{"id":19688,"date":"2012-09-11T17:33:13","date_gmt":"2012-09-11T21:33:13","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-31T13:29:54","modified_gmt":"2021-07-31T17:29:54","slug":"itu-regs-bad-for-cybersecurity","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/itu-regs-bad-for-cybersecurity\/","title":{"rendered":"ITU Regs Bad for Cybersecurity"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20101222054351\/http:\/\/www.dvorak.org:80\/blog\/2010\/12\/17\/harmonize-global-efforts-to-regulate-the-internet-by-the-u-n\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-105606\" title=\"ITU Regs Bad for Cybersecurity\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/1984.jpg?resize=74%2C110&#038;ssl=1\" alt=\"ITU Regs Bad for Cybersecurity\" width=\"74\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/1984.jpg?resize=102%2C150&amp;ssl=1 102w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/1984.jpg?resize=51%2C75&amp;ssl=1 51w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/1984.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 74px) 100vw, 74px\" \/><\/a><a href=\"https:\/\/www.cdt.org\/personnel\/emma-llans%C3%B3\" target=\"_blank\" rel=\"noopener noreferrer\">Emma Llans\u00f3<\/a> at the <a title=\"Center for Democracy &amp; Technology\" href=\"https:\/\/www.cdt.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Center for Democracy &amp; Technology<\/a> <a title=\"ITU Ill-Suited to Regulate Cybersecurity\" href=\"http:\/\/web.archive.org\/web\/20130525171833\/https:\/\/www.cdt.org\/blogs\/emma-llanso\/0609itu-ill-suited-regulate-cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\">writes<\/a> that the\u00a0<a title=\"International Telecommunication Union\" href=\"http:\/\/www.itu.int\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\"><strong>International Telecommunication Union<\/strong><\/a><strong> is ill-suited to regulate cybersecurity<\/strong>. The <a title=\"United Nations\" href=\"https:\/\/www.un.org\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>United Nations<\/strong><\/a>-backed ITU will meet in December to try to expand its control over the Internet. The <em>CDT<\/em> believes that the issue of cybersecurity perfectly illustrates why the <a title=\"International Telecommunication Union\" href=\"https:\/\/en.wikipedia.org\/wiki\/International_Telecommunication_Union\" target=\"_blank\" rel=\"homepage noopener noreferrer\">ITU<\/a> should not be given expanded regulatory authority to include matters of Internet governance.<\/p>\n<p><a title=\"Center for Democracy &amp; Technology\" href=\"https:\/\/www.cdt.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"border: 0px none; margin-left: 3px; margin-right: 3px;\" title=\"Center for Democracy &amp; Technology\" src=\"https:\/\/i0.wp.com\/www.cdt.org\/files\/cdt_logo.png?resize=110%2C77&#038;ssl=1\" alt=\"Center for Democracy &amp; Technology\" width=\"110\" height=\"77\" \/><\/a>The UN body is holding the World Conference on International Telecommunications (WCIT) this December in\u00a0<a title=\"Dubai\" href=\"https:\/\/web.archive.org\/web\/20140325040710\/http:\/\/www.dubai.ae\/en\/pages\/default.aspx\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Dubai, UAE<\/a> to <strong>renegotiate the International Telecommunication Regulations<\/strong> (ITRs), the UN&#8217;s core telecommunications treaty. The ITRs were in 1988 and sets forth general principles for the <strong>operation of international telephony systems<\/strong>. The CDT reports that some Member States of the ITU want to use the WCIT to <strong>expand these regulations to Internet matters<\/strong> by amending the ITRs. The CDT and others have warned of the <strong>risks to online freedom<\/strong> and innovation if the UN is allowed to regulate the Internet. The CDT has <a href=\"https:\/\/www.cdt.org\/files\/pdfs\/Cybersecurity_ITU_WCIT_Proposals.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">released a paper<\/a> (PDF) that examines in detail some of the proposals pending before the ITU relating to cybercrime and cybersecurity.<\/p>\n<p>The CDT states that cybersecurity is undeniably a critical issue for the future of telecommunications and indeed for <strong>global commerce, development, and human rights<\/strong>. On the other hand, it is ill-suited to the kind of <strong>centralized, government-dominated policy-making<\/strong> that the ITU represents.