web stats
Print this page  Bookmark and Share  NTS Alert October 2009 (Issue 1)   |   Read:   |   Email: NTS Alert NTS Bulletin NTS Insight
Email not displaying correctly? Click here to view it in your browser.
NTS Alert

NTS Alert October 2009 (Issue 1)

Security in Cyberspace: The Return of the State

The recent cyber attacks on South Korea and the United States, as well as those on Georgia in 2008 and Estonia in 2007 have awakened a certain consciousness in the minds of the international community, particularly that of the security community. As if triggered by a sense of vulnerability, when these cyber attacks managed to disrupt normal services, states were hard pressed to extend national security policies to the realm of cyberspace especially those with highly developed information and communication technology structures. This edition of the Alert traces the securitisation of cyberspace in recent years and ponders its implications for human security.

Contents:
The NTS Alert Team
Mely Caballero-Anthony, Nur Azha Putra and Kevin Punzalan.

Introduction

The secretary-general of the United Nation’s (UN) International Telecommunication Union (ITU), Dr Hamadoun Toure, warned that the next world war could take place in cyberspace. Speaking to stakeholders from across all sectors including heads of state, Dr Toure called for global cooperation across all industries and sectors to provide cyber security which includes the protection of children, businesses and governments. He stressed that cyber security could only be achieved within an international global framework comprising countries who are committed towards protecting their citizens and privacy.

'The next world war could take place in cyberspace and this needs to be avoided. The conventional wars have shown us that first of all, there is no winner in any war and second, the best way to win a war is to avoid it in the first place. So we need to plant the seeds for a safer cyberspace together. And it can only be done at the global level because the criminal needs no longer to be on the crime scene and you can attack many places at the same time in the cyberspace,’ said Dr Toure on the United Nations Radio website.

Although Dr Toure’s remarks seem alarming, he is not alone. In recent years, the proliferation of cyber wars and cyber crimes have driven multilateral institutions such as the European Union (EU), North Atlantic Treaty Organization (NATO) and the Association of Southeast Asian Nations (ASEAN) as well as national governments such as the United States (US), the United Kingdom (UK), Australia, Malaysia and Singapore towards securing their cyberspace.

Anti-cyber crime laws empower the national cyber security agencies with the legal mandate to protect the state’s critical information and communications technology (ICT) networks and infrastructure, particularly from international cyber criminals and cyber terrorists. The initial phase of delivering ICT infrastructures which drove the transformation from the Industrial Society to the Information Society has now been coupled with efforts to secure cyberspace. ICT, which was initially meant to reduce the spatial dimension and enhance global communication, has now taken the added burden of national security and sovereignty.

^ To the top

Global Issues and Policy Pathways in Cyber Security

The issue of vulnerabilities and threats posed in cyberspace go beyond those which are politically motivated.

Global internet security giant, McAfee in its 2007 virtual criminology report, Cybercrime: The Next Wave, identified three emerging global trends in cyberspace – a growing threat to national security from web espionage, an increasing threat to online services and an emergence of a sophisticated market of software vulnerabilities.

In its latest 2008 report, Cybercrime versus Cyberlaw, McAfee highlighted several issues:

  • Governments have not given enough priority to cybercrime;
  • There is a lack of a transnational law enforcement regime to combat cyber crime which thus impedes international cooperation; and
  • Law enforcement at the national and local levels are ill-equipped to cope with increasing cyber crimes especially in digital forensics and evidence collection.

Earlier this year at the World Economic Forum, McAfee projected that companies worldwide have lost more than US $1 trillion in 2008 due to the loss of intellectual property rights and the costs of repairs to damaged data, amongst other things which were revealed in its report titled Unsecured Economies: Protecting Vital Information. In particular, the report revealed that cyber mafia gangs are increasingly trying to infiltrate corporations. Using phishing techniques, cyber criminals target top executives in an attempt to steal vital information.

A 2005 global report by Symantec Corporation, a global information security corporation, showed that Denial of Service attacks grew by nearly 700 per cent. These attacks increased by 119 per day to an average of 927 a day. The largest increase occurred in the small business sector and the education industry. The US, Germany and the UK are the top three locations where these attacks occurred.

