Academia.eduAcademia.edu

SCO and Cybersecurity: Eastern Security Vision for Cyberspace

2018, International Relations and Diplomacy

International Relations and Diplomacy, October 2018, Vol. 6, No. 10, 549-555 doi: 10.17265/2328-2134/2018.10.003 D DAVID PUBLISHING SCO and Cybersecurity: Eastern Security Vision for Cyberspace Bruna Toso de Alcântara Federal University of Rio Grande do Sul, Rio Grande do Sul, Brazil Cyberspace is presenting not only new challenges for states but also new opportunities for power projection. Thus, analyzing how non-Western perspectives have been developed around this subject becomes relevant to understand some dynamics of contemporary international relations. In this way, in order to understand how China and Russia have been behaving in this area, the present paper seeks, through a constructivist approach based on the perspective of the regional complexes, to develop an exploratory research toward the existence of an Eastern regional strategic thinking to cybersecurity, materialized by the Shanghai Cooperation Organization (SCO). To achieve this objective, the paper will use the qualitative document analysis as a method, seeking not only to verify if such Eastern thought for cyberspace is cohesive within the organization, but also to explain what the implications for international society of this thought are. Keywords: Cyberspace, SCO, Security Introduction Established in 2001, and as an evolution of the Shanghai Five Group, the Shanghai Cooperation Organization (SCO) becomes a relevant institution in the Eastern scenario, as it establishes a link between Russia and China, not only with Central Asian countries (i.e., Kazakhstan, Kyrgyzstan, Uzbekistan, and Tajikistan) but also, and more recently, with South Asia, through the incorporation of India and Pakistan. Therefore, its relevance comes not only from its size, as it comprises about 40% of the world’s population and its economic weight, accounting for 20% of world GDP (Harada & Yamada, 2017), but also from its own constitution, which differs from other Western military alliances. This difference emerges since SCO: (1) goes beyond security issues; (2) embraces the cultural and political diversity of its members; (3) operates by consensus; and (4) originated from the necessity over the border and regional affairs management in the post-collapse of the Soviet Union (Bin, 2013). In this sense, being an organization that congregates independence and interdependence, it is natural that several international issues and threats are perceived in a proper way by the SCO. Moreover, given its geopolitical position, it involves nuclear powers and states with a great international projection into the power table. This ends up shaping much of the SCO orientations, especially towards security, including cyberspace. Cyberspace gains importance in this context once one considers that critical infrastructures 1, whether Bruna Toso de Alcântara, Ph.D. candidate in the Postgraduate Program in International Strategic Studies (PPGEEI), Economic Sciences Department, Federal University of Rio Grande do Sul (UFRGS), Rio Grande do Sul, Brazil. 1 The connection between physical and virtual means occurs through Industrial Control Systems, used in large-scale industrial processes, as is the case of processes that maintain critical infrastructures. In addition, Industrial Control System technologies are often employed in infrastructure industries “to allow a single control center to manage multiple sites” (Shea, 2004, p. 3). 550 SCO AND CYBERSECURITY: EASTERN SECURITY VISION FOR CYBERSPACE wired or not2, are attached to it. Thus, cyberspace has a direct impact on the flow of information and the maintenance of these infrastructures, being relevant within SCO scope when considering the energy and transport sectors that interconnect its members. In this way, thinking about cybersecurity and defense is a step towards both the security of national information and the maintenance of SCO itself in its physical or virtual media. In this sense, this paper seeks to develop an exploratory research toward the existence of an Eastern regional strategic thinking to cybersecurity, materialized by the SCO. To achieve this objective, the paper will use a constructive approach based on the perspective of the regional complexes (Buzan & Weaver, 2003). Additionally, it will use as a method, the qualitative document analysis, seeking not only to verify if such Eastern thought for cyberspace is cohesive within the organization but also to explain what implications for international society of this thought. Geopolitics of Central Asia and SCO Based on the assumptions that a region if formed beyond geographical boundaries―being constructed through interdependence and its interactive recognition