supply chain and security, if you observe, In Africa, we have a unique culture. We have a unique system, and we are doing things for the funding of our nations until human rights came into being. But you’re not taking into consideration human rights. I said that our agriculture cannot implement certain things or implement certain rules. One, the disciplinary aspect of our case, our culture that have to do with training, that have to do with the power in the society, for both boys and girls. We, our team, have looked at the human rights in law five. It’s actually contravening our African culture, which have to be looked at and discussed among Africans to find a better way to fit in our society. One, our culture state, a lady must go to our tradition, which train you, teach you how to behave, how to, I mean, it gives you a good upbringing. For human rights, it’s a bad practice. You want to look at the pre-manipulation aspect, and that of the male circumcision aspect, and you forget about the educational aspect of our traditional norms. So we think UN norms, number five, actually contravening that aspect of our culture, which have to be looked at very critically in regards and be discussed among Africans to find a better way to address this, to fit in our society. Number nine, we speak about ensure supply chain security. If you observe more African nations, because of the lack of funding, the lack of human capacity, and the lack of infrastructure development, most African countries are lacking in health. And we are now discussing issues of. cyber security and insurance supply chain security. So this aspect also to have to be looked at and discussed among Africans to see what they have. Because if you don’t know what we have, we cannot fit in norms number nine. And when you also look at norms, UN norm number 10, report asking for vulnerabilities. You will observe that many African nations, our government and that of the private sector, they run, did not even run a parallel system. Everybody run an independent system. Our government, they are not taking responsibility of how things flow in and things flow out. The private sector is among most countries the private sector controls how things flow in and flow out. So I think this norm number 10 have to be discussed, look at what every perspective of African and sectors. We should not look at those developed countries and then we just categorize everywhere and think that it fit every way. Secondly, can we also consider norm number seven in the UN norms? That speak about project critical infrastructure. If you will observe, many African nations do not even have alternative for saving electricity. Many African nations are not financially you know, potent to sustain infrastructure. How can they develop a well protected infrastructure that will ensure that UN norm number seven fit in the most African nations? So I think with this, UN norm need to consider some funding, it had to be discussed, visit some African nations and see what they have and see what they can improve upon and then- reverse to norm number seven on the UN Charter. And if you look at norm number 11, no harm to emergency response team. No harm to respond. No harm to emergency response team. That is, I forgot, I would say 60% of African nations are vulnerable in terms of security. In terms of physical security, military-wise, we are vulnerable. So I don’t know where, from where UN knows, get the conclusion. Because if you want to have the world inclusive, that’s African nation to be inclusive, I think there should be more piece of data study done in various African nations to see what they have, what it will be built upon, and then you can be able to factor those African nations and we all can be on a parallel stance and moving forward to have a progressive and robust cyber security network. Thank you, Mr. Chairman.

Chair:
Thank you very much, distinguished delegate. Is the chair correct in understanding that the distinguished delegates would be able to support language on the voluntary nature of norms? If when we get to capacity building in the next session, there is language that emphasizes the need to build that capacity around implementing norms, around critical infrastructure, around these kinds of things. Is that a correct understanding of the chair? Yes, please. Thank you very much, distinguished delegate. When we get to that in the next session, we’ll be certain to raise it. I’m sure that the distinguished delegate will raise this point adequately. The chair recognizes the distinguished delegate, first of all, of purple, to be followed by… Yes.

Team Purple:
Thank you once again, Mr. President. My country would like to recall regarding the applicability of the international norms that have been agreed upon, that the African Union, or rather the Council of Peace and Security of the African Union, in its session on January 29, 2024, has recognized, the African Union to which all our delegations are members, has recognized, after being profoundly concerned by the multiplication of cyber threats, and cyberattacks on a global scale, including on the African continent, has stated that international law applies to cyberspace, and has highlighted that Member States are obliged to respect the fundamental rules of international law in cyberspace, including the obligation to respect the territorial sovereignty of States, the prohibition of resorting to threats, the use of force, the prohibition of intervening in internal affairs, the basic regulation of different people, as well as the rules of application of international humanitarian law and international law relating to human rights. What does this mean? This means, dear distinguished guests, that negotiating norms and leaving them to the free application of States risks making our fight to all less effective, our will to all fight against these cyberattacks. So, my delegation would rather consider or propose that the norms that will be convened are rather obligatory applications for the entire delegation, for the entire country. Thank you.

Chair:
Thank you very much. Speaker of the Delegation, Speaker of the Delegation, yellow yet green, is it earlier or still going? Please, go ahead.

