Article contents
Always in control? Sovereign states in cyberspace
Published online by Cambridge University Press: 04 May 2020
Abstract
For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live. But how has it impacted the sovereignty of states? An initial wave of scholars argued that it had dramatically diminished centralised control by states, helped by a tidal wave of globalisation and freedom. These libertarian claims were considerable. More recently, a new wave of writing has argued that states have begun to recover control in cyberspace, focusing on either the police work of authoritarian regimes or the revelations of Edward Snowden. Both claims were wide of the mark. By contrast, this article argues that we have often misunderstood the materiality of cyberspace and its consequences for control. It not only challenges the libertarian narrative of freedom, it suggests that the anarchic imaginary of the Internet as a ‘Wild West’ was deliberately promoted by states in order to distract from the reality. The Internet, like previous forms of electronic connectivity, consists mostly of a physical infrastructure located in specific geographies and jurisdictions. Rather than circumscribing sovereignty, it has offered centralised authority new ways of conducting statecraft. Indeed, the Internet, high-speed computing, and voice recognition were all the result of security research by a single information hegemon and therefore it has always been in control.
- Type
- Research Article
- Information
- Copyright
- Copyright © British International Studies Association 2020
References
1 John Perry Barlow, ‘A Declaration of the Independence of Cyberspace’, Electronic Frontier Foundation, available at: {https://www.eff.org/cyberspace-independence} accessed 1 October 2019
2 Jerome Taylor, ‘Google chief: My fears for Generation Facebook’, Independent (22 October 2011), available at: {http://www.independent.co.uk/life-style/gadgets-and-tech/news/google-chief-my-fears-for-generation-facebook-2055390.html} accessed 27 November 2018.
3 See, for example, Robins, Kevin, ‘Cyberspace and the world we live in’, Body & Society, 1:3–4 (1995), pp. 135–55CrossRefGoogle Scholar; Dodge, Martin and Kitchin, Rob, Mapping Cyberspace (London: Routledge, 2003)CrossRefGoogle Scholar; Fuchs, Christian, Internet and Society: Social Theory in the Information Age (London: Routledge, 2007)CrossRefGoogle Scholar.
4 See, for example, Ryan Henry and Edward Peartree, ‘The Information Revolution and International Security’ (Washington: CISI, 1998); Deibert, Ronald, ‘Circuits of power: Security in the Internet environment’, in Rosenau, J. and Singh, J. P. (eds), Information Technologies and Global Politics: The Changing Scope of Power and Governance (New York: SUNY, 2002), pp. 115–42Google Scholar; Latham, Robert, Bombs and Bandwidth: The Emerging Relationship Between IT and Security (New York: The New Press, 2003)Google Scholar; Ferguson, Yale and Mansbach, Richard, Remapping Global Politics: History's Revenge and Future Shock (Cambridge: Cambridge University Press, 2004)CrossRefGoogle Scholar.
5 Herrera, Geoffrey, ‘Cyberspace and sovereignty: Thoughts on physical space and digital space’, in Cavelty, Myriam Dunn and Mauer, Victor (eds), Power and Security in the Information Age: Investigating the Role of the State in Cyberspace (London: Routledge, 2016), pp. 81–108Google Scholar.
6 Ibid. See also Herrera, Geoffrey, Technology and International Transformation: The Railroad, the Atom Bomb, and the Politics of Technological Change (New York: SUNY Press, 2012)Google Scholar.
7 Lefebvre, Henri, The Production of Space (London: Wiley-Blackwell, 1991)Google Scholar.
8 Henri Lefebvre, ‘Reflections on the politics of space’, Antipode, 8:1 (1976), p. 31.
9 Lefebvre, The Production of Space, p. 26.
10 Massey, Doreen, For Space (London: Sage, 2005)Google Scholar.
11 Massey, Doreen, Power Geometries and the Politics of Space-Time (Heidelberg: University of Heidelberg Press, 1999), p. 50Google Scholar.
12 Massey, For Space, p. 9.
13 Fall, Juliet J., ‘Artificial states? On the enduring geographical myth of natural borders’, Political Geography, 29:2 (2010), pp. 140–7CrossRefGoogle Scholar.
14 Tuathail, Gearóid Ó, ‘Borderless worlds? Problematising discourses of de-territorialisation’, Geopolitics, 4:2 (1999), pp. 139–54CrossRefGoogle Scholar.
15 Ibid., p. 147.
16 Our conception of state power and surveillance derives from Lyon, David, Surveillance Society: Monitoring Everyday Life (London: McGraw-Hill, 2001)Google Scholar.
