Eight norms for stability in cyberspace | The Business Standard
Skip to main content
  • Latest
  • Epaper
  • Economy
    • Banking
    • Stocks
    • Industry
    • Analysis
    • Bazaar
    • RMG
    • Corporates
    • Aviation
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Friday
June 27, 2025

Sign In
Subscribe
  • Latest
  • Epaper
  • Economy
    • Banking
    • Stocks
    • Industry
    • Analysis
    • Bazaar
    • RMG
    • Corporates
    • Aviation
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
FRIDAY, JUNE 27, 2025
Eight norms for stability in cyberspace

Thoughts

Joseph S Nye Jr
09 December, 2019, 12:25 pm
Last modified: 09 December, 2019, 12:34 pm

Related News

  • Patriotic Hacktivism: A plausible concept for the militarily weaker nations to dominate the cyberspace
  • Foreign Policy thinks Bangladesh a role model for fighting cyber terrorism
  • Saving costs: Banks moving to cyberspace from brick and mortar

Eight norms for stability in cyberspace

At last month's Paris Peace Forum, the Global Commission on the Stability of Cyberspace issued its report on how to provide an overarching cyber stability framework. Combined with norms, principles, and confidence-building measures suggested by others, the GCSC's conclusions are an important step forward

Joseph S Nye Jr
09 December, 2019, 12:25 pm
Last modified: 09 December, 2019, 12:34 pm
The non-state actors should not engage in offensive cyber operations, and state actors should prevent such activities or respond if such engagements occur.
The non-state actors should not engage in offensive cyber operations, and state actors should prevent such activities or respond if such engagements occur.

In little more than a generation, the Internet has become a vital substrate for economic, social, and political interactions, and it has unlocked enormous gains. Along with greater interdependence, however, come vulnerability and conflict. Attacks by states and non-state actors have increased, threatening the stability of cyberspace.

In November, at the Paris Peace Forum, the Global Commission on the Stability of Cyberspace issued its report on how to provide an overarching cyber stability framework. Originally convened by the Dutch government three years ago, the multi-stakeholder GCSC (of which I was a member) had co-chairs from Estonia, India, and the United States, and comprised former government officials, experts from civil society, and academics from 16 countries.

Over the years, there have been numerous calls for laws and norms to manage the new international insecurity created by information technology, starting with Russian proposals at the United Nations two decades ago calling for a binding treaty. Unfortunately, given the nature of cyber weapons and the volatility of the technology, such a treaty would not be verifiable and would quickly become obsolete.

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

Instead, the UN set up a Group of Governmental Experts (GGE), which produced a non-binding set of norms in 2013 and 2015. That group was unable to issue a report in 2017, but its work continues with an expanded membership, and an Open-Ended Working Group, in which some 80 states participated last September, has joined it at the UN. In addition, UN Secretary-General António Guterres established a High-Level Group, which issued a report looking forward to a broader UN discussion in 2020.

The GCSC defines cyber stability as a condition in which individuals and institutions can be reasonably confident in their ability to use cyber services safely and securely, change is managed in relative peace, and tensions are resolved without escalation. Stability is based on existing international law, which, as the GGE's 2013 and 2015 reports affirmed, applies to cyberspace.

But a binding international legal treaty would be premature as the next step. Norms of expected behavior can provide a flexible middle ground between rigid treaties and taking no action at all. As Michael Chertoff, one of the GCSC co-chairs and previously US Secretary of Homeland Security, has explained, norms can exist in parallel with laws but are more dynamic in the face of rapidly changing technology.

The GCSC proposed eight norms to address gaps in previously declared principles and focused on technical issues that are fundamental to cyber stability. Such norms can be seen as common points of reference in the evolving political discussions.

The first norm is non-interference with the public core of the Internet. While authoritarian and democratic states might disagree about free speech or regulation of online content, they can agree not to interfere with core features such as the domain name system, without which there would be no predictable inter-connection among the network of networks that comprise the Internet.

Second, state and non-state actors must not support cyber operations intended to disrupt the technical infrastructure essential to elections, referenda, or plebiscites. While this norm does not prevent all interference such as what happened in the US elections in 2016, it sets some bright lines around technical features.

Third, state and non-state actors should not tamper with goods and services in development or production if doing so may substantially impair the stability of cyberspace. Insecure supply chains present an important threat to stability.

Fourth, state and non-state actors should not commandeer the general public's resources for use as "botnets" (cyber robots based on others' machines but commanded without their knowledge or consent).

Fifth, states should create procedurally transparent frameworks to assess whether and when to disclose to the public vulnerabilities or flaws in information systems or technology. Such flaws are often the basis of cyber weapons. Hoarding such vulnerabilities for possible use in the future poses a risk to all. The presumption should be in favor of disclosure and patching.

