fbpx
Wikipedia

Network sovereignty

In internet governance, network sovereignty, also called digital sovereignty or cyber sovereignty, is the effort of a governing entity, such as a state, to create boundaries on a network and then exert a form of control, often in the form of law enforcement over such boundaries.[1]

Much like states invoke sole power over their physical territorial boundaries, state sovereignty, such governing bodies also invoke sole power within the network boundaries they set and claim network sovereignty. In the context of the Internet, the intention is to govern the web and control it within the borders of the state. Often, that is witnessed as states seeking to control all information flowing into and within their borders.

The concept stems from questions of how states can maintain law over an entity such like the Internet, whose infrastructure exists in real space, but its entity itself exists in the intangible cyberspace. According to Joel Reidenberg, "Networks have key attributes of sovereignty: participant/citizens via service provider membership agreements, 'constitutional' rights through contractual terms of service, and police powers through taxation (fees) and system operator sanctions."[2] Indeed, many countries have pushed to ensure the protection of their citizens' privacy and of internal business longevity by data protection and information privacy legislation (see the EU's Data Protection Directive, the UK's Data Protection Act 1998).

Network sovereignty has implications for state security, Internet governance, and the users of the Internet's national and international networks.

Implications for state security edit

Networks are challenging places for states to extend their sovereign control. In her book Sociology in the Age of the Internet, communications professor Allison Cavanagh argues that state sovereignty has been drastically decreased by networks.[3]

Other scholars such as Saskia Sassen and Joel R. Reidenberg agree. Sassen argues that the state's power is limited in cyberspace and that networks, particularly the numerous private tunnels for institutions such as banks.[4] Sassen further postulates that these private tunnels create tensions within the state because the state itself is not one voice.[5] Reidenberg refers to what he terms "Permeable National Borders," effectively echoing Sassen's arguments about the private tunnels, which pass through numerous networks.[6] Reidenberg goes on to state that intellectual property can easily pass through such networks, which incentivizes businesses and content providers to encrypt their products.[7] The various interests in a network are echoed within the state, by lobby groups.

Internet governance edit

Many governments are trying to exert some forms of control over the Internet. Some examples include the SOPA-PIPA debates in the United States, the Golden Shield Project in China, and new laws that grant greater power to the Roskomnadzor in Russia.

SOPA-PIPA edit

With the failed Stop Online Piracy Act, the United States would have allowed law enforcement agencies to prevent online piracy by blocking access to websites. The response from bipartisan lobbying groups was strong. Stanford Law Professors Mark Lemly, David Levin, and David Post published an article called "Don't Break the Internet."[8] There were several protests against SOPA and PIPA, including a Wikipedia blackout in response to statements by Senator Patrick Leahy, who was responsible for introducing the PROTECT IP Act. Both acts viewed as good for mass media because they limited access to certain websites. The acts were viewed as an attack on net neutrality and so were seen as potential damaging to the networked public sphere.[9]

Golden Shield Project edit

The Golden Shield Project, sometimes known as Great Firewall of China, prevents those with a Chinese IP address from accessing certain banned websites inside the country. People are prevented from accessing sites that the government deems problematic. That creates tension between the netizen community and the government, according to scholar Min Jiang.[10]

Roskomnadzor edit

Russia's Roskomnadzor (Federal Service for Supervision in the Sphere of Telecom, Information Technologies and Mass Communications) was created in December 2008 in accordance with President's Decree No. 1715. The agency was created to protect personal data owners' rights. According to the Russian government, the agency has three primary objectives:

  • ensuring society demand in high-quality telecommunication services as well as information and communication technologies;
  • promoting mass communications and freedom of mass media;
  • ensuring protection of citizens' rights to privacy, personal and family confidentiality.[11]

On 1 September 2015, a new data localization law provided Roskomnadzor with greater oversight. The law itself stipulates that any personal data collected from Russian citizens online must be stored in server databases that are physically located in Russia. It "creates a new procedure restricting access to websites violating Russian laws on personal data."[12] Even with staunch pressure from those who promote "free flow of information," President Vladimir Putin and the Kremlin remain stolid in assertions of network sovereignty to protect Russian citizens.[13]

Other examples edit

China's approach could also be repeated in many other countries around the world.[14][15] One example was the Internet censorship in the Arab Spring, when the Egyptian government in particular tried to block access to Facebook and Twitter. Also, during the 2011 England riots, the British government tried to block Blackberry Messenger.

Response to Internet governance edit

Many believe that the government has no right to be on the Internet. As Law Professor David Post at the University of Georgetown argued, "'[States] are mapping statehood onto a domain that doesn't recognize physical boundaries,'" at least in the context on the internet. He went on to say, "'When 150 jurisdictions apply their law, it's a conflict-of-law nightmare.'"[16] Some proponents of the internet, such as John Perry Barlow, argued that the current form of the Internet is ungovernable and should remain as open as possible. Barlow's essay was written about the 1990s Internet, and while it has changed very much since then, the ideas in his work are still salient in the ongoing debates surrounding the future of the Internet. In his essay A Declaration of the Independence of Cyberspace, he advocated that governments should stay out of the internet.[17]

Network Sovereignty can affect state security, law enforcement on the internet, and the ways that private citizens use the internet, as many people attempt to circumvent the protections and legal devices, placed by many governments on the Internet, by using tools such as VPNs.

