Você está na página 1de 9

PAPER ID 4427941 1

Sovereignty in Cyberspace: Balkanization or


Democratization
Amaël Cattaruzza, Didier Danet and Stéphane Taillat., Research Fellows, CREC St Cyr, Arthur
Laudrain, Project Officer, French Air Force General Staff

 their implications for international security and cooperation


Abstract—Inherently linked to States’ sovereignty and its between States are far from similar.
relationship with third-party stakeholders, the governance of In order to make sense of the impact of sovereignty in the digital
cyberspace has become a subject of great debate and domain on world politics, it seems analytically useful to
controversies. One of the most prominent of them -the dominance
compare its rise and structure with those of other transnational
of the United States as an hegemon- has raised concerns and
triggered diverging reactions within the international community. spaces. Dating back from the global transformation of the 19th
Looking at recent events such as the invalidation of the Safe century [1], the rise and intensification of commercial, financial
Harbor Agreement through the lenses of the balance of power, we and information flows have created specific challenges for
found that the reassertion of States in cyberspace is dependent on States. The debates and concerns about sovereignty in the
the political significance given to cyberspace as both a digital domain can be traced back to the liberal tradition in
transnational realm and an American-dominated space. If most
international relations and its beliefs in the causal relationship
States have adopted a balancing policy vis-à-vis the US by means
of either critical cooperation (EU, France) or what could be between economic interdependence and the expansion of peace
described as a form of containment (Russia, China), some others through shared interests. First, according to this view, the
pursue free-riding policies (Ireland, Luxembourg), causing openness of cyberspace is a crucial feature that has to be
regional struggles. We suggest that, given this fragmentation of the protected against the traditional logic of power politics [2].
Web, regulation of cyberspace would be best served through a Nevertheless, this link between “le doux commerce” and the
multilateral mode of governance which could enhance collective
decreasing likelihood of war is far from being as deterministic
security
as liberal beliefs would imply. It is highly dependent on the
expectations of a dependent State toward the future trade and
Index Terms—Cyber diplomacy, cyberspace fragmentation, investment environment in terms of access to raw materials and
digital Sovereignty, Government, Industry and academia markets [3]. Constructing the digital domain as a space of
cooperation, Internet governance, Law and ethics in cyberspace conflict instead of a space of exchange between rivals and
competitors is thus not neutral and may have important
consequences on the behavior of States, likely leading to self-
I. INTRODUCTION fulfilling prophecies [4]. More importantly, this has deep

T HE last semester of 2015 saw several attempts from States


to tighten their control over the digital domain. The Russian
Duma passed a bill in September mandating Internet Service
implications with regards to international security through a
specific “cybersecurity dilemma” [5]. Second, in addition to the
representations on the nature of relationships in cyberspace, one
Providers (ISPs) to locate servers hosting data from Russian has to take into account the securitization process by which
citizens in Russia, thus protecting these data from what was threats and vulnerabilities have been erected to a national
perceived as an intrusive global surveillance by the NSA (and security level. Hence a logical (and political) link between the
allowing the FSB to spy on Russian dissenters). The following reaffirmation of sovereign rights and monopoly in cyberspace
month, the European Court of Justice struck down the Safe on the one hand, and the provision of security by the State on
Harbor Agreement which until then permitted US companies to the other. Furthermore, transnational spaces challenge this
transfer data from European users outside the European Union. particular dimension of sovereignty which is focused on the
Despite their similarities in terms not only of sovereignty but regulation and control of both transnational flows and their
also of mistrust vis à vis the United States, these two events stakeholders [6], [7]. In other words, in cyberspace like in other
reveal the deeply rooted ambiguities of cyberspace. However,

The paper was submitted for review on July 20, 2016. This work was Stéphane Taillat is with the Centre de Recherche des Ecoles de Coëtquidan,
supported in part by the St Cyr-Sogeti-Thalès Chair on Cybersecurity and 56381 Guer cedex, France (e-mail : stephane.taillat@st-cyr.terre-
Cyberdefense. net.defense.gouv.fr).
Amaël Cattaruzza is with the Centre de Recherche des Ecoles de Arthur Laudrain is with the Centre d’Etudes Stratégiques Aérospatiales,
Coëtquidan, 56381 Guer cedex, France (e-mail: amael.cattaruzza@st-cyr.terre- 75007 Paris, France (e-mail: arthur.laudrain@kcl.ac.uk).
net.defense.gouv.fr). Views expressed are those of the authors and do not necessarily reflect the
Didier Danet is with the Centre de Recherche des Ecoles de Coëtquidan, official policy or position of the French government, Ministry of Defense or
56381 Guer cedex, France (e-mail: didier.danet@st-cyr.terre- other institutions.
net.defense.gouv.fr).
PAPER ID 4427941 2

