国产视频

In Short

A Tale of Two Internets

global internet

Listen to the ongoing conversations on net neutrality, and you鈥檒l notice that the United States, like other liberal-democratic countries, believes that, in the lexicon of policymakers, a free, open, interoperable, secure, and resilient internet can be a torchbearer for an open society鈥攁nd democracy more broadly. But listen to China and Russia, and you鈥檒l notice that they march to the beat of a different drum.

Rather than being a place to freely share ideas or to be secure in our interactions, the internet, as China and Russia largely tell it, is and an inherent threat to state security. This is their justification for , , and , all of which seek to manage the devastating effects online interactions can, and too often do, produce. Think of it this way: For Russia, China, and many others, it鈥檚 all about an internet that maintains sovereign state control.

What emerges is an interesting juxtaposition, a tale of two internets: one based on the principles of freedom, openness, interoperability, security, and resilience, and the other tightly attached to authoritarian strings. In this broader push for cyber governance, the United States, and countries like it, ought to pay attention to what鈥檚 happening. In particular, the state-controlled model of the internet seems to be , shaping how the internet operates across the planet. If liberal-democratic countries don鈥檛 do more to challenge this trend, the reigning view of the internet may soon become one that鈥檚 deeply at odds with their vision of cyberspace.

While authoritarian models of internet control are unattractive to some countries, that doesn鈥檛 mean that China and Russia make incorrect assumptions about the nature of the worldwide network. The planet has increasingly been rocked by , , , , , and other harms鈥攁ll fueled by the global internet. In this light, China and Russia鈥檚 pro-security approaches can seem more desirable than liberal-democratic countries鈥 approaches, particularly to countries still trying to create their internet policies.

But the challenges for the liberal-democratic method don鈥檛 end there. Part of the problem with using these five principles as the basis for foreign policy is that liberal-democratic countries don鈥檛 always uphold them. Put more bluntly, they often operate in ways that appear inconsistent with their foreign policy messaging. Take, for instance, the internet principle of openness, which in the United States has become synonymous with net neutrality鈥攖he notion that internet service providers shouldn鈥檛 internet content. While authoritarians and , consistent with their state-controlled internet model, the United States repeals its net neutrality protection, violating its own principle of an open internet.

But an open internet鈥攐ne whose infrastructure, regardless of who controls it, doesn鈥檛 discriminate or throttle traffic鈥攊s, in significant ways, contrary to modern internet security needs. Firewalls, for one thing, prevent dangerous communications from entering a network and are designed to restrict the open flow of information. We face an enormous security risk if malicious actors can get onto our home Wi-Fi or our company鈥檚 intranet. Conversely, blocking all traffic in the name of security would mean a completely closed internet, through which nobody can communicate at all鈥攁nother unrealistic (and undesirable) extreme.

As liberal-democratic countries have begun to observe the security implications of the internet, in terms of both cybersecurity and the internet vis-脿-vis broader security, policymakers have started to realize that not each of these five principles works in perfect tandem with the others. In other words, liberal-democratic policymakers may have to depart from absolutes of some principles鈥openness, interoperability, and freedom, for example鈥攊f the internet is to become more secure.

The United Kingdom is one case of a liberal-democratic country that鈥檚 acknowledged these tradeoffs. It鈥檚 begun filtering out security threats 鈥渁t the border,鈥 where something akin to a national firewall . While the global volume of phishing attacks has about doubled since the start of this policy, the United Kingdom鈥檚 share has been cut . Recognizing the importance of both internet openness and internet security, the United Kingdom has started to find a way to balance the two.

Contrarily, authoritarian countries have long recognized the implicit tension between things like openness and security, and have built their internet accordingly. For example, the Chinese government authorized the in 1998, when internet penetration there was less than . The project later spawned the so-called , which serves to block internet traffic for the alleged purpose of security. As similar as this may sound to the United Kingdom鈥檚 filtering, the distinction between the two is significant.

The United Kingdom is filtering for data. Its focus remains on items like phishing URLs鈥攊.e., when someone fakes a website address鈥攁nd email spoofing鈥攊.e., when someone impersonates a sender鈥攚hile still allowing free discourse and access to foreign websites. To paraphrase Ian Levy, director of the National Cyber Security Centre, it鈥檚 all about .

China, however, is filtering for content. It takes aim at things like protest speech that supposedly challenges its national interest and foreign news sites it says threaten the political objectives of the Communist Party, rather than preventing data breaches or minimizing device hacking. In short, China 鈥渋nternet content as a potential threat to [its] political stability that demands tight controls,鈥 and policy mechanisms emphasize controlling discourse over protecting citizens.

This difference raises very difficult technical questions about whether you can have internet architecture that recognizes and filters malicious data without fundamentally altering the content presented to internet users. (Hint: It鈥檚 unlikely that you can). Given the relationship between internet data and internet content, the question for liberal-democratic policymakers is one of degrees: How much are they willing to compromise openness in the name of security?

Of course, the tension between openness and security isn鈥檛 the only one. Also consider the principles of interoperability and security. If devices have an easier time exchanging information, that aids interoperability. But increasing the ease of device communication also means attackers can more easily hop from one device to another鈥攁nd in turn harm security.

And yet, for all that friction, what also becomes clear on closer examination are some interesting interrelations. We see, for example, that freedom and openness are intertwined. Laws that restrict freedom can prompt restrictions of openness. Still, it鈥檚 possible to find some middle ground between the two: Nations like Iran throttle undesirable internet traffic . Indeed, it鈥檚 much more complicated than it appears.

According to the Russian newspaper Kommersant, the Russian government is to the United Nations about how countries use the internet鈥攁 鈥渃ybercode for states.鈥 This follows a history of Chinese and Russian , frequently coupled with , to ramp up influence in nations in which the internet is still a relatively underdeveloped phenomenon. This is an underappreciated battleground of cyberspace. So, as liberal-democratic countries pay more attention to the tensions inherent in their approach to the internet and grapple with the role of the state in securing it, the task becomes clear: ensuring that they don鈥檛 cede too聽much ground in the fight for the future of cyberspace.

For more information on internet realities, read the new report by 国产视频鈥檚 Cybersecurity Initiative:聽鈥The Idealized Internet vs. Internet Realities (Version 1.0).

More 国产视频 the Authors

Justin Sherman
Justin Sherman
robert-morgus_person_image.jpeg
Robert Morgus
A Tale of Two Internets