Challenges to Cyber Sovereignty and Response Measures

205
DOI: 10.20542/0131-2227-2020-64-2-89-99

Xu Wenhong (xuwenhong@mail.ru),
Institute of Russian, East European and Central Asian Studies, Chinese Academy of Social Sciences, 3, Zhangzizhonglu Str., Beijing 100007, People’s Republic of China,
Belt and Road Research Center, Chinese Academy of Social Sciences, 3, Zhangzizhonglu Str., Beijing 100007, People’s Republic of China

Abstract. With the development of the Internet, it has gradually become an indispensable infrastructure for all countries in the world. Cyber security issues have been emerging in various countries recently, and countries around the world are beginning to build their own cyber security systems. The origin of all cyber security activities come from the “yber sovereignty”. “Sovereignty” refers to the supreme and exclusive power of administration over matters within a certain jurisdiction. “Cyber sovereignty” is a natural extension of national sovereignty in the cyber space. There are different opinions on the cyber security building. When the meaning of “Internet freedom” is significant, we believe that the words “cyber sovereignty” are the first and foremost in the cyber security system building. And cyber sovereignty itself is a foundation of all corresponding activities. Theoretically, the cyber space has no boundaries, but legally, it is not out of reach of law. China is a staunch supporter and advocate of cyber sovereignty. At present, cyber sovereignty faces many challenges. In order to meet them, it is necessary to study the future cyber sovereignty (security) with emerging countries involved. It is impossible for any country to get absolute security. Usually, a great power promotes freedom while others stress on game rules. Emphasizing the role of cyber sovereignty in the cyber security building does not mean shutting down the cyber and secluding a country from the outside world. The international community should build a new cyber governance order based on mutual respect for cyber sovereignty and sovereign equality. Shared governance should be the future of cyber sovereignty.

Keywords: cyber sovereignty, cyber security, cyber governance, challenge, risk, response measures


REFERENCES

1. Remarks on Internet Freedom by Hillary Rodham Clinton, Secretary of State. U. S. Department of State, January 21, 2010. Available at: https://2009-2017.state.gov/secretary/20092013clinton/rm/2010/01/135519.htm (accessed 29.01.2019).

2. Biersteker T., Weber C. State Sovereignty as Social Construct. Cambridge Studies in International Relations, Cambridge University Press, Book 46, 1996. 316 p.

3. Draft Declaration on Rights and Duties of States. 1949. Available at: http://legal.un.org/docs/?path=../ilc/texts/instruments/english/draft_articles/2_1_1949.pdf&lang=EF (accessed 13.02.2019).

4. International Strategy for Cyberspace. Prosperity, Security, and Openness in a Networked World. The White House. May 2011. Available at: https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf (accessed 01.02.2019).

5. The Five Principles of Peaceful Co-existence. People, 28.06.2004. Available at: http://en.people.cn/200406/28/eng20040628_147763.html (accessed 01.02.2019).

6. Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations General Assembly. 24 June 2013. Available at: https://digitallibrary.un.org/record/753055 (accessed 29.01.2019).

7. Limbago A. The Global Push for Cyber Sovereignty Is the Beginning of Cyber Fascism. The Hill, 14.12.2016. Available at: https://thehill.com/blogs/congress-blog/technology/310382-the-global-push-for-cyber-sovereignty-is-the-beginning-of (accessed 29.01.2019).

8. National Cyber Strategy of the United States of America. The White House. September 2018. Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf (accessed 30.01.2019).

9. Internet Freedom. U.S. Department of State. Available at: https://www.state.gov/internet-freedom/ (accessed 25.01.2019).

10. Jork J.C. The Myth of a Borderless Internet. The Atlantic, 03.06.2015. Available at: https://www.theatlantic.com/technology/archive/2015/06/the-myth-of-a-borderless-internet/394670/ (accessed 25.01.2019).