Impact of VPNs edit

Virtual Private Networks (VPNs) are a significant tool to allow private citizens to get around network sovereignty and any restrictions their government may place on their access to the internet. VPNs allow a computer to route its Internet connection from one location to another. For example one would connect from a connection at point A to a connection at point B, and to others, it would appear that they are accessing the Internet from point B even if they are in point A. For example, in China, VPNs are used to access otherwise-blocked content. Yang gives the example of pornography stating that with VPN, "smut that's banned in the US can wind its way into American homes through electrical impulses in, say, Amsterdam."[16] In that example, by using VPNs, an Internet user in the United States could access banned material that is hosted in Amsterdam by accessing through a server, hosted in Amsterdam, to make it appear that the user is in Amsterdam, based on the IP address. Therefore, citizens have a way around network sovereignty, simply by accessing a different server through a VPN. That greatly limits how governments can enforce network sovereignty and protect their cyberspace borders. Essentially, there is no way that a government could prevent every citizen from accessing banned content by means such as VPNs.[citation needed]

Rationales edit

Protection of national traffic edit

One of the most significant reasons for enforcing network sovereignty is to prevent the scanning of information that travels through other countries. For example, any internet traffic that travels through the United States is subject to the Patriot Act and so may be examined by the National Security Agency, regardless of the country of origin. Jonathan Obar and Andrew Clement refer to the routing of a transmission from a point in state A to another location in state A through state B as Boomerang Routing.[18] They provide the example of traffic from Canada being routed through the United States before returning to Canada, which enables the United States to track and examine the Canadian traffic.

Copyright protection edit

Governments may want to enact network sovereignty to protect copyright within their borders. The purpose of SOPA-PIPA was to prevent what was effectively deemed theft. Content providers want their content to be used as intended because of the property rights associated with that content.[19] One instance of such protection is in e-commerce.

E-commerce edit

Currently, private networks are suing others who interfere with their property rights.[20] For the effective implementation of e-commerce on the Internet, merchants require restrictions on access and encryption to protect not only their content but also the information of content purchasers. Currently, one of the most effective ways to regulate e-commerce is to allow Internet service providers (ISPs) to regulate the market.[21] The opposing argument to regulating the internet by network sovereignty to allow e-commerce is that it would break the Internet's egalitarian and open values because it would force governments and ISPs to regulate not only the Internet's content but also how the content is consumed.[22]

Role of WIPO edit

The World Intellectual Property Organization is a United Nations body, designed to protect intellectual property across all of its member states.[19] WIPO allows content to traverse various networks through their Patent Cooperation Treaty (PCT). The PCT allows for international patents by providing security for content providers across state borders.[23] It is up to states to enforce their own network sovereignty over these patents. Global standards for copyright and encryption are viewed as one way that governments could cooperate.[24] With global standards it is easier to enforce network sovereignty because it builds respect for intellectual property and maintains the rights of content creators and providers.[25] It is possible that governments may not be able to keep up with regulating these initiatives. For example, in the 1995 Clipper Chip system, the Clinton administration in the United States reneged on its original policy because it was deemed that it would soon be too easy to crack the chips.[19] One alternative proposed was the implementation of the digital signature, which could be used to protect network sovereignty by having content providers and governments sign off the content, like for a digital envelope.[19] This system has already been implemented in the use of Wi-Fi Protected Access Enterprise networks, some secured websites, and software distribution. It allows content to pass through borders without difficulty because it is facilitated through organizations such as WIPO.[19]

Countries edit

In his 2015 book Data and Goliath, American security expert Bruce Schneier says the cyber sovereignty movement, in countries such as Russia, China, France and Saudi Arabia, was given an enormous boost by the 2013 revelations of widespread international NSA surveillance, which those countries pointed to as justification for their activities and evidence of U.S. hypocrisy on Internet freedom issues.[26]

China edit

Cyber sovereignty, known in Mandarin as 网络主权, has been a mainstay of Chinese Internet policy in recent years, and the international promotion of cybersovereignty forms an integral part of Chinese foreign policy, although it remains ill-defined within Chinese discourse.[14] The Great Firewall is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected foreign websites and to slow down cross-border internet traffic.[27] The effect includes: limiting access to foreign information sources, blocking foreign internet tools (e.g. Google Search,[28] Facebook,[29] Twitter,[30] Wikipedia,[31][32] and others) and mobile apps, and requiring foreign companies to adapt to domestic regulations.[33][34]

