A/65/201
Report of the Group of Governmental Experts
on Developments in the Field of Information and
Telecommunications in the Context of
International Security
Summary
Existing and potential threats in the sphere of information security are among
the most serious challenges of the twenty-first century. Threats emanate from a wide
variety of sources and manifest themselves in disruptive activities that target
individuals, businesses, national infrastructure and Governments alike. Their effects
carry significant risk for public safety, the security of nations and the stability of the
globally linked international community as a whole.
The growing use of information and communications technologies (ICTs) in
critical infrastructure creates new vulnerabilities and opportunities for disruption.
Because of the complex interconnectivity of telecommunications and the Internet,
any ICT device can be the source or target of increasingly sophisticated misuse.
Since ICTs are inherently dual-use in nature, the same technologies that support
robust e-commerce can also be used to threaten international peace and national
security.
The origin of a disruption, the identity of the perpetrator or the motivation for it
can be difficult to ascertain. Often, the perpetrators of such activities can only be
inferred from the target, the effect or other circumstantial evidence, and they can act
from virtually anywhere. These attributes facilitate the use of ICTs for disruptive
activities. Uncertainty regarding attribution and the absence of a common
understanding creates the risk of instability and misperception.
There is increased reporting that States are developing ICTs as instruments of
warfare and intelligence, and for political purposes. Of increasing concern are
individuals, groups or organizations, including criminal organizations, that engage as
proxies in disruptive online activities on behalf of others. The growing sophistication
and scale of criminal activity increases the potential for harmful action. While there
are few indications of terrorist use of ICTs to execute disruptive operations, it may
intensify in the future.
Confronting the challenges of the twenty-first century depends on successful
cooperation among like-minded partners. Collaboration among States, and between
States, the private sector and civil society, is important and measures to improve
information security require broad international cooperation to be effective. The
report of the Group of Governmental Experts offers recommendations for further
dialogue among States to reduce risk and protect critical national and international
infrastructure.
2
10-46957