More recently, the Symantec Internet Security Threat Report: Trends for 2008 observed that amongst the threat activity occurring in the government and infrastructure sectors in 2008, malicious activities occured the most in the telecommunications infrastructure sector. China, as a country of origin, accounted for 22 per cent of the total attacks conducted against gov-ernments worldwide. This represented an increase of 8 per cent in 2007. The most common form of attack against government sectors was in Denial of Service attacks. Meanwhile, 28 per cent of attacks originated from within the US and targeted the government sectors in Europe, the Middle East and Africa.

Telus Security Solutions, an international internet security firm, pointed out the rising rate of identity theft, increasing vulnerability due to shrinking time between exposure and attacks, increased incidents of spams, the targeting of desktop computers and web-based applications, and new risks stemming from mobility of data. Perhaps, more importantly is the ‘professionalisation’ of cybercrime. In recent years and perhaps due to the global economic recession, hacking has transformed from a personal hobby to that of an organised criminal business activity. In fact, Telus has singled out criminals rather than terrorists as the main perpetrators of internet-based attacks.

In addition to the proliferation of cyber crimes and cyber espionage, there have been an increased number of alleged incidents of international cyber wars and cyber terrorism.

^ To the top

International Cyber Attack Incidents

In 2007, Estonia was in the middle of a diplomatic dispute with Russia over their removal of a Russian public war memorial. As a result, or by coincidence, the Baltic state came under intense cyber warfare attacks. According to several news reports, these attacks resulted in the disabling of several government websites, newspaper organisations, two of the country’s largest banks and companies specialising in communications,. Estonia was especially vulnerable considering that it is one of the most wired countries in Europe.

Militarisation of cyberspace in ‘Black Code: Censorship, surveillance, and the militarisation of cyberspace’, by Ronald Deibert.

Although the issue of cyber security is not new, political observers noted that there has been an increase in the militarisation of cyberspace especially since 9/11. Deibert for instance, pointed out that, fuelled by the fear of the potential use by terrorists of electronic networks and an ‘electronic Pearl Harbour’, states have been gradually adopting offensive information warfare capabilities. Drawing upon the theory of the Revolution in Military Affairs, Deibert explained that states have increasingly adopted the innovative use of new technologies and organisation structures as a product of the advances made in the communication and computing technologies. Consequently, cyber war tools such as remote sensing and electronic viruses have led to a major change in the nature of warfare.

According to him, the US is leading the cyber arms race and employs computer hackers, developed advanced computer viruses, worms and Trojan horses and has drawn up guidelines for conducting cyber warfare. The guidelines include establishing the rules and framework within which the US would  penetrate and disrupt foreign states’computer systems. Deibert however was unable to cite or refer to any other sources apart from news reports.

Nevertheless, he was quick to point out that many observers are sceptical over the degree of threat involved due to the technological limitation of the ICT architecture, which limits assaults only to the realm of cyberspace and also because of the low pay-off for terrorists whose ultimate aim is premised on physical bodily harm.

Furthermore, Deibert highlighted that there has not been any real evidence of actual acts of cyber terrorism unless one adopts a maximalist perspective and considers any form of hacking and DDoS attacks as attempts towards mass destruction. To Deibert, hacking and DDoS attacks are merely attempts to periodically disrupt internet traffic.

For nearly three weeks, these websites were barraged with Distributed Denial of Service (DDoS) attacks which inevitably paralysed the targeted websites. DDoS is a situation whereby the host computer (or webserver), which houses the targeted website, is unable to respond or communicate with legitimate requests from other computers because its resources have been consumed by the barrage of requests from the attackers. Thus a DDoS attack serves to deny service to other legitimate users by consuming the webserver’s resources with an overwhelming number of requests.

A similar attack occurred in Georgia in August 2008 when the former Soviet state was under ‘cyber siege’. DDoS attacks were carried out against several government websites following a period of armed conflict between Georgia and Russia over the issue of South Ossetia. The affected websites were those of the Georgian presidential office, Ministry of Defense and Ministry of Foreign Affairs. Interestingly, independent security researchers found that the attacks came from internet traffic which originated in Germany but were re-routed to Georgia via Russia.