<\/p>\n<p><a href=\"http:\/\/www.sodahead.com\/united-states\/should-united-nations-have-more-control-over-internet\/question-2472055\/?page=4&amp;link=ibaf&amp;q=&amp;imgurl=https:\/\/rbach.net\/blog\/wp-content\/uploads\/2013\/08\/4346342397_Logo_ITU_xlarge.jpeg\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105609 size-thumbnail\" title=\"ITU logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/itu_logo.jpeg?resize=66%2C75&#038;ssl=1\" alt=\"ITU logo\" width=\"66\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/itu_logo.jpeg?resize=66%2C75&amp;ssl=1 66w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/itu_logo.jpeg?resize=132%2C150&amp;ssl=1 132w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/itu_logo.jpeg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 66px) 100vw, 66px\" \/><\/a>Cybersecurity requires agility: Given the pace of technological change, governmental bodies are not likely to be the source of effective technical solutions. The CDT predicts those solutions will emerge from multi-stakeholder efforts, involving ICT companies, technologists, academics, and civil society advocates, as well as governments.<\/p>\n<p>Moreover, <strong>the cybersecurity issue inevitably leads straight into questions of human rights and governmental power: surveillance, privacy, and free expression<\/strong>. None of these are issues the<strong> ITU has any expertise<\/strong> in or any ability to assess and balance. The CDT suggests, rather than adopting <strong>vague wording that could be used by governments as justification for repressive measures<\/strong>, the ITU should endorse existing standards initiatives such as those underway at the <a title=\"Internet Engineering Task Force\" href=\"http:\/\/ietf.org\" target=\"_blank\" rel=\"homepage noopener noreferrer\">IETF<\/a> and continue to serve as one forum among many for the development of consensus-based, private sector-led efforts.<\/p>\n<p><a href=\"https:\/\/www.un.org\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-thumbnail wp-image-105612\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/un_logo.png?resize=75%2C63&#038;ssl=1\" alt=\"\" width=\"75\" height=\"63\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/un_logo.png?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/un_logo.png?w=102&amp;ssl=1 102w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>According to the CDT briefing, the <a title=\"Arab League\" href=\"http:\/\/en.wikipedia.org\/wiki\/Arab_League\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\"><strong>Arab States<\/strong><\/a> regional group has offered a proposal to amend the ITRs to <strong>require Member States<\/strong> to \u201cundertake appropriate measures&#8221; to address issues relating to \u201cConfidence and Security of telecommunications\/ICTs,\u201d including \u201c&#8230; online crime; controlling and countering unsolicited electronic communication (e.g Spam); and protection of information and personal data (e.g. phishing).\u201d The governments of the middle-east have a <strong>history<\/strong><strong> of <a title=\"Internet censorship in the Arab Spring\" href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_censorship_in_the_Arab_Spring\" target=\"_blank\" rel=\"noopener noreferrer\">manipulating<\/a> the Internet to <a title=\"Syria&#039;s Online Battlefield: Who Is Winning The War 2.0?\" href=\"https:\/\/web.archive.org\/web\/20130312102410\/http:\/\/worldcrunch.com\/world-affairs\/syria-039-s-online-battlefield-who-is-winning-the-war-2.0-\/syria-online-warfare-fsa-snc-assad-war-aleppo-damascus-cyber-warfare\/c1s9344\/\" target=\"_blank\" rel=\"noopener noreferrer\">silence dissent<\/a>.<\/strong><\/p>\n<p>Another example of why the UN should not control the Internet comes from the <strong>African Member States<\/strong> cybersecurity proposal which deals with data retention. The <em>CDT<\/em> reports the requirement will force communications companies to <strong>retain data about customers and communications for the benefit of the government<\/strong> rather than for business purposes.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20150905173804\/http:\/\/www.wcupa.edu\/constitution\/default.asp\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105614 size-medium\" title=\"UN against U.S. Constitution\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wethepeople2.jpg?resize=150%2C90&#038;ssl=1\" alt=\"UN against U.S. Constitution\" width=\"150\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wethepeople2.jpg?resize=150%2C90&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wethepeople2.jpg?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wethepeople2.jpg?w=640&amp;ssl=1 640w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Analysis by CDT says that this requirement <strong>goes against American criminal laws<\/strong>. This data retention law <strong>turns the presumption of innocence on its head<\/strong>\u00a0since these cybersecurity data retention laws <strong>apply to every citizen<\/strong> regardless of whether they have committed a crime. Further, because data retention laws require service providers to store information that identifies people online, they threaten anonymity online, implicating the rights to both privacy and free expression.