فصلنامه روابط خارجی

فصلنامه روابط خارجی

ژئوپلیتیک سایبری در گذرگاه قدرت: تحلیل هژمونی سایبری ایالات‌متحده آمریکا در تقابل با چین

نوع مقاله : مقاله پژوهشی

نویسندگان
1 استادیار روابط بین‌الملل، دانشگاه عالی دفاع ملی، تهران، ایران
2 دانشجوی دکتری امنیت ملی، دانشگاه عالی دفاع ملی، تهران، ایران
3 کارشناسی ارشد مطالعات منطقه‌ای (آمریکای شمالی)، دانشکده حقوق و علوم سیاسی، دانشگاه علامه طباطبایی، تهران، ایران
چکیده
ایالات‌متحده آمریکا برای مدت طولانی،نزدیک به دو دهه به‌عنوان اصلی‌ترین بازیگر در شکل‌دهی به هنجارهای حقوق بین‌الملل سایبری و چارچوب‌های حکمرانی جهانی بر فضای سایبر اقدام به کنشگری نموده است؛اما در سال‌های اخیر چین در مقام یکی از بازیگران کلیدی حوزه سایبری و فناوری،تغییرات چشم‌گیری در چشم‌انداز بین‌المللی به وجود آورده و در نتیجه،به نظر می‌رسد قدرت اثرگذاری آمریکا در این زمینه به چالش کشیده شده و گفتمان آمریکایی در حوزه حکمرانی بر فضای سایبری رو به افول گذاشته است.سوال اصلی پژوهش حاضر بررسی این موضوع است که کاهش قدرت کنشگری فعال ایالات متحده در نظام حقوق بین‌الملل،در تقابل با افزایش قدرت روزافزون چین، چه پیامدهایی برای ژئوپلیتیک سایبری جهانی و تغییر شیوه حکمرانی بر اینترنت خواهد داشت؟ در این راستا، تلاش داریم تا عواملی که در کاهش قدرت سایبری آمریکا، از جمله افت اعتماد و اعتبار، تغییرات سیاست‌ها و چالش‌های شکل‌گیری و اجرای هنجارها نقش دارند را بررسی کنیم. به همین منظور، از رویکرد توصیفی-تحلیلی برای بررسی افزایش قدرت چین در حقوق بین‌الملل سایبری با استفاده از تحلیل جامع توانمندی‌های سایبری رو به رشد این کشور، قاطعیت دیپلماتیک و رویکردهای جایگزین برای حکمرانی سایبری استفاده می‌شود. نتایج نشان می‌دهد که گسترش قابلیت‌های سایبری چین، از جمله جاسوسی سایبری، عملیات تهاجمی و پیشرفت‌های تکنولوژیک، این کشور را به یک رقیب سرسخت برای آمریکا تبدیل کرده است.قاطعیت دیپلماتیک نیز چین را قادر به کنشگری فعالانه در شکل‌دهی چارچوب‌های حکمرانی سایبری جهانی و دفاع از هنجارهای جایگزین مورد تأیید حزب کمونیست ساخته و با ایجاد هنجارهای جدید توانسته است تا اقدام به ارائه رویکرد استقلال ملی در چشم‌انداز حکمرانی سایبری بین‌المللی ‌نماید.
کلیدواژه‌ها

موضوعات


عنوان مقاله English

Cyber Geopolitics at the Crossroads of Power: An Analysis of US Cyber Hegemony in Confrontation with China

نویسندگان English

Mostafa Esmaili 1
amir abbas rokni 2
Seyed Reza Hosseini 3
1 Assistant Professor in International Relations, Supreme National Defense University, Tehran, Iran
2 Ph.D. student in National Security, Supreme National Defense University, Tehran, Iran
3 Master of Regional Studies (North America), Faculty of Law and Political Sciences, Allameh Tabataba'i University, Tehran, Iran
چکیده English