The Chinese government and ruling Communist Party asserts cyber sovereignty, or control over all of China's digital resources, including servers, user data, technical infrastructure, and tech firms operating in China, both within the country and overseas. China's 2017 Cybersecurity Law of 2017 requires firms that offer "critical information infrastructure" in mainland China to store their data on Chinese government-run servers, allowing the state to access resources such as Apple's China-based iCloud data. The Data Security Law of 2021 also empowers the Chinese government to conduct national security audits over firms operating in China which gather user data.[35]

France edit

Project Andromède launched in 2009, with the aim to spend €285 million on "cloud souverain" or sovereign cloud.[36][37] The government spent €75 million on each of its two national champions, Cloudwatt and Numergy, but these two sold only €8 million worth of services, combined.[38] On January 1, 2020, all services were terminated and clients were advised their data was deleted.[39]

Germany edit

openDesk is a project to create administrative workspaces to enable digital sovereignty, initiated in 2023 by the German Federal Ministry of the Interior (BMI) and the public IT service provider Dataport.[40] There is collaboration with a team of open-source specialists from Collabora, Nextcloud, OpenProject, OpenXchange, Univention, XWiki, and others[41]

Russia edit

The Sovereign Internet Law is a set of 2019 amendments to existing Russian legislation that mandate Internet surveillance and grants the Russian government powers to partition Russia from the rest of the Internet, including the creation of a national fork of the Domain Name System.[42][43][44][45][46][47]