In July 2009, South Korea and the US were subjected to three waves of DDoS attacks. According to news reports, a leading South Korean national newspaper and its spy agency were hit by an unnaturally high volume of internet traffic. In the US, the White House and Pentagon were targeted. Perhaps to coincide with the American Independence Day, the first wave started on 4 July, followed by 7 July and finally on 9 July. However, subsequent statements from the affected government agencies and cyber security experts claimed that these attacks, while malicious, were not detrimental as it did not lead to any major disruptions.

Nearer to home, several Malaysian government websites, universities and private institutions were allegedly penetrated by Indonesian hackers during the Malaysia-Indonesia Ambalat dispute in 2005, according to a report by Malaysia’s Centre for Maritime Security and Diplomacy. High-profile websites that were hacked included the Malaysian Communication and Multimedia Commission, the Universiti Sains Malaysia and the Public Works Department. The hackers left behind a political message alluding to the disputed Ambalat issue and Malaysia’s Ops Tegas. Ops Tegas was a nation-wide law enforcement operation which targeted illegal immigrants.

The report further mentioned that the hacker left the following message on the Public Works Department website:

With respect,

In the name of the law, I order you, Malaysian government, please retreat from Indonesian area. Please don’t be too greedy. Indonesia is having bad days recently. The natural disasters, increasing poverty, etc. Your country is much more prosperous than Indonesia. Don’t you be ashamed?

FYI. I’m not a hacker.

^ To the top

Re-rationalising Cyber Attacks

The writers of this NTS Alert use the word ‘alleged’ repeatedly throughout to exercise caution when linking international cyber attacks to conflicts between states, for several reasons. The main reason is that, while ICT has developed rapidly over the last few decades, most states are still ill-equipped in evidence gathering and digital forensics. While there is the technological capability to trace and therefore locate the physical location of cyber attacks, it remains difficult to determine the actual perpetrators and their motives unless they are caught and prosecuted. In the minds of traditional security analysts, cyber vandalism could easily be passed off as acts of terrorism while commercial hacking could be misintepreted as cyber espionage.

In all of the international cyber attacks cited above, news reports, political observers and security specialists were quick to frame and link these cyber attacks to strained diplomatic and international relations and armed conflicts, particularly in the case of Georgia. Despite the lack of actual evidence and in the absence of any arrests, attempts at rationalising cyber conflicts remain speculative at best and politicised at worst. As pointed out by political observer, Ronald Deibert,

‘In spite of the alarm, there are no empirical examples of cyber-terrorism to date, unless the term is used so broadly as to encompass politically motivated hacks on websites and occasional inconveniences caused by denial of service attacks.’

Perhaps more worrying is the potential for such speculation and politicisation to intensify already- deteriorating diplomatic relations between affected nations.

^ To the top

Policy Pathways in National Cyber Security Policies

Following the recent spate of international cyber attacks, the issue of cyber security has inevitably received increased attention from the security community. In certain countries, the issue of cyber security has been elevated to the level of high politics and figures prominently in the national security agenda and ICT architecture. Cyber security policies have been formulated with the intent to defend the integrity of states’ information systems and communication networks while national cyber security agencies in its different permutations have been created to institutionalise these policies. Most of these cyber security doctrines were articulated within the language of traditional security norms that emphasises state security and sovereignty.

For instance, at the highest international forum and as mentioned earlier, the Secretary-General of the UN’s ITU, Dr Toure warned that the next world war may occur in cyberspace. His warning leaves little to the imagination.

In a US government report titled Cyberspace Policy Review released in May 2009, it was mentioned that threats to cyberspace have security implications for the global economic and security challenges of the 21st century. Other news reports quoted the Director of US National Intelligence as saying that the biggest cyber threat facing the US is from other nation-states, particularly Russia and China.

