Democracy, Gender Equality, and Gender Security Ted Piccone
Total Page:16
File Type:pdf, Size:1020Kb
Democracy,Democracy gender and cybersecurity equality, and gender security TED PICCONE* SEPTEMBER 2017 TedPOLICY Piccone BRIEF SEPTEMBER 2017 Summary The growing challenges democracies face in managing the complex dimen- sions of cybersecurity have become a defining domestic and foreign policy issue with direct implications for human rights and the democratic health of nations. The progressive digitization of nearly all facets of society and the inherent transborder nature of the internet raise a host of difficult problems when public and private information online is subject to manipulation, hack- About the Project This policy brief is part of a series ing, and theft. of papers on democracy, security, and violent extremism prepared for the Community of Democ- This policy brief addresses cybersecurity as it relates to three distinct subtop- racies’ Democracy and Security ics: democratic elections, human rights, and internet governance. In all three Dialogue. The project seeks to foster greater collaboration areas, governments and the private sector are struggling to keep up with the among democratic governments, positive and negative aspects of the rapid diffusion of digital technology. To donors, civil society and academ- address these challenges, democratic governments, in partnership with civil ics to improve security outcomes and create a more conducive en- society and media and technology companies, should urgently lead the way vironment for the strengthening toward devising and implementing best practices for strengthening free and of democracy around the world. For more on the project and relat- fair electoral processes, defending human rights online, and protecting inter- ed materials, including the final net governance from restrictive lowest common denominator approaches. report, visit www.brookings.edu/ democracy-security-dialogue. * This brief was written with invaluable assistance from Hannah Bagdasar, Carlos Castillo, Jesse Kornbluth, and Mat- thew Koo, with expert feedback from Tarun Chhabra (Brookings Institution), Eileen Chamberlain Donahoe (Stan- ford University), Steven Feldstein (Boise State University), Patrick Merloe (National Democratic Institute), Harold Trinkunas (Stanford University), and researchers at the Institute for Security Studies, as well as members of the Community of Democracies Governing Council and its Civil Society Pillar. Brookings is committed to quality, inde- pendence, and impact in all of its work. Activities supported by its donors reflect this commitment and the analysis and recommendations are solely determined by the scholar. Support for this publication was generously provided through the Permanent Secretariat of the Community of Democracies. What the evidence tells us: both a direct and indirect threat to the integrity of the democratic process as they are often motivated by an in- Democratic elections tention to undermine popular support for democracies, Cyberattacks from authoritarian governments and non- their legitimacy, and their soft power.6 state actors pose a clear and increasing threat to democ- racies across the world through their interference in free Manipulation of information sources for political discourse and fair elections. These attacks take many forms and and decisionmaking is particularly insidious and difficult to can undermine and destabilize democratic processes combat. Distinctive characteristics of contemporary forms and governance in numerous ways. of Russian propaganda, which can feature high-volume content delivered quickly through both social and tradi- There are at least four ways in which cyberattacks can in- tional media, continuously and repeatedly with little com- fluence elections: (1) manipulating facts and opinions that mitment to objective reality or consistency, can be difficult inform how citizens vote, (2) interfering with the act of for independent media and governments to counter.7 Non- voting (e.g., tampering with voter registration rolls), (3) state actors from the radical right and the radical left, and changing the vote results, and (4) undermining confidence those engaged in terrorism, are exploiting the open nature in the integrity of the vote.1 These threats have emanated of the internet for multiple purposes, including influencing from countries like Russia and China, and in the past few public opinion before and during elections.8 years, targeted nations across the democratic West. For example, the Netherlands’ General Intelligence and Se- Human rights curity Service specifically named Russia, China, and Iran The internet can be a tool for both protecting and violat- as national security threats due to cyberattacks.2 The U.S. ing human rights, with direct implications for individu- Federal Bureau of Investigation (FBI) and Department of als’ cyber and physical security. The diffusion of digital Homeland Security (DHS) released multiple statements technology has vastly expanded citizens’ opportunities in 2016 detailing Russia’s ties to recent attacks and leaks to exercise their rights to freedom of expression and as- with the intent to influence U.S. elections.3 In May 2017, sociation, to participate in civic life, and to hold public French President Emmanuel Macron accused the Russian officials accountable. Recent technological advances also official media of disseminating deceitful propaganda and have helped shed light on human rights abuses committed fake news with the intention of influencing the election across the world. Victims’ groups now post, livestream, results in favor of his opponent. and crowdsource videos and photos of abuses on YouTube and other platforms, in hopes they eventually may be used These attacks were preceded in 2007 by Russian inter- as evidence in accountability proceedings. Human rights ference, for example, in Estonia’s government, political investigators used satellite imagery to expose abuses in parties, and banks in a cyberattack that inhibited inter- North Korean political prisons and potential mass graves net usage for two weeks.4 Similar attacks are becoming in Burundi that otherwise could have gone undiscovered.9 increasingly frequent, with more hackings of public and private enterprises; the disruption of internet commu- Recent years, however, have also seen an ongoing dete- nications of the lower house of the German parliament; rioration of human rights online, despite clear declara- and the spread of disinformation campaigns and false tions from the United Nations General Assembly and news before the Dutch referendum on Ukraine, the Ital- the Human Rights Council that offline rights established ian constitutional referendum, and the U.S. presidential under international human rights law also are protected election, all in 2016 alone.5 Cyberattacks can serve as online.10 Everyone is entitled to the same rights online Democracy and cybersecurity 2 that they have off the internet, such as to privacy, and Not only do internet shutdowns impair national security from mass surveillance and unlawful attacks.11 Interna- through the suppression of free speech, they also can cause tional law essentially guarantees the same rights to pri- panic and raise public health concerns. By cutting access vacy and security of one’s online data as they would to to crucial communication tools, emergency services, and the files in their home.For example, mass internet sur- reliable public safety information, shutdowns endanger the veillance, practiced even in established democracies, is a physical safety of citizens.18 Such breaches also undermine direct breach of the security of an individual’s personal the international rules-based system for internet gover- data, as is vague legislation with significant discretionary nance, and encourage state competition in developing in- authority to monitor one’s digital life.12 Internet service trusive legal codes and offensive cyber capabilities. Lastly, providers and telecommunications companies are falling it is important to point out that deteriorating online rights dramatically behind in offering consumers hardware and are not only a tactic of authoritarian regimes, but of demo- software products that adequately protect them from a cratic governments as well. The lack of effective regulatory multitude of cyberattacks.13 The rise in the availability of or oversight mechanisms of private companies’ role in pro- licit and illicit trade of sophisticated cyber weapons and tecting citizens’ data is another element of the dilemma. surveillance tools is facilitating these kinds of attacks, as seen in the worldwide “WannaCry” attacks of 2017. Despite these cyber threats to human rights, some coun- tries have been on the forefront of adopting laws and codes Malicious exploitation of technology also can affect the of conduct to protect their citizens’ online rights. In Brazil, physical security of individuals and of states. For starters, the 2014 Marco Civil da Internet law “guarantees the right the increased digitization of the past two decades has cre- to free expression, protects users’ privacy, precludes liabili- ated a “chilling effect” on free speech, where citizens in cer- ty for web content generated by third parties, and preserves tain countries feel less safe to assert their opinions, know- Internet neutrality.”19 Also in 2014, the Tallinn Agenda for ing that their personal data are monitored or archived.14 Freedom Online was established, in which the members Through location tracking, social media, and internet shut- of the Freedom Online Coalition, including