World News

Review – Cyber ​​Sovereignty

Cyber ​​​​​​Sovereignty: International Security, Mass Communication, and the Future of the Internet
By Lev Topor
Springer2024

Cyber ​​Empire is particularly relevant to current geopolitical dynamics, addressing pressing issues such as cyber warfare, mis/disinformation, and the role of technology in international power struggles. Lev Topor’s analysis provides important insights into how states are navigating the challenges of the digital age and the implications for global security and stability. Beyond technical and political analysis, Topor raises important ethical and philosophical questions about sovereignty, free speech, and the balance between security and freedom online. This book examines the complex and changing landscape of the Internet and its implications for international relations, security, and governance. Toper provides a comprehensive analysis of how nation states continue to assert control over their digital domains, creating tailored versions of the Internet that suit their political, religious, cultural, and security agendas.

After Chapter 1, about the method, arguments, and research findings, Topor provides a historical overview of the development of the Internet from its origins as an American security project (ARPANET) to its current status as a global communication network. This context is important for understanding geopolitical power struggles in cyberspace. Topor says that the Internet, which was initially considered a tool of global solidarity, has become a contested space where states vie for control and influence.

Chapter 3 examines the concepts of sovereignty, power, and international security as they apply to the Internet. Topor introduces the concept of “cyber sovereignty,” referring to the efforts of nations to control their own part of the Internet as they also control their borders. By establishing digital borders and controlling content, states aim to protect national interests and maintain social stability. The book goes on to examine examples such as China’s Great Firewall, Russia’s RuNet, Iran’s National Information Network, and North Korea’s closed cyberspace known as Kwangmyong (“bright star”), in contrast with American, British, and open but vulnerable Israel. cyberspace.

In Chapter 4, Topor discusses the field of cyber warfare, highlighting how cyber attacks have become a new frontier in international conflicts. The chapter examines 500 key cyber warfare incidents and goes into detail on incidents such as the Russian cyber attack on the Ukrainian power grid, the North Korean WannaCry ransomware attack, the alleged Russian cyber attack on the US election process, and more. which shows. how cyberspace can disrupt national infrastructure and pose serious security threats. Topor emphasizes the importance of developing strong cyber security measures and international cooperation to reduce such risks.

A significant part of the book is devoted to misinformation practices and their impact on national resilience. In Chapter 5, Topor asks “Are Countries Safe from Fake News? He explores how states and non-state actors use cyberspace to spread disinformation, manipulate public opinion, and destabilize communities. Case studies of Russian influence operations in the US and Europe, as well as Iranian-led fake news and Hamas in Israel, provide strong examples of how mis/disinformation campaigns can influence political outcomes and erode trust in democratic institutions. You are right to ask questions that have difficult answers such as: how can a country retaliate with fake news on the Internet? Is fake news more dangerous to a nation than an arrow? He argues that countries are not immune to destruction, which can cause chaos. Each country decides how to retaliate against “fake news” while considering the risks of such retaliation.

Countries with strong cyber security and controlled digital spaces – Secure Cyber ​​Domains (SCD) – are explored in Chapter 6. Topor conducts a systematic and balanced review of SCDs in North Korea, China, Russia, -Iran and Saudi Arabia. He also discusses internet shutdowns in India and Myanmar, among others. In contrast, Chapter 7 focuses on Vulnerable Cyber ​​Domains (VCD), highlighting countries with open and vulnerable cyberspaces. He reviews the cyberspace of the United States, the United Kingdom, and Israel. Topor also reviews the European Cyberspace as a whole, which he refers to as the “cyber bloc” due to European regulatory efforts aimed at managing cyberspace, such as the European Union’s General Data Protection Regulation (GDPR), Digital Services Act (DSA), and the Digital Markets Act (DMA), and others.

These frameworks in Chapters 6 and 7 represent efforts to balance national sovereignty with the need for international standards and cooperation. These chapters show important differences in Internet sovereignty. A comparative analysis of secure and vulnerable cyberspaces is among the book’s strengths, offering insightful perspectives on how different countries are strategizing their digital governance. These chapters are useful in showing the practical manifestations of Internet sovereignty. However, a more critical assessment of social impact and international cooperation would have improved the analysis.

Topor explains that the book is about strategy and not about human rights. However, these strategies have far-reaching consequences for all of us. Restricting the Internet, banning, and restricting free speech can undermine basic human rights such as freedom of expression and access to information, weakening democracy and society. These measures can stifle innovation, stifle dissent, and can lead to social isolation, economic stagnation, and reduced international cooperation on human rights. A thin line separates between too much research and not enough of it.

The book says that while these efforts are a step in the right direction, achieving global consensus on Internet governance remains a major challenge. Finally, Chapter 8 presents Topor’s predictions for the future of the Internet, discussing possible scenarios. Topor predicts four scenarios for the future development, or fragmentation of the Internet: (1) Status quo of current issues about the computer environment, (2) the emergence of an effective international law regarding cyberspace, (3) the creation of “independent” cyber domains that are independent and secure, and (4) the creation of cyber blocs, which is illustrated by the evolving European cyberspace. Although interesting, these assumptions sometimes feel overdetermined, underestimating the power of emerging technologies and civil society movements to reshape the digital landscape.

While this book provides a comprehensive analysis of state-centric views on internet sovereignty, it tends to ignore the implications for human rights and digitalization. The emphasis on national security and control may overshadow the importance of ensuring that cyberspace remains an open and inclusive platform for all users. A more balanced discussion of these issues would have strengthened the argument of the rest of the book. Additionally, while the book acknowledges the role of non-state actors such as cybercriminals and terrorist organizations, it does not examine their impact in sufficient depth. These actors play an important role at the national level, and their activities can have a significant impact on national security and international stability. A key strength of the book is its thorough and multi-faceted analysis of Internet sovereignty. Topor successfully combines historical, technical, political, and legal perspectives to provide a comprehensive understanding of the topic. This interdisciplinary approach makes the book a valuable resource for scholars and practitioners of international relations, cybersecurity, and digital governance. The use of in-depth case studies is another notable strength, providing concrete evidence to support Topor’s arguments. Cyber ​​Empire makes an important contribution to the literature on international relations and Internet policies, particularly in its interdisciplinary approach to distinguishing the intersections of technology, security, governance, and society. This book is an important addition to the discourse on international security and the future of the Internet, challenging readers to rethink the role of the digital world in world politics. Future research should build on this foundation, delving deeper into the dynamic effects of internet sovereignty on global digital equality and freedom.

Further Studies in E-International Relations


Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button