国产视频

Two Poles and Three Clusters

It is tempting to romanticize Internet architecture and governance as innately embodying democratic values of equality, participatory openness, and multistakeholder oversight but there are several problems with this narrative. In a significant portion of the world, Internet governance control structures do not embody democratic values but involve systems of repression, media censorship, and totalitarian surveillance of citizens.1

– Laura DeNardis


Norms at the international level are likely to reflect actions at the national level around the globe. To that end, internet governance, as described by DeNardis above, is not one thing. It is a suite of issues including technical design standards, data retention and localization policies, and many things in between. Some of these issues should appropriately involve or even be driven by private stakeholders鈥攃ivil society or industry. Others, though, still need to be driven by the state.

DeNardis鈥 words ring just as true today as they did in 2014. Two loose models for the internet and its governance exist. On the one hand, a predominantly free and open internet driven by a multistakeholder governance model; on the other, a sovereign and controlled version of the internet, where the state exerts authority over the architecture, often in the name of some form of security, usually resulting in a censored or unfree space. These two models represent poles of attraction. In reality, national-level internet regimes exist on a spectrum between these two camps with few鈥攊f any鈥攆ully embodying the extremes of either camp.

In order to depict this phenomenon, we use a simple plot consisting of two spectrums as the axes: one measuring internet openness and the other capturing the character of internet governance.

Openness means different things to different people. For the early internet pioneers, 鈥渙pen鈥 referred to the principle that internet architecture should be agnostic to the traffic on it. What this would mean, in practice, is that architecture would not discriminate鈥攂lock or throttle鈥攄ifferent packets based on what was contained in them. However, openness in the political context has increasingly come to describe the content environment of a country鈥檚 internet. A fully open internet in this context refers to an internet absent of any censorship, throttling, or blocking鈥攚hether of content or any other type of internet traffic. As authoritarian countries push to legitimize censorship and democrats laud the power of the internet for spreading democracy, it is this second version of openness that has been placed at the center of the internet governance debate. It is also this version of openness鈥攃ontent openness鈥攖hat we map on our x-axis. On the far right, we have a completely open internet. On the far left, we have an internet whose content is completely moderated.

The character of governance is the extent to which the state has鈥攐r should have鈥攁 monopoly over internet governance in its country and is mapped along the y-axis. Full monopoly鈥攚here the government is a solitary decision maker on internet governance鈥攊s the bottom of the spectrum, whereas pure multistakeholderism鈥攚here each relevant stakeholder has a voice in governance decisions鈥攊s the top of the spectrum. A country where the state has a monopoly over all internet policy decisions, can dictate architectural changes and configurations, and sets standards would fall on the bottom of the spectrum. A country where control is partially distributed would fall near the middle of the spectrum. A country where control is equitably distributed would sit at the top of the spectrum.

The poles of attraction鈥攕overeign and controlled and open and global鈥攁re the bottom left and top right of the graph, respectively.

The exercise of plotting countries on these spectrums reveals a clear differentiation between two clusters of countries, with a few countries sprinkled throughout the middle. In the lower left-hand corner is a cluster of states that take a heavy-handed approach to governing the internet and tightly control the content on that internet. The opposing cluster is slightly less well defined. Looking at the far right end of the plot we see a series of countries that generally favor an open internet, but their governance model is less starkly defined. In addition, the 2014 and present day comparison reveals that this second cluster of countries (on the far right end of the spectrum) have begun to creep closer and closer to the middle鈥攁 visual depiction of the challenges to the multistakeholder and open models we previously described.

No longer do the camps only represent models for global internet governance. Instead, these two camps represent distinct鈥攂ut seemingly compatible鈥攎odels for the internet itself.