See also edit

References edit

  1. ^ Obar, Jonathan; Clement, Andrew (1 July 2013). "Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty": 2. doi:10.2139/ssrn.2311792. SSRN 2311792. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ Reidenberg, Joel R. (1996). "Governing Networks and Rule-Making in Cyberspace". Emory Law Journal. 45: 928.
  3. ^ Cavanagh, Allison (1 April 2007). Sociology in the Age of Internet. McGraw-Hill International. p. 41. ISBN 9780335217250.
  4. ^ Sassen, Saskia (2000). "The Impact of the Internet on Sovereignty: Unfounded and Real Worries". (PDF). Nomos Verlagsgesellschaft. pp. 198–209. Archived from the original (PDF) on 27 February 2014. Retrieved 23 January 2014.{{cite book}}: CS1 maint: location missing publisher (link)
  5. ^ Sassen, Saskia. "The Impact of the Internet on Sovereignty: Unfounded and Real Worries". (PDF). Nomos Verlagsgesellschaft: Baden-Baden. pp. 198–209. Archived from the original (PDF) on 27 February 2014. Retrieved 23 January 2014.
  6. ^ Reidenberg, Joel R. (1996). "Governing Networks and Rule-Making in Cyberspace". Emory Law Journal. 45: 913.
  7. ^ Reidenberg, Joel R. (1996). "Governing Networks and Rule-Making in Cyberspace". Emory Law Journal. 45: 914.
  8. ^ Benkler, Yochai; Hal Roberts; Rob Faris; Alicia Solow-Niederman; Bruce Etling (July 2013). "Social Mobilization and the Networked Public Sphere: Mapping the SOPA-PIPA Debate". Cambridge, MA: Berkman Center for Internet & Society: 34. {{cite journal}}: Cite journal requires |journal= (help)
  9. ^ Benkler, Yochai; Hal Roberts; Rob Faris; Alicia Solow-Niederman; Bruce Etling (July 2013). "Social Mobilization and the Networked Public Sphere: Mapping the SOPA-PIPA Debate". Cambridge, MA: Berkman Center for Internet & Society: 10. {{cite journal}}: Cite journal requires |journal= (help)
  10. ^ Jiang, Min (2010). "Authoritarian Informationalism: China's Approach to Internet Sovereignty". SAIS Review of International Affairs. 30 (2): 71–89. doi:10.1353/sais.2010.0006. S2CID 154005295. Retrieved 23 January 2014.
  11. ^ "Роскомнадзор - Federal Service for Supervision in the Sphere of Telecom, Information Technologies and Mass Communications (ROSKOMNADZOR)". rkn.gov.ru. Retrieved 6 October 2015.
  12. ^ "News Data Protection: NOERR" (PDF). News Data Protection: NOERR. NOERR. 1 June 2015. Retrieved 10 June 2015.
  13. ^ "Putin Says Russia Under Pressure for Defending Its Sovereignty". Bloomberg.com. 3 July 2015. Retrieved 6 October 2015.
  14. ^ a b Tai, Katharin; Zhu, Yuan Yi (September 2022). "A historical explanation of Chinese cybersovereignty". International Relations of the Asia-Pacific. 22 (3): 469–499. doi:10.1093/irap/lcab009.
  15. ^ "Democratic Republic of Congo internet shutdown shows how Chinese censorship tactics are spreading". CNN. 2 January 2019. Retrieved 10 December 2019.
  16. ^ a b Yang, Catherine (14 June 1997). . Business Week. Archived from the original on 28 June 1997. Retrieved 28 January 2014.
  17. ^ Barlow, John Perry. . Electronic Frontier Foundation. Archived from the original on 23 October 2013. Retrieved 28 January 2014.
  18. ^ Obar, Jonathan; Clement (1 July 2013). "Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty". Social Science Research Network: 1–12. SSRN 2311792.
  19. ^ a b c d e Davis, J.C. (Summer 1998). "Protecting intellectual property in cyberspace". IEEE Technology and Society Magazine. 17 (2): 12–25. doi:10.1109/44.682891.
  20. ^ Zekos, Georgios I. (2006). "State Cyberspace Jurisdiction and Personal Cyberspace Jurisdiction". International Journal of Law and Information Technology. 15 (1): 1–37. doi:10.1093/ijlit/eai029.
  21. ^ Zekos, Georgios I. (2002). "Legal problems in cyberspace". Managerial Law. 44 (5): 45–102. doi:10.1108/03090550210770614.
  22. ^ Post, David G. (1 May 2000). "What Larry Doesn't Get: Code, Law, and Liberty in Cyberspace". Stanford Law Review. 52 (5): 1439–1459. doi:10.2307/1229518. JSTOR 1229518.
  23. ^ (PDF). World Intellectual Property Organization. Archived from the original (PDF) on 25 June 2008. Retrieved 20 March 2014.
  24. ^ Reidenberg, Joel R. (1996). "Governing Networks and Rule-Making in Cyberspace". Emory Law Journal. 45: 918.
  25. ^ World Intellectual Property Organization. "Building Respect for IP". World Intellectual Property Organization. Retrieved 20 March 2014.
  26. ^ Schneier, Bruce (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. New York: W.W. Norton & Company. ISBN 978-0393244816.
  27. ^ Mozur, Paul (13 September 2015). "Baidu and CloudFlare Boost Users Over China's Great Firewall". The New York Times. from the original on 24 January 2019. Retrieved 16 September 2017.
  28. ^ "google.com is blocked in China | GreatFire Analyzer". en.greatfire.org. from the original on 5 August 2014. Retrieved 18 January 2020.
  29. ^ "How China's social media users created a new language to beat censorship on COVID-19". Amnesty International. 6 March 2020. from the original on 3 April 2020. Retrieved 3 April 2020.
  30. ^ "China Blocks Access To Twitter, Facebook After Riots". Washington Post. from the original on 19 September 2010. Retrieved 18 January 2020.
  31. ^ "Wikipedia founder defends decision to encrypt the site in China". The Verge. 4 September 2015. from the original on 12 June 2018. Retrieved 17 April 2018.
  32. ^ Skipper, Ben (7 December 2015). "China's government has blocked Wikipedia in its entirety again". International Business Times UK. from the original on 3 May 2018. Retrieved 2 May 2018.
  33. ^ Mozur, Paul; Goel, Vindu (5 October 2014). "To Reach China, LinkedIn Plays by Local Rules". The New York Times. from the original on 13 June 2018. Retrieved 4 September 2017.
  34. ^ Branigan, Tania (28 June 2012). "New York Times launches website in Chinese language". The Guardian. from the original on 4 September 2017. Retrieved 4 September 2017.
  35. ^ "Trafficking Data: China's Pursuit of Digital Sovereignty". thediplomat.com. Retrieved 27 September 2022.
  36. ^ . 21 September 2011. Archived from the original on 23 October 2011.
  37. ^ "France continues to pursue its own data centre infrastructure, dubbed “le cloud souverain”, despite the closure of some of the businesses initially behind the idea." https://theconversation.com/digital-colonialism-why-some-countries-want-to-take-control-of-their-peoples-data-from-big-tech-123048
  38. ^ "Numergy and Cloudwatt, each benefited from €75 million ($101 million) from the French government." https://gigaom.com/2013/11/18/a-guide-to-the-french-national-clouds/
  39. ^ "Cloudwatt : Vie et mort du premier "cloud souverain" de la France". 29 August 2019.
  40. ^ "Sovereign workspace openDesk: German Ministry of the Interior provides answers". Free Software Foundation Europe (FSFE). 21 September 2023. Retrieved 22 October 2023.
  41. ^ Brock, Richard (19 October 2023). "openDesk – Collabora Online brings Digital Freedom to European Government". CollaboraOffice. Retrieved 22 October 2023.
  42. ^ Schulze, Elizabeth (1 November 2019). "Russia just brought in a law to try to disconnect its internet from the rest of the world". CNBC. Retrieved 28 February 2021.
  43. ^ "Russia: Growing Internet Isolation, Control, Censorship". Human Rights Watch. 18 June 2020. Retrieved 28 February 2021.
  44. ^ Epifanova, Alena (16 January 2020). "Deciphering Russia's "Sovereign Internet Law"". DGAP.
  45. ^ "Russia internet: Law introducing new controls comes into force". BBC News. 1 November 2019. Retrieved 28 February 2021.
  46. ^ "On the Federal Law "On Amendments to the Federal Law" On Communications "and the Federal Law" On Information, Information Technologies and the Protection of Information"". Federation Council of the Federal Assembly of the Russian Federation. 22 April 2019.
  47. ^ "Law on "Sovereign Internet" adopted". The State Duma. 16 April 2019.

