Вызовы кибер-суверенитету и ответные меры

 
Код статьиS013122270008996-6-1
DOI10.20542/0131-2227-2020-64-2-89-99
Тип публикации Статья
Статус публикации Опубликовано
Авторы
Должность: научный сотрудник, Институт российских, восточноевропейских и центральноазиатских исследований; заместитель генерального секретаря, Исследовательский центр “Пояс и путь”
Аффилиация:
Институт российских, восточноевропейских и центральноазиатских исследований, Китайская академия социальных наук
Исследовательский центр “Пояс и путь”, Китайская академия социальных наук
Адрес: КНР, 100732 Пекин, ул. Чжанцзичжунлу, 3
Название журналаМировая экономика и международные отношения
ВыпускТом 64 Выпуск №2
Страницы89-99
Аннотация

По мере своего развития Интернет постепенно стал жизненно необходимой инфраструктурой для всех государств мира. В последнее время в разных странах возникают вопросы, связанные с кибер-безопасностью, и государства всего мира начали создавать собственные системы кибер-безопасности. Кибер-суверенитет является естественным продолжением национального суверенитета. Китай неизменно поддерживает и отстаивает кибер-суверенитет, который в настоящее время сталкивается со многими вызовами. Для ответа на эти вызовы необходимо изучить будущее кибер-безопасности для развивающихся стран. Ни одно государство не способно добиться абсолютной безопасности. Подчеркнутое уважение к кибер-суверенитету не означает отключения Интернета и изоляции страны от внешнего мира. Международное сообщество должно создать новый порядок кибер-управления, основанный на взаимном уважении кибер-суверенитета и суверенного равенства. Будущим кибер-суверенитета должно стать совместное управление.

Ключевые словакибер-суверенитет, кибер-безопасность, кибер-управление, вызов, риск, ответные меры
Получено29.03.2020
Дата публикации29.03.2020
Кол-во символов45381
Цитировать  
100 руб.
При оформлении подписки на статью или выпуск пользователь получает возможность скачать PDF, оценить публикацию и связаться с автором. Для оформления подписки требуется авторизация.

Оператором распространения коммерческих препринтов является ООО «Интеграция: ОН»

Размещенный ниже текст является ознакомительной версией и может не соответствовать печатной.
1 With the rapid development and application of network information technology, the Internet has already become a necessary basic factor for the survival of the peoples and an indispensable infrastructure for all countries in the world1. It has become the fifth dimension in addition to land, sea, air and sky. Network technology has been widely used in the management of political, economic, social, military and other aspects, and the cyber is seen as the “neural system” on which sovereign states depend for survival and development. At the same time, events such as cyber attacks, cyber espionage, cyber surveillance and information leakage emerge one after another, and all countries are speeding up the construction of their respective cyber and information security protection systems. 1. Hillary Clinton once called communication networks a “new nervous system for our planet” [1].
2 The mutual recrimination between Russia and the U.S. that Russia supposedly interfered in the 2016 U.S. presidential election appeared clearly as a historic event to underline the struggle between big powers over cyber security and cyber sovereignty. Although the cyber has no boundaries, the cyber infrastructure does have boundaries. Internet information can go beyond a country, but the cyber is not a place out of the reach of law. Although the cyber belongs to a virtual world, actors on the network (including individuals, companies, political parties, etc.) are citizens and organizations of a particular country in real life, and are subject to the rule of laws and regulations of the country. Therefore, the development of the cyber should also be subject to a certain rule. The management of this development is essentially a matter of a country’s internal affairs. The right of such management is a natural extension of national sovereignty in cyberspace in the Internet era, which is now receiving more and more attention from states.
3

THE CONNOTATION AND EXTENSION OF CYBER SOVEREIGNTY

4 The concept of “sovereignty” of modern countries is derived from the corresponding concept as defined by the Westphalian System2. In this context, the state sovereignty refers to the supreme and exclusive power of administration over matters within a certain jurisdiction [2]. This kind of power contains four basic elements, namely people, land, resources and political system [3]. The long-standing norms governing state behavior in peacetime also apply to cyberspace [4]. Naturally, the Five Basic Principles of Peaceful Coexistence, namely respect for sovereignty, non-aggression, non-interference in each other's internal affairs, sovereign equality and mutual benefit, which apply to relations between nations, also work in cyberspace [5]. 2. Jean Bodin from France was the first who demonstrated the concept of “sovereignty” in the history of human thought; the Dutch jurist Hugo Grotius defined “sovereignty” as follows: “a country is said to have sovereignty when it is not subject to the control of any other country in handling its internal affairs”; the Westphalian System defined norms in international relations based on “equality” and “sovereignty”; the UN Charter and related laws established the supremacy of national sovereignty in post-war international relations.
5 Thus, cyber sovereignty is based on national sovereignty, just like territorial sea rights. It is the extension and embodiment of national sovereignty in cyberspace. Cyber sovereignty in the Internet era means that each country has the supreme authority for the management of cyberspace within its own territory, and it inherits the basic elements, basic rights and basic principles of national state sovereignty.
6

