GGE Information Security
Developments in the field of information and telecommunications in the context of international security
The issue of information security has been on the UN agenda since the Russian Federation in 1998 first introduced a draft resolution in the First Committee of the UN General Assembly. It was adopted without a vote ( A/RES/53/70 )
Since that time there have been annual reports by the Secretary-General to the General Assembly with the views of UN Member States on the issue:
The following States submitted full reports in 2015 that were too long to be included in the published report of the Secretary-General. They are published here in extenso.
The following States submitted full reports in 2014 that were too long to be included in the published report of the Secretary-General. They are published here in extenso.
- 2013 — A/68/156 and A/68/156/Add.1
- German submission to the 2012 report of the Secretary-General
- 2011 — A/66/152 and A/66/152/Add.1
- 2010 — A/65/154
In addition there have been four Groups of Governmental Experts (GGEs) that have examined the existing and potential threats from the cyber-sphere and possible cooperative measures to address them. See UNODA Factsheet for a summary of the three earlier reports:
On 27 December 2013, the UN General Assembly unanimously adopted resolution 68/243 in which it took note of the outcome of the 2012/2013 GGE and requested the Secretary-General to establish a new GGE that would report to the General Assembly in 2015.
The new GGE, with 20 experts, held four meetings between July 2014 and June 2015. Experts from the following Member States participated in the GGE: Belarus, Brazil, China, Colombia, Egypt, Estonia, France, Germany, Ghana, Israel, Japan, Kenya, Malaysia, Mexico, Pakistan, Russian Federation, Spain, United Kingdom and United States of America. Mr. Carlos Luís Dantas Coutinho Perez (Brazil) chaired the Group.
The Group agreed on a substantive consensus report in June 2015 ( A/70/174 ) on norms, rules or principles of the responsible behaviour of States in the cyber-sphere as well as confidence building measures, international cooperation and capacity building which could have wider application to all States. It also addresses how International Law applies to the use of information and communications technologies and also makes recommendations for future work. It will be presented to the First Committee of the General Assembly in October.
Its findings include:
In their use of ICTs, States must observe, among other principles of
international law, State sovereignty, the settlement of disputes by peaceful means, and non-intervention in the internal affairs of other States.
Existing obligations under international law are applicable to State use of ICTs and States must comply with their obligations to respect and
protect human rights and fundamental freedoms.
- States must not use proxies to commit internationally wrongful acts using ICTs, and should seek to ensure that their territory is not used by non-State actors to commit such acts.
- The UN should play a leading role in promoting dialogue on the security of ICTs in their use by States, and in developing common understandings on the application of international law and norms, rules and principles for responsible State behaviour.
In his foreword to the report, The Secretary-General notes:
"Few technologies have been as powerful as information and communications technologies (ICTs) in reshaping economies, societies and international relations. Cyberspace touches every aspect of our lives. The benefits are enormous, but these do not come without risk. Making cyberspace stable and secure can only be achieved through international cooperation, and the foundation of this cooperation must be international law and the principles of the UN Charter......Our efforts in this realm must uphold the global commitment to foster an open, safe and peaceful Internet. In that spirit, I commend this Report to the General Assembly and to a wide global audience as a crucial contribution to the vital effort to secure the ICT environment."