transnational spaces, sovereignty is tied to control more than to democratization and rejuvenation of traditional forms of State
authority, while both matter in the domestic (territorial) space governance.
which is yet the main focus of sovereign rights in the digital However, this proliferation of actors and stakeholders should
domain. The transnational realm is thus submitted to an not conceal the centrality of the US in this constellation. This
incomplete regime of regulation which relies either on inter- centrality is the result and the byproduct of both the role played
State cooperation or on an hegemonic power willing and able by the US in the world financial, commercial and technological
to act as a stabilizer [8], [9]. realms and the strategy outlined by the Clinton administration
We argue that in the absence of the latter, such a cooperation in the years 1997-1998, according to which the federal
would enhance the security and prosperity of cyberspace for the government gave its support to the corporations willing to
US, its allies and virtually every State dependent on these flows. conquer cyberspace. This American predominance may take
Besides, establishing a framework for multilateral cooperation multiple shapes with regards to other States.
between States in this particular field would provide a missing The concept of "cyber dominance" is difficult to define and
link between the strict reaffirmation of State sovereignty and a assess for it is the product of a complex set of soft and hard
governance characterized by a loose regulation and the absence power, a mix of technical, economic, legal, institutional and
of collective security mechanisms. political factors. However, who could seriously doubt that the
United States is the leading actor in the development and
Yet, the dominance of US private and public actors on governance of cyberspace? In the field of operating systems, a
cyberspace has given rise to a broad set of fears with regards to single firm, Microsoft (Windows), is holding more that 90% of
the future of State sovereignty. These fears are common to both the world market share and the follower, Apple (MacOS), is
allies and rivals and should not necessarily be seen as a attracting most of the rest of the demand. On the market of
nationalistic move or as a balancing challenge to the hegemony. mobile phones operating systems, Google (Android) and Apple
Most States tried to protect or restore their “sovereignty” in (iOS) dominate the competition.
cyberspace in reaction to this asymmetric configuration The conclusion would be the same as far as we consider
between the US and themselves. Of course, their policies have cloud storage (Microsoft Cloud), (proto)-quantum computing
taken diverging paths, from bandwagoning vis à vis the US to (IBM’s Watson), server infrastructures (Apple’s data centers)
the edification of a protectionist regime, the former reinforcing or productivity software (Microsoft Office). Universities in the
the structuration of cyberspace between a core and a periphery, United States are fostering research and education, companies
the latter potentially leading to the risk of fragmenting a global drive investments and innovations, public and private
network into competing, closed and national networks. France institutions spread the American way of governance in
has chosen an intermediate position of critical cooperation, cyberspace. In a Ricardian perspective of trade between
stressing the need to promote a system of governance centered nations, this leading role of the US is mutually beneficial for the
on States and which would empower them at the expense of wealth of every stakeholders and the global order that these
private actors whose legitimacy is highly disputable. Hence its relations tend to shape. Does it mean that each and every
leading role in promoting international negotiations whose decision of the dominant actor is benevolent and that other
goals would be to build a regulative regime acceptable to both countries should comply by these rules or practices? This seems
the US and their partners. to be the assumption of many policy makers in Washington.
The following paper is thus built around two main claims. President Obama vigorously condemned the decision of the
First, the reassertion of States in cyberspace is dependent on the European Court of Justice which struck down the Safe Harbor
political significance given to cyberspace as both a agreement.
transnational realm and an American-dominated space. Second,
the regulation of cyberspace would be best served through a “We have owned the Internet. Our companies have created
multilateral mode of governance which could enhance it, expanded it, perfected it in ways that [Europeans] can’t
collective security. This article proceeds in two steps. It first compete. And oftentimes what is portrayed as high-minded
outlines the modalities by which the United States dominate positions on issues sometimes is just designed to carve out some
cyberspace. It then follows by analyzing the various ways and of [Europe’s] commercial interests [10]”.
logics by which States try to reassert their sovereignty. It
concludes by reviewing the question of governance and To some analysts, the Safe Harbor dispute is rooted in a
democratization in cyberspace. political resentment due to the massive surveillance programs
that Snowden's files have set on the agenda.
II. THE UNITED STATES AS THE DOMINANT POWER IN
CYBERSPACE “By transforming US technology companies into tools of
Governance in the digital domain rests on the participation of national intelligence, Washington has badly damaged their
a high number of stakeholders from States to NGOs through corporate reputations and exposed them to foreign sanctions
corporations and international organizations. They define [11: 131]”.
norms and standards around a broad set of issues, mainly
technical, through procedures focused on concertation. In this Even if this political resentment does exist in many European
respect, this governance has often been seen as an example of countries which were not taking an active part in NSA
PAPER ID 4427941 3

programs, recent European initiatives proceed from a very even in the face of opposition from both the Irish government
classical regulatory preoccupation. and Silicon Valley companies [11: 132]”.