BASIC ELEMENTS AND RIGHTS OF CYBER SOVEREIGNTY

7 Similar to national sovereignty, cyber sovereignty also has four basic elements: the cyberspace formed by the information and communication technology (ICT) system, equivalent to the territory of cyberspace (the sovereign network); the subjects who operate the data, equivalent to the population of cyberspace; the signal transmitted by the information and communication technology system, equivalent to the resources of cyberspace; the “activity rules”, equivalent to the cyberspace regime.
8 The cyber sovereignty rights are the following.
9
  1. Right to cyber independence. This is an important manifestation of cyber sovereignty: a country's cyber system is completely independent, and it is not subject to the control of any other country or organization in terms of the domestic cyber infrastructure construction, data storage3, operation rules and application technology. However, in the actual development of Internet, the existing network relies on the root domain name resolution system, which directly affects the right for network independence to a certain extent.
  2. Right to cyber equal sharing. That is, regardless of their size, all countries' cybers are equal and have the right for interconnection and information sharing. For example, cybers with the domain name “.cn” are equal to the cybers with the domain name “.ru”, and they are all entitled to interconnection and information resources sharing. The inequality in cyber resources owned by different countries shall not lead to inequality in cyber status or resource sharing. In terms of global Internet governance, all countries enjoy equal status and equal rights, one country has one vote, regardless of the size of its cyber.
  3. Right to cyber self-defense. That is, all countries have the right to protect their own cybers from external attack and take measures to protect their own cyber sovereignty when being attacked. One of the measures is to defend the “sovereign cyber” by building “cyber frontier defense” to prevent and resist attacks from abroad; on the other hand, it is necessary to clarify the duties and functions of national cyber security defense forces in defending a national network infrastructure and important information systems. And, when necessary, national cyber security defense forces should be given full play in protecting the sovereignty of cybers.
  4. Right to cyber jurisdiction. Countries have the supreme jurisdiction over their own cyber infrastructure, cyber systems, data and their operating rules. At present, countries are in fact exercising jurisdiction over cybers within their respective territories. To define cyberspace jurisdiction, it is necessary to first define “sovereign cyber”, which is the “information and communication technology facilities providing network and information services within the territory” [6] as has been agreed by countries on the scope of cyber jurisdiction. This is also the consensus among countries on the cyber management. Therefore, a country can determine its own cyber management mechanism as well as business model, business content and related penalties for the main Internet operators. In the process of implementation, it can be expressed in forms of the ownership of cyber infrastructure, administration of the Internet, management of network culture, and the power to formulate and enforce laws and regulations, etc. in cyberspace.
3. In mid-November 2016, the social network site LinkedIn was blocked in Russia as an example of Russia's exercise of its network sovereignty in response to the violation of the requirement to store Russian citizens’ personal data on its territory.

Всего подписок: 0, всего просмотров: 2167

Оценка читателей: голосов 0

1. Remarks on Internet Freedom by Hillary Rodham Clinton, Secretary of State. U.S. Department of State, January 21, 2010. Available at: https://2009-2017.state.gov/secretary/20092013clinton/rm/2010/01/135519.htm (accessed 29.01.2019).

2. Biersteker T., Weber C. State Sovereignty as Social Construct. Cambridge Studies in International Relations, Cambridge University Press, Book 46, 1996. 316 p.

3. Draft Declaration on Rights and Duties of States. 1949. Available at: http://legal.un.org/docs/?path=../ilc/texts/instruments/english/draft_articles/2_1_1949.pdf&lang=EF (accessed 13.02.2019).

4. International Strategy for Cyberspace. Prosperity, Security, and Openness in a Networked World. The White House. May 2011. Available at: https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf (accessed 01.02.2019).