Team Yellow:
Thank you, Mr. Chair. My delegation just wishes to allay the fear of colleagues from other States. The norms are not expected to go into any area of a nation’s life. The norms of framework basically crafted to handle the issue of cyberspace, cyber security. If my colleagues are really conscious of what is happening, the gravity of the situation we are running into, what we call the paradox which we are facing, that what we have crafted for our good has turned to be something that is now dangerous, then we should understand that cyber security and the cyberspace is very important. So, with our lady fear, let the law take its own course. We agree about the norms, we tend to speak directly to cyber security, cyberspace. The minimum appendage we’ve agreed, just a long way to have it crafted, to be recognized beyond being a norm, and may be norms, but part of a law, and indeed a law, so that the respect could be secured so easily and implementation could be done with the emergency nature it requires. Thank you, Mr. Chair.

Chair:
Thank you very much. The Chair has a proposal, or the Chair thinks it’s an effective way of using the time, it will depend on delegations. We are planned to end this session in three minutes right now, have lunch for one hour, and then come back here from 2 to 3. If delegations are able and willing to have a shortened panel discussion on confidence building measures and capacity building, we can postpone by a bit, of course, with the kind of agreement by the translators, interpreters. We can go perhaps for another 15 minutes going confidence building measures and capacity building, and then go to lunch, and then be able to finish this session. Is this something that would be acceptable to delegations if we really have a focused discussion? So let’s do that, let’s try that. Delegations are encouraged. them to go into the following session. As before, the agenda item on international law and norms remains open. We have flexible floating agenda items. These are open. The chair can come back to them. But let’s now go to the confidence building measures and capacity building. The chair asks for really focused, short, to the point interventions with a desire to find where that distance is made. With that, the floor is open. Please focus on confidence building measures and capacity building. Thank you. If I remember correctly, this was one of the issues that were important for you. Perhaps we start with you. Thank you very much for the opportunity once again, Mr. Chair. Yeah, with the issue of capacity building, I think we should look at that. you you you foreign eh don’t uh where there is no authority to bomb any country. In my opinion, if it extends to many more countries, even if the countries are really in normal situations, it can arise at any time. So, the adjustment of the strengthening of the capacities of other countries is what I would like to say. Thank you. Thank you very much, Distinguished Delegates. A kind reminder to all Delegations that this panel is about capacity building. It’s also about confidence building measures. So, this is something, an area that we also need to focus on. Obviously, we won’t solve all the issues today, but it’s good that we all have a chair. It gives an idea of what is of concern to Delegations. So, when we draft a proposal for you tomorrow, we know exactly what is of concern to you. I believe that the Delegation blue, who is next on the list, will be happy to go. Thank you, Mr. President.

Team Blue:
The Blue Delegation has strengthened cyber security in the world, in particular in developing countries. We are convinced that the implementation of confidence building measures and strengthening of capacities are essential to create a safer, more stable, more transparent future for all. Cyber threats do not know borders. This is why it is crucial to promote international cooperation and to strengthen trust between States. Confidence building measures can play an important role in this regard, by reducing tensions and the risk of misunderstandings. The Blue State would like to propose a number of concrete measures to strengthen capacities. en cybersécurité dans les pays, en développement notamment, la mise en place des centres d’opérations de sécurité informatique. Chers centres d’opérations de sécurité informatique nationaux, permettez au pays de surveiller et de répondre aux attaques, aux ouvertes attaques en temps réel. Comme vous l’avez vu, les tableaux proposent la formation des sphères en cybersécurité. Il s’agit essentiellement de disposer de personnel qualifié pour proposer des infrastructures critiques et des systèmes informatiques. Il s’agira ensuite de partager des informations sur les cybermenaces. Les pays doivent partager les dernières informations liées aux attaques, aux ouvertes attaques et les vulnérabilités afin de pouvoir se protéger mutuellement. Il faut également mener des exercices de cybersécurité qui permettront de tester les réponses aux incidents et de les améliorer. Enfin, les tableaux voudraient proposer la promotion de l’utilisation de la technologie de cybersécurité fiable. Il est important d’utiliser ces genres de technologies qui proviennent des fournisseurs de conscience et d’où la nécessité de leur mettre à jour au regard des différentes innovations dans l’éthique. En plus de ces mesures concrètes que les tableaux viennent d’élaborer, il est également important de promouvoir une culture de cybersécurité au sein des gouvernements et des entreprises publiques. Cela implique une sensibilisation au risque and a proportion of good practices in cyber security. Mr. President, the Blue State is ready to play an active role in strengthening cyber security capabilities in developing countries. We are convinced that this is an essential investment for global security and economic development.

Chair:
Thank you very much, distinguished delegates of the Blue. A lot of points have been communicated, and there seems to be, at least in the Chair’s view, a broadening area for addressing these issues. The Chair has on the list the distinguished Delegation of Purple, to be followed by Green. Purple, you have the floor, to be followed by Green.

Team Purple:
Thank you very much, Mr. President. My Delegation would like, without obviously harming the rights of other Delegations, to point out that after all the interventions, it would seem that there is a consensus on how to move forward on strengthening capabilities. All Delegations are practically in agreement on the issue of strengthening capabilities, and my Delegation would like to propose its adoption by consensus. Other Delegations do not see this as an inconvenience. This allows us to save time and to be able to move forward quickly. Thank you.