both internally and externally (Algappa, 2003, p. 25) and that security matters come from speech acts, that is, the idea of threats arises through a social process of securitization―it is feasible to use the concept of Buzan and Waever (2003, p. 44) of Regional Security Complexes (RSC) in the area covered by the SCO: the Asian one. After all, an RSC is “a set of units whose major processes of securitisation, desecuritisation, or both are so interlinked that their security problems cannot reasonably be analysed or resolved apart from one another”. In addition, an RSC can be transformed and defined by two types of relationships: the balance of power which gives the tone of the polarity of the system and the pattern of friendship and enmity, generated by a mixture of history, politics, and material conditions (Buzan & Waever, 2003). In this sense, SCO encompasses both central and southern Asia with its effective members. However, in this paper, we will focus on the central region since it was part of the core of the Organization and its states participated in formal discussions on the cybersecurity in the mid-2000s. Thus, what is important to note in the Central Asian region is a balance of power among China, Russia, and the United States, where the patterns of friendship and enmity involves a former Soviet’s power space which, more recently, depends on Chinese material capabilities for its development and at the same time suffers from external security interferences from the United States. Roughly speaking, the SCO attracts the attention of Russia, China, and the United States given the energy importance of the central Asian region, as well as its natural representation as a bridge between the Middle East and the rest of Asia―facilitating, for example, the displacement of terrorists. Hence, on the one hand, there is a US oscillation towards the region, being more prominent after September 11 and recently, according to Bin (2003), more cooperative with the SCO which seems to give the tone of ideologies and strategic thoughts of the central countries towards the region. And on the other hand, there is an intern dynamic of the Organization materialized by a dual engine encompassing Russia with greater security responsibility and China with greater economic responsibility. On the Chinese side, the country’s influence on the Organization is growing in scope, extrapolating 2 Wired means refers to those based on fiber optics, telephone cables, and coaxial cables, as well as non-wired and satellite signals and signals that propagate through electromagnetic waves (Fernandes, 2015, p. 607, my translation). SCO AND CYBERSECURITY: EASTERN SECURITY VISION FOR CYBERSPACE 551 non-security issues and creating a slight Russian animosity in the sense of region control. According to Guang (2013, p. 26), the Chinese influence is projected in the: (1) formulation of theoretical guidelines; (2) the promotion of institutionalization; and (3) the financial support for large projects among the central Asian countries. This movement facilitates the pursuit of national interests for China, including the construction of a stable and secure region for the implementation, for example, of its One Belt One Road project (i.e., new Silk Road), while allowing the country’s conduct of a multilateral diplomacy and the development of political, cultural, security, and economic ties with Central Asia. These directives directly influence the heart of friendship or enmity links within the region. Russia, on its side, does not want to lose its historical influence zone, seeking to soften Chinese influence with initiatives, such as the Customs Union between Russia, Kazakhstan, and Belarus, and the maintenance of Moscow’s power over the Eurasian Economic Community (Bin, 2013, p. 49). In addition, the country seeks to maintain its integration plans within the Commonwealth of Independent States (CIS), and therefore, according to Danilovich (2013, p. 34), unlike China, it does not act unconditionally for the development of SCO, taking special care with the presence of other powers in the region. Thus, this same security mix of influences presents itself in the cyber sector, which in spite serving national objectives, becomes complementary for the construction of a coherent discourse in the area of cybersecurity within the SCO. Cybersecurity and China The notion of Chinese cybersecurity differs from the Western one by understanding not only the technical security of networks but also the very content of the Internet, so they prefer in their documents to use the concept of information security (信息安全) rather than cybersecurity. In this sense, according to Lindsay (2015, p. 11), the country has developed a legal and institutional framework more focused on building a