Opening plenary session and adoption of the agenda

6 Jun 2024 09:00h - 10:00h

Table of contents

Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.

Full session report

UN open-ended working group tackles evolving cyber threats and ICT security challenges

The open-ended working group (OEWG) convened under the auspices of the United Nations General Assembly Resolution 75/240 to address critical issues in the domain of information and communication technologies (ICTs) security. The Chair of the session underscored the emergence of a multi-polar world with numerous influential actors, particularly those with military capabilities in the cyber domain, which has blurred the lines between peace and war. Emphasizing the significant advancements in ICTs since analog times, the Chair highlighted the increasing potential for cyber warfare to occur in the grey zone between hostile and peaceful activities. The Chair urged the assembly to work constructively on four key areas: international law, norms, confidence-building measures, and capacity building, to narrow this grey zone and promote peace.

During the General Exchange of Views, several delegations presented their perspectives on the challenges and strategies for enhancing cybersecurity:

– Team Purple stressed the importance of a coordinated global response to the complex and evolving cyber threat landscape, advocating for a UN repository on threats to raise awareness and understanding of cyber threats. They also emphasized the need for inclusive participation in cyber diplomacy and policy development.

– Team Green discussed the significance of cyber diplomacy in international relations, highlighting the need for solid alliances, information sharing, and common standards to ensure the security and stability of cyberspace. They also pointed out the role of cyber diplomacy in promoting peace, human rights, and rural development.

– Team Yellow expressed deep concern over the existential challenges posed by ICTs, acknowledging the progress made in developing a normative framework to promote responsible state behaviour in cyberspace. They emphasized adherence to this framework and the importance of due diligence in preventing the misuse of cyberspace.

– Team Orange focused on the need for international cooperation to address the challenges of the digital age, advocating for the inclusion of topics such as existing and potential cyber threats and regular institutional dialogue in the agenda. They highlighted the necessity of an inclusive and regular institutional dialogue mechanism to address emerging challenges and foster collaboration.

– Team Gray raised concerns about cybersecurity challenges such as the theft of cryptocurrencies and ransomware, which pose threats to national security, the financial sector, and personal data protection. They called for a proactive international approach to combat cybercrime.

A Civil Society Organization from West Africa voiced concerns about the lack of inclusivity in the cybersecurity dialogue and the need for an all-of-society approach, emphasizing data protection and civil/human rights when implementing cybersecurity laws.

The Chair successfully moved to adopt the proposed agenda without objection, though Team Orange indicated their intent to raise concerns during their opening remarks. Following the General Exchange of Views, the Chair transitioned to a panel discussion aimed at developing a deeper understanding of specific cybersecurity issues, particularly those related to the four substantive issues outlined in the UN General Assembly Resolution: developing norms, the application of international law, confidence-building measures, and capacity building. The Chair encouraged delegations to engage with the panelists and develop their questions for a productive dialogue. The session concluded with a structured and inclusive exchange of views, setting the stage for further discussions on enhancing global cybersecurity.