This plot depicts the steady consolidation of states into two clusters, one in the Sovereign and Controlled quadrant of the graph and the other in the Global and Open quadrant, over the last four years. With this consolidation comes greater clarity of the impact of these models on the functioning of the internet. No longer do the camps only represent models for global internet governance. Instead, these two camps represent distinct鈥攂ut seemingly compatible鈥攎odels for the internet itself: one placing freedom and opportunity for individual users front and center, the other emphasizing sovereign control and managing threats to political stability. Yet, so long as interconnection continues to work鈥攖hat is, filtering and blocking happens at the borders of national networks鈥攖hese models may not break one another.

That these two clusters exist is not groundbreaking. What matters is where these clusters plot鈥攖he general trend down and to the left in our scatterplot鈥攁nd where countries that do not yet fit into either of these clusters reside in relation to each cluster. To better understand these dynamics, let us first explore the principles and practices of each cluster.

Sovereign and Controlled

Whoever masters the Internet holds the initiative of the era, and whoever does not take the Internet seriously will be cast aside by the times.2

– Zhuang Rongwen, Chief of the Cyberspace Administration of China


In September 2018, newly appointed chief of the Cyberspace Administration of China (CAC), Zhuang Rongwen, published an essay outlining the Communist Party of China鈥檚 plan to 鈥渆xert full control over the information flowing over China鈥檚 portion of the Internet,鈥 according to a translation by DigiChina.3 For Zhuang, 鈥淲hoever masters the Internet holds the initiative of the era, and whoever does not take the Internet seriously will be cast aside by the times.鈥4 While some of the means proposed by Zhuang in his essay were novel, the end was not. This notion, that the state must master the internet to stay relevant, has been present in parts of the world for the better part of two decades.

This approach was embodied at the international level first in 2011 when a group of countries, including China, Russia, and several Central Asian Republics submitted a letter to the United Nations General Assembly (UNGA). The letter, which was resubmitted in 2014 with minor changes, opined on 鈥渢he need to prevent the potential use of information and communication technologies for purposes that are inconsistent with the objectives of maintaining international stability and security and may adversely affect the integrity of the infrastructure within States, to the detriment of their security鈥 and sought to reaffirm 鈥渢hat policy authority for Internet-related public issues is the sovereign right of States, which have rights and responsibilities for international Internet-related public policy issues.鈥5 In short, as early as 2011, governments in Russia, China, and a group of allies sought to legitimize a consolidation of sovereign control over the internet through international institutions.

So what does this approach look like in practice? For the better part of five decades, the creators and stewards of the internet have expounded on the benefits of its statelessness鈥攄escribing a solitary internet as challenging territorial borders, needing its own law and legal institutions.6 The Sovereign and Controlled approach challenges these notions, placing 鈥渕ore authority in the hands of the state,鈥 and viewing 鈥渃yber activity as occurring within the jurisdiction of these states, rather than within a stateless data environment.鈥7 As Jack Margolin notes, for Russia at least, the sovereign approach to the digital space mirrors 鈥渢he Kremlin鈥檚 conception of 鈥榮overeign democracy,鈥 a term used to justify Russia鈥檚 right to eschew certain democratic principles in the name of 鈥榮tability鈥 and sovereignty in its own affairs.鈥 Cyber-sovereignty challenges an 鈥渋nternationalist approach to norms of digital governance.鈥8 For China, arguably the leader of this pack, 鈥淐ybersecurity and informatization are a single body with two wings, the two wheels of a single drive, and require unified planning, unified deployment, unified promotion, and unified implementation.鈥9 While there is some variation between Sovereign and Controlled approaches, the model manifests with a number of generalizable traits with regard to governance process and character, as well as鈥攑articularly鈥攊nternet openness.

As early as 2011, governments in Russia, China, and a group of allies sought to legitimize a consolidation of sovereign control over the internet through international institutions.

First, with regard to governance process and character the cluster of states that have gravitated towards the Sovereign and Controlled end of the spectrum tend towards a statist approach to internet governance. In contrast to the popular multistakeholder governance movement from the mid-2010s, this statist approach to internet governance grants the state outsized鈥攊f not complete鈥攄ecision-making power over governance. Crucially, internet governance impacts the internet鈥檚 architecture as well as the policies guiding corporations, developers, and users. Decision-making power may come via state-owned and operated corporations, public infrastructure, laws and regulations that legitimize state direction of private corporations, quiet agreements, or simple intimidation.