censorship and surveillance infrastructure (i.e., the Great Firewall of China) than coordinating technical standards and enforcement mechanisms. In this way, they can better defend against imagined threats, such as terrorism, separatism, and extremism, rather than crime or cyber espionage. This defensive perception is replicated in the SCO, not only because it allows greater scope for combating the three evils, but also because it fits into the Chinese International Strategy for Cooperation in Cyberspace, of 2017. This strategy foresees as its main objectives: (1) safeguard sovereignty and security; (2) develop a system of international rules; (3) promote fair Internet governance; (4) protect legitimate rights and interests of citizens; (5) promote cooperation in the digital economy; (6) build a platform for cyberculture exchange (China, 2017). These objectives would be based on 04 principles (i.e., peace, sovereignty, shared governance, and shared benefits) which demonstrate a vision of inequality towards the West, especially the United States, regarding the control of flows of cyberspace (Mckune, 2015, p. 266). In addition, by allowing a defensive use for “imagined” threats, the country is able to enforce its principle of active defense in cyberspace. This allows greater guarantee of security of national infrastructures and networks, as the National Defense Strategy of 2006 states: 552 SCO AND CYBERSECURITY: EASTERN SECURITY VISION FOR CYBERSPACE China pursues a three-step development strategy in modernizing its national defense and armed forces, in accordance with the state’s overall plan to realize modernization. The first step is to lay a solid foundation by 2010, the second is to make major progress around 2020, and the third is to basically reach the strategic goal of building informationized armed forces and being capable of winning informationized wars by the mid-21st century. (China, 2006, Section II para 2) In this sense, it is possible to see Chinese influence in the SCO. The country is using it as a platform to achieve national goals, following a line of thought that merges security with development, and which is replicated within SCO strategies. This replication can be seen through the declaration of Xi Jinping in 2014―during the Group’s first meeting Central Security and Computerization of the Internet―when he mentions that “No internet safety means no national security. No informatization means that there is no modernization” (Panda, 2014, para 6). Cybersecurity and Russia In a similar way to China, Russia understands cybersecurity as information security. Moreover, Russia’s Information Security Doctrine (Доктрина информационной безопасности), created in 2000, is the most relevant document for the Central Asian region, as according to doctrine: The state’s interests in the information sphere consist of creating conditions for harmonious Russian information infrastructure development and for the exercise of the constitutional rights and freedoms of man and the citizen with respect to receiving and using information to ensure the inviolability of the constitutional system, the sovereignty and territorial integrity of Russia, and political, economic and social stability; the interests of the state also consist of the unconditional maintenance of law and order and in the promotion of equal and mutually advantageous international cooperation. (Rússia, 2000, Section I.1.para 5) In addition, in a 2013 document entitled “The Basic Principles of the Federative Republic of Russia in the field of Information Security for 2020”, there is a need for engagement with the area within the SCO, on a bilateral and multilateral basis of dialogues (Russia, 2013), including advancing the template of the agreement in the area of information security among members (Russia, 2013, p. 5). Objectives that, on the one hand, become tangible in Central Asia due to its dependency on the Russian digital infrastructure, as according to Maness and Valeriano (2015, p. 88), the majority of the Internet, the traffic that comes in and out of the country passes through the Federal Security Service (Federal’naya Sluzhba Bezopasnosti) or by the FSB. On the other hand, these objectives emerge against Chinese interconnection projects in the region. In this sense, what is observed is that Russia in general, while advocating multilateral dialogue in the cyber field, aims to maintain its security control over the region, reinforcing the idea of the Commonwealth of Independent States and the Security Treaty Organization (CSTO), not only in the basic principles document for 2020, but also in the National Security Strategy for 2020, when it is stated that: The development of bilateral and multilateral cooperation with the member states of the Commonwealth