Table of Contents
Introduction
For the past several decades, the governments of the United States and many other liberal-democratic societies have espoused the benefits of a global internet that is, in some combination, free, open, interoperable, secure, and resilient. These are what we term the liberal-democratic policy community鈥檚 five internet principles. As far back as the early 2000s, the U.S. government referenced most of this language in its policy documents,1 and those ideas have persisted since鈥攎ost recently in the U.S. Department of Homeland Security鈥檚 Cybersecurity Strategy (released May 15, 2018)2 and the U.S. State Department鈥檚 Recommendations to the President on Protecting American Cyber Interests through International Engagement (released May 31, 2018).3 The United Kingdom鈥檚 2016 cybersecurity strategy called to protect a 鈥渇ree, open, peaceful and secure cyberspace鈥;4 France鈥檚 international digital strategy relies on principles of internet openness, net neutrality, and decentralization;5 and Canada鈥檚 newly-minted cybersecurity strategy makes similar mention of an open, free, and secure internet.6 These five terms, while usually not precisely defined, are frequently used by policymakers in liberal-democratic nation-states.7
Liberal-democratic societies have espoused the benefits of a global internet that is free,聽open,聽interoperable,聽secure, and聽resilient.聽
In contrast, countries like Russia, China, and Iran have gradually developed methodologies for shaping the internet in their borders that do not depend on these five principles. While largely acknowledging and working to maximize the economic benefits of the internet, many of these countries鈥 internet regulatory and legislative structures emphasize and seek to reassert the state鈥檚 sovereignty over a space not originally designed to recognize sovereign boundaries.8 In doing so, these countries aspire to forge advantageous, efficient economic environments and leverage the internet鈥檚 potential to grow wealth, while also managing its capacity to sow instability and create new harms at home and abroad. Many of these countries have developed compelling arguments鈥攖o some鈥攆or why their nation鈥檚 model for the internet is the better one. Russia has exported its surveillance technology to encourage compliance with its model of the internet,9 and China has used assorted mechanisms鈥攕uch as investment in underwater internet cables in the Asia Pacific10 and low-cost infrastructure projects in Africa11鈥攖o push its tightly-controlling, sovereignty-centric internet model as well.
At the same time, the repeal of net neutrality protections in the United States12 has elevated some discussion of the idealism behind the five principles of freedom, openness, interoperability, security, and resiliency. Not only do liberal-democratic nation-states often challenge their own vision of the global internet through domestic policies, as some commentators are beginning to understand, but some of these characterizations are in tension with one another and in conflict with the architecture of the internet itself.
The internet鈥檚 physical infrastructure is filled with so-called 鈥渃hoke points鈥 where single companies13 or governments14 control massive flows of information鈥攃reating single points of failure (SPOFs) that challenge the principle of resilience. In 2017, for instance, private corporation CloudFlare revealed that they handle around 10 percent of all American internet requests.15 Globally, just four corporations account for upwards of 90 percent of all traffic to content delivery networks (CDNs), challenging the resiliency of dependent systems.16 Companies and governments have begun reinvesting in control of undersea internet cables,17 and nations like Iran have built their own internal internets.18 Centralization, rather than decentralization, is the name of the game.
Not only do liberal-democratic nation-states often challenge their own vision of the global internet through domestic policies, as some commentators are beginning to understand, but some of these characterizations are in tension with one another and in conflict with the architecture of the internet itself.
Further, the internet is certainly not secure; if anything, it was designed for redundancy and constant availability鈥攆or protocols to route around failure rather than encrypt data or filter out malicious packets. But even those original principles of redundancy and constant availability have been challenged, with attacks that manipulate data and botnets that shut down entire subsections of a nation鈥檚 internet.19 This is perhaps equally true in authoritarian nation-states, where governments restrict public internet access and rigorously police instances in which access is permitted. The web has drastically changed since its inception.
Citations
- Network Reliability and Interoperability Council VI: Focus Group 3, 鈥淣etwork Interoperability,鈥 2003, , 3.
- U.S. Department of Homeland Security, 鈥淐ybersecurity Strategy,鈥 2018, , 4.
- U.S. Department of State, 鈥淩ecommendations to the President on Protecting American Cyber Interests through International Engagement,鈥 2018, , 1.
- Government of the United Kingdom, 鈥淣ational Cyber Security Strategy 2016-2021,鈥 2016, , 63.
- Government of France, 鈥淪trat茅gie Internationale de la France pour le Num茅rique,鈥 2017, , 4.
- Government of Canada, 鈥淣ational Cyber Security Strategy,鈥 2018, , 32.
- To be clear, not every liberal-democratic nation-state uses all five of these terms at once in their policy documents, or perhaps at all. Further, even with different languages aside, nation-states may use different words to refer to these terms鈥攑referring, for instance, to say 鈥渞edundant鈥 or 鈥渄ecentralized鈥 rather than 鈥渞esilient.鈥 Nation-states may also use these in different combinations in different documents. All of that said, most liberal-democratic nation-states do refer to these general five ideas when discussing internet governance and cyber strategy.
- For further discussion of this phenomenon, see: Henry H. Perritt, 鈥淭he Internet as a Threat to Sovereignty? Thoughts on the Internet鈥檚 Role in Strengthening National and Global Governance,鈥 1998, , 423-442.
- Peter Bourgelais, 鈥淐ommonwealth of Surveillance States: On the Export and Resale of Russian Surveillance Technology to Post-Soviet Central Asia,鈥 2013, , 2-3.
- Dwayne Winseck, 鈥淭he Geopolitical Economy of the Global Internet Infrastructure,鈥 2017, , 241 & 261.
- See, for example: The Infrastructure Consortium for Africa, 鈥淎frica鈥檚 ICT Sector in China,鈥 n.d., ; and The Chinafrica Project, 鈥淔or Better or Worse, Africa鈥檚 Digital Future is Tied to China,鈥 May 5 2018, .
- Jeremy B White, 鈥淣et Neutrality Rules Officially Repealed in the United States,鈥 June 11 2018, .
- Russell Brandom, 鈥淲e Have Abandoned Every Principle of the Free and Open Internet,鈥 December 19 2017, .
- Center for Human Rights in Iran, 鈥淕uards at the Gate: The Expanding State Control Over the Internet in Iran,鈥 2018, , 8.
- Matthew Prince, 鈥淲hy We Terminated Daily Stormer,鈥 August 16 2017, .
- Dwayne Winseck, 鈥淭he Geopolitical Economy of the Global Internet Infrastructure,鈥 2017, , 242.
- The Economist, 鈥淭ech Companies Are Laying Their Own Undersea Cables,鈥 October 9 2017, .
- Berkman Klein Center for Internet & Society, 鈥淚ran鈥檚 National Information Network: Faster Speeds, but at What Cost?鈥 February 21, 2018, .
- BBC, 鈥淗ack Attacks Cut Internet Access in Liberia,鈥 November 4 2016, .