Internet, Cybercrime, And Politics – Analysis
Future war “may see attacks via computer viruses, worms, logic bombs, and trojan horses rather than bullets, bombs, and missiles” -- Steven Metz, Armed Conflict in the 21stCentury: The Information Revolution and Post-Modern Warfare, Carlisle, PA: Strategic Studies Institute, 2000, xiii.
The facilities of the Internet in politics
The Internet or the WWW (World Wide Web) became massively widespread around the globe in the late 1980s, or more precisely since 1989, the same year when the Berlin Wall collapsed and, therefore, enabled the Cold War 1.0 to enter the final stage of its end. That is why both of these historical events mark the start of the Turbo-Globalization Era in all spheres, from economy to culture, including politics as well. (1) With the growing importance of the Internet, it is quite understandable that it is becoming an arena of political and ideological rivalry with necessary growing implications concerning national security issues. (2)
The spread of mass media via the Internet, followed by communications within the framework of cyber-space (3) enables ever more people, even in remote corners of the globe, to be informed (or misinformed) about world affairs, form (or to accept) opinions about certain events, and to be involved in politics in ways that some 35 years ago would have been unimaginable. Today, even poor peasants in many parts of the world have access to the Internet, which provides information and gives both government and anti-government groups a new way to struggle for their ideas, ideologies, and programs in order to indoctrinate the public.
The Internet already become the focal instrument of all in facilitating the exchange of different viewpoints, dissemination of information, fake news or propaganda, movement of electronic money, and finally the coordination of activities for the obvious reason that it is inexpensive and easily accessible. Bloggers with their weblogs are influencing the masses of people across the globe by transmitting both information and disinformation and opinion on the Internet. (4) After the end of Cold War 1.0, a new Cold War 2.0 started, in which the Great Powers started to adopt smart weapons to fight conventional wars, weapons that utilize new information and communication technologies like the Internet or cyberspace. A new type of warfare emerged – cyber-war. (5)
What concerns politics, the focal impact of the Internet can be summarized into four basic points:
- The real technical possibility of the Internet is to increase and improve the transparency of the Government by free access to online content, official documents, and all kinds of Governmental reports and viewpoints on different issues and problems.
- The ability of the Internet to increase the politically relevant set of information, including both factual and hoaxes.
- It has the power to organize and speed up the coordination of different interest groups, extremist groups, and the so-called civil society beyond what was known before as traditional political areas and barriers.
- The creation of new forms of criminal activities, known as cybercrime, cyber-terrorism, or cybersecurity problems.
Regarding the first point of the possibility to increase transparency, Governments, NGOs, and different institutions in global governance (like the UN) have created millions of web pages for the purpose of offering political information as official reports, viewpoints, comments, contact forums, or strategy rationalizations. Many governments established increasing targets for the maximum proportion of their communication with citizens via the Internet.
Nevertheless, if we are speaking about information flows, the Internet is offering, for sure, a cheap and easy platform for many types of populist movements, parties, or organizations seeking to indoctrinate and attract a possible voting audience at the elections. (6) One such very successful example, as a matter of illustration, was by the US Democrats in the presidential election of Barack Obama in 2008.
The facility of the Internet allows for greater communication of identity politics, like, for instance, those witnessed during the British referendum to leave the EU – Brexit. (7) However, another facility that the Internet offers in practice is the spreading of propaganda (8) by extremist persons or organizations for different purposes. One of the most blatant examples of misusing Internet facilities for the very political and/or ideological purposes is used by different radical groups for recruitment strategies.
The Internet in general and social media in particular provide powerful platforms for the greater dissemination of so-called fake news. Such news is a form of uncorroborated media is popularized by many online views generated, rather than from traditional forms of independent channels of verification. Concerning the former, many experts would argue that both the promotion of fake news and targeted viewer profiling on the Internet (particularly on Twitter) tremendously contributed to the election of Donald Trump for US President in November 2016.
