169 163
170 164
171 165
172 166
173 167
174 168
175 169
176 170
177 171
178 172
179 173
180 174
181 175
182 176
183 177
184 178
185 179
186 180
187 181
188 182
189 183
190 184
191 185
192 186
193 187
194 188
195 189
196 190
197 191
198 192
199 193
200 194
201 195
202 196
203 197
204 199
205 201
206 202
207 203
208 205
209 206
210 207
211 208
212 209
213 210
214 211
215 212
216 213
217 214
218 215
219 216
Cybersecurity Set
coordinated by
Daniel Ventre
Volume 2
Conflicts, Crimes and Regulations in Cyberspace
Edited by
Sébastien-Yves Laurent
First published 2021 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:
ISTE Ltd
27-37 St George’s Road
London SW19 4EU
UK
John Wiley & Sons, Inc.
111 River Street
Hoboken, NJ 07030
USA
© ISTE Ltd 2021
The rights of Sébastien-Yves Laurent to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988.
Library of Congress Control Number: 2021945731
British Library Cataloguing-in-Publication Data
A CIP record for this book is available from the British Library
ISBN 978-1-78630-686-9
Introduction
Studying Cyberspace Internationally
Why is it necessary to perceive cyberspace from a reflexive point of view? Since it is not a natural or social reality, but a shared system built over time by a multitude of actors, its hybrid nature – it possesses both a technological and a social aspect – does not enable us to use the usual benchmarks that social sciences use to study the social world. Moreover, cyberspace actors are talkative and doctrinaire and produce a host of fairly new strategic concepts (often of little value) that obscure the understanding of the situation1. The effort to be reflexive seems all the more necessary. Understanding cyber therefore presumes an approach that takes into account its social and technological dimensions, as well as an ability to distance oneself from the various discourses of the actors, both indispensable conditions in order to make it an authentic object of study. The challenge of this book is specifically to try to contribute to this essential reflection, which is still in its infancy2, and so we must therefore state for the reader the choices and perspectives that guide it.
The nine chapters of this volume provide a global and, therefore, original dimension of cyberspace. Indeed, it seemed to us to be beneficial to not limit its content, as is sometimes the case, to an irenic vision that only values the collaborative dimension or, conversely, to a cynical vision that reduces cyberspace to a conflictual space. In the spirit of our global perspective, we chose the title Conflicts, Crimes and Regulations in Cyberspace. This book is not directly part of the endless debate between the advocates of cyberwar (Calvo 2014) and those who reject this posture (Gartzke 2013). We note that there are confrontations in cyberspace, involving civilian and military actors, toward various ends that are not always short term. Today, the state of our knowledge strongly exceeds the apocalyptic prognoses of the 1990s and 2000s and this allows us to relativize the quantity and scope of confrontations between state actors, most of which are related to data theft activities, that is espionage (Valeriano and Maness 2018). Thus, we have chosen to describe them as “crimes” or “conflicts” in order to deliberately avoid the term “war”3, which seems excessive to us and immediately produces a securitization effect.
The 10 authors, whom we thank warmly4