Session transcript

Chair:
Today we’re entering a multi-polar world with several actors who can influence the international system and many with significant military capability including in the cyber domain. Second, the information and communication technologies of the day were still mostly analog and infinitesimally small slower than those we have at our disposal today. Today it is possible to use cyber warfare in a vast and increasing gray zone between what are hostile and what are peaceful activities. In other words, when peace ends and war begins. This is why our work arises from the first committee of the General Assembly and not, for instance, the third. We have worked to great effects so far, developing common understanding in many areas. During this session, I asked you to focus on four areas specific international law, norms, confidence building measures, and capacity building. Let’s work constructively to capture the gains we have made in specific language that will enjoy consensus. Let’s contribute to narrowing that gray zone between war and peace in favor of peace. With that, let’s turn to the formal sections of our work. This meeting is in order. In the name of the Bureau, I propose to myself as chair and my fellow vice chair, welcome to the substantive session of the open-ended working on the security of and in the use of information and communication technologies. Formed pursuant UN General Assembly Resolution 75 slash 240. The chair wishes to thank the Secretary General for his support and for laying out the vision of disarmament. it is securing our common future, which touches on many aspects of our work. We have with us Under-Secretary-General for Disarmament Affairs and we are all quite aware that our work would not be possible without the tireless efforts of her and her very capable team. But we have more to speak and we should get to it. Delegations will have received a draft agenda proposed by the Chair with the kind help of the Secretary. The Chair now moves that we adopt the agenda as proposed. Unless there are any objections, I see none. It is so decided. Let us now move to the next agenda item, General Exchange of Views. Delegations may have up to five minutes to present their views on all matters pertaining to our mandate. Please be aware that a title will be set and that the Chair will be strict with their adherence to the timelines in order to allow for all delegations to take part. A list of speakers has been open since yesterday for this agenda item and will remain open until the end of that item. Delegations will be allowed to speak in the order of their registration. Delegations that speak for groups of more than one or more than two states will be given precedence, as circumstances allow. With that, we already have several delegations that have asked for the floor and we will go in the order of their registration. We already have several delegations that have asked for the floor and we will go in the order of the speakers have registered. The distinguished delegates of Delegation Purple may now signal the floor to raise their hands. It seems that the chair has missed a point of order raised by Team Orange. So before continuing with the speakers, the chair listens to the point of order raised by Team Orange. Orange, you have the floor.

Team Orange:
Thank you, Mr. Chair. On the issue of the agenda, Team Orange would like to inject into the agenda, but our injection will be made during our opening remarks. If the chair understands it well, there’s not an objection to the agenda, but you wish to register some concerns, but that will then make it into the report. Is that the case? During our opening remarks, we’ll give our comments on that.

Chair:
Very well. The agenda has been adopted and has been gathered, so we can continue, but you will be given an opportunity to express your concerns on the agenda.

Team Orange:
Thank you, Mr. Chair.

Chair:
Thank you. We now continue with the list of speakers as proposed. Team Purple has the floor. You have the floor.

Team Purple:
Thank you, Mr. President, for giving me the floor. Mr. President, Madam Vice-President, ladies and gentlemen, members of the board, distinguished members of the committee, honorable guests, ladies and gentlemen. In a world of constant evolution, cybersecurity has only one place. More and more important threats are facing us, a landscape of threats that never ceases to be infinitely complex, affecting not only peace and international security, but also human rights. but also the fundamental rights and freedoms of individuals, in particular children. These threats, ranging from cybernetic attacks, critical infrastructure, to attacks on the protection of personal data, through disinformation campaigns or deepfakes, require a coordinated and global response from this so-called NRL. The application of international law and international standards in cyberspace is therefore essential to guarantee an effective response to these threats. Thus, my delegation supports without reserve the proposal of the Blue Team to establish a UN repertoire on threats in order to promote awareness and a better understanding of the existing and potential cyberthreats. This, of course, implies attacking underlying norms linked to people who act as barriers and investing in exchange of knowledge and network establishment to promote more inclusive participation in diplomacy and the development of co-operative policies in cyberspace. To achieve these crucial objectives, my delegation reminds that the exchange of information between States remains fundamental in order to ensure stability and security in the use of ethics. Mr. President, Distinguished Delegates, my delegation would like to highlight once again the capital role that the threat, that the measure of trust, plays in cyberattacks. the construction of a stable environment of cybersecurity. The promotion of shared understanding must continue to be a priority. This approach strengthens trust and supports the objectives in a holistic and sustainable way. Thus, my delegation will strongly support the implementation of effective contact points. The implementation of a range of contact points facilitates the strengthening of essential capacities to ensure that all states, in particular developing countries, can effectively participate in the governance of cybersecurity. This requires targeted investments in training, sharing of knowledge and technical support to build resilient cybersecurity infrastructures. My delegation believes that the strengthening of capacities is both a warning to all cooperation in the field of cybersecurity and the adoption of all measures. Finally, the establishment of a regular institutional dialogue is essential to maintain momentum for a safer cyberspace. The adoption of an action programme as a forum for a regular institutional dialogue would provide a permanent structure necessary to deal with cybersecurity issues in a stable and coherent manner. This would avoid the duplication of efforts and the creation of parallel paths of discussion, thus promoting transparency, trust and stability between states in cyberspace. In conclusion, we must work together with a renewed commitment to multilateralism and international cooperation to raise the challenges of cyberspace. and security. By adopting a global approach that includes international law, international norms, confidence measures, and regular intellectual dialogue, and above all, the strengthening of capacities, we can build a more secure and inclusive digital future for all. Thank you for your supportive attention. Thank you, Mr. President.