11. Rothkopf D. Is Unrestricted Internet Access a Modern Human Right? Foreign Policy, 02.02.2015. Available at: https://foreignpolicy.com/2015/02/02/unrestricted-internet-access-human-rights-technology-constitution/ (accessed 25.01.2019).

12. The Sovereign Internet Bill Passed in First Reading. The State Duma of the Federal Assembly of the Russian Federation. 12.02.2019 (In Russ.) Available at: http://duma.gov.ru/news/29748 (accessed 26.02.2019).

13. Attack from the Inside: Operators Will Test the Law on Stability of the Runet. RBC, 08.02.2019 (In Russ.) Available at: https://www.rbc.ru/technology_and_media/08/02/2019/5c5c51069a7947bef4503927 (accessed 26.02.2019).

14. Russia Is Ready for a Shut-Down of the Internet – Putin’s Adviser. The Moscow Times, 05.05.2018. Available at: https://www.themoscowtimes.com/2018/03/05/russia-is-ready-for-a-shut-down-of-the-internet-putins-adviser-a60704 (accessed 26.01.2019).

15. Downes L. Requiem for Failed UN Telecom Treaty: No One Mourns the WCIT. Forbes, 17.12.2012. Available at: https://www.forbes.com/sites/larrydownes/2012/12/17/no-one-mourns-the-wcit/#72b3344d5b2c (accessed 27.01.2019).

16. Kuz’min V. Standarty dlya seti. Dmitrii Medvedev vystupil za mezhdunarodnoe regulirovanie interneta [Standards for the Net. Dmitry Medvedev Spoke in Favor of International Internet Regulation]. Rossiiskaya gazeta, 16.12.2015. Available at: https://rg.ru/2015/12/16/internet-site.html (accessed 27.01.2019).

17. Joint Statement by the President of the Russian Federation and the Chairman of the People’s Republic of China on Cooperation in the Development of the Information Space. President of Russia. June 25, 2016 (In Russ.) Available at: http://www.kremlin.ru/supplement/5099 (accessed 27.01.2019).

18. Experts on the “Conversation with Medvedev”. Agency of Political and Economic Communications, 30.11.2017 (In Russ.) Available at: http://www.apecom.ru/articles/?ELEMENT_ID=4270 (accessed 27.01.2019).

19. Yarovaya M. Igor’ Ashmanov: “Segodnya informatsionnoe dominirovanie – eto vse ravno, chto gospodstvo v vozdukhe” [Igor’ Ashmanov: “Today, Information Dominance is the Same as Air Superiority”]. Ain, 01.05.2013. Available at: https://ain.ua/2013/05/01/igor-ashmanov-segodnya-informacionnoe-dominirovanie-eto-vseravno-chto-gospodstvo-v-vozduxe/ (accessed 27.01.2019).

20. Troops of Information Operations Were Created in Russia. RIA Novosti, 22.02.2017 (In Russ.) Available at: https://ria.ru/20170222/1488596879.html (accessed 27.01.2019).

21. International Code of Conduct for Information Security. Ministry of Foreign Affairs of the People’s Republic of China. 12.09.2011. Available at: https://www.fmprc.gov.cn/mfa_eng/wjdt_665385/2649_665393/t858323.shtml (accessed 26.01.2019).

22. Press Release on the Adoption of a Russian Resolution on International Information Security at the UN General Assembly. The Ministry of Foreign Affairs of the Russian Federation. 7 December 2018. Available at: http://www.mid.ru/en_GB/foreign_policy/news/-/asset_publisher/cKNonkJE02Bw/content/id/3437775 (accessed 26.01.2019).

23. Xi Jinping Emphasizes the Significance of “Respect for Network Sovereignty”. People, 16.12.2015 (In Chin.) Available at: http://it.people.com.cn/n1/2015/1216/c1009-27937865.html (accessed 26.01.2019).

24. National Security Law of the People’s Republic of China (2015). Ministry of National Defense of the People’s Republic of China. Available at: http://eng.mod.gov.cn/publications/2017-03/03/content_4774229.htm (accessed 27.01.2019).