network, sovereignty, internet, governance, network, sovereignty, also, called, digital, sovereignty, cyber, sovereignty, effort, governing, entity, such, state, create, boundaries, network, then, exert, form, control, often, form, enforcement, over, such, bou. In internet governance network sovereignty also called digital sovereignty or cyber sovereignty is the effort of a governing entity such as a state to create boundaries on a network and then exert a form of control often in the form of law enforcement over such boundaries 1 Much like states invoke sole power over their physical territorial boundaries state sovereignty such governing bodies also invoke sole power within the network boundaries they set and claim network sovereignty In the context of the Internet the intention is to govern the web and control it within the borders of the state Often that is witnessed as states seeking to control all information flowing into and within their borders The concept stems from questions of how states can maintain law over an entity such like the Internet whose infrastructure exists in real space but its entity itself exists in the intangible cyberspace According to Joel Reidenberg Networks have key attributes of sovereignty participant citizens via service provider membership agreements constitutional rights through contractual terms of service and police powers through taxation fees and system operator sanctions 2 Indeed many countries have pushed to ensure the protection of their citizens privacy and of internal business longevity by data protection and information privacy legislation see the EU s Data Protection Directive the UK s Data Protection Act 1998 Network sovereignty has implications for state security Internet governance and the users of the Internet s national and international networks Contents 1 Implications for state security 2 Internet governance 2 1 SOPA PIPA 2 2 Golden Shield Project 2 3 Roskomnadzor 2 4 Other examples 2 5 Response to Internet governance 3 Impact of VPNs 4 Rationales 4 1 Protection of national traffic 4 2 Copyright protection 4 3 E commerce 5 Role of WIPO 6 Countries 6 1 China 6 2 France 6 3 Germany 6 4 Russia 7 See also 8 ReferencesImplications for state security editNetworks are challenging places for states to extend their sovereign control In her book Sociology in the Age of the Internet communications professor Allison Cavanagh argues that state sovereignty has been drastically decreased by networks 3 Other scholars such as Saskia Sassen and Joel R Reidenberg agree Sassen argues that the state s power is limited in cyberspace and that networks particularly the numerous private tunnels for institutions such as banks 4 Sassen further postulates that these private tunnels create tensions within the state because the state itself is not one voice 5 Reidenberg refers to what he terms Permeable National Borders effectively echoing Sassen s arguments about the private tunnels which pass through numerous networks 6 Reidenberg goes on to state that intellectual property can easily pass through such networks which incentivizes businesses and content providers to encrypt their products 7 The various interests in a network are echoed within the state by lobby groups Internet governance editMany governments are trying to exert some forms of control over the Internet Some examples include the SOPA PIPA debates in the United States the Golden Shield Project in China and new laws that grant greater power to the Roskomnadzor in Russia SOPA PIPA edit With the failed Stop Online Piracy Act the United States would have allowed law enforcement agencies to prevent online piracy by blocking access to websites The response from bipartisan lobbying groups was strong Stanford Law Professors Mark Lemly David Levin and David Post published an article called Don t Break the Internet 8 There were several protests against SOPA and PIPA including a Wikipedia blackout in response to statements by Senator Patrick Leahy who was responsible for introducing the PROTECT IP Act Both acts viewed as good for mass media because they limited access to certain websites The acts were viewed as an attack on net neutrality and so were seen as potential damaging to the networked public sphere 9 Golden Shield Project edit Main article Golden Shield Project The Golden Shield Project sometimes known as Great Firewall of China prevents those with a Chinese IP address from accessing certain banned websites inside the country People are prevented from accessing sites that the government deems problematic That creates tension between the netizen community and the government according to scholar Min Jiang 10 Roskomnadzor edit Main article Roskomnadzor Russia s Roskomnadzor Federal Service for Supervision in the Sphere of Telecom Information Technologies and Mass Communications was created in December 2008 in accordance with President s Decree No 1715 The agency was created to protect personal data owners rights According to the Russian government the agency has three primary objectives ensuring society demand in high quality telecommunication services as well as information and communication technologies promoting mass communications and freedom of mass media ensuring protection of citizens rights to privacy personal and family confidentiality 11 On 1 September 2015 a new data localization law provided Roskomnadzor with greater oversight The law itself stipulates that any personal data collected from Russian citizens online must be stored in server databases that are physically located in Russia It creates a new procedure restricting access to websites violating Russian laws on personal data 12 Even with staunch pressure from those who promote free flow of