The United States of America has long been the primary actor in shaping international cyber law norms and global cyberspace governance frameworks, actively engaging in this domain for nearly two decades. However, China's emergence as a key player in the cyber and technology realm has significantly changed the international landscape in recent years. Consequently, America's influence in this sphere appears to be challenged, and its discourse on cyberspace governance is seemingly declining. This profound investigation seeks to elucidate the far-reaching repercussions of the United States' waning assertive power within the intricate tapestry of international law, juxtaposed against the meteoric rise of China's global influence, on the complicated dynamics of global cyber-geopolitics and the evolving paradigm of internet governance. Therefore, This research delves into the factors contributing to the erosion of US cyber power, including the decline of trust and credibility, policy shifts, and challenges in norm creation and enforcement. To this end, a descriptive-analytical approach examines China's growing influence in international cyber law. This entails a comprehensive analysis of its expanding cyber capabilities (espionage, offensive operations, technological advancements), diplomatic assertiveness in shaping global cyber governance frameworks and promoting alternative, state-centric norms aligned with the Communist Party's vision. Our analysis reveals that China's burgeoning cyber capabilities position it as a formidable competitor to the United States. Additionally, its diplomatic assertiveness enables China to advocate for alternative norms and establish itself as a proponent of national independence in cyberspace governance.

کلیدواژه‌ها English

cyber diplomacy
cyber governance
international norms
United States of America
China
  • ارغوانی پیرسلامی، فریبرز؛ علی پور، حسین (1402). انتقال نهادی قدرت در نظم بین‌المللی: فرصت‌ها و چالش‌های بانک سرمایه‌گذاری زیرساخت آسیا برای چین. فصلنامه روابط خارجی، 15(4)، صص.1-34 . doi: 10.22034/fr.2024.403607.1403
  • زاهدی خطیر، الهام؛ صالحی، مختار (1401). روند پژوهی تداوم جنگ تجاری آمریکا علیه چین (2018-2022). فصلنامه روابط خارجی، 14(3)، صص. 133-162.

                                                                  doi: 10.22034/fr.2022.165684.

  • قلخانباز، خلیل؛ یزدانی، عنایت‌الله؛ ابراهیمی، شهروز (1402). رقابت استراتژیک آمریکا و چین و تأثیر آن بر سیاست هندو- پاسیفیک ایالات‌متحده: درس آموخته‌های راهبردی جمهوری اسلامی ایران. فصلنامه روابط خارجی، 15(3) ، صص 28-56. doi:10.22034/fr.2024.428449.1468                                