25. People’s Republic of China Network Security Law. Xinhua News, 19.09.2019 (In Chin.) Available at: http://www.xinhuanet.com/local/2017-09/19/c_129707671.htm (accessed 27.01.2019).

26. Shires J. Between Multistakeholderism and Sovereignty: Cyber Norms in Egypt and the Gulf States. Harward Kennedy School. Belfer Center for Science and International Affairs. October 12, 2018. Available at: https://www.belfercenter.org/publication/between-multistakeholderism-and-sovereignty-cyber-norms-egypt-and-gulf-states (accessed 27.01.2019).

27. Cybersecurity in the EU Common Security and Defense Policy (CSDP). Challenges and Risks for the EU. European Parliament. Available at: http://www.europarl.europa.eu/RegData/etudes/STUD/2017/603175/EPRS_STU(2017)603175_EN.pdf (accessed 27.01.2019).

28. Cyber Security Strategy of the European Union: an Open, Safe and Secure Cyberspace. European Data Protection Supervisor. 14 June 2013. Available at: https://edps.europa.eu/data-protection/our-work/publications/opinions/cyber-securitystrategy-european-union-open-safe-and_en (accessed 27.01.2019).

29. Rohrig W., Smeaton R. Cyber Security and Cyber Defence in the European Union. Cyber Security Review, May 2015. Available at: http://www.cybersecurity-review.com/articles/cyber-security-and-cyber-defence-in-the-european-union/ (accessed 27.01.2019).

30. Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations General Assembly. 24 June 2013. Available at: https://digitallibrary.un.org/record/799853 (accessed 27.01.2019).

31. Clinton H. Internet Rights & Wrongs: Choices and Challenges in a Networked World. The George Washington University, Washington D. C., February 15, 2011. American Rhetoric. Online Speech Bank. Available at: https://www.americanrhetoric.com/speeches/hillaryclintoninternetpolicyspeechgw.htm (accessed 27.01.2019).

32. McGuinness D. How a Cyber Attack Transformed Estonia. BBC News, 27.04.2017. Available at: https://www.bbc.co.uk/news/39655415 (accessed 02.02.2019).

33. Yang Yi. Full Text of BRICS Leaders Xiamen Declaration. Xinhua News, 04.09.2017. Available at: http://www.xinhuanet.com/english/2017-09/04/c_136583396_2.htm (accessed 02.02.2019).


Registered in System SCIENCE INDEX

For citation:
Xu Wenhong Challenges to Cyber Sovereignty and Response Measures. World Eonomy and International Relations, 2020, vol. 64, no. 2, pp. 89-99. https://doi.org/10.20542/0131-2227-2020-64-2-89-99



Comments (0)

No comments

Add comment







Indexed

 

 

 

 

Dear authors! Please note that in the VAK List of peer-reviewed scientific journals, in which the main scientific results of dissertations for the degree of candidate and doctor of sciences should be published for the “MEMO Journal” the following specialties are recorded:
economic sciences:
5.2.5. World Economy.
5.2.1. Economic Theory
5.2.3. Regional and Branch Economics
political sciences:
5.5.4. International Relations
5.5.1. History and Theory of Politics
5.5.2. Political Institutions, Processes, Technologies

 

Current Issue
2024, vol. 68, No. 5
Topical Themes of the Issue:
  • Are There Any Ways to Break Through the Korean Nuclear Impasse?
  • Contemporary U.S. Taiwan Policy: Balancing on the Edge
  • The Gulf Monarchies’ Vision of the Global Order Transformations and the Russian Place in It
  • At Post-Soviet Space
Submit an Article
INVITATION FOR PUBLICATION
The Editorial Board invites authors to write analytical articles on the following topics:
  • changes in the processes of globalization in modern conditions
  • formation of the new world order
  • shifts in civilization at the stage of transition to a digital society

The editors are also interested in publishing synthesis articles / scientific reviews revealing the main trends in the development of certain regions of the world - Latin America, Africa, South Asia, etc.