information President Vladimir Putin and the Kremlin remain stolid in assertions of network sovereignty to protect Russian citizens 13 Other examples edit China s approach could also be repeated in many other countries around the world 14 15 One example was the Internet censorship in the Arab Spring when the Egyptian government in particular tried to block access to Facebook and Twitter Also during the 2011 England riots the British government tried to block Blackberry Messenger Response to Internet governance edit Many believe that the government has no right to be on the Internet As Law Professor David Post at the University of Georgetown argued States are mapping statehood onto a domain that doesn t recognize physical boundaries at least in the context on the internet He went on to say When 150 jurisdictions apply their law it s a conflict of law nightmare 16 Some proponents of the internet such as John Perry Barlow argued that the current form of the Internet is ungovernable and should remain as open as possible Barlow s essay was written about the 1990s Internet and while it has changed very much since then the ideas in his work are still salient in the ongoing debates surrounding the future of the Internet In his essay A Declaration of the Independence of Cyberspace he advocated that governments should stay out of the internet 17 Network Sovereignty can affect state security law enforcement on the internet and the ways that private citizens use the internet as many people attempt to circumvent the protections and legal devices placed by many governments on the Internet by using tools such as VPNs Impact of VPNs editVirtual Private Networks VPNs are a significant tool to allow private citizens to get around network sovereignty and any restrictions their government may place on their access to the internet VPNs allow a computer to route its Internet connection from one location to another For example one would connect from a connection at point A to a connection at point B and to others it would appear that they are accessing the Internet from point B even if they are in point A For example in China VPNs are used to access otherwise blocked content Yang gives the example of pornography stating that with VPN smut that s banned in the US can wind its way into American homes through electrical impulses in say Amsterdam 16 In that example by using VPNs an Internet user in the United States could access banned material that is hosted in Amsterdam by accessing through a server hosted in Amsterdam to make it appear that the user is in Amsterdam based on the IP address Therefore citizens have a way around network sovereignty simply by accessing a different server through a VPN That greatly limits how governments can enforce network sovereignty and protect their cyberspace borders Essentially there is no way that a government could prevent every citizen from accessing banned content by means such as VPNs citation needed Rationales editProtection of national traffic edit One of the most significant reasons for enforcing network sovereignty is to prevent the scanning of information that travels through other countries For example any internet traffic that travels through the United States is subject to the Patriot Act and so may be examined by the National Security Agency regardless of the country of origin Jonathan Obar and Andrew Clement refer to the routing of a transmission from a point in state A to another location in state A through state B as Boomerang Routing 18 They provide the example of traffic from Canada being routed through the United States before returning to Canada which enables the United States to track and examine the Canadian traffic Copyright protection edit Governments may want to enact network sovereignty to protect copyright within their borders The purpose of SOPA PIPA was to prevent what was effectively deemed theft Content providers want their content to be used as intended because of the property rights associated with that content 19 One instance of such protection is in e commerce E commerce edit Currently private networks are suing others who interfere with their property rights 20 For the effective implementation of e commerce on the Internet merchants require restrictions on access and encryption to protect not only their content but also the information of content purchasers Currently one of the most effective ways to regulate e commerce is to allow Internet service providers ISPs to regulate the market 21 The opposing argument to regulating the internet by network sovereignty to allow e commerce is that it would break the Internet s egalitarian and open values because it would force governments and ISPs to regulate not only the Internet s content but also how the content is consumed 22 Role of WIPO editThe World Intellectual Property Organization is a United Nations body designed to protect intellectual property across all of its member states 19 WIPO allows content to traverse various networks through their Patent Cooperation Treaty PCT The PCT allows for international patents by providing security for content providers across state borders 23 It is up to states to enforce their own network sovereignty over these patents Global standards for copyright and encryption are viewed as one way that governments could cooperate 24 With global standards it is easier to enforce network sovereignty because it builds respect for intellectual property and maintains the rights of content creators and providers 25 It is possible that governments may not be able to keep up with regulating these initiatives For example in the 1995 Clipper Chip system the Clinton administration in the United States reneged on its original policy because