In an interview with the British Broadcasting Corporation, the UK prime minister said that terrorists are using the internet in an exploitative way and therefore Britain needs to develop a national security strategy to protect itself from organised crime and terrorist threats from individuals, companies and governments.

Suleyman Anil, a senior official with NATO, was quoted in news reports as saying that ‘cyber defence is now mentioned at the highest level along with missile defence and energy security.’ In the same report, Anil suggested that rogue nations would resort to cyber terrorism to shut down formal online communication networks and the websites of official institutions.

In Southeast Asia, Singapore and Malaysia have taken a stand on cyber security albeit with slight variations in conceptual models. Prior to the launching of the Singapore Infocomm Technology Security Authority (SITSA) on 1 October 2009, the Ministry of Home Affairs announced that the SITSA mission is to secure the country’s information technology environment against external threats to national security such as cyber terrorism and cyber espionage. Amongst its other area of focus, SITSA is also responsible for the country’s planning, preparedness and response against major external cyber attacks. Its immediate tasks is twofold: First, it plans to strengthen the critical information infrastructure against cyber attacks and second, to achieve a higher level of national preparedness in response to cyber attacks.

The Malaysian cyber security agency, CyberSecurity Malaysia, was established in 2007 under the purview of the Ministry of Science, Technology and Innovation, to reduce the nation’s vulnerability in ICT systems and networks, amongst other objectives. However, CyberSecurity Malaysia is not a law enforcement agency but instead provides cyber forensics and analysis and also provides expert witnesses in court. The agency operates within a larger national cyber security policy framework designed to support a K-economy (knowledge-based economy). Although there was no mention of specific threats such as cyber terrorism, it frames cyber threats as one which is detrimental towards its use of ICT for socio-economic development.

^ To the top

Securitisation of Cyberspace

Judging by the national cyber security policies as highlighted earlier, it appears that cyberspace has effectively been securitised to the extent that states have generally adopted a defensive cyber security posture. Most cyber security policies are framed within the language of national security and in the interests of protecting national economies. States and the business community are increasingly vulnerable to cyber attacks, cyber espionage and commercial hacking. The security threats posed by cyber terrorists from rogue nations and ‘hackers’ posed significant danger to the social, political and economic survival of nations, as security specialists and policymakers have argued. In fact, if left undeterred, cyber wars could even lead to a third world war, as Dr Toure has warned. Thus, the survival of states and the global economy is dependent on the institutionalisation of a cyber security agenda, which is primarily targeted at securing the integrity of the national communications and information architecture and the protection of classified data.

Humanising Cyberspace

However, there is also the element of human security in cyberspace which must be taken into consideration in analysing the security implications of cyberspace. States are not the only referent object as the widespread implementation of ICT has transformed society into one which is dependent on the production and delivery of information. The general consensus is that ICT was responsible for the transformation from the Industrial Society to the Information Society. Access to information has been a key characteristic of the Information Society. In fact, to a certain extent, vulnerabilities in the Information Society is measured by the degree of an individual or society’s acessibility to information.

In his speech which appeared on the Bangkok Post news website, Professor Vitit Muntarbhorn outlined several issues which test the linkage between human security and the information age. Amongst these issues are ‘access to information and education, reduction of internet gap, cyberspace law and human capacity building for information security and community-based approach’.

Professor Vitit opines that human security is dependent on the access to information and education, and are interlinked with access to quality education, which can be delivered on the ICT platform.

Furthermore, a person’s potential for development can be increased if there is access to modern communication channels. Thus computer literacy, which is a basic prerequisite for many jobs, is necessary in the employment market in the Information Society. However, he pointed out that there is a wide internet gap between developed and developing societies which further disadvantages developing communities’ economies. The internet gap has to be reduced to decrease this disparity.

The liberalisation of cyberspace serves as a liberating force for human security because people are free to express themselves and communicate via cyberspace. However, state regulations which attempt to control cyberspace may be met with resistance, although it could serve to protect copyright laws and prevent human rights abuses.

Professor Vitit advocates human-capacity building to deter any compromise in information security. Staff who are information-proficient and skilled in computer skills and are of the suitable psychological make-up could respond to the needs of an information security environment better than those who lack these attributes.

