Pub Date : 2022-07-03DOI: 10.1080/09662839.2022.2101883
L. Monsees, Daniel Lambach
ABSTRACT “Digital sovereignty” has emerged as a hot topic in European politics. But although true European digital sovereignty seems unattainable, analysing the digital sovereignty discourse is still useful since it tells us much about European politics. We examine three “projects” which are part of the broader digital sovereignty initiative: 5G, Gaia-X, and the semiconductor industry. This empirical perspective allows for a better understanding of how imaginaries about digital sovereignty play out in these specific tech projects and how these then help to affirm a particular European identity. Methodologically, we focus on how particular geopolitical imaginaries appear in these digital sovereignty projects. Our empirical analysis reveals that Europe’s comparatively weak digital industries are considered a security issue. China and, to a lesser degree, the United States are not only seen as economic rivals but also security threats when it comes to issues such as espionage and data protection. Based on this, we argue that digital sovereignty projects, despite being full of contradictions and tensions, contribute to a distinct EU identity of an agile, future-oriented global player in the digitised economy. This, while not entirely new, is a powerful imaginary even if the proposed idea of “sovereignty” might never be enacted.
{"title":"Digital sovereignty, geopolitical imaginaries, and the reproduction of European identity","authors":"L. Monsees, Daniel Lambach","doi":"10.1080/09662839.2022.2101883","DOIUrl":"https://doi.org/10.1080/09662839.2022.2101883","url":null,"abstract":"ABSTRACT “Digital sovereignty” has emerged as a hot topic in European politics. But although true European digital sovereignty seems unattainable, analysing the digital sovereignty discourse is still useful since it tells us much about European politics. We examine three “projects” which are part of the broader digital sovereignty initiative: 5G, Gaia-X, and the semiconductor industry. This empirical perspective allows for a better understanding of how imaginaries about digital sovereignty play out in these specific tech projects and how these then help to affirm a particular European identity. Methodologically, we focus on how particular geopolitical imaginaries appear in these digital sovereignty projects. Our empirical analysis reveals that Europe’s comparatively weak digital industries are considered a security issue. China and, to a lesser degree, the United States are not only seen as economic rivals but also security threats when it comes to issues such as espionage and data protection. Based on this, we argue that digital sovereignty projects, despite being full of contradictions and tensions, contribute to a distinct EU identity of an agile, future-oriented global player in the digitised economy. This, while not entirely new, is a powerful imaginary even if the proposed idea of “sovereignty” might never be enacted.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45902872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-03DOI: 10.1080/09662839.2022.2102896
B. Farrand, Helena Carrapico
ABSTRACT In recent years, we have been able to observe the emergence and mainstreaming of an EU discourse on digital sovereignty, which highlights the importance of gaining back control of EU digital infrastructure and technological production, based on the EU's perceived loss of economic competitiveness, limited capacity to innovate, high degree of dependence on foreign digital infrastructures and service providers and, related to all these factors, difficulty in providing EU citizens with a high level of cybersecurity. Bearing in mind that a considerable percentage of these infrastructures and service providers are under private sector control, the present article asks how this sovereignty discourse conceptualises the role of the private sector in EU cybersecurity. Drawing from a Regulatory Capitalism theoretical model, this article proposes that the EU has instead entered a Regulatory Mercantilist phase where it seeks to reassert its control over cyberspace, impose digital borders, accumulate data wealth and reduce its dependence on external private sector actors whose values may not reflect those of the EU order. A new approach to cybersecurity is emerging, in which the non-EU private sector can be perceived as much of a threat as foreign powers, and from whom digital sovereignty must be secured.