it was deemed that it would soon be too easy to crack the chips 19 One alternative proposed was the implementation of the digital signature which could be used to protect network sovereignty by having content providers and governments sign off the content like for a digital envelope 19 This system has already been implemented in the use of Wi Fi Protected Access Enterprise networks some secured websites and software distribution It allows content to pass through borders without difficulty because it is facilitated through organizations such as WIPO 19 Countries editIn his 2015 book Data and Goliath American security expert Bruce Schneier says the cyber sovereignty movement in countries such as Russia China France and Saudi Arabia was given an enormous boost by the 2013 revelations of widespread international NSA surveillance which those countries pointed to as justification for their activities and evidence of U S hypocrisy on Internet freedom issues 26 China edit Main article Great Firewall Cyber sovereignty known in Mandarin as 网络主权 has been a mainstay of Chinese Internet policy in recent years and the international promotion of cybersovereignty forms an integral part of Chinese foreign policy although it remains ill defined within Chinese discourse 14 The Great Firewall is the combination of legislative actions and technologies enforced by the People s Republic of China to regulate the Internet domestically Its role in internet censorship in China is to block access to selected foreign websites and to slow down cross border internet traffic 27 The effect includes limiting access to foreign information sources blocking foreign internet tools e g Google Search 28 Facebook 29 Twitter 30 Wikipedia 31 32 and others and mobile apps and requiring foreign companies to adapt to domestic regulations 33 34 The Chinese government and ruling Communist Party asserts cyber sovereignty or control over all of China s digital resources including servers user data technical infrastructure and tech firms operating in China both within the country and overseas China s 2017 Cybersecurity Law of 2017 requires firms that offer critical information infrastructure in mainland China to store their data on Chinese government run servers allowing the state to access resources such as Apple s China based iCloud data The Data Security Law of 2021 also empowers the Chinese government to conduct national security audits over firms operating in China which gather user data 35 France edit Project Andromede launched in 2009 with the aim to spend 285 million on cloud souverain or sovereign cloud 36 37 The government spent 75 million on each of its two national champions Cloudwatt and Numergy but these two sold only 8 million worth of services combined 38 On January 1 2020 all services were terminated and clients were advised their data was deleted 39 Germany edit openDesk is a project to create administrative workspaces to enable digital sovereignty initiated in 2023 by the German Federal Ministry of the Interior BMI and the public IT service provider Dataport 40 There is collaboration with a team of open source specialists from Collabora Nextcloud OpenProject OpenXchange Univention XWiki and others 41 Russia edit Main article Sovereign Internet Law The Sovereign Internet Law is a set of 2019 amendments to existing Russian legislation that mandate Internet surveillance and grants the Russian government powers to partition Russia from the rest of the Internet including the creation of a national fork of the Domain Name System 42 43 44 45 46 47 See also editCybersecurity Data governance Data localization Data sovereignty Digital inclusion Digital self determination Information privacy data protection Legal aspects of computing Privacy Privacy lawReferences edit Obar Jonathan Clement Andrew 1 July 2013 Internet Surveillance and Boomerang Routing A Call for Canadian Network Sovereignty 2 doi 10 2139 ssrn 2311792 SSRN 2311792 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help Reidenberg Joel R 1996 Governing Networks and Rule Making in Cyberspace Emory Law Journal 45 928 Cavanagh Allison 1 April 2007 Sociology in the Age of Internet McGraw Hill International p 41 ISBN 9780335217250 Sassen Saskia 2000 The Impact of the Internet on Sovereignty Unfounded and Real Worries Understanding the Impact of Global Networks in Local Social Political and Cultural Values PDF Nomos Verlagsgesellschaft pp 198 209 Archived from the original PDF on 27 February 2014 Retrieved 23 January 2014 a href Template Cite book html title Template Cite book cite book a CS1 maint location missing publisher link Sassen Saskia The Impact of the Internet on Sovereignty Unfounded and Real Worries Understanding the Impact of Global Networks in Local Social Political and Cultural Values PDF Nomos Verlagsgesellschaft Baden Baden pp 198 209 Archived from the original PDF on 27 February 2014 Retrieved 23 January 2014 Reidenberg Joel R 1996 Governing Networks and Rule Making in Cyberspace Emory Law Journal 45 913 Reidenberg Joel R 1996 Governing Networks and Rule Making in Cyberspace Emory Law Journal 45 914 Benkler Yochai Hal Roberts Rob Faris Alicia Solow Niederman Bruce Etling July 2013 Social Mobilization and the Networked Public Sphere Mapping the SOPA PIPA Debate Cambridge MA Berkman Center for Internet amp Society 34 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help Benkler Yochai Hal Roberts Rob Faris Alicia Solow Niederman Bruce Etling July 2013 Social Mobilization and the Networked Public Sphere Mapping the SOPA PIPA Debate Cambridge MA Berkman Center for Internet amp Society 10 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help Jiang Min 2010 Authoritarian Informationalism China s Approach to