Chair:
Thank you very much. We continue with the list of speakers. Next on our speakers list is the delegation of Gray. Gray, you have the floor.

Team Gray:
Thank you very much, Mr. President. First of all, I would like to congratulate all the members of the Bureau for their election, and to assure you of the full support of my delegation, full of the success of the work. This work comes before the United Nations on cyber-attacks, which pose a new security challenge in our cyberspace, disrupting the functioning of critical infrastructure and the course of elections, or by using means of obtaining information and sensitive information. Under these relations, I would like to draw attention to two types of cyber-threats that affect my country the most, the theft of cryptocurrencies and real estate robberies. With regard to the theft of cryptocurrencies, I would like to draw attention to two types of cyber-threats that affect my country the of cryptocurrencies, the latest evaluation tells us that they represent 1.7 billion dollars by 2023. We are particularly concerned that these cryptocurrencies could be a source of financing for arms or terrorist activities. In terms of ransomware, they are likely, due to their transcontinental nature, to pose a threat to our national security, the financial sector and companies, critical infrastructure and the protection of personal data. It is necessary to have a proactive approach in view of the transcontinental nature of cybercrime and the impossibility for States to deal with it individually. For this reason, we invite States, as well as various other parties involved, to collaborate more to strengthen our common efforts to prevent and fight against malware cybercrime. This is where the relevance of the next two plenary sessions will allow us to examine the way in which international law should apply to cyberspace, the voluntary norms and responsible behavior of States in cyberspace. international cooperation at the end of the strengthening of the cyber capacity of countries as well as the establishment of a regular institutional dialogue on cyberspace under the auspices of the United Nations. My delegation will be part of these observations on this point during the thematic debates that will be devoted to them. Thank you for your attention.

Chair:
If there is a desire to register on the list of speakers before we finish. Most delegations have already, but it’s just a kind of reminder, if the delegation wishes to register. Now, the floor is given to the distinguished delegate of Green.

Team Green:
Thank you, Mr President. My delegation would like to express its thanks and ask you for the opportunity to speak on cyber diplomacy. Mr President, technology has revolutionised the way we interact and do business on a global scale. In this country, in constant evolution, cyber diplomacy has become an essential pillar of international relations. Cyber diplomacy is the art of negotiating, of co-paying, of competing in cyberspace. This is an area where the stakes are already high. Boundaries are blurred. As a nation, my delegation, it is our responsibility to navigate with prudence and wisdom in this new digital environment. International cooperation is crucial to face the threats lurking behind our screens. It is imperative to create solid alliances, to share information, good practices and to promote common standards to ensure the security and stability of cyberspace. But cyber diplomacy goes beyond security. It is also a powerful tool to promote peace, human rights and rural development. By using technology strategically, we can strengthen democracy, social inclusion and innovation. My delegation will be available to discuss all issues related to diplomacy, cyber diplomacy and to find a sustainable peace in the world. Mr President, cyber diplomacy is a complex and constantly evolving field. But it is also an extraordinary opportunity to build a better, more connected and more equitable world. By working together, we can shape a digital and prosperous future for all. Thank you.