{"title":"Digital sovereignty and taking back control: from regulatory capitalism to regulatory mercantilism in EU cybersecurity","authors":"B. Farrand, Helena Carrapico","doi":"10.1080/09662839.2022.2102896","DOIUrl":"https://doi.org/10.1080/09662839.2022.2102896","url":null,"abstract":"ABSTRACT In recent years, we have been able to observe the emergence and mainstreaming of an EU discourse on digital sovereignty, which highlights the importance of gaining back control of EU digital infrastructure and technological production, based on the EU's perceived loss of economic competitiveness, limited capacity to innovate, high degree of dependence on foreign digital infrastructures and service providers and, related to all these factors, difficulty in providing EU citizens with a high level of cybersecurity. Bearing in mind that a considerable percentage of these infrastructures and service providers are under private sector control, the present article asks how this sovereignty discourse conceptualises the role of the private sector in EU cybersecurity. Drawing from a Regulatory Capitalism theoretical model, this article proposes that the EU has instead entered a Regulatory Mercantilist phase where it seeks to reassert its control over cyberspace, impose digital borders, accumulate data wealth and reduce its dependence on external private sector actors whose values may not reflect those of the EU order. A new approach to cybersecurity is emerging, in which the non-EU private sector can be perceived as much of a threat as foreign powers, and from whom digital sovereignty must be secured.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49639000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-03DOI: 10.1080/09662839.2022.2101887
R. Bellanova, Helena Carrapico, D. Duez
ABSTRACT The notion of digital sovereignty, also often referred to as technological sovereignty, has been gaining momentum in the European Union’s (EU) political and policy discourses over recent years. Digital sovereignty has come to supplement an already substantial engagement of the EU with the digital across various security policy domains. The goal of this article and of the overall Special Issue is to explore how the discourse and practices of digital sovereignty redefine European security integration. Our core argument is that digital sovereignty has both direct and indirect implications for European security as the EU attempts to develop and control digital infrastructures (sovereignty over the digital), as well as the use of digital tools for European security governance (sovereignty through the digital). It is thus essential to further explore digital sovereignty both in terms of European policies and of a re-articulation of sovereign power and digital technologies – what we suggest calling digital/sovereignty.
{"title":"Digital/sovereignty and European security integration: an introduction","authors":"R. Bellanova, Helena Carrapico, D. Duez","doi":"10.1080/09662839.2022.2101887","DOIUrl":"https://doi.org/10.1080/09662839.2022.2101887","url":null,"abstract":"ABSTRACT The notion of digital sovereignty, also often referred to as technological sovereignty, has been gaining momentum in the European Union’s (EU) political and policy discourses over recent years. Digital sovereignty has come to supplement an already substantial engagement of the EU with the digital across various security policy domains. The goal of this article and of the overall Special Issue is to explore how the discourse and practices of digital sovereignty redefine European security integration. Our core argument is that digital sovereignty has both direct and indirect implications for European security as the EU attempts to develop and control digital infrastructures (sovereignty over the digital), as well as the use of digital tools for European security governance (sovereignty through the digital). It is thus essential to further explore digital sovereignty both in terms of European policies and of a re-articulation of sovereign power and digital technologies – what we suggest calling digital/sovereignty.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48506669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-03DOI: 10.1080/09662839.2022.2102895
A. Barrinha, G. Christou
ABSTRACT The EU’s revised Cybersecurity Strategy (2020) has been constructed in the context of increasing geopolitical tension and within a dynamically evolving technological environment. The onset of new technologies has brought with it new opportunities but also perceived risks and threats in cyberspace, to which the EU has sought to elicit a more comprehensive approach underpinned by a move to become more “technologically sovereign”. We seek in this article to critically unpack what such claims to technological sovereignty mean for the EU in the cyber domain and what the practical implications are of the EU taking ownership of and performing sovereignty. More specifically, in seeking to conceptually unpack technological sovereignty in its internal and external manifestations, we show how its articulation, legitimisation and operationalisation has implications and consequences for the EU’s identity and action in the cyber domain.
{"title":"Speaking sovereignty: the EU in the cyber domain","authors":"A. Barrinha, G. Christou","doi":"10.1080/09662839.2022.2102895","DOIUrl":"https://doi.org/10.1080/09662839.2022.2102895","url":null,"abstract":"ABSTRACT The EU’s revised Cybersecurity Strategy (2020) has been constructed in the context of increasing geopolitical tension and within a dynamically evolving technological environment. The onset of new technologies has brought with it new opportunities but also perceived risks and threats in cyberspace, to which the EU has sought to elicit a more comprehensive approach underpinned by a move to become more “technologically sovereign”. We seek in this article to critically unpack what such claims to technological sovereignty mean for the EU in the cyber domain and what the practical implications are of the EU taking ownership of and performing sovereignty. More specifically, in seeking to conceptually unpack technological sovereignty in its internal and external manifestations, we show how its articulation, legitimisation and operationalisation has implications and consequences for the EU’s identity and action in the cyber domain.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45184091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-03DOI: 10.1080/09662839.2022.2101886
R. Bellanova, Georgios Glouftsios
ABSTRACT In this article, we explore the security politics of EU database interoperability, inquiring how knowledge infrastructures underpin European security integration. Sitting at the intersection of Science and Technology Studies (STS) and critical approaches to European security, we unpack the co-constitutive relation between database anxieties and interoperability mechanisms. By database anxieties, we refer to what European institutions identify as the main epistemic and operational concerns that emerge from the current use of databases by security authorities across Europe. These anxieties are expected to be resolved by mechanisms that foster interoperability. We argue that the relation between database anxieties and interoperability mechanisms shapes the novel conditions of possibility for European security integration in a datafied world. While far-reaching in technological terms, interoperability is not about introducing a new overarching system, but about the management, re-organisation and re-purposing of datasets. Such formatting matters politically because it eventually informs sovereign acts of policing and mobility control.
