Approaches to international information security and the discourse of cyberspace
Downloads
This paper investigates the notion of sovereignty and territorial integrity of states in cyberspace by carefully examining the information security debate. Nowadays, issues related to infosec are posing fundamental challenges to the sovereignty and territorial integrity of nation-states. Our analysis has attempted to answer the critical question, which aspect makes infosec the most pressing issue of the 21st century? The United States, The Russian Federation, and China are the three technologically superior nations and are included in the study to compare their understanding of infosec issues. The authors have typically relied on their expertise to interpret primary and secondary data because of descriptive discourse. Moreover, the study is efficiently conducted through a deductive approach and has applied non-kineticism as a theoretical model. The results showed that due to the compelling non-kinetic application of infosec, the debate at international forums had become a victim of geopolitical considerations. Results also revealed that the discourse of infosec needs to be disassociated from social freedom as it has been adopted for military application and requires a national security perspective to confine the course of security implications. In abstract, the notion of infosec has given birth to new contestation in the domain of cyberspace that altogether would lead the competition into the ‘digital battlefield.'
Arquilla J & Ronfeldt DF (1997) In Athena's Camp: Preparing for Conflict in the Information Age. CA: Rand Corporation.
Bieda D & Halawi L (2015) Cyberspace: A venue for terrorism. Issues in Information Systems 16 (3):33-42.
Cavelty MD (2013) From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review 15 (1):105-122. https://doi.org/10.1111/misr.12023.
Clement J (2019) Worldwide digital population as of October 2019. [Accessed 9 June 2020]. https://www.statista.com/statistics/617136/digital-population-worldwide/.
Davis JA & Lewis C (2019) Beyond the United Nations Group of governmental experts. The Cyber Defense Review (2019):161-168.
Feaver P & Inboden W (2018) Washington needs a new solarium project to counter cyber threats. Foreign Policy, 26 June. [Accessed 9 May 2020]. https://foreignpolicy.com/2018/06/26/washington-needs-a-new-solarium-project-to-counter-cyberthreats/.
France Diplomacy (2019) France and cyber security. [Accessed 9 April 2020]. https://www.diplomatie.gouv.fr/en/french-foreign-policy/defence-security/cyber-security/.
Goel S (2020) National cyber security and the emergence of strong digital borders. Connections: The Quarterly Journal 19 (1):73-86. https://doi.org/10.11610/Connections.19.1.07.
Hayward RJ (2017) Evaluating the imminence of a cyber-attack for purposes of anticipatory self-defense. Columbia Law Review 117 (2):399-434.
Heickero R (2010) Emerging Cyber Threats and Russian Views on Information Warfare and Information Operations. Stockholm: Defense Analysis, Swedish Defense Research Agency (FOI).
Jia K, Kenney M, Mattila J, & Seppala T (2018) The application of artificial intelligence at Chinese digital platform giants: Baidu, Alibaba and Tencent. ETLA Reports 81 (2018):1-11. https://doi.org/10.2139/ssrn.3154038.
Klimburg A (2020) Mixed signals: A flawed approach to cyber deterrence. Survival 62 (1):107-130. https://doi.org/10.1080/00396338.2020.1715071.
Koh HH (2012) International law in cyberspace. Harvard International Law Journal 54 (2012):1-12.
Lyndsey N (2019) US cyber command signals more aggressive approach involving persistent engagement ahead of 2020 election. [Accessed 10 March 2020]. https://www.cpomagazine.com/cyber-security/us-cyber-command-signals-more-aggressive-approach-involving-persistent-engagement-ahead-of-2020-election/.
Leuprecht C, Szeman J, & Skillicorn DB (2019) The damoclean sword of offensive cyber: Policy uncertainty and collective insecurity. Contemporary Security Policy 40 (3):382-407. https://doi.org/10.1080/13523260.2019.1590960.
Lynn III WJ (2010) Defending a new domain-the Pentagon's cyberstrategy. Foreign Affairs 89 (5):97-108.