Second, these countries tend to favor a more closed version of the internet. Through legal and technical means as well as social norms and intimidation, the market for information on the internet is strictly controlled by the state. In China, this means the continued iteration on the Golden Shield project, which uses technical and human means to manipulate the Chinese internet鈥檚 architecture to filter out content deemed malicious by the state.10 Similarly, the Iranian state is able to control the few physical points of ingress for the internet in Iran effectively enough to block information at the borders.11

In part because of the nature of its internet architecture, the Russian model for information control departs from these technical means of censorship and, in a sense, the flow of online information is freer. Rather than employing heavy-handed filtering of traffic, the Russian government deploys a system called the System for Operative Investigative Activities (SORM), which allows the government to intercept and view all traffic on their networks.12 The presence of this pervasive surveillance coupled with strict laws regarding legal and illegal information and communications achieves a similar censoring effect to that of the Chinese 鈥淕reat Firewall鈥 or the Iranian 鈥淗alal Net鈥.

In his book, The Darkening Web, Alex Klimburg aptly outlines the Sovereign and Controlled model and provides an assessment of some of its pitfalls. To Klimburg, the 鈥渃ore notion of cyber sovereignty is on its surface beguilingly simple: a state should be totally sovereign within its borders,鈥 rendering it free from foreign influence or interference. According to Klimburg, this implicates both internet content in the country and the 鈥渓ogical and physical infrastructure on the local Internet segment,鈥 what we refer to as the internet鈥檚 architecture. Sovereignty in this space, to its champions, is meant to help states 鈥渂etter protect not only its citizens from bad content but also the critical infrastructure and government systems from hostile outside forces.鈥 For this to work, contends Klimburg, the sovereignty of states must be 鈥漣mmutable and absolute,鈥 and this is simply not the case.13 Compounding these fallacies is the notion that sovereign control over domestic internets could lead to breakdowns in the interconnection of the global network, impacting the way the internet acts and presents outside of those sovereign borders鈥攁 somewhat paradoxical reality. If your sovereign internet inevitably interferes with the functioning of mine, are you respecting my sovereignty?

The Sovereign and Controlled cluster of states plot at the extreme ends of both of our described spectrums and appear clustered in the bottom left corner of Figure 1.

Global and Open (albeit without consensus on how)

Americans sometimes took for granted that the supremacy of the United States in the cyber domain would remain unchallenged, and that America鈥檚 vision for an open, interoperable, reliable, and secure Internet would inevitably become a reality. Americans believed the growth of the Internet would carry the universal aspirations for free expression and individual liberty around the world. Americans assumed the opportunities to expand communication, commerce, and free exchange of ideas would be self-evident.

– National Cyber Strategy of the United States of America, September 2018


On the opposite end of the spectrum of content control sits a cluster of countries that gravitate towards the global and open end of the content spectrum, but have been volatile with regard to governance structures. This is the cluster of states we wrote about in our Internet Ideals vs. Internet Realities report and consists of a group of like-minded states that favor a global internet that embodies principles of openness, freedom, interoperability, security, and resilience. As the 2018 U.S. National Cyber Strategy observes, many Americans鈥攁nd many of America鈥檚 allies鈥斺漷ook for granted that the supremacy of the United States in the cyber domain would remain unchallenged, and that America鈥檚 vision for an open, interoperable, reliable, and secure Internet would inevitably become a reality.鈥14 Likewise, this Global and Open cluster, spearheaded by U.S leadership, 鈥渂elieved the growth of the Internet would carry the universal aspirations for free expression and individual liberty around the world.鈥15

Within this cluster, there is a general consensus that a global internet is not only in the best interest of individual states, but in the best interest of the entire globe. Likewise, there is consensus that openness鈥攖hough there is some contention over what that term means鈥攊s in the national and global best interest. However, less consensus exists in how, exactly, to design both domestic and international governance structures鈥攍aws, regulations, standards, and norms鈥攖o achieve this reality.