Finally, a community-based approach towards the promotion and protection of human security would lead towards the positive use of information. This requires the drawing in of community participation of civil society organisations, community watchdogs as well as the media in generating the right information, which could then be disseminated to the larger society.

^ To the top

Conclusion

The international cyber attacks incidents in recent years have awoken a certain consciousness on the need to extend national security interests to the realm of cyberspace. As if triggered by the international DDoS attacks which occurred in Georgia and then Estonia, followed by the US and South Korea, states which have a highly developed ICT structure have taken the issue of cyber security to the next level. The institutionalisation of cyber security agencies and national cyber security policies marked a turning point in the evolution of international politics, conflicts and warfare.

Amidst these developments, there is also a growing concern amongst non-governmental organisations, global civil society and political observers of the impact of the securitisation of cyberspace on human security. This new development also raises questions about the impact of national cyber security policies on national governments in terms of governance and bureaucratic procedures. Another issue of concern is how would these national cyber security policies affect international cooperation? Would it lead to greater cooperation or to a widened technological or internet gap that would leave developing economies and societies further behind? These are some of the issues that will be discussed in the next edition of the NTS Alert.

EU Convention on Cybercrime

Opening for signature Entry into force
Place: Budapest

Date: 23/11/2001
Conditions: 5 Ratifications including at least 3 member States of the Council of Europe

Date : 1/7/2004

Status as of October 14, 2009.

Presently, transnational cooperation on cyber security is certainly not comprehensive enough. To begin with, international cooperation lacks adequate global participation and thus support. It is not as extensive as the global use of ICT. As of 12 October 2009, despite its limitations, the European Union (EU) Convention on Cyber Security is perhaps the most comprehensive and extensive, although the agreement is only signed by EU member states, the US and a handful of others.

Refer to appendix for complete list.


Glossary of Key Cyber Security Terms

Cyberspace

An environment in which digitized information is distributed on networks of computers.

Cyber Security

Measures taken to protect computers or critical infrastructure, although some experts suggest that it is about protecting everything of value.

Cyber Warfare

Using computers and the Internet to attack others via their computer systems. Targets may include military computer networks, power grids, banks, and government and media Web sites. Most often the goal is to disrupt the functioning of the target system.

Cyber Crime

Criminal activities that make use of computers or networks.

Distributed Denial-of-Service Attacks

Flooding the networks or servers of individuals or organizations with false data requests so they are unable to respond to requests from legitimate users.

Cyber Terrorism

The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.

Cyber Espionage / Cyber Spying

The act or practice of obtaining secrets (sensitive, proprietary or classified information) from individuals, competitors, rivals, groups, governments and enemies also for military, political, or economic advantage using illegal exploitation methods on internet, networks, software and or computers.

Source: wikipedia

Note:

There is no standard definition of cyber security terms since perception of security threats varies according to context. Therefore, this list is to be treated as a general reference only and not to be cited in relation to the NTS Alert.

Source: The U.S Federal Bureau of Investigation
Link: http://www.america.gov/st/peacesec-english/2009/September/20090917175715sjhtrop0.2718012.html

^ To the top

 

References

About us, Cybersecurity Malaysia, Available at <http://www.cybersecurity.my/en/about_us/establishment/main/detail/733/index.html?mytabsmenu=0>.

Bush Orders Guidelines for Cyber-Warfare, Washingtonpost.com, February 7 2003. Available at <http://www.washingtonpost.com/ac2/wp-dyn/A38110-2003Feb6?language=printer>.

Buzan, Barry, and Ole Waever, Security: A New Framework for Analysis, Lynne Rienner Publishers, United Kingdom, 1998.

Cyberspace Policy Review, National Security and Homeland Security Councils, United States Government, May 2009.

Cybercrime versus Cyberlaw, McAfee Virtual Criminology Report, McAfee Inc., 2008.

Cybercrime: The Next Wave, McAfee Virtual Criminology Report, McAfee Inc., 2007.

Unsecured Economies: Protecting Vital Information, McAfee Inc., 2008.

