Cyberspace, the New Frontier — and the Same Old Multilateralism

  • Panayotis A. Yannakogeorgos
Part of the Palgrave Studies in International Relations Series book series (PSIR)

Abstract

The term “cyberspace” still elicits a sense of fundamental departure from business as usual. Depicted in the popular press as being a metaphor for a medium without geographic boundaries, the dynamic new applications using computer networking technology are the epitome of a global project that, although barely visible, has an extensive geography consisting of terrestrial, maritime, outer space, and electromagnetic elements.3 The processes of negotiation and bargaining, as well as the endemic politics of cyberspace, are surprisingly familiar.

Keywords

Information Society World Politics Domain Name System Global Civil Society World Summit 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. 3.
    Elihu Zimet and Edward Skoudis, “A Graphical Introduction to the Structural Elements of Cyberspace”, in Cyberpower and National Security (Washington, DC: National Defense University Press, 2009), pp. 91–112.Google Scholar
  2. See also Aharon Kelerman (1993), Telecommunications and Geography (New York: Belhaven Press), p. 14.Google Scholar
  3. 4.
    Economic and Security Review Commission (2007), Report to Congress of the U.S.-China Economic and Security Review Community, November, http://www.uscc.gov/annual_report/2007/report_to_congress.pdfGoogle Scholar
  4. 5.
    Levon Anderson (2006), “Countering State-Sponsored Cyber Attacks: Who Should Lead?” in Jeffrey L. Groh, David J. Smith, Cynthia E. Ayers and William O. Waddell (eds), Information as Power: An Anthology of Selected United States Army War College Student Papers (Carlisle Barracks, PA: US Army War College), pp. 105–122, 106, available online at http://www.csl.army.mil/usacsl/Publications/infoaspowervol2/IAP2%20-%20Section%20Two%20(Anderson).pdfGoogle Scholar
  5. 12.
    Greg Rattray, Chris Evans, and Jason Healey, “American Security in the Cyber Commons”, in Contested Commons: The Future of American Power in a Multipolar World, Abraham M. Denmark and Dr James Mulvenon (eds), Center for a New American Security, 2010, pp. 137–76Google Scholar
  6. Ahmad Kamal (2005), The Law of Cyber-Space: An Invitation to the Table of Negotiations (Geneva, Switzerland: United Nations Institute for Training and Research), http://www.un.int/kamal/thelawofcyberspace/The%20Law%20of%20Cyber-Space.pdfGoogle Scholar
  7. 13.
    US Department of Defense, The National Military Strategy for Cyberspace Operations, November 2006, p. 3.Google Scholar
  8. 14.
    Martin Libicki (2007), Conquest in Cyberspace (New York: Cambridge University Press).CrossRefGoogle Scholar
  9. 15.
    Robert O. Keohane and Joseph S. Nye (1999), “Power and Interdependence in the Information Age”, Democracy.com? Governance in a Networked World (Hollis, NH: Hollis Publishing Company), pp. 197–214, especially p. 199.Google Scholar
  10. 16.
    See Robert E. Molyneux (2003), The Internet Under the Hood: An Introduction to Network Technologies for Information Professionals (Westport, CT: Libraries Unlimited), pp. 85–6.Google Scholar
  11. 17.
    For further information on the symbiotic relationship between the US Department of State and MNCs, see Edward A. Comor (1994), “Communication Technology and International Capitalism: The Case of DBS and U.S. Foreign Policy”, in Edward A. Comor (ed.), The Global Political Economy of Communication: Hegemony, Telecommunication and the Information Economy (New York: St Martin’s Press), pp. 83–102.CrossRefGoogle Scholar
  12. 18.
    Jill Hills (2002), The Struggle for Control of Global Communications: The Formative Century (Chicago, Ill: University of Illinois Press).Google Scholar
  13. 19.
    Marc Raboy and Normand Landry (2005), Civil Society Communication and Global Governance: Issues from the World Summit on the Information Society (New York: Peter Lang Publishing), p. 26.Google Scholar
  14. 20.
    Marc Raboy and Normand Landry (2005), Civil Society Communication and Global Governance: Issues from the World Summit on the Information Society (New York: Peter Lang Publishing), p. 1.Google Scholar
  15. 34.
    Marc Raboy and Normand Landry (2005), Civil Society Communication and Global Governance: Issues from the World Summit on the Information Society, op.Google Scholar
  16. 36.
    United Nations Economic Commission for Europe (2002), The Information Society in Europe and North America: Contributions from the UNECE to the WSIS Prep Com 2, December, p. 3.Google Scholar
  17. 39.
    Marc Raboy and Normand Landry (2005), Civil Society Communication and Global Governance: Issues from the World Summit on the Information Society, op. cit., p. 21.Google Scholar
  18. 40.
    World Summit on the Information Society (2003), Declaration of Principles WSIS-03/GENEVA/DOC/0004, Paragraph 1.Google Scholar
  19. 41.
    World Summit on the Information Society (2003), Declaration of Principles WSIS-03/GENEVA/DOC/0004, Paragraph 1.Google Scholar