The now very old dispute between European regulators and To many European analysts, this "benign neglect" of US
US technology companies (Microsoft and now Google) is far judges for cooperative procedures is considered a disguised
more due to antitrust motives than to some kind of political way of promoting internal American rules beyond US borders.
retaliation against the NSA’s intrusive practices. The very large In all these cases, the apparent fragmentation of the governance
market share owned by US companies worries European in the digital domain reveals the privileged situation of the
regulators just as Rockefeller or Morgan trusts worried US United States vis à vis other stakeholders. This situation gives
legislators by the end of the 19th century. Antitrust actions the United States the capacity to leverage other States’ access
undertaken by the European Commission are by no means to global flows in order to coerce or persuade them to act
surprising since the rules are mostly the same in both accordingly to its interests. It would undoubtedly be more
continents. President Obama’s accusations could be more accurate to remind that the US is far from being a unitary actor
challenging on the tax optimizations dispute between some when dealing with the definition and the pursuit of its interests
European countries (France at the forefront) and big companies in cyberspace. This said, the diverging visions and interests
who benefit from "free riding" policies lead by Ireland or between public and private actors seem irrelevant when seen
Luxembourg. But this is more an internal struggle within the from the outside. In this case, what remains is a global
European Union rather than a dispute between Europe and the convergence of these actors impulsed by the consideration of
United States. national interests when stakes are deemed essential.
Beyond disguised protectionism, the Safe Harbor Of course, one could argue that this position is congruent
invalidation means that even if the US and Europe share the with the “Command of the Commons” [13] and the role of the
same global values (human rights or individual freedom for US as a global hegemon. But one should not take the acceptance
example), they do not align on the same equilibrium concerning of hegemony for granted. Indeed, hegemony is not simply about
the balance between privacy protection and national security capabilities or political will, but rather a social role constructed
constraints. For a very long time now, France has been cautious through social relations. Its most important feature is persuasion
about personal data flows. In 1978, a legal provision prevented and it functions through consent more than coercion [14]. In
transfers of personal data beyond borders. The Safe Harbor other words, the regulative power of the US in the digital
agreement was clearly in disharmony with this traditional domain is dependent on its perceived legitimacy on the
provision. For many years, regulators and policy makers international stage.
pretended not to see the problem in order not to face the
resentment of Facebook or Google customers. With Snowden's III. SOVEREIGNTY AND BALKANIZATION
revelations, this ostrich policy became unsustainable. Contrary States have attempted to assert their sovereignty across many
to Myron Brilliant1’s assertion, the decision of the European ways and means. While some have focused their claims of
Court was all but a surprise [12]. The US administration and independence from a US-dominated Internet, others have
government must consider that the blurred lines between attempted to secure greater control on their physical, logical and
companies and the Administration under American legal social infrastructures. Although in practice policies have
provisions do not fit within traditional conceptions of privacy followed both paths, the logic behind the affirmation of
in Europe. This situation could evolve however, as the French sovereignty is more distinct because it doesn’t address the same
experience demonstrates. After the attacks of Charlie and dimensions of what sovereignty entails. As Krasner famously
Bataclan, public opinion and legal provisions shifted towards a put it, sovereignty is a contested concept dependent on its social
stronger enforcement of surveillance programs and intelligence and political construction through a complex historical process
policies, at the expense of privacy principles. But the gap [6]. If sovereignty as a norm implies external independence as
between the US and Europe remains significant. well as the exclusive legitimacy of the State in the political
Another prominent litigation is related to the unilateralist order, it is also a practice involving domestic authority (by
view of the US administration in the Microsoft case in which claiming the monopoly on the use of coercion) as well as
the company is requested to provide personal data housed in its control and regulation. Analytically, two different variables
Irish data center. Obviously, no European government would have driven various policies with regards to the digital domain,
disagree with the US administration on the fact that an effective whether in practice or in discourse. First, how States perceive
anti-drug policy is required and that a notorious drug dealer the need to tighten their control on the digital domain as a
should go to jail. This does not mean that efficiency must transnational space. Second, how they assess the potential
prevail over basic principles of judicial cooperation. threat posed by the privileged position America enjoys in
cyberspace. Of course, both factors could be tied together with
“Rather than requesting the data through the ordinary regards to the expectation of actors. As we already mentioned,
processes of intergovernmental exchange..., the United States is the asymmetric position of the United States means that it has
using the global reach of its legal system to demand the data the capacity to deny others access to global information flows

1
US Chamber of Commerce Vice President for International Affairs.
PAPER ID 4427941 4

on which global trade rests. Depending on where they are country in 1991, it is deeply embedded within Tunisie Télécom.
situated on these two spectrums, it is possible to highlight three
main political postures: bandwagoning (implying free riding), With the development of social networks and spread of
hard balancing and critical cooperation. While the former is less smartphones, there are increasingly at the very beginning of
concerned by both aspects of cyberspace, the second is wary of content creation people, in the streets, reporting on what they
both and the latter is more concerned by transnational spaces see. Here again, State's censorship was tight. Tunisian activist
than American dominance. These perceptions are shaped by Lina Ben Mhenni explains that, contrary to what was happening
two sets of domestic variables. Political or strategic culture on in Egypt, it was very difficult for protesters to take photos of
the one hand, political institutions on the other. Together, they exactions publicly [20]. Cameras would often be seized and
form the structural factors alongside specific strategies of the protesters arrested.
political elites toward their constituencies.
This end-to-end combination of infrastructures “modelled for
In addition, the assertion of sovereignty over cyberspace control” [21: 484] and monitoring & censorship abilities across
raises a question over the model of sovereignty. It seems the board provided the government with an integrated view and
impossible to apply the strict model of territorial sovereignty, large powers over almost all information flows [21: 492]. This
which implies linear borders and continuous area, because of said, censorship is never absolute, and counter-measures do
the transnational nature of cyberspace. Any attempt to take an exist.
absolute control of cyberspace inside a national territory, even
in China and Russia, will always be partial. Even in the field, Indeed, this old habit of censorship created in the
this model is imperfectly applied to tangible frontiers. population a strong sense of disbelief in State-controlled media
Geographers as John Agnew has shown that the idea that outlet, encouraging the use of circumventing tools, such as
Westphalian territories are under the exclusive power of States proxy servers and virtual private networks (VPN).
is only theoretical [15]. Thus, it seems that social networks allow social movements
to take, at least temporarily, the upper-hand over governments.
Similarly, it is important to debunk the myth that the digital Thanks to the implementation of Deep Packet Inspection
era relies on dematerialized infrastructures and content. It was technologies between 2007 and 2011, the government had
argued that digital networks enjoy greater flexibility, scalability effective influence over emails and traditional websites 2. It
and survivability [16], which represent either the “bright” or lacked however efficient monitoring tools for social media.
“dark side of connectivity” [17], depending on who is enjoying Deep Packet Inspection is also not fit for the challenges of
these features. A new system of mass communication built like instant messaging apps such as WhatsApp, since it requires
a mix between an interactive television, Internet, radio and time for interception. The heavy crackdown on censorship
mobile communication systems, it would however be through gross methods, such as hacking Facebook users'
misleading to overemphasize their game-changing nature in credentials, was too little and too late to prevent protests to
terms of social and political control. escalate.