Deibert, Ronald, ‘Black Code: Censorship, surveillance, and the militarisation of cyberspace’, vol. 32, no. 3, pp. 501-30, Millennium: Journal of International Studies, 2003.

European Union Convention on Cybercrime. Available at <http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CL=ENG>.

‘Human security as a challenge for the information age’, BangkokPost.com, 4 September 2009. Available at <http://www.bangkokpost.com/opinion/opinion/23217/human-security-as-a-challenge-for-information-age>.

‘ITU chief stresses need for cooperation to protect cyberspace’, United Nations Radio, 6 October 2009.

Kierkegaard, Sylvia, ‘Cracking down on cybercrime global response: The Cybercrime Convention’, International Information Management Association, vol. 5, issue 1, 2005.

Malaysia’s National Cyber Security Policy, Ministry of Science, Technology and Innovation. Available at <http://www.nitc.org.my/index.cfm?&menuid=57>.

‘Nato says cyber warfare poses as great a threat as a missile attack’, guardian.co.uk, 6 March 2008.

Schneier, Bruce, Cyberwar: Myth or Reality, November 2007. Available at <http://www.schneier.com/essay-201.html>.

Trends for 2008, Symantec Corporation, Symantec Internet Security Threat Report, 2009. Available at <http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_exec_summary_internet_security_threat_report_xiv_04-2009.en-us.pdf>.

Understanding Cybercrime: A Guide for Developing Countries, ITU Telecommunication Development Center, April 2009.

Zubir, Mokhzani, Exchange of ‘cyber-fire’ during the Malaysia-Indonesia Ambalat dispute: A lesson for the future, Centre for Maritime Security and Diplomacy, 2005.

^ To the top

Appendix

Member States of the Council of Europe

States

Signature

Ratification

Entry into force

Notes

R. 

D. 

A. 

T. 

C. 

O. 

Albania  

23/11/2001  

20/6/2002  

1/7/2004  

   

   

   

X  

   

   

   

Andorra  

   

   

   

   

   

   

   

   

   

   

Armenia  

23/11/2001  

12/10/2006  

1/2/2007  

   

   

   

X  

   

   

   

Austria  

23/11/2001  

   

   

   

   

   

   

   

   

   

Azerbaijan  

30/6/2008  

   

   

   

X  

X  

X  

X  

   

   

Belgium  

23/11/2001  

   

   

   

   

   

   

   

   

   

Bosnia and Herzegovina  

9/2/2005  

19/5/2006  

1/9/2006  

   

   

   

X  

   

   

   

Bulgaria  

23/11/2001  

7/4/2005  

1/8/2005  

   

X  

X  

X  

   

   

   

Croatia  

23/11/2001  

17/10/2002  

1/7/2004  

   

   

   

X  

   

   

   

Cyprus  

23/11/2001  

19/1/2005  

1/5/2005  

   

   

   

X  

   

   

   

Czech Republic  

9/2/2005  

   

   

   

   

   

   

   

   

   

Denmark  

22/4/2003  

21/6/2005  

1/10/2005  

   

X  

   

X  

X  

   

   

Estonia  

23/11/2001  

12/5/2003  

1/7/2004  

   

   

   

X  

   

   

   

Finland  

23/11/2001  

24/5/2007  

1/9/2007  

   

X  

X  

X  

   

   

   

France  

23/11/2001  

10/1/2006  

1/5/2006  

   

X  

X  

X  

   

   

   

Georgia  

1/4/2008  

   

   

   

   

   

   

   

   

   

Germany  

23/11/2001  

9/3/2009  

1/7/2009  

   

X  

X  

X  

   

   

   

Greece  

23/11/2001  

   

   

   

   

   

   

   

   

   

Hungary  

23/11/2001  

4/12/2003  

1/7/2004  

   

X  

X  

X  

   

   

   

Iceland  

30/11/2001  

29/1/2007  

1/5/2007  

   

X  

   

X  

   

   

   

Ireland  

28/2/2002  

   

   

   

   

   

   

   

   

   

