Assessment – ​​Cyber ​​sovereignty Trendy Blogger

Cyber ​​sovereignty: international security, mass communication and the future of the Internet
By Lev Topor
Springer2024

Cyber ​​sovereignty is highly relevant to current geopolitical dynamics, addressing pressing issues such as cyberwar, disinformation, and the role of technology in international power struggles. Lev Topor’s analysis provides valuable insights into how states are confronting the complexities of the digital age and the implications for global security and stability. Beyond technical and political analysis, Topor raises important ethical and philosophical questions about sovereignty, freedom of expression, and the balance between security and freedom in cyberspace. The book examines the complex and evolving landscape of cyberspace and its implications for international relations, security and governance. Toper provides a comprehensive analysis of how nation states are increasingly asserting control over their digital domains, creating tailor-made versions of the Internet that align with their political, religious, cultural, and security agendas.

After Chapter 1, on the study’s methodology, arguments and conclusions, Topor provides a historical overview of the development of the Internet from its origins as a US defense project (ARPANET) to its current status as a network global communications. This context is crucial for understanding geopolitical power struggles around cyberspace. Topor argues that the Internet, initially seen as a tool for global unity, has become a contested space where states fight for control and influence.

Chapter 3 examines the concepts of sovereignty, power, and international security as they apply to cyberspace. Topor introduces the idea behind “cyber sovereignty”, referring to the efforts of nation states to control their segment of the Internet while controlling their borders. By erecting digital borders and regulating content, states aim to protect national interests and maintain social stability. The book goes on to explore examples such as China’s Great Firewall, Russia’s RuNet, Iran’s National Information Network, and North Korea’s closed cyberspace known as Kwangmyong (“shining star”), unlike to the relatively open but vulnerable American, British and Israeli cyberspaces. cyberspace.

In Chapter 4, Topor delves into the field of cyberwarfare, highlighting how cyberattacks have become a new frontier in international conflict. The chapter explores 500 significant cases of cyberwarfare and also delves into details of incidents such as the Russian cyberattack on Ukraine’s power grid, the North Korean WannaCry ransomware attack, alleged Russian cyberattacks on US election processes, and more , demonstrating how cyber operations can disrupt national infrastructure and pose significant security threats. Topor highlights the importance of developing robust cybersecurity measures and international cooperation to mitigate these risks.

A significant part of the book is devoted to the phenomenon of disinformation and its impact on national resilience. In Chapter 5, Topor asks “Are countries immune to fake news?” It examines how states and non-state actors use cyberspace to spread false information, manipulate public opinion and destabilize societies. Case studies of Russian influence operations in the United States and Europe, as well as fake news carried out by Iran and Hamas in Israel, provide concrete examples of how disinformation campaigns can influence political outcomes and erode trust in democratic institutions. He is right to ask questions with difficult answers such as: How can a country respond to a false story online? Is a false story more dangerous to a nation than a missile? He says countries are not immune to disinformation, which can destabilize and create chaos. Each nation decides how to respond to “fake news,” while considering the risks of such retaliation.

Countries with robust cyber defenses and controlled digital spaces – Cyber ​​Security Domains (SCDs) – are explored in Chapter 6. Topor conducts a structured and equal examination of SCDs in North Korea, China, Russia, Iran and Saudi Arabia. He also discusses internet shutdowns in India and Myanmar, among others. In contrast, Chapter 7 focuses on Vulnerable Cyber ​​Domains (VCDs), highlighting countries with more open and vulnerable Internet spaces. It reviews the cyberspaces of the United States, United Kingdom and Israel. Topor also examines European cyberspace as a whole, which it refers to as a “cyberbloc” due to Europe’s regulatory efforts to govern cyberspace, such as the EU’s General Data Protection Regulation (GDPR). European Union, the Digital Services Act (DSA) and the Digital Markets Act (DMA) and others.

The frameworks in Chapters 6 and 7 represent attempts to balance national sovereignty with the need for international norms and cooperation. These chapters demonstrate critical differences in cyber sovereignty. The comparative analysis of secure and vulnerable cyber domains is among the strengths of the book, providing illuminating perspectives on how different countries develop their digital governance strategy. These chapters help illustrate the practical manifestations of cyber sovereignty. However, a more critical examination of the impact on civil society and international cooperation would have enriched the analysis.

Topor explains that the book is about strategy and not human rights. Yet these strategies have far-reaching implications for all of us. Internet restriction, censorship and limitation of freedom of expression can undermine fundamental human rights such as freedom of expression and access to information, thereby weakening democracy and civil society. These measures can stifle innovation, suppress dissent, and lead to societal polarization, economic stagnation, and diminished global collaboration on human rights. There is a fine line between too much and too little censorship.

The book argues that while these efforts are a step in the right direction, achieving global consensus on cyberspace governance remains a formidable challenge. Finally, Chapter 8 presents Topor’s predictions for the future of the Internet, discussing potential scenarios. Topor predicts four scenarios for the future development, or segmentation, of the Internet: (1) the Status quo news concerning cyberspace, (2) the emergence of international law applicable to cyberspace, (3) the creation of sovereign and secure “autonomous” cyber domains, and (4) the formation of cyber blocks, illustrated by the evolution of European cyberspace. While intriguing, these speculations sometimes seem too deterministic, underestimating the potential of emerging technologies and civil society movements to reshape the digital landscape.

Although the book provides an in-depth analysis of state perspectives on cyber sovereignty, it tends to overlook the implications for human rights and digital inclusion. The focus on national security and control may overshadow the importance of ensuring that cyberspace remains an open and inclusive platform for all users. A more balanced discussion of these issues would have strengthened the book’s overall argument. Additionally, although the book acknowledges the role of non-state actors such as cybercriminals and terrorist organizations, it does not explore their impact in sufficient depth. These actors play an important role in the digital landscape and their activities can have profound implications for national security and international stability. One of the main strengths of the book is its comprehensive and multidimensional analysis of cyber sovereignty. Topor successfully integrates historical, technical, political and legal perspectives to provide a holistic understanding of the subject. This interdisciplinary approach makes this book a valuable resource for scholars and practitioners of international relations, cybersecurity, and digital governance. The use of in-depth case studies is another notable strength, providing concrete evidence to support Topor’s arguments. Cyber ​​sovereignty makes a significant contribution to the literature on international relations and also cyber policy, particularly in its interdisciplinary approach to dissecting the intersections of technology, security, governance and society. The book is a crucial addition to the discourse on international security and the future of the Internet, challenging readers to reconsider the role of the digital domain in global politics. Future research should build on this foundation, delving deeper into the nuanced impacts of cyber sovereignty on global digital equity and freedom.

Further Reading on International Electronic Relations

Leave a Comment