Drawing a line: Digital transnational repression against political exiles and host state sovereignty

IF 2.5 Q1 INTERNATIONAL RELATIONS European Journal of International Security Pub Date : 2022-10-25 DOI:10.1017/eis.2022.27
M. Michaelsen, Johannes Thumfart
{"title":"Drawing a line: Digital transnational repression against political exiles and host state sovereignty","authors":"M. Michaelsen, Johannes Thumfart","doi":"10.1017/eis.2022.27","DOIUrl":null,"url":null,"abstract":"Abstract Authoritarian regimes increasingly resort to surveillance and malware attacks to extend their coercive reach into the territory of other states and silence dissidents abroad. Recent scholarship has examined the methods of digital transnational repression and their detrimental effects on the fundamental rights and security of targeted individuals. However, the broader normative and security dimensions of these practices remain underexplored, especially with regard to the states hosting the affected exiles. Addressing this gap, our article investigates digital transnational repression as a potential violation of host state sovereignty. Mobilising emerging research on digital sovereignty and cybersecurity, we argue that digital repression can violate host state sovereignty in that it constitutes extraterritorial enforcement jurisdiction; interferes with open debate and national self-determination; impedes the host state's adherence to fundamental norms of international humanitarian law; and undermines host state authority, domestic sovereignty, and integrative capacities. We outline possible pathways to counter digital transnational repression, focusing notably on distributed cyber deterrence, punitive measures like sanctions, and norms and regulations restricting the global proliferation of offensive cyber capabilities. Building on a post-territorial notion of sovereignty that centres on the effects of state actions in and beyond cyberspace, our article contributes to reflections on a human-centric approach to cybersecurity.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":"8 1","pages":"151 - 171"},"PeriodicalIF":2.5000,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of International Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1017/eis.2022.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 4

Abstract

Abstract Authoritarian regimes increasingly resort to surveillance and malware attacks to extend their coercive reach into the territory of other states and silence dissidents abroad. Recent scholarship has examined the methods of digital transnational repression and their detrimental effects on the fundamental rights and security of targeted individuals. However, the broader normative and security dimensions of these practices remain underexplored, especially with regard to the states hosting the affected exiles. Addressing this gap, our article investigates digital transnational repression as a potential violation of host state sovereignty. Mobilising emerging research on digital sovereignty and cybersecurity, we argue that digital repression can violate host state sovereignty in that it constitutes extraterritorial enforcement jurisdiction; interferes with open debate and national self-determination; impedes the host state's adherence to fundamental norms of international humanitarian law; and undermines host state authority, domestic sovereignty, and integrative capacities. We outline possible pathways to counter digital transnational repression, focusing notably on distributed cyber deterrence, punitive measures like sanctions, and norms and regulations restricting the global proliferation of offensive cyber capabilities. Building on a post-territorial notion of sovereignty that centres on the effects of state actions in and beyond cyberspace, our article contributes to reflections on a human-centric approach to cybersecurity.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
划清界限:对政治流亡者和东道国主权的数字跨国镇压
摘要威权政权越来越多地利用监视和恶意软件攻击,将其胁迫范围扩大到其他国家的领土,并压制国外的异见人士。最近的学术研究研究了数字跨国镇压的方法及其对目标个人基本权利和安全的有害影响。然而,这些做法在更广泛的规范和安全方面仍然没有得到充分的探索,特别是在收容受影响流亡者的国家。针对这一差距,我们的文章调查了数字跨国镇压对东道国主权的潜在侵犯。我们动员了关于数字主权和网络安全的新兴研究,认为数字镇压可能侵犯东道国主权,因为它构成域外执法管辖权;干扰公开辩论和民族自决;妨碍东道国遵守国际人道主义法的基本准则;破坏东道国的权威、国内主权和一体化能力。我们概述了对抗数字跨国镇压的可能途径,特别关注分布式网络威慑、制裁等惩罚措施,以及限制攻击性网络能力在全球扩散的规范和条例。基于后领土主权概念,该概念以国家在网络空间内外的行动的影响为中心,我们的文章有助于反思以人为中心的网络安全方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
3.40
自引率
13.60%
发文量
30
期刊最新文献
Transcending the fog of war? US military ‘AI’, vision, and the emergent post-scopic regime Anything you can do [I can do better]: Exploring women’s agency and gendered protection in state militaries Timing bombs and the temporal dynamics of Iranian nuclear security Cyberbiosecurity in the new normal: Cyberbio risks, pre-emptive security, and the global governance of bioinformation The military-strategic rationality of hybrid warfare: Everyday total defence under strategic non-peace in the case of Sweden
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1