{"title":"Formatting European security integration through database interoperability","authors":"R. Bellanova, Georgios Glouftsios","doi":"10.1080/09662839.2022.2101886","DOIUrl":"https://doi.org/10.1080/09662839.2022.2101886","url":null,"abstract":"ABSTRACT In this article, we explore the security politics of EU database interoperability, inquiring how knowledge infrastructures underpin European security integration. Sitting at the intersection of Science and Technology Studies (STS) and critical approaches to European security, we unpack the co-constitutive relation between database anxieties and interoperability mechanisms. By database anxieties, we refer to what European institutions identify as the main epistemic and operational concerns that emerge from the current use of databases by security authorities across Europe. These anxieties are expected to be resolved by mechanisms that foster interoperability. We argue that the relation between database anxieties and interoperability mechanisms shapes the novel conditions of possibility for European security integration in a datafied world. While far-reaching in technological terms, interoperability is not about introducing a new overarching system, but about the management, re-organisation and re-purposing of datasets. Such formatting matters politically because it eventually informs sovereign acts of policing and mobility control.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46532436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-03DOI: 10.1080/09662839.2022.2101884
Bruno Oliveira Martins, Kristoffer Lidén, Maria Gabrielsen Jumbert
ABSTRACT The European Union’s effort at controlling its external borders is an endeavour that increasingly relies on digital systems: from tools for information gathering and surveillance to systems for communicating between different agencies and across member states. This makes EU borders a key site for the politics of “digital sovereignty” – of controlling digital data, software and infrastructures. In this article, we propose a new understanding of how the concepts of digital and sovereignty interplay: sovereignty by digital means, sovereignty of the digital, and sovereignty over the digital. We do it by analysing three key manifestations within the EU’s borderwork: firstly, the expansion of EURODAC to include facial biometric data; secondly, the creation of the (future) shared Biometric Matching System (sBMS); and thirdly, the EU-funded West Africa Police Information System (WAPIS). These databases and systems exemplify three transformations of EU borderwork that invoke different dimensions of digital sovereignty: expansion of techniques for governing migration; interoperability of EU databases facilitating the internalisation of borders through domestic policing; and extra-territorialization of borderwork beyond the geographic limits of the EU.
{"title":"Border security and the digitalisation of sovereignty: insights from EU borderwork","authors":"Bruno Oliveira Martins, Kristoffer Lidén, Maria Gabrielsen Jumbert","doi":"10.1080/09662839.2022.2101884","DOIUrl":"https://doi.org/10.1080/09662839.2022.2101884","url":null,"abstract":"ABSTRACT The European Union’s effort at controlling its external borders is an endeavour that increasingly relies on digital systems: from tools for information gathering and surveillance to systems for communicating between different agencies and across member states. This makes EU borders a key site for the politics of “digital sovereignty” – of controlling digital data, software and infrastructures. In this article, we propose a new understanding of how the concepts of digital and sovereignty interplay: sovereignty by digital means, sovereignty of the digital, and sovereignty over the digital. We do it by analysing three key manifestations within the EU’s borderwork: firstly, the expansion of EURODAC to include facial biometric data; secondly, the creation of the (future) shared Biometric Matching System (sBMS); and thirdly, the EU-funded West Africa Police Information System (WAPIS). These databases and systems exemplify three transformations of EU borderwork that invoke different dimensions of digital sovereignty: expansion of techniques for governing migration; interoperability of EU databases facilitating the internalisation of borders through domestic policing; and extra-territorialization of borderwork beyond the geographic limits of the EU.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49349920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-03DOI: 10.1080/09662839.2022.2101885
Andrea Calderaro, Stella Blumfelde
ABSTRACT EU Digital Sovereignty has emerged as a priority for the EU Cyber Agenda to build free and safe, yet resilient cyberspace. In a traditional regulatory fashion, the EU has therefore sought to gain more control over third country-based digital intermediaries through legislative solutions regulating its internal market. Although potentially effective in shielding EU citizens from data exploitation by internet giants, this protectionist strategy tells us little about the EU’s ability to develop Digital Sovereignty, beyond its capacity to react to the external tech industry. Given the growing hybridisation of warfare, building on the increasing integration of artificial intelligence (AI) in the security domain, leadership in advancing AI-related technology has a significant impact on countries’ defence capacity. By framing AI as the intrinsic functioning of algorithms, data mining and computational capacity, we question what tools the EU could rely on to gain sovereignty in each of these dimensions of AI. By focusing on AI from an EU Foreign Policy perspective, we conclude that contrary to the growing narrative, given the absence of a leading AI industry and a coherent defence strategy, the EU has few tools to become a global leader in advancing standards of AI beyond its regulatory capacity.