17 Naila Hamdy and Ehab Gomaa, ‘Framing the Egyptian uprising in Arabic language newspapers and social media’, Journal of Communication, 62:2 (2012), pp. 195–211; Sahar Khamis, Paul B. Gold, and Katherine Vaughn, ‘Beyond Egypt's “Facebook revolution” and Syria's “YouTube uprising”: Comparing political contexts, actors and communication strategies’, Arab Media & Society, 15:1 (2012); S. Khamis and K. Vaughn, ‘We are all Khaled Said: The potentials and limitations of cyberactivism in triggering public mobilization and promoting political change’, Journal of Arab & Muslim Media Research, 4:1 (2012), pp. 145–63; M. Nanabhay and R. Farmanfarmaian’, Journal of North African Studies, 16:4 (2011), pp. 573–605.
18 Howard, Philip and Hussain, Muzammil, Democracy's Fourth Wave? Digital Media and The Arab Spring (Oxford: Oxford University Press, 2013), p. 5CrossRefGoogle Scholar.
19 Nevertheless, there is quite a lot of work on how state bordering practices, for example, Amoore, Louise, The Politics of Possibility: Risk and Security beyond Probability (Durham, NC: Duke University Press, 2013)CrossRefGoogle Scholar; Amoore, Louise, ‘Algorithmic war: Everyday geographies of the War on Terror’, Antipode, 41:1 (2009), pp. 49–69CrossRefGoogle Scholar.
20 C. Byun and E. J. Hollander, ‘Explaining the intensity of the Arab Spring’, Digest of Middle East Studies, 24:1 (2015), pp. 26–46; A. Smidi and Saif Shahin, ‘Social media and social mobilisation the Middle East: A survey of research on the Arab Spring’, India Quarterly, 73:2 (2017), pp. 196–209.
21 Michael Meyer, ‘Evgeny vs. the Internet’, Columbia Journalism Review, Jan/Feb (2014).
22 Omand, David, Bartlett, Jamie, and Miller, Carl, ‘Introducing social media intelligence (SOCMINT)’, Intelligence and National Security, 27:6 (2012), pp. 801–23CrossRefGoogle Scholar.
23 Lefebvre, Henri, ‘Reflections on the politics of space’, Antipode, 8:1 (1976), p. 31CrossRefGoogle Scholar.
24 Hunter, Dan, ‘Cyberspace as place and the tragedy of the digital anti-commons’, in Berman, Paul Schiff (ed.), Law and Society Approaches to Cyberspace (London: Routledge, 2017), pp. 59–139CrossRefGoogle Scholar.
25 Graham, Mark, ‘Geography/Internet: Ethereal alternate dimensions of cyberspace or grounded augmented realities?’, The Geographical Journal, 179:2 (2013), pp. 177–82CrossRefGoogle Scholar.
26 Chris Baynes, ‘New laws to tackle “Wild West” Internet will make UK “safest place in the world” to be online, Matt Hancock claims’, Independent (20 May 2018).
27 Nick Allen, ‘Barack Obama warns of Cold War-style “cyber arms race” with Russia’, Telegraph (5 September 2016), available at: {https://www.telegraph.co.uk/news/2016/09/05/barack-obama-warns-of-cold-war-style-cyber-arms-race-with-russia/} accessed 2 April 2019.
28 Tom Westbrook, ‘Severed cable sends Tonga “back to beginning of the Internet’, Reuters (23 January 2019), available at: {https://www.reuters.com/article/us-tonga-internet/severed-cable-sends-tonga-back-to-beginning-of-the-internet-idUSKCN1PI0A8} accessed 2 April 2019.
29 Ibid.
30 Garrett Hinck, ‘Cutting the cord: The legal regime protecting undersea cables’, Lawfare blog (November 2017), available at: {https://www.lawfareblog.com/cutting-cord-legal-regime-protecting-undersea-cables} accessed 2 April 2019.
31 Alexandra Chang, ‘Why undersea cables are more vulnerable than you think’, Wired (2 April 2013), available at: {https://www.wired.com/2013/04/how-vulnerable-are-undersea-internet-cables/} accessed 2 April 2019.
32 Andrew Blum, Tubes: A Journey to the Center of the Internet (New York: Ecco, 2012).
33 Jaeger, Paul, Lin, Jimmy, and Grimes, Justin, ‘Cloud computing and information policy: Computing in a policy cloud?’, Journal of Information Technology & Politics, 5:3 (2008), pp. 269–83CrossRefGoogle Scholar.
34 Buyya, Rajkumar et al. , ‘Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility’, Future Generation Computer Systems, 25:6 (2009), pp. 599–616CrossRefGoogle Scholar.