One of the crucial power features of cyberspace is that it poses real challenges to Governments as the Internet facilitates mobilization and coordination by professionals, freedom fighters, insurgents, criminals, and terrorists of all kinds. A good example of the use of the Internet against authoritarian regimes is the case of WikiLeaks in April 2010, when a video that showed a US helicopter in Baghdad killing a dozen Iraqis, including two journalists, appeared on the net.
Cybercrime
Cybercrime, in essence, refers to traditional types of crimes that have migrated to cyberspace (the Internet), such as money laundering or sexual exploitation. However, cybercrime also includes internet-specific criminal activities like illegal access to electronic information, trade, national or political secrets, and finally the creation and spread of dangerous computer viruses, which can impose political or national-security harmfulness.
Cyber-crime committed by individuals or state-sponsored cyber-attacks undoubtedly poses serious threats to the international community in general or a particular part of it, for the very reason that they are in principle designed to degrade, deny, or even destroy information stored in computers or to compromise computers themselves. Such activities of cyber-attacks or cyber-terrorism are committed with the ultimate task of inflicting disruption, destruction, or human loss.
Cyber-crime can be a foremost threat to individuals, industry, or/and/or political organizations as well. However, in political terms, cybercrime can question the proper function of the state and its political system if the latter persistently fails to control such criminal activity or if it suffers breakdowns in cybersecurity.
One of the very specific types of cybercrime is cyber-terrorism. It basically refers to the (mis)use of Internet facilities by different organizations to promote terrorist propaganda and activities. Terrorist groups can use the Internet as a domain to commit cyber-attacks by, for example, targeting networks or computers that belong to the Governmental, public, or military infrastructures. The most notorious up to now cyber-program used in cyber-crimes is the so-called Trojan horse – a program in which a code is contained inside a program or data so that it can take control of a computer for the sake of damaging it. However, an additional danger can be posed by computer trap doors or back doors – deliberate holes in computer programs that are used to gain unauthorized access to a computer or a computer network for the reasons of spying and/or destroying the computer system. (9)
However, the Internet can be (mis)used to perpetrate acts of terror that produce physical or mental damage, but in extreme cases, cyber-terrorists can incur individual criminal responsibility under international criminal law where their conduct is understood as supporting war crimes, aggression, crimes against humanity, or genocide. In war terminology, cyber-war is the use of a system of information for the purpose of exploiting, disrupting, or destroying an enemy’s military or civilian computer networks with the ultimate aim of disrupting those systems and the tasks they perform. (10)Cyber-war is war in cyberspace, which is already a new fifth military domain after land, sea, air, and space.
The legal measures against cybercrime
During the last two decades, cyber-crime of all types has been increasingly understood to be war-like attacks on states and their infrastructure and, therefore, are regulated mostly by the international legal framework relating to the use of force or, in the case committed at the time of war (armed conflict), by international humanitarian law.
All countries, or groups of countries, which are considered to belong to the Great Powers’ bloc, implemented certain legal and practical measures to counter the cyber-crime on their authorized territory. One of the examples is the Council of Europe, which adopted the Convention on Cyber-crime in 2001 and 2004, which established a common criminal policy among the Member States by both adopting an appropriate legislative framework and encouraging transnational cooperation on the global level in the practice of beating cybercrime in all spheres, including politics as well. If we can speak in more precise legal terms, according to the legal framework of the European Council concerning beating cybercrime, the Member States should criminalize illegal access and illegal interference, and at the same time, the Member States should cooperate by all possible legal and practical means in their examination and prosecution policies. (11)
It is a clear decision by the UN that such cyber-activities are undermining the global or regional peace process and security, and, therefore, the organization called all its Member States to prohibit incitement to commit terrorism, take as many active measures for the prevention of incitement, and deny a safe place to persons or groups of persons who are guilty of incitement. Nevertheless, any kind of adopted cybersecurity measure must comply with the protection of international standards of human rights, like the freedom of speech and association, or the right to privacy.