Sixth, developers and producers of goods and services on which the stability of cyberspace depends should emphasize security, take reasonable steps to ensure that their wares are free from significant vulnerabilities, mitigate flaws when they are discovered, and be transparent about the process. All actors have a duty to share information on vulnerabilities to help mitigate malicious cyber activity.

Seventh, states should enact appropriate measures, including laws and regulations, to ensure basic cyber hygiene. Just like vaccinations prevent communicable diseases such as measles, so basic cyber hygiene can go a long way toward removing the low-hanging fruit that attract cyber malefactors.

Lastly, non-state actors should not engage in offensive cyber operations, and state actors should prevent such activities or respond if they occur. Sometimes called "hack-back," private vigilantism may escalate and pose a major threat to cyber stability. In the past, states once condoned and even supported privateers upon the high seas, but then discovered that the risks of escalation and unwanted conflict were too high. The same could be said for stability in cyberspace.

These eight norms alone will not ensure stability in cyberspace, but combined with norms, principles, and confidence-building measures suggested by others, they could provide a start. In the long term, states observe norms of behavior in order to improve coordination, manage uncertainty, preserve their reputations, or in response to internal pressures. The world is a long way from such a normative regime for cyberspace, but the GCSC has helped to nudge the process forward.

Joseph S Nye Jr, a professor at Harvard

Top News

cyberspace / norms

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • A crane loads wheat grain into the cargo vessel Mezhdurechensk before its departure for the Russian city of Rostov-on-Don in the course of Russia-Ukraine conflict in the port of Mariupol, Russian-controlled Ukraine, October 25, 2023. REUTERS/Alexander Ermochenko/File Photo
    Ukraine calls for EU sanctions on Bangladeshi entities for import of 'stolen grain'
  • SMEs deserve more, get less
    SMEs deserve more, get less
  • Representational image of accident. Photo: Collected
    1 killed, another injured as bus crashes onto divider in Mirpur

MOST VIEWED

  • Illustration: Khandaker Abidur Rahman/TBS
    BAT Bangladesh to invest Tk297cr to expand production capacity
  • Photo: Courtesy
    Silk roads and river songs: Discovering Rajshahi in 10 amazing stops
  • Office of the Anti-Corruption Commission. File Photo: TBS
    ACC seeks info on 15yr banking irregularities; 3 ex-governors, conglomerates in crosshairs
  • Illustration: Ashrafun Naher Ananna/TBS Creative
    Most popular credit cards in Bangladesh
  • $4b Chinese loan deals face delay as Dhaka, Beijing struggle to agree terms
    $4b Chinese loan deals face delay as Dhaka, Beijing struggle to agree terms
  • M Muhit Hassan FCCA, director of JCX. Sketch: TBS
    'Real estate sector struggling, survival now the priority'

Related News

  • Patriotic Hacktivism: A plausible concept for the militarily weaker nations to dominate the cyberspace
  • Foreign Policy thinks Bangladesh a role model for fighting cyber terrorism
  • Saving costs: Banks moving to cyberspace from brick and mortar

Features

Photo: Collected

The best three bespoke suit brands in the city

29m | Mode
Zohran Mamdani gestures as he speaks during a watch party for his primary election, which includes his bid to become the Democratic candidate for New York City mayor in the upcoming November 2025 election, in New York City, US, June 25, 2025. REUTERS/David 'Dee' Delgado

What Bangladesh's young politicians can learn from Zohran Mamdani

23h | Panorama
Footsteps Bangladesh, a development-based social enterprise that dared to take on the task of cleaning a canal, which many considered a lost cause. Photos: Courtesy/Footsteps Bangladesh

A dead canal in Dhaka breathes again — and so do Ramchandrapur's residents

23h | Panorama
Sujoy’s organisation has rescued and released over a thousand birds so far from hunters. Photo: Courtesy

How decades of activism brought national recognition to Sherpur’s wildlife saviours

1d | Panorama

More Videos from TBS

Why is Shakespeare equally acceptable in both capitalism and socialism?

Why is Shakespeare equally acceptable in both capitalism and socialism?

14m | TBS Programs
US gained nothing from strikes: Khamenei

US gained nothing from strikes: Khamenei

4h | TBS World
The instructions given by the Chief Advisor for installing solar panels on the roofs of government buildings

The instructions given by the Chief Advisor for installing solar panels on the roofs of government buildings

18h | TBS Today
Why Zohran thanked 'Bangladeshi aunties'?

Why Zohran thanked 'Bangladeshi aunties'?

18h | TBS World
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net