  20. 44.
    World Summit on the Information Society (2003), Plan of Action WSIS-03/GENEVA/DOC/0005, Section C5.12.Google Scholar
  21. 45.
    World Summit on the Information Society (2003), Tunis Agenda for the Information Society, WSIS-05/TUNIS/DOC/6, Paragraph 31.Google Scholar
  22. 49.
    World Summit on the Information Society (2005), United States Contribution document WSIS/PC-1/CONTR/9-E, http://www.itu.int/dms_pub/itu-s/md/02/wsispc1/c/S02-WSISPC1-C-0009!!MSW-E.doc, Annex 2.Google Scholar
  23. 52.
    World Summit on the Information Society (2003), First Deputy Minister of the Russian Federation for Communications and Informatization of the Preparatory Committee for the World Summit on the Information Society, Opening Ceremony, 10 December.Google Scholar
  24. 53.
    World Summit on the Information Society (2002), Statement by Chinese Ambassador Sha Zukang at the First Meeting of the Intergovernmental Preparatory Committee of the World Summit on the Information Society, 1 July, http://www.itu.int/wsis/docs/pc1/statements_general/china.docGoogle Scholar
  25. 57.
    World Summit on the Information Society (2002), Final Declaration of the Pan European Regional Conference, 7–9 November, http://www.itu.int/dms_pub/itu-s/md/03/wsispc2/doc/S03-WSISPC2-DOC-0005!!PDF-E.pdfGoogle Scholar
  26. 58.
    World Summit on the Information Society (2002), Final Declaration of the Pan European Regional Conference, 7–9 November, http://www.itu.int/dms_pub/itu-s/md/03/wsispc2/doc/S03-WSISPC2-DOC-0005!!PDF-E.pdfGoogle Scholar
  27. 63.
    James Bamford (2009), The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America (New York, Anchor Books, 2009).Google Scholar
  28. 64.
    World Summit on the Information Society (2003), Bavaro Declaration, Paragraph 1.h, http://www.itu.int/dms_pub/itu-s/md/03/wsispc2/doc/S03-WSISPC2-DOC-0007!!PDF-E.pdfGoogle Scholar
  29. 66.
    World Summit on the Information Society (2003), Bavaro Declaration, op. cit., Paragraph 2.g.Google Scholar
  30. 68.
    World Summit on Information Society (2003), Report of the Second Meeting of the Preparatory Committee, 17–28 February, http://www.itu.int/dms_pub/itu-s/md/03/wsispc2/doc/S03-WSISPC2-DOC-0012!R1!PDF-E.pdf, Paragraph B.20.Google Scholar
  31. 69.
    World Summit on the Information Society (2003), Note by the President, 18 July.Google Scholar
  32. 74.
    World Summit on the Information Society (2003), Draft Declaration of Principles WSIS/PC-3/DT/1-E, 19 September.Google Scholar
  33. 76.
    World Summit on the Information Society (2003), Draft Declaration of Principles WSIS/PC-3/DT/1(rev.2B)-E, 26 September, Paragraph 28.Google Scholar
  34. 80.
    World Summit on the Information Society (2003), Draft Declaration of Principles WSIS/PC-3/DT/1(rev.2B)-E, 26 September, Alternative Paragraph 40.Google Scholar
  35. 81.
    The main issues of contention were not related to cybersecurity, but rather to human security and human rights. In an effort to bridge this divide with Southern concerns, see Office of the United Nations High Commissioner for Human Rights (2003),“Background Note on the Information Society and Human Rights”, October.Google Scholar
  36. 82.
    European Commission Working Party on Telecommunications and Information Society (2004), Preparation of the Transport/Telecommunications and Energy Council of 1/10 (6423/04 TELECOM 30 DEVGEN 37 CONUN 6).Google Scholar
  37. 83.
    European Commission Working Party on Telecommunications and Information Society (2004), World Summit on Information Society (WSIS): Internet Governance-Guidelines for Discussions in the WSIS Framework, 7 October, Paragraph 4.2.Google Scholar
  38. 88.
    Transmission Note for the Attention of EU Heads of Mission (2004), WSIS: Information Exchange of Views Between E.U. Heads of Mission and the ITU Secretary General, Mr. Utsumi, 17 November.Google Scholar
  39. 92.
    Council of the European Union Working Party on Telecommunication and Information Society (2004), World Summit on Information Society (WSIS): Internet Governance- Guidelines for Discussions in the WSIS Framework, 7 October, Paragraph 4.4.Google Scholar
  40. 95.
    Presidency of the Council of the European Union (2005), World Summit for the Information Society- Guidelines for the Exchange of Views at the Council, 20 June.Google Scholar
  41. 96.
    Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions (2005), Towards a Global Partnership in the Information Society: The Contribution of the European Union to the Second Phase of the World Summit on the Information Society (WSIS), 6 February.Google Scholar
  42. 97.
    National Telecommunications and Information Administration (2005), Domain Names: U.S. Principles on the Internet’s Domain Name and Addressing System, 30 June, http://www.ntia.doc.gov/ntiahome/domainname/USDNSprinciples_06302005.htmGoogle Scholar

Copyright information

© Panayotis A. Yannakogeorgos 2010

Authors and Affiliations

  • Panayotis A. Yannakogeorgos

There are no affiliations available

Personalised recommendations