The example of the Tunisian revolution of 2011 highlights it The censorship system implemented by the Tunisian
clearly. As David M. Faris explains [18], the institutional government over almost two decades was indeed enjoying the
organization of communication networks in Tunisia made it increased flexibility and scalability brought by contemporary
easy for the government to control and monitor information. information technologies. However, this was in a significant
Tunisie Télécom, the State-owned telephone and Internet part possible because of the structural features of the Tunisian
provider, enjoys a monopoly position in this market. As it is the network and its infrastructures. Even with this favorable context
pioneering telecom company of the country, it also owns the for the government, the ATI failed to adapt quickly enough to
overwhelming majority of Internet and phone access points and the technical challenges brought by this new generation of
hubs, including the central hub for underwater cables online social networks. The Tunisian experience thus
connecting the country to the outside world, through Europe demonstrates to what extent a State’s sovereignty over the
[19]. Internet relies on local features and may be fragmented,
incomplete and quickly overturned.
Another aspect to keep in mind is the content. Owning
infrastructures is not an end but rather a mean to monitor and A. Bandwagoning
control the content going through them. This is why, in parallel
with Tunisie Télécom, the government possessed a long- For a certain number of countries which are close allies to the
standing propaganda and censorship agency, the Agence US and share their fundamental values and interests, the
Tunisienne de l'Information (ATI, Tunisia's Information strategy of aligning with the dominant power in cyberspace is
Agency). Active a few years after the arrival of Internet in the the best way to benefit from individual and joint efforts under
2
Deep Packet Inspection (DPI) tools allow a network administrator, among
other things, to intercept and modify emails before transmitting them to their
original recipient.
PAPER ID 4427941 5

the lead of the US. This bandwagoning approach may proceed create an isolated network [4: 14–19]. Indeed, for the power
from an economic policy aimed at attracting US investments holder faced with a weak society, the core issue remains finding
thanks to fiscal or legal incentives. In Europe for example, the right balance between economic development and political
Ireland or Luxembourg implemented successful tax policies freedom. Cutting the country from outside influence by
which lead companies such as Google or Microsoft to choose isolating its network is taking the risk of jeopardizing economic
these countries as their headquarters for the whole region. The development. Yet, in a developing country, sustaining
bandwagoning strategy may also imply deeper agreements from economic growth is essential for a political power that needs to
a political point of view. The “Five Eyes” block took advantage address the needs and grievances of a rising middle-class [23].
of the surveillance programs designed by the US administration This was described as the “Dictator’s Dilemma” [24].
through shared procedures of data gathering and analysis. From
free trade policies to secret intelligence practices, the Whatever the potential success of these attempts toward
bandwagoning strategy takes many forms and implies various more protectionist policies, they entail a risk of fragmentation
levels of cooperation and involvement in the US approach of which has been described as “balkanization” by several
the Internet. scholars and analysts [25], [26].
Yet, the idea of “balkanization” used by American
B. Hard-balancing intellectuals is not neutral. Indeed, it is strongly linked in our
imagination to the recent conflicts in Yugoslavia in the 90’s.
Several States have denounced this domination as Then, this word implies necessarily a strong pejorative
detrimental to their national security and perceived meaning, reminding blood and irrational casualties. Even
international status. They have taken various steps in order to before the conflicts, Maria Todorova has demonstrated how the
re-establish what they see as their full digital sovereignty over terms of “Balkans” and “balkanization” have often been
the physical layer (national preferences, physical relocation of associated to violence and “otherness” since the end of the 19th
servers) as well as the logical and cognitive ones (struggle century [27]. After the First World War, the word
against the “American propaganda”, censorship, promotion of “balkanization” gets a darker meaning, which involves an
national solutions and Apps). This is the case of both of China uncontrolled process of State fragmentation in an infinity of
and Russia. China launched a massive crackdown on Western smaller territories - implying a continuous and unstoppable
and -especially- US companies, by passing new regulations up chain of violence.
to 2015 under which foreign corporations have to reveal the Thus, the application of this idea to cyberspace reveals an
source code of their softwares and firmwares in order to export implicit and systematic condemnation of all the actions that
to the Mainland. Among others, IBM and Microsoft would be described as “balkanization”, from Chinese attempts
surrendered to China’s demands, by installing backdoors into to control the political content of cyberspace inside its territory
their systems as well. - and to use it eventually against its opponents - to other more
moderate initiatives (the debates on digital sovereignty in
Yet, the choice to free oneself from the US dominance is France for instance). All the nuances between modes of action,
dependent on technical capabilities, financial costs and the political objectives, will of actors, seem to disappear behind a
critical size of the would-be independent cyberspace. general and univocal reprobation.
Then, the fuzzy and very large definition of “balkanization”
The particular logic of States depends on their seems to prevent any rational and strategic analysis of the
representations of what is at stake in the cybersecurity realm. different State policies in the international level. Indeed, the
China’s and Russia’s sovereigntist stance cannot be reduced to first uses of the notion of “cyberspace balkanization” were
mere nationalistic values or policies but has to be put in relatively neutral. In 1995, the expression was used in a very
perspective with regards to their perception of world politics technical dimension to point out the potential incompatibility of
and, more broadly, to their conception of international relations. different languages and web browsers. It obtained a much
In the case of China, the very notion of information security is stronger political meaning during the 2000’s. Nowadays, in
informed by the twin perception of the Internet as a “western” almost all cases, the very notion of balkanization of cyberspace
Trojan horse and of the international order as detrimental to the is assimilated to a threat against the security and integrity of the
return of China on the front stage. Chinese cybersecurity has Internet, not against individual freedom.
been shaped by the perception of threats against the domestic Beyond a political discourse discounting claims of
political and societal stability while offensive uses (mainly sovereignty, it would be more analytically and politically useful
economic intelligence gathering) should be seen within the to unbox the digital domain in order to assess the potential
lenses of a broader “modernization” project [22]. effects of this fragmentation process. On the one hand,
fragmentation poses a challenge to the regulation of behaviors
Hence several ambiguities with regards to the assertion of in cyberspace, whether in the case of judicial disputes or in the
sovereignty. First, focusing on information security has mostly case of cybercrime for instance. It might also increase the risk
produced shortcomings in the protection of infrastructures or of misunderstanding and escalation between States [28]. On the
the struggle against cybercrime. Second, the pressing needs of other hand, it seems legitimate to consider the military side of
“modernization” mean that Chinese elites could not afford to cyberspace (i.e. “cyber defense”) as a regal domain that has to
PAPER ID 4427941 6