As a matter of fact, within the legal framework of international agreements aimed at the suppression of terrorism in general, and more particularly on the Internet, states are subject to many international legal obligations that require their struggle against cyber-terrorism within the Internet space that is controlled by them. It is, for instance, the case of the UNSC, which adopted several resolutions by which all the UN Member States are required to act against terrorist activities within their borders, including cyber-terrorism too.
- Personal disclaimer: The author writes for this publication in a private capacity which is unrepresentative of anyone or any organization except for his own personal views. Nothing written by the author should ever be conflated with the editorial views or official positions of any other media outlet or institution. The author of the text does not have any moral, political, scientific, material, or legal responsibility for the views expressed in the article.
Endnotes:
- Michael Meyer, The Year that Changed the World: The Untold Story Behind the Fall of the Berlin Wall, New York: Scribner, 2009; Brian McCullough, How the Internet happened: From Netscape to the iPhone, New York−London: Liveright Publishing Corporation, 2018.
- See more in [John Erikkson, Giampiero Giacomello, “The Information Revolution, Security, and International Relations: (IR) Relevant Theory?”, International Political Science Review, 27/3, 2006, 221−224].
- Cyber-space is “electronic medium of computer networks in which online communication takes place” [Richard W. Mansbach, Kirsten L. Taylor, Introduction to Global Politics, Second Edition, London−New York: Routledge Taylor & Francis Group, 2012, 575].
- Daniel W. Drezner, Henry Farrell, “Web of Influence”, Foreign Policy, 145, 2004, 32−40.
- About cyber-war, see more in [Richard A. Clarke, Robert Knake, Cyber War, New York: HarperCollins, 2010]. This book is giving a picture of cyber-war and its capabilities which afford potential enemies.
- See, for instance [Pipa Norris, Ronald Inglehart, Cultural Backlash: Trump, Brexit, and Authoritarian Populism, Cambridge, UK: Cambridge University Press, 2019].
- Brexit is abbreviated term by the British, meaning literary shorthand for the British leaving of the European Union. The Brexit refers to the debates in the direct connections with June 23rd, 2016 referendum for the UK to exit the EU. The Brexit referendum became a debate between two camps in the UK – those for the British leaving the EU vs. those for the British standing in the EU. About the Brexit issue, see more in [Harold D. Clarke, Matthew Goodwin, Paul Whiteley, Brexit: Why Britain Voted to Leave the European Union, Cambridge, UK: Cambridge University Press, 2017].
- The term propaganda is historically originating in an office of the Roman Catholic Church in the Vatican charged with the propagation of the (Roman Catholic) faith – de propaganda fide. The term propaganda entered common usage in the 1930s in order to describe at that time the authoritarian regimes to achieve total subordination of knowledge to the policy of the state. Based on the politics of different kinds of authoritarian and totalitarian political regimes in Europe to develop legitimacy and social control by the centralized governmental institutions, propaganda soon came to be directed toward the populations of other states (usually the neighbours), provoking reactions from the other states. Therefore, for instance, the UK established the Ministry of Information. Such ministries employed print, radio, film, graphic art, and the oral word in order to justify the official policy of their Governments (the White Propaganda) but at the same time to beat the enemy’s propaganda (the Black Propaganda). Propaganda was quite important in the international relations during the Cold War 1.0 especially via radio stations like Radio Free Europe or Voice of America which have been propagating the official values of the Western political liberal democracy and market economy. Today, the Western political propaganda either via the Internet or other technical means is mainly directed against Russia and China in the forms of (extreme) Russophobia and Sinophobia. See more about propaganda in [Jason Stanley, How Propaganda Works, Princeton, US−Oxford, UK: Princeton University Press, 2015].
- See in more detail in [Jonathan Kirshner (ed.), Globalization and National Security, New York: Routledge, 2006].
- Richard W. Mansbach, Kirsten L. Taylor, Introduction to Global Politics, Second Edition, London−New York: Routledge Taylor & Francis Group, 2012, 575.
- See more in [Robert W. Taylor, et al, Cyber Crime and Cyber Terrorism, Pearson, 2018].