Internet Sovereignty SAIS Review of International Affairs 30 2 71 89 doi 10 1353 sais 2010 0006 S2CID 154005295 Retrieved 23 January 2014 Roskomnadzor Federal Service for Supervision in the Sphere of Telecom Information Technologies and Mass Communications ROSKOMNADZOR rkn gov ru Retrieved 6 October 2015 News Data Protection NOERR PDF News Data Protection NOERR NOERR 1 June 2015 Retrieved 10 June 2015 Putin Says Russia Under Pressure for Defending Its Sovereignty Bloomberg com 3 July 2015 Retrieved 6 October 2015 a b Tai Katharin Zhu Yuan Yi September 2022 A historical explanation of Chinese cybersovereignty International Relations of the Asia Pacific 22 3 469 499 doi 10 1093 irap lcab009 Democratic Republic of Congo internet shutdown shows how Chinese censorship tactics are spreading CNN 2 January 2019 Retrieved 10 December 2019 a b Yang Catherine 14 June 1997 Law Creeps Onto the Lawless Internet Business Week Archived from the original on 28 June 1997 Retrieved 28 January 2014 Barlow John Perry A Declaration of the Independence of Cyberspace Electronic Frontier Foundation Archived from the original on 23 October 2013 Retrieved 28 January 2014 Obar Jonathan Clement 1 July 2013 Internet Surveillance and Boomerang Routing A Call for Canadian Network Sovereignty Social Science Research Network 1 12 SSRN 2311792 a b c d e Davis J C Summer 1998 Protecting intellectual property in cyberspace IEEE Technology and Society Magazine 17 2 12 25 doi 10 1109 44 682891 Zekos Georgios I 2006 State Cyberspace Jurisdiction and Personal Cyberspace Jurisdiction International Journal of Law and Information Technology 15 1 1 37 doi 10 1093 ijlit eai029 Zekos Georgios I 2002 Legal problems in cyberspace Managerial Law 44 5 45 102 doi 10 1108 03090550210770614 Post David G 1 May 2000 What Larry Doesn t Get Code Law and Liberty in Cyberspace Stanford Law Review 52 5 1439 1459 doi 10 2307 1229518 JSTOR 1229518 PCT FAQs PDF World Intellectual Property Organization Archived from the original PDF on 25 June 2008 Retrieved 20 March 2014 Reidenberg Joel R 1996 Governing Networks and Rule Making in Cyberspace Emory Law Journal 45 918 World Intellectual Property Organization Building Respect for IP World Intellectual Property Organization Retrieved 20 March 2014 Schneier Bruce 2015 Data and Goliath The Hidden Battles to Collect Your Data and Control Your World New York W W Norton amp Company ISBN 978 0393244816 Mozur Paul 13 September 2015 Baidu and CloudFlare Boost Users Over China s Great Firewall The New York Times Archived from the original on 24 January 2019 Retrieved 16 September 2017 google com is blocked in China GreatFire Analyzer en greatfire org Archived from the original on 5 August 2014 Retrieved 18 January 2020 How China s social media users created a new language to beat censorship on COVID 19 Amnesty International 6 March 2020 Archived from the original on 3 April 2020 Retrieved 3 April 2020 China Blocks Access To Twitter Facebook After Riots Washington Post Archived from the original on 19 September 2010 Retrieved 18 January 2020 Wikipedia founder defends decision to encrypt the site in China The Verge 4 September 2015 Archived from the original on 12 June 2018 Retrieved 17 April 2018 Skipper Ben 7 December 2015 China s government has blocked Wikipedia in its entirety again International Business Times UK Archived from the original on 3 May 2018 Retrieved 2 May 2018 Mozur Paul Goel Vindu 5 October 2014 To Reach China LinkedIn Plays by Local Rules The New York Times Archived from the original on 13 June 2018 Retrieved 4 September 2017 Branigan Tania 28 June 2012 New York Times launches website in Chinese language The Guardian Archived from the original on 4 September 2017 Retrieved 4 September 2017 Trafficking Data China s Pursuit of Digital Sovereignty thediplomat com Retrieved 27 September 2022 285 millions d euros pour Andromede le cloud souverain francais le Monde Informatique 21 September 2011 Archived from the original on 23 October 2011 France continues to pursue its own data centre infrastructure dubbed le cloud souverain despite the closure of some of the businesses initially behind the idea https theconversation com digital colonialism why some countries want to take control of their peoples data from big tech 123048 Numergy and Cloudwatt each benefited from 75 million 101 million from the French government https gigaom com 2013 11 18 a guide to the french national clouds Cloudwatt Vie et mort du premier cloud souverain de la France 29 August 2019 Sovereign workspace openDesk German Ministry of the Interior provides answers Free Software Foundation Europe FSFE 21 September 2023 Retrieved 22 October 2023 Brock Richard 19 October 2023 openDesk Collabora Online brings Digital Freedom to European Government CollaboraOffice Retrieved 22 October 2023 Schulze Elizabeth 1 November 2019 Russia just brought in a law to try to disconnect its internet from the rest of the world CNBC Retrieved 28 February 2021 Russia Growing Internet Isolation Control Censorship Human Rights Watch 18 June 2020 Retrieved 28 February 2021 Epifanova Alena 16 January 2020 Deciphering Russia s Sovereign Internet Law DGAP Russia internet Law introducing new controls comes into force BBC News 1 November 2019 Retrieved 28 February 2021 On the Federal Law On Amendments to the Federal Law On Communications and the Federal Law On Information Information Technologies and the Protection of Information Federation Council of the Federal Assembly of the Russian Federation 22 April 2019 Law on Sovereign Internet adopted The State Duma 16 April 2019 Retrieved from https en wikipedia org w index php title Network sovereignty amp oldid 1181923766, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.