{"title":"Artificial intelligence and EU security: the false promise of digital sovereignty","authors":"Andrea Calderaro, Stella Blumfelde","doi":"10.1080/09662839.2022.2101885","DOIUrl":"https://doi.org/10.1080/09662839.2022.2101885","url":null,"abstract":"ABSTRACT EU Digital Sovereignty has emerged as a priority for the EU Cyber Agenda to build free and safe, yet resilient cyberspace. In a traditional regulatory fashion, the EU has therefore sought to gain more control over third country-based digital intermediaries through legislative solutions regulating its internal market. Although potentially effective in shielding EU citizens from data exploitation by internet giants, this protectionist strategy tells us little about the EU’s ability to develop Digital Sovereignty, beyond its capacity to react to the external tech industry. Given the growing hybridisation of warfare, building on the increasing integration of artificial intelligence (AI) in the security domain, leadership in advancing AI-related technology has a significant impact on countries’ defence capacity. By framing AI as the intrinsic functioning of algorithms, data mining and computational capacity, we question what tools the EU could rely on to gain sovereignty in each of these dimensions of AI. By focusing on AI from an EU Foreign Policy perspective, we conclude that contrary to the growing narrative, given the absence of a leading AI industry and a coherent defence strategy, the EU has few tools to become a global leader in advancing standards of AI beyond its regulatory capacity.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43449617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-03DOI: 10.1080/09662839.2022.2103370
Raluca Csernatoni
ABSTRACT Discourses around “strategic autonomy” and “sovereignty”, traditionally used at the state level, have been recently circulated within the EU supranational context regarding the European defence technological and industrial base, dual-use and disruptive research and innovation, and advances in the tech and digital domains. This article explores whether a high-politics logic intrinsic to “strategic autonomy” and “sovereignty” has been transplanted at the EU-level to enhance the strategic priority of various lower-politics policy fields across tech and digital policy initiatives and instruments. This logic has the hegemonic effect of shaping collective thinking and opening windows of opportunity for EU policymaking, by mainstreaming a security imaginary into broader technological governance processes. The article examines the EU’s scaled-up rhetoric around floating signifiers such as “strategic autonomy” and “technological sovereignty”, as well as the diffusion of overlapping “sovereignty” agendas enacted transversely in the defence, tech and digital sectors. The argument is that their meaning is not yet fixed but articulated via hegemonic interventions across different interconnected policy fields. This makes for conceptual “travelling” and “stretching” with a potential impact on the future of European security integration, by creating of a more unified security imaginary of the EU as a strategically independent and technologically sovereign space.
