The prospect of a total block on Russia’s most popular messaging app has sparked disagreement between the regime’s political managers and its security agencies.
Andrey Pertsev
{
"authors": [
"Tim Maurer"
],
"type": "other",
"centerAffiliationAll": "dc",
"centers": [
"Carnegie Endowment for International Peace"
],
"collections": [
"Cyber and Digital Policy"
],
"englishNewsletterAll": "ctw",
"nonEnglishNewsletterAll": "",
"primaryCenter": "Carnegie Endowment for International Peace",
"programAffiliation": "NPP",
"programs": [
"Nuclear Policy",
"Technology and International Affairs"
],
"projects": [],
"regions": [
"Iran"
],
"topics": [
"Foreign Policy",
"Technology"
]
}Source: Getty
States use proxies to project power through cyberspace, some capable of causing significant harm. But there is a lack of clarity on what, exactly, the term ‘proxy’ means.
Source: Journal of Conflict and Security Law
States use proxies to project power through cyberspace, some capable of causing significant harm. In recent years, media outlets have published reports about proxies using Information and Communications Technologies (ICTs) from Northeast Asia to India, Pakistan, the Middle East, and Eastern Europe. Two of the landmark documents providing insight into how the international community thinks about rules of the road for cyberspace explicitly reference the term ‘proxies’. However, neither report defines ‘proxy’, nor does the term easily translate into non-English languages. This article therefore reviews what this term means and how it has been used in various contexts. It focuses on the subset of proxies that are non-state actors used by a state actor, analysing the different logical distinctions and levels of detachment between a state and a non-state actor’s activity. The goal is 2-fold: first, to provide a framework to think about the diverse array of existing proxy definitions; second, to conceptualise the relationships between a state and non-state proxies that can offer a guide for political decision-makers and a roadmap for future research on proxy actors and cyberspace.
This article was originally published in the Journal of Conflict and Security Law.
Tim Maurer
Former Senior Fellow, Technology and International Affairs Program
Dr. Tim Maurer was a senior fellow in Carnegie’s Technology and International Affairs program.
Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.
The prospect of a total block on Russia’s most popular messaging app has sparked disagreement between the regime’s political managers and its security agencies.
Andrey Pertsev
Not only does the fighting jeopardize regional security, it undermines Russian attempts to promote alternatives to the Western-dominated world order.
Ruslan Suleymanov
Moldova’s reintegration plan was drawn up to demonstrate to Brussels that Chișinău is serious about the Transnistria issue—and to get the West to react.
Vladimir Solovyov
Lukashenko is willing to make big sacrifices for an invitation to Mar-a-Lago or the White House. He also knows that the clock is ticking: he must squeeze as much out of the Trump administration as he can before congressional elections in November leave Trump hamstrung or distracted.
Artyom Shraibman
The future trajectory of the U.S.-Iran war remains uncertain, but its impact on global energy trade flows and ties will be far-reaching. Moscow is likely to become a key beneficiary of these changes; the crisis in the Gulf also strengthens Russia’s hand in its relationships with China and India, where advantages might prove more durable.
Sergey Vakulenko