be protected by the State, even if at the same time it hampers law enforcement agencies to eavesdrop on communications in
the probability of cooperation and collective security, even the fight against organized crime (2011). Third, the Intelligence
among allies. Law required ISPs to set up automatic data analyzers (the so-
called “black boxes”) in order to monitor Internet traffic and
But at the same time, the defense of their sovereignty by detect suspicious behaviors in the fight against terrorism
Russia and China remains ambivalent, especially in the realm (2015). In this latter case, the French Parliament allowed ISPs
of international security. Both States were instrumental in to restrict the sharing of information to metadata. These laws
promoting an international code of conduct calling for a highlight the gap between European and French regulations, the
“disarmament in cyberspace” in 2011, while Russia repeatedly former stating in the European e-Commerce directive that ISPs
made an aggressive use of cyberspace in its operations against must remain a “mere conduit” of information, the latter
Georgia and Ukraine [29]. It is also promoting an all-out extending their role to involve them in State security policies.
“information warfare” against the “West” [30], [31]. In this specific case, France’s assertion of its sovereignty was
Sovereignty is thus interpreted, as in the case of the debate motivated by the transnational nature of cyberspace, rather than
about intervention, through an absolutist lens informed by a the fear of US dominance.
simplistic vision of “Realpolitik”. In this view, the defense of
sovereignty is not the defense of a political norm regulating Nevertheless, concerns regarding the place of the European
international relations and enhancing stability, even if it is Union as well as of European States are more tied to the reality
presented as such to international audiences. Russia embodies of a US-dominated space. French Senator Catherine Morin-
the “organised hypocrisy” envisioned by Stephen Krasner: an Desailly emphasized in a report the risk of Europe becoming a
instrumental use of sovereignty in defense of self-interests, “digital colony” of US “Internet Giants” [33]. She thus
emphasizing one’s independence while minimizing that of suggested the creation of specific agencies both in France and
others [6]. What it means is that Russian political and economic at the EU level (Commission and Council) in order to allow
elites cannot afford to create the kind of closed networks as these actors to play a greater role in the protection of their
those feared by the “Balkanization” discourse. On the other digital spaces as well as in global governance. What could be
hand, it also likely means they will endeavor to craft a space in seen as a move to “Europeanize” the French position in
which hegemonic political discourse and control by the State Brussels is yet congruent with the EU’s way of governance.
would make it difficult to plug into the global Internet. Indeed, two principles illustrate the promotion of
multilateralism by the EU, either at its level or through its
C. Critical Cooperation member States. First, the notion of inclusive multilateralism
(which opposes to minilateralism or narrower ways of
The strike down of the Safe Harbor Agreement by the practicing multilateral cooperation). Second, the belief in the
European Court of Justice in October 2015 underlined a change compatibility between international norms resulting from
of posture by European States and institutions regarding their institutional cooperation on the one hand, and national
interests. While the US used to leverage the interdependence of sovereignty on the other.
the global system for its own security goals, this event shows The fear to be marginalized in the Internet economy has been
how the EU and its member States actively claim a rebalancing also stressed two years ago by the French media figure Pierre
vis à vis the US and resist a US-centered global economy (or, Bellanger, in a book titled “La souveraineté numérique” [digital
as Lebow and Reich pointed it, a US norms-centered economy sovereignty] [34]. After the last economic crisis, he was aiming
[14: 61]). Of course, this move was met with fierce criticism in to warn French opinion on an incoming potential digital crisis.
the US, European States being accused to act as protectionists Indeed, with the growing digitalization of the service industry,
in disguise. Nevertheless, European claims focus on a tighter Bellanger noticed that almost half of the jobs in this sector could
control of private Corporations practices by the US federal disappear in France in the next two decades in favor of
government. In other words, demands in favor of a rebalancing American Internet giants. In order to avoid such a situation, he
in the governance framework are tied to the specific vision of suggested three concrete actions based on the notion of digital
many European States with regards to public-private sovereignty: the creation of a digital sovereignty
relationships. Hence the stress put on the revalorization of
States’ role in the current governance system.