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

  • Allahrakha, N. (2023). Balancing Cyber-security and Privacy: Legal and Ethical Considerations in the Digital Age. Legal Issues in the Digital Age, 4(2), 78–121. doi:DOI:10.17323/2713-2749.2023.2.78.12
  • Attatfa, A., Renaud, K., & Paoli, S. D. (2020). Cyber Diplomacy: A Systematic Literature Review. Procedia Computer Science, 176, 60–69. Retrieved from https://doi.org/10.1016/j.procs.2020.08.007
  • Bowden, C. (2013). The US surveillance programmes and their impact on EU citizens' fundamental rights. Brussel: DIRECTORATE GENERAL FOR INTERNAL POLICIES European Parliament. Retrieved from https://www.europarl.europa.eu/RegData/etudes/note/join/2013/474405/IPOL-LIBE_NT(2013)474405_EN.pdf
  • Can the Digital Economy Survive in a Splinternet. (n.d.). Retrieved from The Centre for International Governance Innovation: https://www.cigionline.org/newsletters/can-digital-economy-survive-splinternet/
  • Carr, M. (2016). Crossed Wires: International Cooperation on Cyber Security. Interstate - Journal of International Affairs. Retrieved from https://discovery.ucl.ac.uk/id/eprint/10056277/3/Carr_InterState_Dec2015.pdf
  • Chen, X., & Yang, Y. (2022). Contesting Western and Non-Western Approaches to Global Cyber Governance beyond Westlessness. The International Spectator, 57, 1 - 14. Retrieved from https://www.tandfonline.com/doi/full/10.1080/03932729.2022.2101231
  • Creemers, R. (2021). China’s Emerging Data Protection Framework. Leiden Institute for Area Studies, 4. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3964684
  • Creemers, R. (2022). China’s emerging data protection framework. Journal of Cybersecurity, 8(1). Retrieved from https://doi.org/10.1093/cybsec/tyac011
  • Ettinger, A. (2018). Trump’s National Security Strategy: “America First” meets the establishment. International Journal, 73(3), 474-483. Retrieved from https://doi.org/10.1177/0020702018790274
  • Fedoniuk, S., & Maghdysiuk, S. (2022). US-China Confrontation in Cyber Security. Історико-Політичні Проблеми Сучасного Світу, 45, 113–127. Retrieved from https://doi.org/10.31861/mhpi2022.45.113-127
  • Gao, X. (2022). An Attractive Alternative? China’s Approach to Cyber Governance and Its Implications for the Western Model. The International Spectator, 57(3), 15–30. Retrieved from https://doi.org/10.1080/03932729.2022.2074710
  • Global Free Flow of Information on the Internet. (2010). Retrieved from Federal Register: https://www.federalregister.gov/documents/2010/09/29/2010-24385/global-free-flow-of-information-on-the-internet
  • Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Henry Holt and Company.
  • Hameed, F., Agrafiotis, I., Weisser, C., Goldsmith, M., & Creese, S. (2018). Analysing trends and success factors of international cybersecurity capacity−building initiatives. Department of Computer Science University of Oxford. Retrieved from https://ora.ox.ac.uk/objects/uuid:50e9c5aa-4f3d-40f0-a0a0-ff538b735291/files/mf1ff1854d7b0d2cf2a244539752a2274
  • Harnisch, S., & Zettl-Schabath, K. (2022). Secrecy and Norm Emergence in Cyber-Space. The US, China and Russia Interaction and the Governance of Cyber-Espionage. Democracy and Security, 19, 82-110. Retrieved from https://www.tandfonline.com/doi/full/10.1080/17419166.2022.2097074
  • Hoffmann, S., Lazanski, D., & Taylor, E. (2020). Standardising the splinternet: how China’s technical standards could fragment the internet. Journal of Cyber Policy, 5, 1-26. Retrieved from Retrieved from: https://www.researchgate.net/publication/343978312_Standardising_the_splinternet_how_China's_technical_standards_could_fragment_the_internet
  • Hong, Y., & Goodnight, G. T. (2019). How to think about cyber sovereignty: the case of China. Chinese Journal of Communication, 13(1), 8–26. Retrieved from https://doi.org/10.1080/17544750.2019.1687536
  • Jinghua, L. (2019). What Are China’s Cyber Capabilities and Intentions? Retrieved from Carnegie Endowment for International Peace: https://carnegieendowment.org/2019/04/01/what-are-china-s-cyber-capabilities-and-intentions-pub-78734
  • (2023). Joint Statement on the United States-European Union 9th Cyber Dialogue in Brussels - United States Department of State. United States Department of State. Retrieved from https://www.state.gov/joint-statement-on-the-united-states-european-union-9th-cyber-dialogue-in-brussels/