{"title":"The EU’s hegemonic imaginaries: from European strategic autonomy in defence to technological sovereignty","authors":"Raluca Csernatoni","doi":"10.1080/09662839.2022.2103370","DOIUrl":"https://doi.org/10.1080/09662839.2022.2103370","url":null,"abstract":"ABSTRACT Discourses around “strategic autonomy” and “sovereignty”, traditionally used at the state level, have been recently circulated within the EU supranational context regarding the European defence technological and industrial base, dual-use and disruptive research and innovation, and advances in the tech and digital domains. This article explores whether a high-politics logic intrinsic to “strategic autonomy” and “sovereignty” has been transplanted at the EU-level to enhance the strategic priority of various lower-politics policy fields across tech and digital policy initiatives and instruments. This logic has the hegemonic effect of shaping collective thinking and opening windows of opportunity for EU policymaking, by mainstreaming a security imaginary into broader technological governance processes. The article examines the EU’s scaled-up rhetoric around floating signifiers such as “strategic autonomy” and “technological sovereignty”, as well as the diffusion of overlapping “sovereignty” agendas enacted transversely in the defence, tech and digital sectors. The argument is that their meaning is not yet fixed but articulated via hegemonic interventions across different interconnected policy fields. This makes for conceptual “travelling” and “stretching” with a potential impact on the future of European security integration, by creating of a more unified security imaginary of the EU as a strategically independent and technologically sovereign space.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48380301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-21DOI: 10.1080/09662839.2022.2085997
P. Cardwell, E. Moret
ABSTRACT Sanctions have become the “go to” mechanism for addressing foreign and security challenges in the international arena. The European Union’s willingness to impose autonomous (or unilateral) restrictive measures on third countries, and in particular on Russia, has come to the fore at a time when the uptake of new sanctions through the United Nations (UN) framework has stalled. This trend appears to reflect a growing ability to forge consensus among the EU's Member States and use its economic power to support its foreign policy goals. This article considers the extent to which the EU has succeeded in forging a leadership role in sanctions for itself among non-EU states. It examines the alignment or adoption by non-Member States with its sanctions regimes and finds that the EU has a demonstrable claim to regional, if not yet global, leadership.
{"title":"The EU, sanctions and regional leadership","authors":"P. Cardwell, E. Moret","doi":"10.1080/09662839.2022.2085997","DOIUrl":"https://doi.org/10.1080/09662839.2022.2085997","url":null,"abstract":"ABSTRACT Sanctions have become the “go to” mechanism for addressing foreign and security challenges in the international arena. The European Union’s willingness to impose autonomous (or unilateral) restrictive measures on third countries, and in particular on Russia, has come to the fore at a time when the uptake of new sanctions through the United Nations (UN) framework has stalled. This trend appears to reflect a growing ability to forge consensus among the EU's Member States and use its economic power to support its foreign policy goals. This article considers the extent to which the EU has succeeded in forging a leadership role in sanctions for itself among non-EU states. It examines the alignment or adoption by non-Member States with its sanctions regimes and finds that the EU has a demonstrable claim to regional, if not yet global, leadership.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47222566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1080/09662839.2022.2082838
Lars Gjesvik, Kacper Szulecki
ABSTRACT The digitalisation of the energy system brings out the question of cyber threats. How this area is perceived and how cyber-security policy in the energy sector develops is driven by the most spectacular cyber-incidents. How do these events shape public perceptions about the dangers of digitalisation? To understand this, we look at the 2016 CrashOverride cyberattack on Ukraine’s grid. Hypothesising that cyber-energy security incidents are interpreted in the context of socio-technical imaginaries of the energy sector and security imaginaries linked to foreign policy, we distil four discourses that emerged around the Ukraine attack among Western experts and commentators. One represented it as evidence of an accelerating race towards disaster, another as merely a tip of the iceberg. The third portrayed it as less catastrophic than initially suggested, while the last one as part of Russia’s cyber strategy. Not all of these were picked up by the broader public debate in Western security circles, and only the more alarmist discourses had a visible impact beyond niche communities.
{"title":"Interpreting cyber-energy-security events: experts, social imaginaries, and policy discourses around the 2016 Ukraine blackout","authors":"Lars Gjesvik, Kacper Szulecki","doi":"10.1080/09662839.2022.2082838","DOIUrl":"https://doi.org/10.1080/09662839.2022.2082838","url":null,"abstract":"ABSTRACT The digitalisation of the energy system brings out the question of cyber threats. How this area is perceived and how cyber-security policy in the energy sector develops is driven by the most spectacular cyber-incidents. How do these events shape public perceptions about the dangers of digitalisation? To understand this, we look at the 2016 CrashOverride cyberattack on Ukraine’s grid. Hypothesising that cyber-energy security incidents are interpreted in the context of socio-technical imaginaries of the energy sector and security imaginaries linked to foreign policy, we distil four discourses that emerged around the Ukraine attack among Western experts and commentators. One represented it as evidence of an accelerating race towards disaster, another as merely a tip of the iceberg. The third portrayed it as less catastrophic than initially suggested, while the last one as part of Russia’s cyber strategy. Not all of these were picked up by the broader public debate in Western security circles, and only the more alarmist discourses had a visible impact beyond niche communities.","PeriodicalId":46331,"journal":{"name":"European Security","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48787154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}