France has thus expressed its concerns vis à vis the lack of
control over the exchange of data and the threat posed by
cyberspace to its “digital sovereignty” [32: 147]. Even if it was
not echoed in its cyber strategy, three regulations support this
claim. First the Hadopi Law required ISPs to cooperate against
copyright infringers (2009), stressing the threat posed by the
digital domain to the conservation of national and European
cultural heritage. Second, the “Orientation and programming
law for homeland security performance” (LOPPSIE 2) allowed
PAPER ID 4427941 7

Commissioner, the development of a sovereign operating TABLE I


system, and the implementation of an agreement considering TRANSNATIONAL DEMOCRATIZATION VS STATE DEMOCRATIZATION
data as a global common. Mode of Multistakeholders Multilateral
governance

IV. DEMOCRATIZATION AND GOVERNANCE Theoretical transnationalism statism


framework

Governance in cyberspace involves two separate albeit


closely intertwined set of issues. First, those dealing with the Levels of transnational territorial
technical standards and norms allowing the very existence of governance
this space. Then, those related to the regulation of the behavior
of State actors and non-State actors alike, whether the latter are
Impacts on Global common Digital sovereignty
individuals, corporations or social actors. Under this architecture
perspective, it first appears that the very project of a free, open
and global Internet remains just that: a project. In other words,
the fragmentation of the Web already is a reality. Nevertheless, Forms of International International
it is very unlikely that wholly sovereign and closed networks regulation standards treaties (Montego
(examples of (ICANN) Bay)
are about to emerge. Indeed, the interoperability and the regulation)
connectedness of networks and systems remain the sine qua non
condition for the pursuit of economic gains resulting from the Leading Private Public
very existence of the Internet. cybersecurity (corporations, civil
actors society)
Yet, if technical governance is not without political issues (for
Modes of Asymmetrical Symmetrical/disym
instance on the links between ICANN and the US government negotiation partnership metrical
or on the cultural openness of Internet), it is mostly partnership
characterized by a strong regime. The regulation of the actors’
behaviors is characterized by a weak and narrow regime. Impacts on Distributed Uniformed
Indeed, not only jurisdictional loopholes between States are not collective security cooperation cooperation
offset by a strong international cooperation, but this cooperation
mostly tends to focus on cybercrime 3, and in a mindset close to
arms control4. The multi-stakeholder point of view allows the participation
of different actors, mostly private companies or civil society.
In addition, both domains rely on a multi-stakeholders It could refer to the transnationalist perspective [36], [37],
governance which involves private and public actors alike but particularly to James Rosenau’s notion of sovereignty-free
at the benefit of the former whose legitimacy, expertise and actors [38: 36]. Taking into account the will of non-state actors
interests regarding Internet and the cyberspace are deemed could on the one hand be considered as a path toward more
higher than those of the States. This model implies a de facto democracy. Indeed, it allows to balance between public and
US advantage which means the status-quo is no longer private policies - and seems to offers a better representation of
sustainable [35]. the societal diversity. Yet on the other hand the public/private
cooperation could also be criticized, because of the lack of
In this context, a major divide on Internet governance appears democratic legitimacy, if democracy is defined as the result of
at the international level. On the one hand, countries such as the an electoral process. In this way, the position of Russia or China
United States argues that multi-stakeholders governance would and even more of France should be considered not as a
be the only path to a more democratic cyberspace, an idea which provocation, but as a real counterpoint to the privatization of
relies on a certain conception of democracy and the Internet governance. This statist perspective might sound
democratization, close to the transnationalist perspective. On outdated compared to the transnationalist one, but it might still
the other hand, countries such as Russia or China defend the be the best way toward consensus between States at the
idea of an exclusive multilateral governance based on an international level.
“absolute” representation of sovereignty and deny any
legitimacy to private actors on the field of public policy. An Inclusive multilateral governance may be then considered not
intermediate path is the inclusive multilateral governance or as a threat of balkanization, but as a solution a minima, which
State democratization promoted by the European Union for could lead to the realization of an international treaty on
instance. The table I summarizes what is at stakes in both modes cyberspace sovereignty, a “Cyberspace Montego Bay
of governance. Convention”. De facto, the conference of Montego Bay
succeeded to produce an original territorial materialization of
sovereignty over the sea several centuries after Grotius and
3
See Convention of Budapest 2001.
4
See United Nations General Assembly, International code of conduct for
information security, Annex to the letter dated 9 January 2015.
PAPER ID 4427941 8