35 Amoore, ‘Cloud geographies’, p. 5.
36 Philip Stafford, ‘Next Generation Data explores listing’, Financial Times (28 June 2010).
37 Mattern, Shannon, ‘Interfacing urban intelligence’, in Kitchin, Rob and Perng, Sung-Yueh (eds), Code and The City(London: Routledge, 2016), pp. 49–60Google Scholar.
38 Amoore, Louise, ‘Cloud geographies: Computing, data, sovereignty’, Progress in Human Geography, 42:1 (2018), pp. 4–24CrossRefGoogle Scholar.
39 DeNardis, Laura, ‘The Internet design tension between surveillance and security’, IEEE Annals of the History of Computing, 37:2 (2015), pp. 72–83CrossRefGoogle Scholar.
40 Sassen, Territory, Authority, Rights, p. 330.
41 Ibid., p. 341.
42 Graham, Stephen, ‘The end of geography or the explosion of place? Conceptualising space, place and information technology’, Progress in Human Geography, 22:2 (1998), p. 173CrossRefGoogle Scholar.
43 Graham, ‘The end of geography or the explosion of place?’.
44 Ibid., pp. 522–4.
45 Ibid., p. 523.
46 Brunn, S. D., ‘Towards an understanding of the geopolitics of cyberspace: Learning, re-learning and un-learning’, Geopolitics, 5:3 (2000), p. 146CrossRefGoogle Scholar.
47 Spiegel, S. L., ‘Traditional space vs. cyberspace: The changing role of geography in current international politics’, Geopolitics, 5:3 (2000), p. 115CrossRefGoogle Scholar.
48 Ibid., p. 123.
49 Klimburg, Alexander, The Darkening Web: The War for Cyberspace (London: Penguin, 2014), p. 31Google Scholar.
50 Bratton, Benjamin H., The Stack: On Software and Sovereignty (Cambridge, MA: MIT Press, 2016)CrossRefGoogle Scholar.
51 Ibid., p. 52.
52 Oliver Farnan, Joss Wright, and Alexander Darer, ‘Analysing Censorship Circumvention with VPNs via DNS Cache Snooping’, 2019 IEEE Security and Privacy Workshops (2019); Yeo, Shin Joung, ‘Geopolitics of search: Google versus China?’, Media, Culture & Society, 38:4 (2016), pp. 591–605Google Scholar; Anderson, Daniel, ‘Splinternet behind the great firewall of China’, Queue, 10:11 (2012), p. 40Google Scholar.
53 Inkster, Nigel, ‘The Huawei Affair and China's technology ambitions’, Survival, 61:1 (2019), pp. 105–11CrossRefGoogle Scholar.
54 Segal, Adam, ‘When China rules the web: Technology in service of the state’, Foreign Affairs, 97 (2018), p. 10Google Scholar.
55 Kaplan, Fred, Dark Territory: The Secret History of Cyber war (New York: Simon and Schuster, 2016), pp. 57–87Google Scholar.
56 Aldrich, Richard J., GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency (2nd edn, London: Collins, 2019), pp. 560–73Google Scholar.
57 Thomas Bossert, ‘It's official: North Korea is behind WannaCry’, Wall Street Journal (18 December 2017).
58 A. Zegart, ‘The NSA confronts a problem of its own making’, The Atlantic (29 June 2017).
59 James Titcomb. ‘Microsoft slams UK government over global cyber-attack’, Telegraph (15 May 2017), available at: {https://www.telegraph.co.uk/technology/2017/05/15/microsoft-slams-us-government-global-cyber-attack/} accessed 2 April 2019.
60 Zegart, ‘The NSA confronts a problem of its own making’.
61 Brad Smith, ‘The need for urgent collective action to keep people safe online: Lessons from last week's cyberattack’, Microsoft blog (2017), available at: {https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/} accessed 2 April 2019.
62 Private information.
63 Allie Coyne, ‘Australian govt will introduce decryption laws before end of year’, ITN News (14 July 2017), available at: {https://www.itnews.com.au/news/australian-govt-will-introduce-decryption-laws-before-end-of-year-468360} accessed 23 March 2019.
64 ‘Uproar over Indian encryption law forces government to retreat’, Reuters (22 September 2015), available at: {https://www.reuters.com/article/us-india-encryption-law/uproar-over-indian-encryption-law-forces-government-to-retreat-idUSKCN0RM1CO20150922} accessed on 2 April 2019.
