The US cyberhegemony in the OAS
DOI:
https://doi.org/10.5752/P.2317-773X.2022v10n4p91-112Keywords:
Cybersecurity, Cyberhegemony, Cyberpower, US, OASAbstract
The article examines the cybersecurity activities of the Organization of American States (OAS), through the study of: by analyzing the actors that drive the issue on its agenda; its changes over time; and the problematic aspects of the initiative for Latin American countries. Based on the analysis of primary and secondary sources, it is concluded that the OAS has established itself as the main space for cooperation on cybersecurity issues at the intergovernmental level in the Americas through a set of advisory, training, and information exchange activities among its member States. However, the OAS cybersecurity program also reinforces a normative and technological dependency with major US companies and state agencies, and of their allies. Additionally, discussions on cybersecurity in the OAS overlook cyberattacks and cyber espionage by the US. Consequently, the organization contributes to US cyber-hegemony in the Americas, because although there are consensual relations of cooperation, it also leads to reproducing patterns of dependency for which the OAS is still criticized in the region.
Downloads
References
AYODOLE, O. The New Information Feudalism: Africa’s Relationship with the Global Information Society. South African Journal of International Affairs, vol. 27, n. 1, p. 67–87, 2020.
BAUMAN, Z.; BIGO D.; ESTEVES, P.; GUILD, E.; JABRI, V.; LYON, D.; WALKER, R.B.J. After Snowden: Rethinking the Impact of Surveillance. International Political Sociology, vol. 8, n. 2, p. 121–44, 2014.
BETZ, D. J.; STEVENS, T. Cyberspace and the State. Toward a Strategy for Cyber-Power. London, UK: Routledge, 2011.
BID. Impacto de Los Incidentes de Seguridad Digital En Colombia, 2017. Disponible en: https://doi.org/10.18235/0000843.
BIRHANE, A. Algorithmic Colonization of Africa. SCRIPT-Ed, vol. 17, n. 2, p. 389–409, 2020.
BJOLA, C.; Holmes, M. (eds.). Digital Diplomacy: Theory and Practice. London ; New York: Routledge, 2015.
BUZAN, B.; Waever, O.; DE WILDE, J. Security: A New Framework for Analysis. Boulder, CO: Lynne Rienner Publishers, 1998.
CASTRO VALDEBENITO, H. J.; MONTEVERDE SÁNCHEZ, A. Seguridad Hemisférica Latinoamericana Adaptada a Las Nuevas Tecnologías: Ciberseguridad y Avances de Cooperación Regional e Internacional Para La Sanción Del Ciberdelito. Revista Espacios, vol. 39, n. 39, 2018.
CELAC. Plan de Acción de la CELAC, 2015. Disponible en: https://www.iri.edu.ar/images/Documentos/CENSUD/boletines/49/plan_accion_celac.pdf.
CICTE. Declaración de San Carlos Sobre Cooperación Hemisférica Para Enfrentar El Terrorismo de Manera Integral, 2006. Disponible en: http://www.oas.org/es/sms/cicte/documents/sesiones/2006/Sexto_Periodo_Declaracion%20de%20San%20Carlos%20IC00563%20S%20(1).pdf.
CONTRERAS, B.; BARRETT, K-A. Challenges in Building Regional Capacities in Cybersecurity: A Regional Organizational Reflection. In: TIKK, E.; KERTTUNEN, M. Routledge Handbook of International Cybersecurity. Abingdon: Routledge, 2020, Cap 16. p. 214–7.
COULDRY, N.; MEJIAS, U. A. Data Colonialism: Rethinking Big Data’s Relation to the Contemporary Subject. Television & New Media, vol. 20, n. 4, p. 336–49, 2018.
COX, R. W. Social Forces, States and World Orders: Beyond International Relations Theory. Millennium - Journal of International Studies, vol. 10, n. 2, p. 126–55, 1981.
DEIBERT, R. J. Black Code Redux: Censorship, Surveillance, and the Militarization of Cyberspace. In: BOLER, M. (ed.). Digital Media and Democracy: Tactics in Hard Times, Cambridge, MA: The MIT Press, 2008, Cap. 5, p. 137–63.
DEMCHAK, C.; DOMBROWSKI, P. Rise of a Cybered Westphalian Age. Strategic Studies Quarterly, vol. 5, n. 1, p. 32–61, 2011.
DUNN CAVELTY, M. D. Cybersecurity between Hypersecuritization and Technological Routine. In: TIKK, E.; KERTTUNEN, M. Routledge Handbook of International Cybersecurity. Abingdon: Routledge, 2020, Cap 1. p. 11–21.