Chair:
Thank you very much. Distinguished Delegates, we will close the list with the delegation in blue. Next speaker, Mr. Blue, please, you have the floor.

Team Blue:
Thank you, Mr. Speaker, for your kind words. Mr. Speaker, distinguished guests, ladies and gentlemen. I represent the board, and it is with great pleasure that I take the floor in front of you today to share our views on cybersecurity in the banking sector, a field of capital importance in the era of cross-border migration and the rise of cryptocurrencies mentioned by the State. The digitization of banks, while stimulating innovation and improving access to financial services, creates new challenges in cybersecurity. Banks adopt cutting-edge technologies such as cloud computing, artificial intelligence, and online banking platforms, which expands the potential attack surface for cybercriminals. The rise of cryptocurrencies, while presenting potential opportunities, also raises major questions in cybersecurity. Anonymity and the nature of cryptocurrencies are a privileged target for cyberattacks, aircraft laundering and financial activities. The convergence of banking digitization and cryptocurrencies amplifies cybersecurity risks. Banks engaged in cryptocurrency activities become even more attractive targets for cyberattacks. of cybercriminals who seek to exploit the vulnerabilities of systems and processes related to cryptocurrency. In light of these risks, it is imperative to implement a global and coordinated approach to cybersecurity in the banking sector. This approach must include the following elements. The strengthening of the capabilities of the banking sector. Banks must invest in the implementation of their cybersecurity infrastructure, training their staff, and the implementation of robust processes to manage cybersecurity risks. Reinforced international cooperation. States, international organizations, and the private sector must work closely to share information on cyber threats, develop common security solutions, and strengthen cyber defense capabilities. Clear and harmonized regulation for cryptocurrencies. A clear and harmonized regulation framework for cryptocurrencies is necessary to mitigate the risks of cybersecurity and illegal activities. Cybersecurity in the banking sector is of capital importance in the era of growing modernization and the rise of new systems. By strengthening cybersecurity capabilities, by promoting international cooperation, and by putting in place clear regulations for cryptocurrencies, we can build a safe and stable cyberspace that will allow the banking sector to propose and contribute to a sustainable and inclusive digital economy. Thank you, Mr. President.

Chair:
Thank you, dear delegates, for your attention. on the list of speakers, the speakers delegated of yellow.

Team Yellow:
Mr. Chairman, Madam Vice President, good morning and welcome to the assembly this morning. My delegation is here with a very heavy heart. The world is facing paradoxically an existential challenge. The product of man’s endeavor has become his abattoirs. Information and communication technologies are not only the infrastructure of civilization, they contribute significantly to global productivity. However, the concern is the possibility of the opposition and used by some elements of society with sinister intentions. This concern has been the common preoccupation of this assembly for more than two decades and a half now. Mr. President, my delegation wishes to recall resolution ARES 5370 of 4th January, 1999 on this subject. The assembly in its wisdom expressed concern that these technologies and means would potentially be used for purposes that were inconsistent with the objectives of maintaining international stability and security may adversely affect the security of states. Consequently, the assembly underscored that it was necessary to prevent the use of exploitation information resources or technology for criminal or terrorist purposes. Since the inception of this conversation, we have recorded progress. The series of six group of governmental experts constituted by the assembly have several identified the potential threats and call for them to be addressed. We therefore developed a normative framework to promote responsible state behavior in cyberspace based on four pillars. Yeah, based on four pillars, international law, the level voluntary norms setting out what states should and should not do in cyberspace, confidence building measures to strengthen transparency and stability and capacity building. My delegation is happy to participate in this session of the open-ended working group and not only to further the process of state to all the product of the efforts of the DG, but also for you to have the by of member states. This is a good initiative. We should remain committed to our responsibility to protect the cyberspace from being exploited by sinister elements to our disadvantage. The trade, the cyber domain is increasingly geometrically, it has grown in dimension above what we know of it when this conversation was started in 1998. Cyber attacks are increasingly targeting our democratic institutions and processes. Our critical infrastructure and commercial online services are not spared. The emergence of generative artificial intelligence is not a concern in the domain. in regard of the challenge of applying an autonomous weapon system. The solution to this challenge is securing the commitment of states to be responsible to their behavior towards others. It requires strong attention to debate to the formulation of groups of governmental experts as a way forward. Our reliance on the provisional international law as a guide for our common behavior is held sacrosanct by this team. Therefore, my dedication underlines the importance of adherence to the common framework we design for our behavior regarding the use of the cyberspace. Related to the reliance on international law as our guide, we should be committed to the principle of due diligence in undertaking a preventive approach, including avoiding the use of our territories in the commission of abusive acts that are detrimental to any one of us. My team supports implementation and development of the confidence building measures in this regard. We reserve our right to come up, Mr. President, on this subject when we have the floor again.

