Richard E. Butler and the author in the secretariat workroom of the Old Melbourne City Hall writing the cybersecurity treaty provisions, December 1988. Photo courtesy of the author's legal assistant, Laina Raveendran-Greene.
Next week, July 1, 2020 marks the 30th anniversary of one of the most significant treaty instruments in modern times. On 1 July 1990, the Melbourne Treaty came into force as the first and only global treaty that enabled worldwide internets and mobile networks to exist, together with the cybersecurity provisions designed to protect those infrastructures. The achievement remains as an enduring tribute to Richard Edmund Butler of Australia who was one of the most influential, and best-loved Secretaries-General of the ITU.
Dick Butler as he was known by everyone had an almost encyclopedic familiarity with public international telecommunications law, technology, and the long arc of history. He was also universally admired as a dedicated international civil servant which, combined with his friendly Aussie persistence and considerable height, made him the ideal, formidable man for the task.
After he was elected Secretary-General in 1982, Dick decided that he would begin pulling together a team of trusted colleagues to embark on the preparation of a new treaty instrument for enabling global internets and mobile networks. At that time, it was unlawful for international leased circuits to be used for creating internets for data or mobile services available to the public. At the time, all internets were, by definition, private networks and only implemented within enterprises or governments. Like all the many internets, the DARPA Internet only existed internationally as a government network.
As my job in the FCC and across multiple Federal agencies significantly involved the ITU, Dick and I traded ideas about the conference for several years. As his team of compatriots floated concepts in published articles and at conferences, they were merged into the planning process. The model ultimately pursued was that for radio internets developed by the U.S. 60 years earlier by Herbert Hoover and William F. Friedman. At the FCC, I also reported to the former Director of DARPA who had previously authorized and oversaw internet development there, as well as headed up U.S. intelligence community advisory and coordination activities. Deciding the associated internet policies, regulations, and shaping international law were key components of the FCC work during those renaissance years, and supported by CIA and NSA experts. The significantly increased interest in the mid-80s in global internet and mobile networks resulted in Dick picking his hometown of Melbourne and Nov-Dec 1988 for the treaty conference.
In late 1987, things were sufficiently far along that Dick asked me to move from Boston to Geneva to join him as his counselor and Chief of Telecommunication Regulations to further develop the treaty provisions and help negotiate them at the Melbourne treaty conference the next year. In Boston, my job involved collaborating with multiple internet related entities that included the prime contractor for NSA's key cybersecurity platform SDNS (Secure Data Network System).
Standing with Peter Stephen Wilenski (right) who Dick asked to take over as Conference chair on the second day to help save it from disaster along with the changes described. Peter was a really unusual and incredibly talented Australian civil servant like Dick, who escaped from Poland to Australia in 1943. He died rather young in 1994. Photo courtesy of the author's legal assistant, Laina Raveendran-Greene.
As 1988 got underway, things became even more complicated and hectic when GATT (now the WTO) located near the ITU decided it also would develop treaty provisions entwined with the envisioned ITU internet treaty. One of the fortunate assets to assist the effort literally came walking in the door in the form of an energetic young lawyer from Singapore named Laina Raveendran who was doing graduate studies in Geneva and focused on harmonizing the two treaty developments in play. We hired her.
During 1988, all manner of legal and technical research, including historical precedents going back to 1850, was done to ensure the success of the first treaty for global internets and mobile networks. Countless hours were spent attending external meetings, presenting papers and writing articles worldwide. Dick spent day and night traveling and talking by phone to get senior officials from every country in the world, as well as the major industry user organizations, to agree on the provisions that were continually refined and redistributed every week using what the first network-based information system supporting a treaty conference was.
As the representatives from 133 nations were getting ready to head off to Melbourne in November 1988 to ink the first internet treaty, everything appeared good to go. The stated objective in the ITU press release was at hand an enduring treaty to "provide the basic foundation of norms and administrative mechanisms required not only for implementing the 'Networks of the 90's' and beyond but also for assuring the continued availability of traditional existing telecommunications services among the public throughout the world."
However, one of the worst possible events occurred in early November that spelled disaster. A Cornell University graduate student named Robert Tappen Morris created a worm that took down the entire DARPA internet infrastructure. To make this disaster even worse, the legendary New York Times investigative technology journalist John Gregory Markoff took an interest in the incident, and his articles were carried throughout the world almost every day by the International Herald Tribune. It didn't take John long to discover that the identity of Morris' equally legendary but publicly unknown father was NSA's Chief Scientist.