Molander RC, Riddile AS, & Wilson PA (1996) Strategic Information Warfare: A New Face of War. CA: Rand Publisher.
Nakashima E (2018) Russian military was behind ‘NotPetya' cyberattack in Ukraine, CIA concludes. The Washington Post, 13 January. [Accessed 9 June 2020]. https://www.washingtonpost.com/world/national-security/russian-military-was-behind-notpetya-cyberattack-in-ukraine-cia-concludes/2018/01/12/048d8506-f7ca-11e7-b34a-b85626af34ef_story.html.
Nolan A (2015) Cybersecurity and Information Sharing: Legal Challenges and Solutions. Washington DC: Congressional Research Service.
North Atlantic Treaty Organization (2016) The Warsaw Declaration on Transatlantic Security: Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw 8-9 July 2016. [Accessed 5 June 2020]. https://www.nato.int/cps/en/natohq/official_texts_133168.htm.
Norton Cyber Security (2017) Norton cyber security insights report 2017 global results. [Accessed 5 June 2020]. https://www.symantec.com/content/dam/symantec/docs/about/2017-ncsir-global-results-en.pdf.
Pytlak A & Mitchell GE (2016) Power, Rivalry and Cyber Conflict: An Empirical Analysis. In: Karsten F & Jens R (eds). Conflict in Cyber Space: Theoretical, Strategic, and Legal Perspectives.London: Routledge.
Rosenberger L (2020) Making cyberspace safe for democracy: The new landscape of information competition. Foreign Affairs, May/June. [Accessed 6 June 2020] https://www.foreignaffairs.com/articles/china/2020-04-13/making-cyberspace-safe-democracy.
Rosenbach E & Chong SM (2019) Governing cyberspace: State Control vs. The Multistakeholder Model. In: Belfer Center for Science and International Affairs, Harvard Kennedy School, August.
Sanger DE (2018) Why hackers aren't afraid of us. The New York Times, 16 June. [Accessed 5 March 2020]. https://www.nytimes.com/2018/06/16/sunday-review/why-hackers-arent-afra id-of-us.html.
Schmitt MN (ed) (2013) Tallinn Manual on the International Law Applicable to Cyber Warfare. UK: Cambridge University Press.
Shaohui T (2017) International strategy of cooperation on cyberspace. Xinhua News, 1 March. [Accessed 1 April 2020]. http://www.xinhuanet.com/english/china/2017-03/01/c_136094371.htm.
Shen Y (2016) Cyber sovereignty and the governance of global cyberspace. Chinese Political Science Review 1 (1):81-93. https://doi.org/10.1007/s41111-016-0002-6.
Singer PW & Friedman A (2014) Cybersecurity: What Everyone Needs to Know. UK: Oxford University Press.
Townsend K (2020) Analyzing cyberspace solarium commission's blueprint for a cybersecure nation. Security Week, 18 March. [Accessed 20 June 2020]. https://www.securityweek.com/analyzing-cyberspace-solarium-commissions-blueprint-cybersecure-nation.
U.S. Department of Defense (2016) All cyber mission force teams achieve initial operating capability. [Accessed 19 May 2020]. https://www.defense.gov/Explore/News/Article/Article/1524747/cyber-mission-force-achieves-full-operational-capability/.
Weinstein D (2014) Snowden and U.S. cyber power. Georgetown Journal of International Affairs 15 (2014):4-11.
White House (2017) Statement by President Donald J. Trump on the elevation of cyber command. [Accessed 2 March 2020]. https://www.whitehouse.gov/briefings-statements/statement-president-donald-j-trump-elevation-cyber-command/.
Copyright of this journal is possession of Editorial Board and Journal Manager, by the knowledge of the author, while the moral right of the publication belongs to the author.
The formal legal aspect of journal publication accessibility refers to Creative Commons Attribution-NonCommercial-ShareAlike (CC BY-NC-SA), implies that publication can be used for non-commercial purposes in its original form (cannot be modified).
Every publication (printed/electronic) are open access for educational purposes, research, and library. Other than the aims mentioned above, the editorial board is not responsible for copyright violation.