Within this cluster, there is a general consensus that a global internet is not only in the best interest of individual states, but in the best interest of the entire globe.

The American model for the internet was indeed embraced by many of the U.S.鈥 friends and allies. In 2017, the French strategy sought an internet driven by principles of 鈥渙uverture鈥 (openness), 鈥渘eutralite des reseaux鈥 (network neutrality), and 鈥渓iberte d鈥檃cces garantie par une architecture decentralisee鈥 (freedom of access guaranteed by a decentralized architecture).16 The U.K. similarly calls for a 鈥渇ree, open, peaceful and secure cyberspace.鈥17 Thus, as with the Sovereign and Controlled cluster, the Global and Open share some generalizable characteristics.

Most notably, these countries favor internets that enable the free flow of internet content, freedom of speech, and global e-commerce. In the past, many of these countries sought鈥攁t least in principle鈥攖o construct systems of internet governance that allotted governance power equitably to stakeholders, including government stakeholders, but also industry, academia, and civil society. At the same time, these countries sought to build internets that embodied the early internet principle of openness. What this meant in practice was that internet infrastructure would be designed and governed to treat all internet traffic equally, thereby not throttling or filtering any of the packets flowing through it.

However, in recent years, both the practicality of a pure multistakeholder system of internet governance and the desirability of the free flow of all data over global networks, have come into question. The governments of the U.K. and Israel are exploring ways to filter out certain malicious traffic at their borders. Data localization and other laws restricting internet content are becoming more commonplace.18 In addition, governments are increasingly intervening on their internet鈥檚 architecture in order to bolster national cybersecurity. These interventions have the often unintended and unstated consequence of consolidating control and influence over the internet鈥檚 architecture in the hands of states, leaving Milton Mueller to ask: 鈥淚s cybersecurity eating internet governance?鈥19 Yet, today this Global and Open cluster is still鈥攁ccording to both doctrine and action鈥攊n favor of a more open version of the internet, though the shape of this vision, the meaning of open, and the best governance structure to achieve it are all in flux.20 Indeed, as portrayed by the movement of this cluster towards a more statist and closed approach to the internet鈥攄own and to the left in Figure 1鈥攖he sovereign and controlled pole has some attraction.

The Global and Open cluster of states plots at the extreme end of the openness spectrum, but tends to be scattered between the middle and the equitable end of the governance spectrum. A sampling of Global and Open states plots in the top right quadrant of Figure 1, especially in the present day.

The Digital Deciders

I think the most likely scenario now is not a splintering, but rather a bifurcation into a Chinese-led internet and a non-Chinese internet led by America.21

– Eric Schmidt


Despite the attraction of these poles, not every state around the world possesses either the capacity or interest to pursue or commit to either model. Indeed, many states have not yet codified one model or the other, and some might even argue that, quietly, a third model鈥攐ne that cedes control over the internet to corporate actors鈥攈as emerged and is thriving in parts of the world. The "Digital Deciders" are those states that remain largely undecided and possess the capacity to influence the global conversation.

In part to avoid confusion in an era where election cybersecurity is a hot topic, we do not refer to this group as swing states, as we did in 2014. Nonetheless, in a one-state-one-vote context, as would be the format for the negotiation of a treaty at the UN, these states act much like swing states and we use similar criteria to isolate the Digital Deciders. According to Richard Fontaine, swing states in the American political context 鈥渁re those whose mixed political orientation gives them a greater impact than their population or economic output might warrant.鈥22 In 2014, we defined a swing state in foreign policy as 鈥渁 state whose mixed political orientation gives it a greater impact than its population or economic output might warrant and that has the resources that enable it to decisively influence the trajectory of an international process.鈥23 This reality means that states can take on new responsibilities, complicate solutions to significant challenges, or free-ride on established countries鈥 positions if they find alignment. In the context of internet governance and the internet鈥檚 architecture, it is these Digital Deciders that will determine the prescience of Schmidt鈥檚 projection.