5. The Five Principles of Peaceful Co-existence. People, 28.06.2004. Available at: http://en.people.cn/200406/28/eng20040628_147763.html (accessed 01.02.2019).

6. Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations General Assembly. 24 June 2013. Available at: http://www.unidir.org/files/medias/pdfs/developments-in-the-field-of-information-and-telecommunications-in-the-context-of-international-security-2012-2013-a-68-98-eng-0-578.pdf (accessed 29.01.2019).

7. Limbago A. The Global Push for Cyber Sovereignty Is the Beginning of Cyber Fascism. The Hill, 14.12.2016. Available at: https://thehill.com/blogs/congress-blog/technology/310382-the-global-push-for-cyber-sovereignty-is-the-beginning-of (accessed 29.01.2019).

8. National Cyber Strategy of the United States of America. The White House. September 2018. Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf (accessed 30.01.2019).

9. Internet Freedom. U.S. Department of State. Available at: https://www.state.gov/internet-freedom/ (accessed 25.01.2019).

10. Jork J.C. The Myth of a Borderless Internet. The Atlantic, 03.06.2015. Available at: https://www.theatlantic.com/technology/archive/2015/06/the-myth-of-a-borderless-internet/394670/ (accessed 25.01.2019).

11. Rothkopf D. Is Unrestricted Internet Access a Modern Human Right? Foreign Policy, 02.02.2015. Available at: https://foreignpolicy.com/2015/02/02/unrestricted-internet-access-human-rights-technology-constitution/ (accessed 25.01.2019).

12. Законопроект о “суверенном интернете” принят в первом чтении. Государственная дума Федерального собрания Российской Федерации. 12.02.2019. [The Sovereign Internet Bill Passed in First Reading. The State Duma of the Federal Assembly of the Russian Federation. 12.02.2019 (In Russ.)] Available at: http://duma.gov.ru/news/29748 (accessed 26.02.2019).

13. Атака изнутри: операторы протестируют закон об устойчивости Рунета. РБК, 08.02.2019. [Attack from the Inside: Operators Will Test the Law on Stability of the Runet. RBC, 08.02.2019 (In Russ.)] Available at: https://www.rbc.ru/technology_and_media/08/02/2019/5c5c51069a7947bef4503927 (accessed 26.02.2019).

14. Russia Is Ready for a Shut-Down of the Internet – Putin’s Adviser. The Moscow Times, 05.05.2018. Available at: https://www.themoscowtimes.com/2018/03/05/russia-is-ready-for-a-shut-down-of-the-internet-putins-adviser-a60704 (accessed 26.01.2019).

15. Downes L. Requiem for Failed UN Telecom Treaty: No One Mourns the WCIT. Forbes, 17.12.2012. Available at: https://www.forbes.com/sites/larrydownes/2012/12/17/no-one-mourns-the-wcit/#72b3344d5b2c (accessed 27.01.2019).

16. Кузьмин В. Стандарты для сети. Дмитрий Медведев выступил за международное регулирование интернета. Российская газета, 16.12.2015. [Kuz'min V. Standarty dlya seti. Dmitrii Medvedev vystupil za mezhdunarodnoe regulirovanie interneta [Standarts for the Net. Dmitry Medvedev Spoke in Favor of International Internet Regulation]. Rossiiskaya gazeta, 16.12.2015.] Available at: https://rg.ru/2015/12/16/internet-site.html (accessed 27.01.2019).

17. Совместное заявление Президента Российской Федерации и Председателя Китайской Народной Республики о взаимодействии в области развития информационного пространства. Президент России. 25 июня 2016 г. [Joint Statement by the President of the Russian Federation and the Chairman of the People’s Republic of China on Cooperation in the Development of the Information Space. President of Russia. June 25, 2016 (In Russ.)] Available at: http://www.kremlin.ru/supplement/5099 (accessed 27.01.2019).

18. Эксперты о “разговоре с Медведевым”. Агентство политических и экономических коммуникаций, 30.11.2017. [Experts on the “Conversation with Medvedev”. Agency of Political and Economic Communications, 30.11.2017 (In Russ.)] Available at: http://www.apecom.ru/articles/?ELEMENT_ID=4270 (accessed 27.01.2019).

