Table of Contents
Introduction
For the past several decades, the governments of the United States and many other liberal-democratic societies have espoused the benefits of a global internet that is, in some combination, free, open, interoperable, secure, and resilient. These are what we term the liberal-democratic policy community’s five internet principles. As far back as the early 2000s, the U.S. government referenced most of this language in its policy documents,1 and those ideas have persisted since—most recently in the U.S. Department of Homeland Security’s Cybersecurity Strategy (released May 15, 2018)2 and the U.S. State Department’s Recommendations to the President on Protecting American Cyber Interests through International Engagement (released May 31, 2018).3 The United Kingdom’s 2016 cybersecurity strategy called to protect a “free, open, peaceful and secure cyberspace”;4 France’s international digital strategy relies on principles of internet openness, net neutrality, and decentralization;5 and Canada’s newly-minted cybersecurity strategy makes similar mention of an open, free, and secure internet.6 These five terms, while usually not precisely defined, are frequently used by policymakers in liberal-democratic nation-states.7
Liberal-democratic societies have espoused the benefits of a global internet that is free, open, interoperable, secure, and resilient.
In contrast, countries like Russia, China, and Iran have gradually developed methodologies for shaping the internet in their borders that do not depend on these five principles. While largely acknowledging and working to maximize the economic benefits of the internet, many of these countries’ internet regulatory and legislative structures emphasize and seek to reassert the state’s sovereignty over a space not originally designed to recognize sovereign boundaries.8 In doing so, these countries aspire to forge advantageous, efficient economic environments and leverage the internet’s potential to grow wealth, while also managing its capacity to sow instability and create new harms at home and abroad. Many of these countries have developed compelling arguments—to some—for why their nation’s model for the internet is the better one. Russia has exported its surveillance technology to encourage compliance with its model of the internet,9 and China has used assorted mechanisms—such as investment in underwater internet cables in the Asia Pacific10 and low-cost infrastructure projects in Africa11—to push its tightly-controlling, sovereignty-centric internet model as well.
At the same time, the repeal of net neutrality protections in the United States12 has elevated some discussion of the idealism behind the five principles of freedom, openness, interoperability, security, and resiliency. Not only do liberal-democratic nation-states often challenge their own vision of the global internet through domestic policies, as some commentators are beginning to understand, but some of these characterizations are in tension with one another and in conflict with the architecture of the internet itself.
The internet’s physical infrastructure is filled with so-called “choke points” where single companies13 or governments14 control massive flows of information—creating single points of failure (SPOFs) that challenge the principle of resilience. In 2017, for instance, private corporation CloudFlare revealed that they handle around 10 percent of all American internet requests.15 Globally, just four corporations account for upwards of 90 percent of all traffic to content delivery networks (CDNs), challenging the resiliency of dependent systems.16 Companies and governments have begun reinvesting in control of undersea internet cables,17 and nations like Iran have built their own internal internets.18 Centralization, rather than decentralization, is the name of the game.
Not only do liberal-democratic nation-states often challenge their own vision of the global internet through domestic policies, as some commentators are beginning to understand, but some of these characterizations are in tension with one another and in conflict with the architecture of the internet itself.
Further, the internet is certainly not secure; if anything, it was designed for redundancy and constant availability—for protocols to route around failure rather than encrypt data or filter out malicious packets. But even those original principles of redundancy and constant availability have been challenged, with attacks that manipulate data and botnets that shut down entire subsections of a nation’s internet.19 This is perhaps equally true in authoritarian nation-states, where governments restrict public internet access and rigorously police instances in which access is permitted. The web has drastically changed since its inception.
Citations
- Network Reliability and Interoperability Council VI: Focus Group 3, “Network Interoperability,” 2003, source, 3.
- U.S. Department of Homeland Security, “Cybersecurity Strategy,” 2018, source, 4.
- U.S. Department of State, “Recommendations to the President on Protecting American Cyber Interests through International Engagement,” 2018, source, 1.
- Government of the United Kingdom, “National Cyber Security Strategy 2016-2021,” 2016, source, 63.
- Government of France, “Stratégie Internationale de la France pour le Numérique,” 2017, source, 4.
- Government of Canada, “National Cyber Security Strategy,” 2018, source, 32.
- To be clear, not every liberal-democratic nation-state uses all five of these terms at once in their policy documents, or perhaps at all. Further, even with different languages aside, nation-states may use different words to refer to these terms—preferring, for instance, to say “redundant” or “decentralized” rather than “resilient.” Nation-states may also use these in different combinations in different documents. All of that said, most liberal-democratic nation-states do refer to these general five ideas when discussing internet governance and cyber strategy.
- For further discussion of this phenomenon, see: Henry H. Perritt, “The Internet as a Threat to Sovereignty? Thoughts on the Internet’s Role in Strengthening National and Global Governance,” 1998, source, 423-442.
- Peter Bourgelais, “Commonwealth of Surveillance States: On the Export and Resale of Russian Surveillance Technology to Post-Soviet Central Asia,” 2013, source, 2-3.
- Dwayne Winseck, “The Geopolitical Economy of the Global Internet Infrastructure,” 2017, source, 241 & 261.
- See, for example: The Infrastructure Consortium for Africa, “Africa’s ICT Sector in China,” n.d., source; and The Chinafrica Project, “For Better or Worse, Africa’s Digital Future is Tied to China,” May 5 2018, source.
- Jeremy B White, “Net Neutrality Rules Officially Repealed in the United States,” June 11 2018, source.
- Russell Brandom, “We Have Abandoned Every Principle of the Free and Open Internet,” December 19 2017, source.
- Center for Human Rights in Iran, “Guards at the Gate: The Expanding State Control Over the Internet in Iran,” 2018, source, 8.
- Matthew Prince, “Why We Terminated Daily Stormer,” August 16 2017, source.
- Dwayne Winseck, “The Geopolitical Economy of the Global Internet Infrastructure,” 2017, source, 242.
- The Economist, “Tech Companies Are Laying Their Own Undersea Cables,” October 9 2017, source.
- Berkman Klein Center for Internet & Society, “Iran’s National Information Network: Faster Speeds, but at What Cost?” February 21, 2018, source.
- BBC, “Hack Attacks Cut Internet Access in Liberia,” November 4 2016, source.