Citations
  1. Laura DeNardis, The Global War for Internet Governance, (New Haven, CT: Yale University Press, 2014), 16.
  2. Rogier Creemers, Paul Triolo, and Graham Webster, 鈥淭ranslation: China鈥檚 new top Internet official lays out agenda for Party control online,鈥 DigiChina – 国产视频, Sepbember 24, 2018, source.
  3. ibid.
  4. ibid.
  5. United Nations General Assembly, Letter Dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General, 69th Session, Agenda item 91, January 13, 2015, Available at:
  6. See, for example: David Johnson and David Post, 鈥淟aw And Borders-The Rise of Law in Cyberspace,鈥 Stanford Law Review 48 (1996): 1367-1390.For a discussion on the fallacies of borderlessness, see: Jack Goldsmith and Tim Wu, Who Controls the Internet? Illusions of a Borderless World, (Oxford, UK: Oxford University Press, Inc., 2006).
  7. Jack Margolin. 鈥淩ussia, China, and the Push for Digital Sovereignty,鈥 Global Observatory, December 6, 2016, .
  8. ibid.
  9. Elsa Kania, Samm Sacks, Paul Triolo, and Graham Webster, 鈥淐hina鈥檚 Strategic Thinking on Building Power in Cyberspace, DigiChina – 国产视频, September 25, 2017, source.
  10. Pingp, The Great Firewall of China: Background, (Palo Alto, CA: Stanford University, 2011) .
  11. Collin Anderson, 鈥淗ow Iran is Building its Censorship-Friendly Domestic Internet,鈥 WIRED, September 23, 2016, . And Collin Anderson and Karim Sadjadpour, Iran鈥檚 Cyber Threat (Washington, DC: Carnegie Endowment for International Peace, 2018), 39-48, .
  12. Andrei Soldatov and Irina Borogan, Inside the Red Web: The Struggle Between Russia鈥檚 Digital Dictators and the New Online Revolutionaries (New York, NY: PublicAffairs, 2015). See and excerpt from the book here: .
  13. Alexander Klimburg, The Darkening Web: The War for Cyberspace (New York, NY: Penguin Press, 2017) 110.
  14. The White House, National Cyber Strategy of the United States of America, September 2018, .
  15. ibid.
  16. Government of France, Strat茅gie Internationale de la France pour le Num茅rique (French International Digital Strategy), December 2017, 14, .
  17. Government of the United Kingdom, National Cyber Security Strategy 2016-2021, November 2016, 63, .
  18. William Alan Reinsch, 鈥淎 Data Localization Free-for-All?鈥 Center for Strategic & International Studies, March 9, 2018, .
  19. Milton Mueller, 鈥淚s cybersecurity eating internet governance? Causes and consequences of alternative framings,鈥 Digital Policy, Regulation and Governance 19, no. 6 (2017): 415-428, .
  20. This trend is illustrated by the movement towards the center of every Open Internet country in Figure Figure 1 from 2014 to present day.
  21. Lora Kolodny, 鈥淔ormer Google CEO predicts the internet will split in two鈥攁nd one part will be led by China,鈥 CNBC, September 20, 2018,
  22. Richard Fontaine and Daniel M. Kliman, 鈥淚nternational Order and Global Swing States,鈥 Washington Quarterly 36, no. 1 (2013): 93, .
  23. Tim Maurer and Robert Morgus, Tipping the Scale: An Analysis of Global Swing States in the Internet Governance Debate (Waterloo, Canada: The Centre for International Governance Innovation and the Royal Institute for International Affairs, 2014), .
Two Poles and Three Clusters

Table of Contents

Close