<\/p>\n<p>The CDT writes that several cybersecurity proposals to amend the ITRs refer to the routing of communications. One proposal from the Arab States regional group would amend the ITRs to specify that \u201cA Member State has the right to know how its traffic is routed.\u201d<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20201031105211\/http:\/\/www.findababysitter.org\/blog\/10-different-monsters-that-scare-children\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-105617\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/monster_under_bed.png?resize=150%2C112&#038;ssl=1\" alt=\"national security\" width=\"150\" height=\"112\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/monster_under_bed.png?resize=150%2C112&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/monster_under_bed.png?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/monster_under_bed.png?w=205&amp;ssl=1 205w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>The proposal is <strong>justified on the grounds of security<\/strong>, according to the CDT which some Member States clearly interpret to mean national security. In its comments, Egypt argued, \u201c&#8230;\u00a0 Member States must be able to know the routes used &#8230; to maintain national security. If the [Member State] does [not] have the right to know or select the route in certain circumstances (e.g. for Security reasons), then the only alternative left is to block traffic from such destinations&#8230;&#8221;<\/p>\n<p>The brief explains that Internet protocol (IP) networks transmit communications and interconnect entirely differently than traditional telephone networks; in that context the Arab States proposal to \u201cknow how traffic is routed\u201d simply would not work and could fundamentally disrupt the operation of the Internet. If the Arab States proposal were applied to all Internet communications, the requirement that countries be able to \u201cknow\u201d how every IP packet is routed to its destination would necessitate extensive network engineering changes, not only creating huge new costs but also threatening the performance benefits and network efficiency of the current system.<\/p>\n<p>The brief goes on to explain that the Arab States proposal could also serve to legitimize governmental efforts to set up controls on the Internet traffic, by enshrining in an international treaty. Changes to IP routing rules to carry out the Arab States&#8217; cybersecurity proposal could give the Member States more technical tools to use to block traffic to and from certain websites or nations. The regulations on routing that the Arab States proposal condones could take a variety of forms, from prohibiting certain IP addresses from being received inside a country to tracking users by IP addresses and blocking specific individuals from sending or receiving certain communications. \u201cKnowledge\u201d of IP routing could also encompass countries keeping track of what websites their citizens visit or with whom they email \u2013 all in the name of national security.<\/p>\n<p>These types of regulations, which could be legitimized if the Arab States proposal is adopted, could threaten user rights to privacy and freedom of expression on the Internet.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em> The UN must not be allowed to expand its control over the Internet.\u00a0 ITU regulation will be bad for cybersecurity.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.zdnet.com\/no-need-for-un-to-take-over-internet-says-eu-digital-chief-kroes-7000003145\/\" target=\"_blank\" rel=\"noopener noreferrer\">No need for UN to take over internet, says EU digital chief Kroes<\/a> (zdnet.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Members of the ITU want to expand the UNs control over the Internet The government-controlled ITU regulations will be bad for cybersecurity and freedom<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,1363,1819,1185,205,1824,1836,1305,4,1304,1364],"class_list":["post-19688","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-cdt","tag-computer","tag-cybersecurity","tag-dubai","tag-ietf","tag-internet-freedom","tag-itu","tag-security","tag-united-nations","tag-wcit"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/19688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=19688"}],"version-history":[{"count":10,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/19688\/revisions"}],"predecessor-version":[{"id":132804,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/19688\/revisions\/132804"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=19688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=19688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=19688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}