Selden’s controversy in the 17th century. Such an agreement is [22] J. R. Lindsay and T. M. Cheung, China and Cybersecurity: Espionage,
Strategy and Politics in the Digital Domain, New-York, NY: OUP, 2015.
still missing for cyberspace. The challenge of the next decades
[23] J. C. Davies, “Toward a Theory of Revolution”, Am. Socio. Rev., Vol. 27,
will be to agree at the international level on a common No. 1, pp. 5–19, Feb. 1962.
definition of sovereignty over this domain. It seems to be the [24] B. Dickson, The Dictator's Dilemma: The Chinese Communist Party's
only possibility to build trust on the international stage, and to Strategy for Survival. New-York, NY: OUP, 2016.
[25] T. Wu and J. Goldsmith, Who controls the Internet? Illusions of a
allow each State to formulate its own strategies and policies, to
Borderless World, New-York, NY: OUP, 2016.
rule its own “cyber-territory”. Then, it could be possible to [26] L. Clark, “Tim Berners-Lee: We Need to Re-Decentralize the Web”,
enhance international cooperation over cybersecurity, and Wired, Feb. 6, 2014. [Online]. Available:
apply the collective security model over the Internet. http://www.wired.co.uk/article/tim-berners-lee-reclaim-the-web.
[27] M. Todorova, Imagining the Balkans, London: Oxford University Press,
1997.
[28] M. C. Libicki, “Crisis and Escalation in Cyberspace”, RAND Corp., Santa
Monica, CA., MG-1215-AF, 2012.
REFERENCES [29] J. A. Lewis, “’Compelling Opponents to Our Will’ The Role of
Cyberwarfare in Ukraine”, in Cyber War in Perspective: Russian
Aggression against Ukraine, K. Geers ed., Talinn: CCDCOE, 2015, pp.
[1] B. Buzan and G. Lawson, The Global Transformation: History, 39–48.
Modernity and the Making of International Relations. Cambridge: [30] J. Nocetti, “Guerre de l’information : le web russe en Ukraine”, IFRI,
Cambridge University Press, 2015. Paris, Focus Stratégique, n°62, Sept. 2015.
[2] A. Bendiek, “Beyond US Hegemony: The Future of a Liberal Order of the [31] M. Galeotti, “Russia’s New National Security Strategy: Familiar Themes,
Internet,” in Liberal Order in a Post-Western World, C. Kupchan Ed., Gaudy Rhetoric”, War on the Rocks, Jan. 4, 2016. [Online]. Available:
Washington, DC: Transatlantic Academy, 2014, pp.57–69. http://warontherocks.com/2016/01/russias-new-national-security-
[3] D.C. Copeland, Economic Interdependence and War, Princeton, NJ: strategy-familiar-themes-gaudy-rhetoric.
Princeton UP, 2014. [32] N. Sarkozy, White Paper on Defense and National Security, Paris, 2008.
[4] J.R. Lindsay, “The Impact of China on Cybersecurity: Fiction and [33] C. Morin-Desailly, “L’Union Européenne, colonie du monde
Friction”, Int. Sec., vol.39, n °3, pp.7–47, Winter 2014-2015. numérique?”, French Senate European Affairs Committee, Paris, n°443,
[5] B. Buchanan, The Cybersecurity Dilemma: Hacking, Trust and Fear Mar. 20, 2013.
Between Nations, London: Hurst & Co., Forth. 2016. [34] P. Bellanger, La souveraineté numérique, Paris : Stock, 2014.
[6] S. D. Krasner, Sovereignty: Organised Hypocrisy, Princeton, NJ: [35] L. DeNardis, The Global War on Internet Governance, New Haven, CT:
Princeton UP. YUP, 2014.
[7] T. Stevens and D. Betz, “Cyberspace and the State: Toward a Strategy for [36] R. O. Keohane and J. S. Nye, Transnational Relations and World Politics,
Cyber-Power”, Adelphi Series, vol.51, n° 424, pp.6–158, Nov. 2011. Cambridge, MA: HUP, 1971.
[8] C.P. Kindleberger, The World in Depression 1929-1939, Berkeley, CA: [37] B. Buzan, From International to World Society? English School Theory
University of California Press, 1973. and the Global Structure of Globalization, Cambridge: Cambridge
[9] R. Gilpin, War and Change in World Politics, Cambridge: Cambridge University Press, 2004.
University Press, 1981. [38] J. Rosenau, Turbulence in World Politics, Princeton, NJ: Princeton UP,
[10] “Obama Meets Swisher”, Recode, Feb. 15 2015. [Online]. Available: 1990.
http://www.recode.net/2015/2/15/11559056/white-house-red-chair-
obama-meets-swisher.
[11] H. Farrell and A. Newman, “The Transatlantic Data War. Europe Fights Amaël Cattaruzza received a M.A. degree in
Back Against the NSA”, Foreign Affairs, vol.95, n°1, pp. 214–134, Jan.-
geography from Université Paris-Sorbonne,
Feb. 2016.
[12] E. Nakashima, “Top E.U. Court Strikes Down Major Data-Sharing Pact Paris, in 2001. He completed his Ph.D. in
Between U.S. and Europe”, The Washington Post, Oct. 6., 2015. [Online]. political geography at Université Paris-
Available : https://www.washingtonpost.com/world/national-security/eu- Sorbonne, Paris, in 2005.
court-strikes-down-safe-harbor-data-transfer-deal-over-privacy-
From 2006 to 2008, he has been a
concerns/2015/10/06/2da2d9f6-6c2a-11e5-b31c-
d80d62b53e28_story.html scientific coordinator at the French Embassy
[13] B. Posen, “Command of the Commons: The Military Foundation of US in Belgrade, Serbia. Since 2008, he has been
Hegemony”, Int. Sec., vol.28, n° 1, pp.5–46, Summer 2003. a senior lecturer with the International
[14] R.N. Lebow and S. Reich, Good Bye Hegemony! Power and Influence in
Relations and Strategic Studies department at St Cyr Military
the International System, Princeton, NJ: Princeton UP, 2014, pp.35–49.
[15] J. Agnew, Globalization & Sovereignty, New York, NY: Rowman & Academy, Coëtquidan, France as well as a research fellow with
Littlefield, 2009. the Changing Character of War Laboratory, Centre de
[16] M. Castells, “A Network Theory of Power”, Int. Jour. of Com., vol. 5, pp. Recherche des Ecoles de St Cyr-Coëtquidan, France. He
773–787, 2011.
[17] D. Betz, Carnage and Connectivity: Landmarks in the Decline of
recently published Géopolitique des conflits, Paris, Breal, 2016
Conventional Military Power, London: Hurst & Co., 2015. with a chapter devoted to conflicts in cyberspace, and the Atlas
[18] D. M. Faris, “La révolte en réseau : le « printemps arabe » et les médias des guerres et conflits, Paris, Autrement, 2014. In 2014, he co-
sociaux”, Politique étrangère, n°1, pp.99–109, Feb. 2012. edited with Didier Danet La Cyberdéfense.Quel territoire, quel
[19] J. Abassi, “Information and Communication Technology in the Middle
droit? Rennes, Presses Universitaires de Rennes. His research
East: Situation as of 2010 and Prospective Scenarios for 2030”. CASE
Network Reports No. 105. [Online]. Available: interest includes border security and sovereignty in cyberspace
http://ssrn.com/abstract=1943455. and, more generally, in Europe. He teaches in the Post-master’s
[20] V. Silver, “Post-revolt Tunisia can alter e-mail with ‘Big Brother’ degree in Cyberspace operations.
software”, Bloomberg Technology, Dec. 11, 2011. [Online]. Available:
Dr. Cattaruzza is the secretary of the French Association
http://www.bloomberg.com/news/2011-12-12/tunisia-after-revolt-can-
alter-e-mails-with-big-brother-software.htm. for Balkans Studies and the secretary of the French Political
[21] B. Wagner, “Push-button-autocracy in Tunisia: Analysing the role of Geography Committee.
Internet infrastructure, institutions and international markets in creating a
Tunisian censorship regime”, Telecommunications Policy, vol.36, n°6,
pp. 484–492, Jul. 2012.
PAPER ID 4427941 9