Shortly after Dick's team arrived in Melbourne, the delegates from the USSR several of whom were very knowledgeable KGB and GRU engineers - made it plain they were prepared to call for an end of the conference as a result of the Morris incident. Over several long days, Dick's team developed key provisions for what is the first and to this day the only, global cybersecurity treaty.
It was clever. The same NSA group that Morris' father led at NSA, had the previous year made public the solutions necessary for internet security the SDNS initiative. Furthermore, these solutions were being brought into the CCITT (now ITU-T). The quid pro quo for allowing global public internets to come into existence was adherence to the SDNS provisions being moved into ITU international standards. Dick approached the USSR delegation, who agreed, and it saved the treaty. The photo here is a historical one Dick and I writing the cybersecurity provisions into the draft treaty text.
The conference was extended for several days. All 131 nations signed the treaty at Melbourne, and almost every country in the world subsequently ratified it. It remains an unparalleled achievement.
Dick decided to leave on a high note. He penned an article marking what had been achieved that was published in the Telecommunication Journal in 1989 with its last paragraph noting:
"The CCITT [now ITU-T] Plenary Assembly has helped to provide a concrete technological and operational foundation for the orderly development of the network while the World Administrative Telegraph and Telephone Conference (WATTC88) provided a regulatory framework appropriate for the diverse technological, operational and national policy environments which are so rapidly evolving today."
With the treaty initiative accomplished and yearning to return to his native Australia with his beloved wife Pat after spending decades in Geneva, he announced shortly after the Melbourne conference he would be stepping down as Secretary-General and privately championed Pekka Tarjanne from Finland as his successor. Dick waved good-bye to his team at the ITU in December 1989. He passed away at 86 in 2012 but in the years between helped leverage his incredible knowledge and negotiating skills to bring about many new satellites and high-altitude radio systems for the poor and underserved areas of the world.
Conference Secretariat team, December 1988. Photo courtesy of the author's legal assistant, Laina Raveendran-Greene.
On 1 July 1990 30 years ago the Melbourne Treaty came into force. As my position at the ITU also included being the Chief of International Telecommunication Regulations, under the new Secretary-General who carried on Dick's mission, I issued advisories to signatory nations to implement the internet and cybersecurity treaty provisions. Private leased lines began to be made available pursuant to the treaty, and new dynamic network globalization ensued. NSA's SDNS cybersecurity platform moved into CCITT standards and was implemented in demonstration networks.
Unfortunately, the ground-breaking, historic Melbourne internet and cybersecurity treaty did not fare well in the following years. The Clinton-Gore Administration subsequently decided it would simply ignore the treaty provisions, and halted the NSA SDNS initiative and implementations, along with all government domestic oversight and regulations of internets. Everything was left to the "Information Superhighway" and constant anarchy of an unfettered marketplace. It indeed brought about almost 30 years of cyber chaos to produce what exists today.
Subsequent U.S. Administrations and lobbyists took up the Clinton-Gore gambit of disparaging and ignoring the Melbourne Treaty conveniently sweeping it under the carpet of ignorance, jingoism, and xenophobia that pervades Washington. However, Russia and many other countries have not forgotten what happened. They occasionally exploit the resulting international legal vacuum to remind the U.S. But then, combined with the international disgraces of the current U.S. Administration, trust in the U.S. honoring its international agreements has evaporated anyway. International stature, integrity and trust - once destroyed are not easily acquired again. Reconstruction after the Trump Plague will be difficult.
The Melbourne Treaty's enduring value proposition is increasingly underscored by the emergence of extraterritorial network architectures and services in a 5G world and the occasional pleas of transnational corporate general counsels for a multilateral treaty instrument. The answer is as Dick would say in his emails until his passing - go see U.S. Treaty Document 102-13. The supreme irony is that the model for the Melbourne Treaty was that devised by the U.S. itself a hundred years ago.
Perhaps on the 1 July 2020, some reflection might occur on what was a finer hour in public international law led by a humble visionary man from Australia with enormous integrity and facilitated by the U.S. national security community.