19. Яровая М. Игорь Ашманов: “Сегодня информационное доминирование – это все равно, что господство в воздухе”. Ain, 01.05.2013. [Yarovaya M. Igor' Ashmanov: “Segodnya informatsionnoe dominirovanie – eto vse ravno, chto gospodstvo v vozdukhe” [Igor' Ashmanov: “Today, Information Dominance is the Same as Air Superiority”]. Ain, 01.05.2013. Available at: https://ain.ua/2013/05/01/igor-ashmanov-segodnya-informacionnoe-dominirovanie-eto-vse-ravno-chto-gospodstvo-v-vozduxe/ (accessed 27.01.2019).

20. В России созданы войска информационных операций. РИА новости, 22.02.2017. [Troops of Information Operations Were Created in Russia. RIA novosti, 22.02.2017 (In Russ.)] Available at: https://ria.ru/20170222/1488596879.html (accessed 27.01.2019).

21. International Code of Conduct for Information Security. Ministry of Foreign Affairs of the People’s Republic of China. 12.09.2011. Available at: https://www.fmprc.gov.cn/mfa_eng/wjdt_665385/2649_665393/t858323.shtml (accessed 26.01.2019).

22. Press Release on the Adoption of a Russian Resolution on International Information Security at the UN General Assembly. The Ministry of Foreign Affairs of the Russian Federation. 7 December 2018. Available at: http://www.mid.ru/en_GB/foreign_policy/news/-/asset_publisher/cKNonkJE02Bw/content/id/3437775 (accessed 26.01.2019).

23. 习近平强调 “尊重网络主权” 有何深意. People, 16.12.2015. [Xi Jinping Emphasizes the Significance of “Respect for Network Sovereignty”. People, 16.12.2015. (In Chin.)] Available at: http://it.people.com.cn/n1/2015/1216/c1009-27937865.html (accessed 26.01.2019).

24. National Security Law of the People’s Republic of China (2015). Ministry of National Defense of the People's Republic of China. Available at: http://eng.mod.gov.cn/publications/2017-03/03/content_4774229.htm (accessed 27.01.2019).

25. 中华人民共和国网络安全法. Xinhua News, 19.09.2019. [People's Republic of China Network Security Law. Xinhua News, 19.09.2019 (In Chin.)] Available at: http://www.xinhuanet.com/local/2017-09/19/c_129707671.htm (accessed 27.01.2019).

26. Shires J. Between Multistakeholderism and Sovereignty: Cyber Norms in Egypt and the Gulf States. Harward Kennedy School. Belfer Center for Science and International Affairs. October 12, 2018. Available at: https://www.belfercenter.org/publication/between-multistakeholderism-and-sovereignty-cyber-norms-egypt-and-gulf-states (accessed 27.01.2019).

27. Cybersecurity in the EU Common Security and Defense Policy (CSDP). Challenges and Risks for the EU. European Parliament. Available at: http://www.europarl.europa.eu/RegData/etudes/STUD/2017/603175/EPRS_STU (2017)603175_EN.pdf (accessed 27.01.2019).

28. Cyber Security Strategy of the European Union: an Open, Safe and Secure Cyberspace. European Data Protection Supervisor. 14 June 2013. Available at: https://edps.europa.eu/data-protection/our-work/publications/opinions/cyber-security-strategy-european-union-open-safe-and_en (accessed 27.01.2019).

29. Röhrig W., Smeaton R. Cyber Security and Cyber Defence in the European Union. Cyber Security Review, May 2015. Available at: http://www.cybersecurity-review.com/articles/cyber-security-and-cyber-defence-in-the-european-union/ (accessed 27.01.2019).

30. Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations General Assembly. 24 June 2013. Available at: http://www.unidir.org/files/medias/pdfs/developments-in-the-field-of-information-and-telecommunications-in-the-context-of-international-security-2012-2013-a-68-98-eng-0-518.pdf (accessed 27.01.2019).

31. Clinton H. Internet Rights & Wrongs: Choices and Challenges in a Networked World. The George Washington University, Washington D.C., February 15, 2011. American Rhetoric. Online Speech Bank. Available at: https://www.americanrhetoric.com/speeches/hillaryclintoninternetpolicyspeechgw.htm (accessed 27.01.2019).

32. McGuinness D. How a Cyber Attack Transformed Estonia. BBC News, 27.04.2017. Available at: https://www.bbc.co.uk/news/39655415 (accessed 02.02.2019).

33. Yang Yi. Full Text of BRICS Leaders Xiamen Declaration. Xinhua News, 04.09.2017. Available at: http://www.xinhuanet.com/english/2017-09/04/c_136583396_2.htm (accessed 02.02.2019).

Система Orphus

Загрузка...
Вверх