Didier Danet graduated from the counterinsurgency strategy, cyberspace operations, military
Universities of Paris Ouest Nanterre (M.A. organizations, norms in current international relations and
in Law) and Rennes 1 where he completed cooperation between states.
a Ph.D. in Management Sciences. Dr. Taillat is a founding member of the French association
Agrégé de l’Université, he has been a for the study of War and Strategy (AEGES).
senior lecturer in Saint Cyr Military
Academy since 1986. He is head of the
Changing Character of War Laboratory and Arthur Laudrain graduated from the
director of the Post-master’s degree in University of Montreal, CA, with a BSc in
Cyberspace operations. His research fields of expertise are international studies in 2015, after
focusing on innovation and armed forces. He is currently attending the Graduate School of
developing research programs on robotization of the battlefield International Studies (GSIS) at Seoul
(supported by Saint-Cyr/SOGETI/THALES Research Chair), National University, ROK, in 2014. He is
cyberspace operations and enhanced soldier. In 2015, he co- currently at the end of his curriculum as a
edited Drones et Killer Robots : faut-il les interdire ? Rennes, MA candidate in international peace and
Presses Universitaires de Rennes and L’action militaire de A à security at the Department of War
Z, Paris, Economica. Studies, King’s College London, UK.
Dr. Danet is a fellow of Rennes 1 University where he is In 2014, he volunteered with the United Nations
teaching Law and Management. Environment Program, ROK, and War Child, UK. Last year, he
became part of King’s College’s crisis simulation team as a
Stéphane Taillat, agrégé de l’Université, Research Analyst. He joined in 2016 the Research and Outreach
received the M.A. degree in modern Division of the Air Force General Staff as a Project Officer, at
history from Université Paris-Sorbonne, the Centre for Strategic Aerospace Studies, Paris, FR. He is the
Paris, in 1996 and the M.A. degree in author or co-author of articles published in The National
political science and international Defense Review (Paris, FR) and STRIFE Journal (London,
relations from the Institut d’Etudes UK). His research interests include lethal autonomous weapon
Politiques de Toulouse in 2007. He systems, security and defense in the cyber domain, international
received his Ph.D. in military history and law and the use of force, and Military-Nation relations.
defense studies from Université Montpellier Paul-Valery in Mr. Laudrain is a representative of the Association of Junior
2013. Auditors in National Defense (ANAJ-IHEDN), and a member
Since 2010, he has been a lecturer with the International of the French Association for the Study of War and Strategy
Relations and Strategic Studies department at St Cyr Military (AEGES). He was the co-recipient in 2015 of the Royal United
Academy, Coëtquidan, France as well as a research fellow with Services Institute’s Trench-Gascoigne Prize for his policy essay
the Changing Character of War Laboratory, Centre de on the French citizen reserve reform.
Recherche des Ecoles de St Cyr-Coëtquidan, France. Since
2014, he has been the deputy manager, Post-master’s degree in
Cyberspace operations at St Cyr Military Academy. He is the
co-editor of Guerre et Stratégie: approches, concepts, Paris:
Presses Universitaires de France, 2015 and the author of more
than a dozen articles and reports. His research interest includes

Você também pode gostar