See more here:
Marking the 30th Anniversary of the Internet and Cybersecurity Treaty - CircleID
- Google researchers have cracked a key internet security tool - Recode [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Letter: Internet security is in jeopardy - INFORUM [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- New internet security device launched to safeguard schools against child abuse - Phys.Org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Data from internet-connected teddy bears held ransom, security expert says - Fox News [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Google cracks longtime pillar of internet security - MarketWatch [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- BullGuard | Internet Security and Antivirus protection ... [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet Storm Center - SANS Internet Storm Center [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet-connected 'smart' devices are dunces about security - ABC News [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Derry internet security expert warns that advanced internet technology 'a risk to us all' - Derry Now [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Firewall Test, Web Tools and Free Internet Security Audit ... [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security in the spotlight: How is the internet safer today than it was 20 years ago? - Mobile Business Insights (blog) [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Jim Mullen: Unsocial internet security | Columnists | auburnpub.com - Auburn Citizen [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security company launches a perfume line to promote cybersecurity - Mashable [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Internet security - Wikipedia [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Are you undermining your web security by checking on it with the wrong tools? - The Register [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog) [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Carpe Diem: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Motivation Monday: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Medical records of 26m patients at risk because of GP surgeries' failing internet security - The Sun [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Free Internet Security | Why Comodo Internet Security Suite ... [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Internet Security Software | Trend Micro USA [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Fix crap Internet of Things security, booms Internet daddy Cerf - The Register [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- What the Cloudbleed disaster says about the state of internet security - Information Age [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Google Has Declared Symantec Harmful To Internet Security - UPROXX [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Internet Security Analysts: North Korea Is Planning a Global Bank Heist - Breitbart News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Internet Security Firm Confirms WikiLeaks 'Vault 7' At Least 40 Cyberattacks Tied to the CIA - The Ring of Fire Network [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices - ZDNet [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- A Global Industry First: Industrial Internet Consortium and Plattform Industrie 4.0 to Host Joint IIoT Security ... - Business Wire (press release) [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- Mucheru urges private sector to boost investment in internet security - The Standard (press release) [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Cloudflare debuts a security solution for IoT - TechCrunch [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Russian-controlled telecom hijacks financial services' Internet traffic - Ars Technica [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Avira Internet Security Suite v15.0.26 - TechCentral.ie [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- NSA To Limit Some Collection Of Internet Communication - NPR [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- Report Indicates '10 Concerts' Facebook Trend Could Compromise Your Internet Security - Complex [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- "Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Don't Fall For This Tech Support Scam Targeting PC Users - KTLA [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Watch Hackers Sabotage an Industrial Robot Arm - WIRED [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Decoding Internet Security: Spear phishing - Washington Post [Last Updated On: May 5th, 2017] [Originally Added On: May 5th, 2017]
- From the Desk of Jay Fallis: To internet vote, or not to internet vote - BarrieToday [Last Updated On: May 7th, 2017] [Originally Added On: May 7th, 2017]
- Crippling cyberattack continues to spread around the world - Los Angeles Times [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cyber Security Experts: Russia Disproportionately Targeted by Malware - Voice of America [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- The Latest: 29000 Chinese institutions hit by cyberattack - ABC News [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- Cyberattack Aftershock Feared as US Warns of Its Complexity - New York Times [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- This week's poll: Priorities for improving internet security - The Engineer [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Akamai Releases First Quarter 2017 State of the Internet / Security Report - PR Newswire (press release) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Do Macs get viruses? - PC Advisor [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga [Last Updated On: May 19th, 2017] [Originally Added On: May 19th, 2017]
- Security News This Week: Hoo-Boy, Mar-a-Lago's Internet Is Insecure - WIRED [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Internet security firm calls for law to compel information sharing to ... - The Star, Kenya [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Check It Out: No need to unplug after reading books on internet security - The Columbian [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- How to beat security threats to 'internet of things' - BBC News - BBC News [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Best Mac antivirus 2017 - Macworld UK [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Paranoid about internet security? Here are the most secure OS options - The American Genius [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Blockchain Offers Hope for the Broken Internet - Fortune [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- New uses for RFID and security for the internet of things - Phys.Org [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Security Best Practices for the Internet of Things - Web Host Industry Review [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Internet infrastructure security guidelines for Africa unveiled - Premium Times [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China cyber-security law will keep citizens' data within the Great Firewall - The Register [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cyber security: Africa gets Internet security guidelines - TheNewsGuru [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Decoding Internet Security: Ransomware - Washington Post [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet security upgrade on course - Business Daily (press release) (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- What's the Safest Laptop For Internet Security? - HuffPost [Last Updated On: June 2nd, 2017] [Originally Added On: June 2nd, 2017]
- Every Day Is Internet Security Day - The Chief-Leader [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- 5 Reasons why internet security is crucial in 2017 - Techworm [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- Are Pop-Ups An Internet Security Threat? - Good Herald [Last Updated On: June 4th, 2017] [Originally Added On: June 4th, 2017]
- 3 Ways Software Programs Can Help With Internet Security in 2017 - Geek Snack [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Inside Social Security: Make every day your internet security day - Santa Ynez Valley News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- SOCIAL SECURITY: Every day is internet security day - Palm Beach Post [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]