65 Haufler, Virginia, A Public Role for the Private Sector: Industry Self-Regulation in a Global Economy (New York: Carnegie Endowment for International Peace, 2011)Google Scholar.
66 Dana Polatin-Reuben and Joss Wright, ‘An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the Internet’ (Oxford: FOCI, 2014), pp. 1–10 (p. 4), available at: {https://www.usenix.org/system/files/conference/foci14/foci14-polatin-reuben.pdf}.
67 Castells, Manuel, ‘Network society’, in Webster, Frank, Theories of the Information Society (London: Routledge, 2014), pp. 98–123Google Scholar.
68 Malcomson, Scott, Splinternet: How Geopolitics and Commerce Are Fragmenting the World Wide Web (New York: OR Books, 2015), p. 7Google Scholar.
69 Mosco, Vincent, To The Cloud: Big Data in a Turbulent World (London: Routledge, 2016)Google Scholar.
70 Polatin-Reuben and Wright, ‘An Internet with BRICS Characteristics’, p. 1.
71 Crampton, Jeremy, The Political Mapping of Cyberspace (Chicago: University of Chicago Press. 2003)Google Scholar.
72 Malcomson, Splinternet, p. 7.
73 Bennett, W. L. and Livingston, Steven, ‘The disinformation order: Disruptive communication and the decline of democratic institutions’, European Journal of Communication, 33:2 (2018), pp. 122–39CrossRefGoogle Scholar.
74 Polatin-Reuben and Wright. ‘An Internet with BRICS Characteristics’.
75 Borghard, Erica and Lonergan, Shawn, ‘The logic of coercion in cyberspace’, Security Studies, 26:3 (2017), pp. 452–81CrossRefGoogle Scholar.
76 Franzese, Patrick, ‘Sovereignty in cyberspace: Can it exist’, Air Force Law Review, 64:1 (2009), p. 10Google Scholar.
77 Tufekci, Zeynep and Wilson, Christopher, ‘Social media and the decision to participate in political protest: Observations from Tahrir Square’, Journal of Communication, 62:2 (2012), pp. 363–79CrossRefGoogle Scholar; Khondker, Habibul Haque, ‘Role of the new media in the Arab Spring’, Globalizations, 8:5 (2011), pp. 675–9CrossRefGoogle Scholar.
78 Bell, David, Cyberculture Theorists: Manuel Castells and Donna Haraway (London: Routledge, 2006)CrossRefGoogle Scholar.
79 Nye, Joseph S., ‘Public diplomacy and soft power’, The Annals of the American Academy of Political and Social Science, 616:1 (2008), pp. 94–109CrossRefGoogle Scholar.
80 Alexandra Dunn, ‘Public as Politician? The Improvised Hierarchies of Participatory Influence of the April 6th Youth Movement Facebook Group’, Working Paper, Cambridge, CRASSH (2010), pp. 1–20.
81 Howard and Hussain, Democracy's Fourth Wave?, p. 3.
82 Ibid., p. 66.
83 Ibid., p. 47.
84 Goldsmith, Jack, ‘The failure of Internet freedom’, Emerging Threats (New York: Knight First Amendment Institute, 2018), pp. 9–12Google Scholar.
85 Moss, Dana M., ‘The ties that bind: Internet communication technologies, networked authoritarianism, and “voice” in the Syrian diaspora’, Globalizations, 15:2 (2018), pp. 265–82CrossRefGoogle Scholar.
86 ‘Turkey blocks access to WhatsApp, Facebook and Twitter’, Agence France-Presse and Telegraph (November 2016), available at: {https://www.telegraph.co.uk/technology/2016/11/04/turkey-blocks-access-to-whatsapp-facebook-and-twitter/} accessed 5 January 2019.
87 Rod, Espen and Weidmann, Nils, ‘Empowering activists or autocrats? The Internet in authoritarian regimes’, Journal of Peace Research, 52:3 (2015), pp. 338–51CrossRefGoogle Scholar.
88 Ibid.
89 Drezner, Daniel, ‘The global governance of the Internet: Bringing the state back in’, Political Science Quarterly, 119:3 (2004), p. 490CrossRefGoogle Scholar.
90 Rod and Weidmann, ‘Empowering activists or autocrats?’.
91 Graham, ‘The end of geography or the explosion of place?’, pp. 165–85.
92 Epstein, Edward, How America Lost Its Secrets: Edward Snowden, the Man and the Theft (New York: Vintage Press, 2017)Google Scholar.
93 Urban, Mark, Task Force Black (London: Little, Brown and Company, 2010)Google Scholar.
94 Betz, David and Stevens, Tim, Cyberspace and the State: Towards a Strategy for Cyber Power (London: Routledge, 2011), p. 60Google Scholar.