Chair:
Thank you very much, Distinguished Delegate of Purple. The Chair is more than happy to try to find language to immediately go to decisions, but let’s leave that for the final part of our agenda, which comes tomorrow. Next on the list was Green, followed by Yellow, and followed by Grey.

Team Green:
Thank you, Mr. President. the vice-president and the delegation of the Green Country and I would like to thank you for giving me a second chance to speak and on the measures of trust, the Green Country has as its objective the measures of trust to strengthen mutual capacity and predictability as well as to reduce the miscalculations and we are in favor of implementing them on a voluntary basis. The other point to which we are in favor is the adoption of an approach by state in order to achieve mutual trust and to reduce the unexpected, while building bridges and initiating cooperation on common objectives. Mr. President, we actively encourage the establishment of a global repertoire of contact points, of people and that this repertoire must be carried out in a spirit of mutual respect, equality and mutual benefit on the basis of voluntary participation. But also, at the same time, countries must not use measures of trust as an excuse to provoke the proliferation of cyber weapons. On the other hand, Mr. President, the development of an international regulation aims to establish a clear and binding legal framework that defines the norms of responsible behavior of states in the cyberspace. This includes the clarification and application of international law regarding the activities of states in the cyberspace. I would also like to point out that confidence measures should not be substituted for the development of an international regulation in cyberspace. The two must reinforce each other and complement each other. Thank you.

Chair:
Chair, thanks. Distinguished Delegates, green. As much as perhaps the Chair may have gotten on the good side of delegations by proposing a shortened period, I’m sure it may be going on the bad side for interpreters and translators whose patients may be tested. So we’re finishing. We have two more speakers on the list, that is the Delegations Yellow and the Delegations Grey. We will then see whether we have a second half of the session.

Team Yellow:
Chair, thank you very much. I have some delegations talking about flogging some issues. The situation we have at hand requires that we all contribute to see the way forward. We want to speak to confidence-building measures, with all the confidence-building measures being highlighted and the matriculation six during the presentation. Then we call on all states that there’s a difference between responsiveness and responsibleness. While we are all interested in it and we are responsive to it, we call on all states to be responsible in the implementation of the CDM. Now with regard to the capacity building Indeed, we don’t need to overflag it, but we want history to carry it for us that we contributed, underscoring the need for capacity building in the field of cybersecurity. What this requires is education, education, and education, and education. We in this regard, we want to talk about complementarity. There are some states that are better in terms of technical know-how. We call on such states, and in which case, too, we declared that there should be a mechanism for the interface of the POCs, the point of contacts, and like minds to come together for maybe a routine, not routine, a time-limiting of these POCs, and expanding their scope to those who are interested in it, the technicians within countries, to see that they are trained in the field of cyberspace and cybersecurity, in which regard my country will be devoted 0.2% of our budget to the appropriated, devoted for the training in cybersecurity, which is very important in research in cybersecurity. We also have decided to open up a compulsory course from the primary school, secondary school, the university institution in my country, which have gotten presidential approval. to institute the training in cyber security on these angles and in layers of our educational system. We have also received presidential approval for the conduct of campaign awareness on what cyber security is and how to bring it to the least man, least woman in the community. And in this regard, the commission has been established and approved by the presidency of the Republic of Yellow, calling for international cooperation and partnership in this regard. And my country believes that this could be replicated in other states to heighten our information horizon on the danger of the misuse of the cyberspace using the misuse of the cyber infrastructure within the cyberspace. Chairman, this is our presentation and we pray for the support of other states to us. Thank you.

Chair:
Thank you very much to the delegates of Yellow. It seems that the chair was overly enthusiastic to try to find a way to have this complex issue dealt so quickly. So we must suspend the meeting right now, go to lunch, come back in 14, 15, have that one hour as planned, and then explore further. The chair has gray to be followed by pink to be followed by blue, still on pink. So we will continue after the lunch at 14, 15, hundred hours to the green. Thank you very much. This meeting is suspended. Thank you. Bye-bye. Bye-bye.

C

Chair

Speech speed

134 words per minute

Speech length

2014 words

Speech time

902 secs

TB

Team Blue

Speech speed

101 words per minute

Speech length

385 words

Speech time

228 secs

TG

Team Green

Speech speed

108 words per minute

Speech length

1134 words

Speech time

629 secs

TG

Team Grey

Speech speed

114 words per minute

Speech length

226 words

Speech time

119 secs

TO

Team Orange

Speech speed

134 words per minute

Speech length

392 words

Speech time

176 secs

TP

Team Pink

Speech speed

142 words per minute

Speech length

1097 words

Speech time

463 secs

TP

Team Purple

Speech speed

118 words per minute

Speech length

1043 words

Speech time

528 secs

TY

Team Yellow

Speech speed

120 words per minute

Speech length

1464 words

Speech time

735 secs