Information Sovereignty and Interference in Domestic Affairs in Russian-American Relations
https://doi.org/10.17994/IT.2018.16.3.54.10
Abstract
This article examines the American policy in the field of cybersecurity since the 1990s to the present. The article is based on the constructivist theory of international relations and takes as a basis the discourse analysis of cyber threats reflected in U.S. official documents and strategies. The construction and articulation of cyber threats are, in this case, the founding factors for the further formulation of cybersecurity policy. Changes in the discourse of cyber threats allow us to analyze the evolution of the American approach to cybersecurity, notably the weights in the documents followed the changes of the presidential administrations, but the main focus on the infrastructure and network security remained stable. However, with the development and dissemination of technologies cyberthreats had received social and then political dimension. In the mid-2000s appeared the international dimension of cybersecurity policy; it became clear that cyberspace is global, and for the safe and cost-effective use of the Internet it is necessary to build an international cybersecurity system. The discourse of cyber threats in American documents has undergone some changes. Their typology was expanded and detailed, the variety of potentially dangerous actors has increased, and possible rivals have become openly called at the interstate level. The article consists of three sections. The first analyzes the U.S. approaches to cybersecurity in the late 1990s-early 2000s, when the protection of internal computer systems and the unilateral nature of the policy in cyberspace dominated the views of the American political establishment. The next section is devoted to the period of the B. Obama administration, when international cooperation was put on the agenda, and cybersecurity policy started being implemented on the principles of multistakeholderism – the participation of all stakeholders, including business, to create a secure cyberspace. The last two sections consider the paradigm shift in the American vision of cybersecurity towards information security, an approach actively advocated at the international level by Russia, that took place after the 2016 U.S. presidential elections. The scandal with the use of personal data of American users of Facebook for targeting election advertising and propaganda can become a trigger for consolidating the information focus of cybersecurity in the updated American policy.
About the Author
Pavel SharikovRussian Federation
Dr Pavel Sharikov - Leading Research Fellow, Institute for the U.S. and Canada Studies of the Russian Academy of Sciences; Associate Professor, Department of Regional Problems in World Politics, Lomonosov Moscow State University
Moscow, 121069
References
1. Batyeva E.V. (2014). K opredeleniyu natsionalnoi kiberstrategii [Defining national cyberstrategy]. Mezhdunarodnye processy. Vol. 12 No. 1–2. (36–37). P. 117–127.
2. Bell D. (1973). The coming of Post-Industrial Society: A venture in Social Forecasting. New York. 508 p.
3. Bolton J. (2010). How Barack Obama is endangering our national sovereignty. Encounter Books. 48 p.
4. Efremov A.A. (2017). Formirovanie kontseptsii informatsionnogo suvereniteta gosudarstva [Formation of the Concept of Information Sovereignty of the State]. Pravo. Zhurnal Vysshey shkoly ekonomiki. No. 1.
5. Ghonim V. (2012). Revolutsia 2.0 [Revolution 2.0]. Sankt-Peterburg: Lenizdat. 352 p.
6. Kokoshin A.A. (2006). Realny suverenitet v sovremennoy miropoliticheskoy sisteme [Real Sovereignty in a World Political System]. Moscow: 140 p.
7. Krasner S. (1999). Sovereignty: organized hypocrisy. Princeton University Press, Princeton New Jersey. 275 p.
8. Lenin V.I. (1969). Soviety postoronnego [Advises by the Outsider]. In Lenin V.I. Polnoye sobranije sochinenii. izd. 5 t. 34. 619 p.
9. Nye J. (2005). Soft Power: The Means to Success in World Politics. N.Y.: PublicAffairs. 191 p.
10. Rogov S.M., Rogova N.V. (2017). Vybory 2016 goda v SShA: itogi i perspektivy (chast pervaya) [U.S. Presidential Elections 2016: Outcomes and Perspectives (Part One)]. SShA i Kanada: Economika, Politika, Kultura. No. 1 (565). P. 17–31.
11. Ruijgrok K. (2017). From the web to the streets: internet and protests under authoritarian regimes. DEMOCRATIZATION. Vol. 24. Issue 3. P. 498–520. doi.org/10.1080/13510347.2016.1223630
12. Smirnov A., Streltsov A. (2017). Rossiisko-amerikanskoe sotrudnichestvo v oblasti mezhdunarodnoi informatsionnoi bezopasnosti: predlozheniya po prioritetnym napraveniyam [Russian-American Cooperation on International Information Security: Suggestions for Priority Agenda]. Mezhdunarodnaya Zhizn. No. 11. P. 71–81.
13. Stikhin A.E. (2014). Globalnye internet-servicy v structure instrumentov americanskoi vneshney politiki [Global internet-services among the instruments of US foreign policy]. Mezhdunarodye processy. Vol. 12. No. 1–2 (36–37). P. 105–116.
14. Tatarchenko E.I. (1923). Vozdushny flot Britanskoi Impreii [British Imperial Air Fleet]. Voyenny vestnik. 80 p.
15. Teschke B. (2003). The myth of 1648, Class, Geopolitics, and the Making of Modern International Relations. 308 p.
16. Toffler A. (1980). The Third Wave. N.Y.: Morrow. 560 p.
17. Wu T. (2003). Network Neutrality, Broadband Discrimination. Journal of Telecommunications and High Technology Law. Vol. 2. 141 p. DOI: 10.2139/ssrn.388863
18. Zinovyeva E.S. (2016). Perspektivnye tendencii formirovaniya mezhdunarodnogi rejima po obespecheniyu mezhdunarodnoi bezopasnosti. [Perspective trends in forming international lregime of ensuring international information security]. Vestnik MGIMO-Universiteta. No. 4 (49). P. 235–247.
Review
For citations:
Sharikov P. Information Sovereignty and Interference in Domestic Affairs in Russian-American Relations. International Trends / Mezhdunarodnye protsessy. 2018;16(3):170-188. (In Russ.) https://doi.org/10.17994/IT.2018.16.3.54.10