of Independent States is a priority direction of Russian foreign policy. Russia will seek to develop the potential for regional and subregional integration and coordination between the CIS Member States, first in the Commonwealth, as well as the CSTO and EvraZEs, which exert a stabilizing influence on the overall situation in the regions on the border with the CIS. (Russia, 2009, p. 5) Cybersecurity and SCO The SCO took its ideas of respect to sovereignty, non-interference in the internal affairs of states, equality and mutual respect in the fulfillment of international norms (without double standards) and the fight against the SCO AND CYBERSECURITY: EASTERN SECURITY VISION FOR CYBERSPACE 553 three evils (i.e., separatism, extremism, and terrorism) to the cyber realm. In fact, it is interesting that in line with Chinese and Russian security visions, the SCO proposes information security as equivalent to what Westerners call cybersecurity, embodied in the Agreement between the Governments of the Member States of the SCO on Cooperation in the Field of Guarantee of International Information Security, signed by China, Russia, Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan. The Agreement on the Information Security Area was created in 2009, following the repercussion of cyber attacks in Estonia (2007) and during the conflict in Georgia (2008). And, in its second article, it identifies the following threats: (1) the development and use of weapons of information and preparation to undertake information warfare; (2) information terrorism; (3) information crime; (4) use of dominant position in cyberspace to the detriment of interests and security of other states; (5) dissemination of information harmful to political systems; (6) natural and/or human threats to safe and stable operations of the global and national information infrastructure (SCO, 2009, p. 203). Thus, in addition to the ideas of the SCO embedded in these perceptions, a criticism is made of the Internet governance pattern centered in the United States, since the country has 10 of the 13 root name servers in the world (Pollpeter, 2015, p. 147). Definitions of war and information terrorism―in the annexes to the document―becomes very close to Sino-Russian visions, bearing at the same time the influence of a multilateral approach and mutual trust (SCO, 2009, p. 204). Also, there is the proposition of international engagement in the debates on cybersecurity/information infrastructure (SCO, 2009, p. 204). This international engagement can already be seen in two moments within the scope of the United Nations. The first was on September 12th , 2011, when four members of the SCO (i.e., China, Russia, Tajikistan, and Uzbekistan) presented a draft International Code of Conduct for Information Security to the United Nations General Assembly (i.e., A66/359), which was rejected. The second moment was in 2015 (i.e., A69/723), when six SCO members, presented a new draft of the code to the UN General Assembly, which was also rejected. This rejection was given based on a perception of excessive state control ideas for cyberspace. However, it is important to highlight that the document also offered an approach of equal rights within a new international law framework, suited (i.e., specific) for the cyber challenges, hence presenting an opposite view of the North Atlantic Treaty Organization (NATO) regarding international law, since NATO advocates for the use of the current developed international law framework, with minor adaptations―proposed in the Tallinn Manual made by the NATO Center for Excellence in Cybernetic Co-operation and Defense (CCDCOE). Final Considerations Information security is relevant to SCO members since practical implications in the physical world, especially in the energy and transport infrastructures that interconnect the region, are possible. Likewise, in light of the present paper, it can be said that although there is a clash between two powers in the Asian RSC, covered by the SCO, there is a cohesion of thought and similar international goals. In other words, there is a thought, at least in the hardcore of the Organization, which has a structured cybersecurity project. Moreover, it is worth emphasizing that there is a difference between the conception of cybersecurity and information security, and that information security is a proposal that seems to rebound the Soviet collective 554 SCO AND CYBERSECURITY: EASTERN SECURITY VISION FOR CYBERSPACE memory of the need for strong and centralized state control since it is up to the State to secure the content of cyberspace. Therefore, even if this fact could lead to a possible breach of international rights in relation to freedom of expression and privacy, it seems that in the eyes of the East this would be