Piecemeal Measures Regulate Cyberspace

By James Lewis

James Lewis is a Senior Vice President and Program Director at the Center for Strategic and International Studies (CSIS).  Before joining CSIS, he worked at the Departments of State and Commerce.  He was the advisor for the 2010, 2013 and 2015 United Nations Group of Governmental Experts on Information Security and has led a long-running Track II dialogue on cybersecurity with the China Institute of Contemporary International Relations.

It is a problem for the U.S. that many of the core concepts that guide internet policy date to the 1990s. One such concept is that the internet is a virtual alternative to the Westphalian state, without borders and where sovereignty does not apply. The problem with this concept is that it is demonstrably wrong. The internet is a physical construct. It depends on a physical infrastructure located within national territories. The speed of data movement gives the illusion that there are no borders, but they exist, defined by this physical structure, and nations have discovered that they can control their borders in cyberspace – hence sovereignty.

The UN General Assembly endorsed the conclusion of the 2013 Report of the UN’s Group of Government Experts that international law, the UN Charter, and national sovereignty apply to cyberspace, and with it, all the rights and responsibilities accorded to national governments. This changed the politics of the internet. There is a reluctance to acknowledge this change in the internet’s ancient regime, and while the demise of the Westphalian state is frequently announced, most countries seem unaware of this and impose regulations on cyberspace when they think regulation is necessary.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:Tech/CyberTagged with:

Related Articles

Search

Close