Chair:
Thank you very much distinguished delegate Thank you. The final speaker from the delegations that are state parties is of Team Orange, and Team Orange, you have the floor.

Team Orange:
Mr. Chair, Madam Vice Chair, fellow member groups, civil society organizations, international organizations, distinguished ladies and gentlemen, it is my pleasure to present the Orange Group’s opening statement at this illustrious session. As a nation committed to promoting the safe and secure use of technology, the Orange Group is of the view that international cooperation and collaboration are crucial in addressing the rapidly evolving challenges posed by the digital age. Without doubt, international cooperation will address the potential dangers to technological advancements and harness the transformative power of technology for the collective good while safeguarding against its potential pitfalls and ensuring that its benefits are accessible to all. The Orange Group is firmly dedicated to playing an active role in these discussions, leveraging our extensive experiences and expertise to foster constructive dialogue and provide suggestions aiming to facilitate progress toward our shared objectives. Mr. Chair, given the significance of regular dialogue in enhancing effective international cooperation on cybersecurity-related matters, my delegation sees merit in a holistic approach to this discourse. The inclusion of either Team 1, which speaks on existing and potential threats, or Team 5 on regular institutional dialogue, which seems to have a building consensus from our colleagues in the room, in the agenda is more pertinent to the outcome of this discussion. Fellow colleagues, given the swiftly evolving technological landscape, continue dialogue on on ICT security remains imperative post the OEWG. Therefore, establishing an inclusive and regular institutional dialogue mechanism, as well as institutional framework, is paramount to effectively address emerging challenges and foster collaboration among stakeholders. Distinguished ladies and gentlemen, our delegation is ready to carefully consider the perspectives of all relevant stakeholders on the various thematic areas and look forward to a successful negotiation process. Thank you.

Chair:
Thank you, distinguished delegates of Orange. Am I to understand that the distinguished delegation of Violet wishes to speak in Florida?

Team Pink:
It’s pink. Okay, distinguished delegates. On behalf of my country, I extend my heartfelt appreciation to the leadership demonstrated in our deliberations. Your vast experience and competence assures us of the success of this crucial process. Today, I’m honored to present my delegation’s view on major global issues in information and communication technology and to share our thoughts on the most pressing matter. Firstly, the application of international law and norms. The relevance of international law and norms to Africa, particularly in cybersecurity, cannot be overstated. We emphasize the importance of responsible state behavior, protections of critical infrastructure and confidence building among states. Key points from our- discussion include the implementation of the existing norms, development and consideration of normal norms, the international cooperation and exchange of views, capacity building and assistance, and the inclusion of diverse perspectives. In terms of capacity building, which is the fundamental to enhancing global cyber security infrastructure. and policy coherence. It improves technical capabilities, ensuring all member states can participate equally in international security dialogues and negotiations. Some of the key points my delegates highlighted include inclusive stakeholder participation, that is engaging industry, civil society and academia in cyber security training and policy development enhances the effectiveness of capacity building efforts. We talk about the cyber diplomacy capability, equipping states with skills and knowledge to engage in international cyber security discussion and agreements, promote a common global cyber security baseline. Upholding universal values, capacity building must safeguard human rights, promote gender balance and engage youth, ensuring a secure and accessible data space for all. In conclusion, capacity building is crucial for advancing global cyber security by enhancing technical capabilities, ensuring inclusive participation and upholding universal values. Together, we can contribute to international peace, security and sustainable development. Thank you.