Italy  

23/11/2001  

5/6/2008  

1/10/2008  

   

   

   

X  

   

   

   

Latvia  

5/5/2004  

14/2/2007  

1/6/2007  

   

X  

   

X  

   

   

   

Liechtenstein  

17/11/2008  

   

   

   

   

   

   

   

   

   

Lithuania  

23/6/2003  

18/3/2004  

1/7/2004  

   

X  

X  

X  

   

   

   

Luxembourg  

28/1/2003  

   

   

   

   

   

   

   

   

   

Malta  

17/1/2002  

   

   

   

   

   

   

   

   

   

Moldova  

23/11/2001  

12/5/2009  

1/9/2009  

   

   

X  

   

X  

   

   

Monaco  

   

   

   

   

   

   

   

   

   

   

Montenegro  

7/4/2005  

   

   

55  

   

   

   

   

   

   

Netherlands  

23/11/2001  

16/11/2006  

1/3/2007  

   

   

   

X  

X  

   

   

Norway  

23/11/2001  

30/6/2006  

1/10/2006  

   

X  

X  

X  

   

   

   

Poland  

23/11/2001  

   

   

   

   

   

   

   

   

   

Portugal  

23/11/2001  

   

   

   

   

   

   

   

   

   

Romania  

23/11/2001  

12/5/2004  

1/9/2004  

   

   

   

X  

   

   

   

Russia  

   

   

   

   

   

   

   

   

   

   

San Marino  

   

   

   

   

   

   

   

   

   

   

Serbia  

7/4/2005  

14/4/2009  

1/8/2009  

55  

   

   

X  

   

   

   

Slovakia  

4/2/2005  

8/1/2008  

1/5/2008  

   

X  

X  

X  

   

   

   

Slovenia  

24/7/2002  

8/9/2004  

1/1/2005  

   

   

   

X  

   

   

   

Spain  

23/11/2001 r

   

   

   

   

   

   

   

   

   

Sweden  

23/11/2001  

   

   

   

   

   

   

   

   

   

Switzerland  

23/11/2001  

   

   

   

   

   

   

   

   

   

the former Yugoslav Republic of Macedonia  

23/11/2001  

15/9/2004  

1/1/2005  

   

   

   

X  

   

   

   

Turkey  

   

   

   

   

   

   

   

   

   

   

Ukraine  

23/11/2001  

10/3/2006  

1/7/2006  

   

X  

   

X  

   

   

   

United Kingdom  

23/11/2001  

   

   

   

   

   

   

   

   

 

Non-member States of the Council of Europe

States 

Signature 

Ratification 

Entry into force 

Notes 

R. 

D. 

A. 

T. 

C. 

O. 

Canada  

23/11/2001  

   

   

   

   

   

   

   

   

   

Chile  

   

   

   

   

   

   

   

   

   

   

Costa Rica  

   

   

   

   

   

   

   

   

   

   

Dominican Republic  

   

   

   

   

   

   

   

   

   

   

Japan  

23/11/2001  

   

   

   

   

   

   

   

   

   

Mexico  

   

   

   

   

   

   

   

   

   

   

Philippines  

   

   

   

   

   

   

   

   

   

   

South Africa  

23/11/2001  

   

   

   

   

   

   

   

   

   

United States  

23/11/2001  

29/9/2006  

1/1/2007  

   

X  

X  

X  

   

   

   


Total number of signatures not followed by ratifications: 

20 

Total number of ratifications/accessions: 

26 

Notes:
(55) Date of signature by the state union of Serbia and Montenegro.
a: Accession - s: Signature without reservation as to ratification - su: Succession - r: Signature "ad referendum".
R.: Reservations - D.: Declarations - A.: Authorities - T.: Territorial Application - C.: Communication - O.: Objection.
Source : Treaty Office on http://conventions.coe.int

^ To the top

About Us
The Centre for Non-Traditional Security Studies is a research centre of the S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore. Please visit the Centre’s website at www.rsis.edu.sg/nts/home.html, for more information or email us at NTS_Centre@ntu.edu.sg.

Share this Alert