95 On recent intelligence scholarship, see Herrington, Lewis, ‘The debatable land: Spies, secrets and persistent shadows’, International Affairs, 94:3 (2018), pp. 645–55CrossRefGoogle Scholar; Gaspard, Jules, ‘Intelligence without essence: Rejecting the classical theory of definition’, International Journal of Intelligence and CounterIntelligence, 30:3 (2017), pp. 557–82CrossRefGoogle Scholar.
96 David Lyon is one the few to observe that in the Snowden ‘revelations’ there ‘was little that was completely new’. David Lyon, ‘The Snowden stakes: Challenges for understanding surveillance today’, Surveillance & Society, 13:2 (2015), pp. 139–52.
97 Standage, Tom, The Victorian Internet (London: Phoenix, 1998)Google Scholar.
98 Larsen, Dan, ‘Intelligence in the First World War: The state of the field’, Intelligence and National Security, 29:2 (2014), pp. 282–302CrossRefGoogle Scholar.
99 Sarah Mainwaring and Richard J. Aldrich, ‘The secret empire of signals intelligence: GCHQ and the persistence of the colonial presence’, International History Review, online (2019).
100 Nickles, David, Under the Wire: How the Telegraph Changed Diplomacy (Cambridge, MA: Harvard University Press, 2009)Google Scholar; Müller, Simone M., Wiring the World: The Social and Cultural Creation of Global Telegraph Networks (New York: Columbia University Press, 2016)Google Scholar.
101 Ceruzzi, Paul E., ‘Are historians failing to tell the real story about the history of computing?’, IEEE Annals of the History of Computing, 36:3 (2014), pp. 94–5CrossRefGoogle Scholar.
102 Seidel, Robert W., ‘“Crunching numbers” computers and physical research in the AEC laboratories’, History and Technology, 15:1–2 (1998), pp. 31–68Google Scholar; Agar, Jon, ‘Putting the spooks back in? The UK secret state and the history of computing’, Information & Culture, 51:1 (2016), pp. 102–24Google Scholar.
103 Deibert, Ronald and Rohozinski, Rafal, ‘Liberation vs. control: The future of cyberspace’, Journal of Democracy, 21:4 (2010), pp. 43–57CrossRefGoogle Scholar.
104 Feldmann, Maryann, ‘The Internet revolution and the geography of innovation’, International Social Science Journal, 54:171 (2002), pp. 47–56CrossRefGoogle Scholar.
105 Delamothe, Tony, ‘The once and future web: Worlds woven by the Telegraph and Internet’, British Medical Journal, 324.7337 (2002), pp. 620–1CrossRefGoogle Scholar.
106 Rosenzweig, Roy, ‘Wizards, bureaucrats, warriors, and hackers: Writing the history of the Internet’, The American Historical Review, 103:5 (1998), pp. 1530–52CrossRefGoogle Scholar.
107 DeNardis, Laura, The Global War for Internet Governance (New Haven: Yale University Press, 2014)CrossRefGoogle Scholar.
108 McDowell, Stephen, Steinberg, Phillip, and Tomasello., TamiManaging the Infosphere: Governance, Technology and Cultural Practice in Motion (Philadelphia: Temple University Press, 2008), p. 23Google Scholar.
109 Sassen, Saskia, Territory, Authority, Rights (New York: Princeton University Press, 2008), p. 331CrossRefGoogle Scholar.
110 Moses, Lyria Bennett, ‘Recurring dilemmas: The law's race to keep up with technological change’, University of Illinois Journal of Law Technology & Policy, 7:1 (2007), p. 239Google Scholar.
111 See, for example, Adas, Michael, Machines as the Measure of Men: Science, Technology, and Ideologies of Western Dominance (New York: Cornell University Press, 2015)CrossRefGoogle Scholar.
112 Mitnick, Kevin, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (London: Little, Brown and Company, 2011)Google Scholar.
113 Liz Jobey, ‘Trevor Paglen: What lies beneath’, Financial Times (31 December 2015), available at: {https://www.ft.com/content/beaf9936-a8ff-11e5-9700-2b669a5aeb83} accessed 12 January 2019.
114 Paglen, Trevor, ‘Goatsucker: Toward a spatial theory of state secrecy’, Environment and Planning D: Society and Space, 28:5 (2010), pp. 759–71CrossRefGoogle Scholar.
115 Bridle, James, New Dark Age: Technology, Knowledge and the End of the Future (London: Verso, 2018)Google Scholar.
- 8
- Cited by