  • Kalen, S., & Howard, W. S. (2016). Reclaiming Accountability: Transparency, Executive Power, and the U.S. Constitution. By Heidi Kitrosser. Chicago: University of Chicago Press, 2015. Pp. 283. ISBN: 978-0-226-19163-8. International Journal of Legal Information, 44(1), 62–65. Retrieved from https://www.cambridge.org/core/journals/international-journal-of-legal-information/article/abs/reclaiming-accountability-transparency-executive-power-and-the-us-constitution-by-heidi-kitrosser-chicago-university-of-chicago-press-2015-pp-283-isbn-978022619
  • Larkin, T. (2022). How China Is Rewriting the Norms of Human Rights. Retrieved from Lawfare: https://www.lawfaremedia.org/article/how-china-rewriting-norms-human-rights
  • Lee, J. (2022). Cyberspace Governance in China, Evolution, Features and Future Trends, ASIE. VISIONS, 129. Retrieved from Retrieved from: https://www.ifri.org/sites/default/files/atoms/files/lee_cyberspace_governance_china_2022.pdf
  • Liaropoulos, A. N. (2017). Cyberspace Governance and State Sovereignty. Democracy and an Open-Economy World Order, 25–35. Retrieved from https://doi.org/10.1007/978-3-319-52168-8_2
  • Lostri, E., Lewis, J. A., & Wood, G. (2022). A Shared Responsibility: Public-Private Cooperation for Cybersecurity. Retrieved from Center for Strategic and International Studies: https://www.csis.org/analysis/shared-responsibility-public-private-cooperation-cybersecurity
  • M Salem Abu Alead, R., & AMHMED AB ALTALIBE, A. (2023). Attribution Challenges in the Era of Cyber Warfare: Unraveling the Identity of Cyber-Attackers. 3(16), 5309-5287. Retrieved from https://doi.org/10.21608/hiss.2023.337323
  • McTague, T. &. (2020, October 29). HOW ‘AMERICA FIRST’ BECAME AMERICA ALONE. Retrieved from The Atlantic: https://www.theatlantic.com/international/archive/2020/10/donald-trump-foreign-policy-america-first/616872/
  • Pijovic, N. (2021). The Cyberspace ‘Great Game’. The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms. 2021 13th International Conference on Cyber Conflict (CyCon), (pp. 215-231). Tallinn, Estonia. doi:doi: 10.23919/CyCon51939.2021.9468296.
  • Piper, A. (n.d.). Digital surveillance’s threat to human rights. Retrieved from International Bar Association: https://www.ibanet.org/article/CEE365AB-CC04-4E2C-91F6-D5F4D353A0A0
  • Runde, D. F., & Ramanujam, S. R. (2022). Digital Governance: It Is Time for the United States to Lead Again. Retrieved from Center for Strategic and International Studies: https://www.csis.org/analysis/digital-governance-it-time-united-states-lead-again
  • Savaş, S., & Karataş, S. (2022). Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. International Cybersecurity Law Review, 3(1), 7–34. Retrieved from https://doi.org/10.1365/s43439-021-00045-4
  • Schulte, G. L., & Schaffer, A. M. (2012). Enhancing Security by Promoting Responsible Behavior in Space. Strategic Studies Quarterly, 6(1), 9–17. Retrieved from http://www.jstor.org/stable/26270787
  • Segal, A. (2020). China’s Alternative Cyber Governance Regime: Hearing on A ‘China Model?’ Beijing’s Promotion of Alternative Global Norms and Standards. Retrieved from Council on Foreign Relations: https://www.uscc.gov/sites/default/files/testimonies/March%2013%20Hearing_Panel%203_Adam%20Segal%20CFR.pdf
  • Segal, A. (2022, July 12). A New U.S. Foreign Policy for Cyberspace. Retrieved from Council on Foreign Relations: https://www.cfr.org/blog/new-us-foreign-policy-cyberspace
  • Sherman, J. &. (2022). The US must broaden its internet strategy beyond China. Retrieved from Brookings: https://www.brookings.edu/articles/the-us-must-broaden-its-internet-strategy-beyond-china/
  • Studies, C. A. (2019). International Cyberspace Governance. In: Chinese Academy of Cyberspace Studies. In P. Ping, World Internet Development Report 2017 (pp. 235–266). Berlin: Springer.
  • Sullivan, J., & Wang, W. (2022). China’s “Wolf Warrior Diplomacy”: The Interaction of Formal Diplomacy and Cyber-Nationalism. Journal of Current Chinese Affairs, 52(1), 68–88. Retrieved from https://doi.org/10.1177/18681026221079841
  • Telefónica. (2023). History of the Internet: how did it come into being and how has it evolved. Retrieved from Telefónica: https://www.telefonica.com/en/communication-room/blog/history-internet-how-come-being-how-evolved/
  • Tung, R. L., Zander, I., & Fang, T. (2023). The Tech Cold War, the multipolarization of the world economy, and IB research. International Business Review, 32(6). Retrieved from https://www.sciencedirect.com/science/article/pii/S0969593123000951
  • Zinovieva, E. S. (2022). Cyber Diplomacy under Increased Competition Between the Great Powers. MGIMO Review of International Relations, 1–21. Retrieved from https://doi.org/10.24833/2071-8160-2022-olf5