the best way to balance power in cyberspace. Finally, it is interesting to note that there is a clash of Sino-Russian influences on the Asian region reaching the cyber arena, but in a complementary way. Additionally, they go against the preponderance of the North American power projection in cyberspace at the same time the countries search for already consolidated organizations, such as The United Nations, to propose new models of international legislation in the digital field. References Algappa, M. (2003). Asian security order: Instrumental and normative features. Stanford: Stanford University Press. Bin. Y. (2013). The SCO ten years after in search of its own identity. In M. Fredholm (Ed.), The Shanghai Cooperation Organization and Eurasian geopolitics: New directions, perspectives, and challenges. Copenhagen: Nordic Institute of Asian Studies (NIAS). Buzan, B., & Waever, O. (2003). Regions and powers: The structure of international security. Cambridge: Cambridge University Press. China. (2006). China’s national defense in 2006. Retrieved from https://fas.org/nuke/guide/china/doctrine/wp2006.html#10 China. (2017). International strategy of cooperation on cyberspace. Retrieved July 10th, 2017, from http://www.xinhuanet.com/english/china/2017-03/01/c_136094371.htm Danilovich, M. V. (2013). Approaches to SCO: China and Russia. In A. A. Rozanov (Ed.), The Shanghai Cooperation Organisation and Central Asian’s security challenges (DCAF Regional Programmes Series No. 16). Geneva: Geneva Centre for Democratic Control of Armed Forces. Fernandes, J. H. C. (2015). The pernicious cybernetic trap and a proposal for national mobilization. In G. F. Gheller, S. L M. Gonzales, and L. P. Mello (Eds.), Amazonia and the South Atlantic: Challenges and prospects for defense in Brazil. Brasília: IPEA. Guang, P. (2013). The spirit of the Silk Road: The SCO and China’s relations with Central Asia. In M. Fredholm (Ed.), The Shanghai Cooperation Organization and Eurasian geopolitics: New directions, perspectives, and challenges. Copenhagen: Nordic Institute of Asian Studies (NIAS). Harada, I., & Yamada, G. (2017) The SCO welcomes rivals into its fold. Retrieved July 10th 2017 from: https://asia.nikkei.com/Economy/The-SCO-welcomes-rivals-into-its-fold2 Lindsay, J. R. (2015). China and cybersecurity: Controversy and context. In J. R. Linsay, T. M. Cheung, and D. Reveron (Eds.), China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford: Oxford University Press. Maness, R. C., & Valeriano, B. (2015). Russia’s coercive diplomacy: Energy, cyber, and maritime policy as new sources of power. New York: Palgrave Macmillan. Mckune, S. (2015). Foreign hostile forces: The human rights dimension of China’s cyber campaigns. In J. R. Linsay, T. M. Cheung, and D. Reveron (Eds.), China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford: Oxford University Press. Panda, A. (2014). Xi Jinping: China should become a ‘Cyber Power’. The Diplomat. Retrieved July 10th, 2018, from https://thediplomat.com/2014/03/xi-jinping-china-should-become-a-cyber-power/ Pollpeter, K. (2015). Chinese writings on cyberwarfare and coercion. In J. R. Linsay, T. M. Cheung, and D. Reveron (Eds.), China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford: Oxford University Press. Russia. (2000). Doctrine of information security of the Russian federation. Retrieved July 10th, 2018, from https://www.itu.int/en/ITU-/Cybersecurity/Documents/National_Strategies_Repository/Russia_2000.pdf Russia. (2009). National security strategy of the Russian federation to 2020. Retrieved July 10th, 2018, from http://mepoforum.sk/wp-content/uploads/2015/08/NDS-RF-2009-en.pdf Russia. (2013). Basic principles for state policy of the Russian federation in the field of international information security. Retrieved July 10th, 2018, from http://www.ccdcoe.org/sites/default/files/strategy/RU_state-policy.pdf SCO AND CYBERSECURITY: EASTERN SECURITY VISION FOR CYBERSPACE 555 Shanghai Cooperation Organization (SCO). (2009). Agreement between the governments of state members of the Shanghai Cooperation Organization on cooperation in the field of ensuring the international information security. Retrieved July 10th, 2018, from http://www.ccdcoe.org/sites/default/files/documents/SCO-090616-IISAgreement.pdf Shea, D. A. (2004). Critical infrastructure: Control systems and the terrorist threat. Retrieved July 10th, 2018, from https://fas.org/irp/crs/RL31534.pdf United Nations. (2011). International code of conduct for information security (A66/359). Retrieved July 4th, 2018, from https://undocs.org/A/66/359 United Nations. (2015). International code of conduct for information security (A69/723). Retrieved July 4th, 2018, from https://documents-dds-ny.un.org/doc/UNDOC/GEN/N15/014/02/PDF/N1501402.pdf?OpenElement