Chair:
Chair, thanks for the speaker’s delegation. Thank you and apologies for the mistake in the name. The chair comes from a country that is not allowed to call itself its own name. Therefore, there’s understanding certainly in this regard. So we have finalized all delegations from state parties that wish to speak. If that is the case, we can allow for the speaker of civil society to have that speech. Sir, you have the floor.

Civil Society Organization:
The civil society organization on cyber security. Do you have any questions? Mr. President, distinguished delegates from West African Member States, we are the West African Civil Society Organization. We represent over 380 million West African citizens, cutting across the English-speaking, French-speaking, and Portuguese-speaking West Africans. Let me use this opportunity on behalf of the West African Civil Society Organizations to express our profound appreciation to the Chair and Member States for giving us the opportunity to speak. We at the Civil Society Organization, we have three concerns. One, we are very pleased with the mentioning of the word inclusivity by Country Pink. However, that word inclusivity was only related to capacity building. We noted that at the beginning of this consultation process, Civil Society Organizations were not left out. In consultation we had with Member States and Civil Society Organizations, we noted that Civil Society Organizations inputs and comments were not appropriately reflected in some of the State’s positions. In this regard, we will call not just only for the point of government approach to this process, we will call for all of the society approach. In particular, we will remind the State Parties that in implementing cyber security laws at the national level, concentration should be given to the primacy of data protections and civil and human rights of our citizens. Thank you very much, Mr. Chair.

Chair:
Mr. Chair, thanks to the distinguished delegates of the Civil Society Organization on Cyber Security. With that, we have exhausted the list of speakers under the agenda item General Exchanging Views. If this is the case, the Chair moves to close this item and move on to the next. If there are no objections, it is so decided. We will now move to a panel discussion and the Chair asks secretary to prepare the room for this panel discussion and for the panelists to approach the front. The chair has invited three renowned panelists to assist as we try to develop a more granular understanding of the issues at hand. Specifically, our focus will be on four of the substantive issues contained in paragraph one of the General Assembly Resolution 75-240. Namely, A, on developing norms, B, on how international law applies, F, on confidence building measures, and G, on capacity building. The chair will start with the first round of questions to our panelists, but delegations are encouraged to develop their own questions and use this time with them for the greatest impact. If you have a question, please raise your name plate so that it is clearly visible, and the chair will allow the question to go to the panelists. The chair will start with the same question posed to all panelists, which should be as brief and direct as possible. And that question is, what are the existing and potential threats related to the OEWG mandate? Are there other existing and potential threats? So that’s the same question posed to all panelists. If the panelists would approach the front.

C

Chair

Speech speed

152 words per minute

Speech length

1234 words

Speech time

486 secs

CS

Civil Society Organization

Speech speed

111 words per minute

Speech length

247 words

Speech time

133 secs

TB

Team Blue

Speech speed

105 words per minute

Speech length

387 words

Speech time

221 secs

TG

Team Gray

Speech speed

109 words per minute

Speech length

371 words

Speech time

203 secs

TG

Team Green

Speech speed

95 words per minute

Speech length

254 words

Speech time

161 secs

TO

Team Orange

Speech speed

114 words per minute

Speech length

407 words

Speech time

214 secs

TP

Team Pink

Speech speed

112 words per minute

Speech length

345 words

Speech time

184 secs

TP

Team Purple

Speech speed

115 words per minute

Speech length

579 words

Speech time

303 secs

TY

Team Yellow

Speech speed

140 words per minute

Speech length

609 words

Speech time

261 secs