DUNN CAVELTY, M. D. Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology & Politics, vol. 4, n. 1, p. 19–36, 2008.
EBO, B. L. (ed.). Cyberimperialism? Global Relations in the New Electronic Frontier. Westport, CT: Praeger, 2001.
FINNEMORE, M.; HOLLIS, D. B. Constructing Norms for Global Cybersecurity. The American Journal of International Law, vol. 110, n. 3, p. 425–79, 2016.
GARCINUÑO, P. La OEA y El Gobierno de Colombia Unen Fuerzas Por La Seguridad Cibernética. InnovaSpain, 27 julio, 2016. Disponible en: https://www.innovaspain.com/la-oea-gobierno-colombia-unen-fuerzas-la-seguridad-cibernetica/.
HERZ, M. Does the Organisation of American States Matter?. Crisis States Working Paper Series 2. London, UK: Crisis States Research Centre, 2018. Disponible en: http://www.lse.ac.uk/international-development/Assets/Documents/PDFs/csrc-working-papers-phase-two/wp34.2-does-the-oas-matter.pdf.
KACOWICZ, A. M.; PRESS-BARNATHAN, G. Regional Security Governance. In: Tanja A. BÖRZEL, T. A.; RISSE, T. : The Oxford Handbook of Comparative Regionalism. Oxford: Oxford University Press, 2016, Cap. 15, p. 297-322.
KAPLAN, F. Dark Territory. The Secret History of Cyber War. New York, USA: Simon & Schuster, 2016.
KERTTUNEN, M.; TIKK, E. Introduction. In: TIKK, E.; KERTTUNEN, M. Routledge Handbook of International Cybersecurity. Abingdon: Routledge, 2020, p. 1–8.
KLOPFENSTEIN, N. Strategic Plan of the Secretariat of the Interamerican Committee Against Terrorism, Washington, DC, USA, 2015. Disponible en: http://www.oas.org/en/sms/cicte/documents/sessions/2015/NeilKlopfenstein.pdf.
KWET, M. Digital Colonialism: US Empire and the New Imperialism in the Global South. Race & Class, vol. 60, n. 4, p. 3–26, 2019.
MANJIKIAN, M. M. E. From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik: From Global Village to Virtual Battlespace. International Studies Quarterly, vol. 54, n. 2, p. 381–401, 2010.
MANOR, I. The Digitalization of Public Diplomacy. Cham: Palgrave Macmillan, 2019.
MINISTERIO DE TECNOLOGÍAS DE LA INFORMACIÓN Y LAS COMUNICACIONES. OEA y Colombia Ratifican Su Compromiso Con La Seguridad Digital, 6 junio, 2019. Disponible en: https://www.mintic.gov.co/portal/inicio/Sala-de-Prensa/Noticias/101050:OEA-y-Colombia-ratifican-su-compromiso-con-la-Seguridad-Digital.
NACIONES UNIDAS. Los Avances en la Informatización y las Telecomunicaciones en el Contexto de la Seguridad Internacional, 1998. https://undocs.org/A/RES/53/70.
NACIONES UNIDAS. 2002. Creación de Una Cultura Mundial de Seguridad Cibernética, 2002. Disponible en: https://digitallibrary.un.org/record/482184.
NYE, J. S. The Regime Complex for Managing Global Cyber Activities, The Centre for International Governance; Global Commission on Internet Governance: Paper Series No. 1, 2014. Disponible en: https://www.cigionline.org/sites/default/files/gcig_paper_no1.pdf
OAS. Summary of Cybersecurity Activities Implemented by the CICTE Secretariat, 2017. Disponible en: http://scm.oas.org/doc_public/ENGLISH/HIST_17/CICTE01105E03.doc.
OEA. Cooperación Hemisférica para Prevenir, Combatir y Eliminar el Terrorismo, 1999. Disponible en: http://www.summit-americas.org/OAS%20General%20Assembly/AG-RES-1650-sp.htm.
OEA. Declaración de San Salvador sobre el Fortalecimiento de la Cooperación en la Lucha contra el Terrorismo, 2003a. Disponible en: http://www.oas.org/OASpage/Terrorismo/declaracion-sansalvador-esp.htm.
OEA. Declaración sobre Seguridad en las Américas, 2003b. Disponible en: http://www.oas.org/36AG/espanol/doc_referencia/DeclaracionMexico_Seguridad.pdf.
OEA. Adopción de una Estrategia Interamericana Integral para Combatir las Amenazas a la Seguridad Cibernética: un Enfoque Multidimensionales y Multidisciplinario para la Creación de una Cultura de Seguridad Cibernética, 2004. Disponible en: http://www.oas.org/en/citel/infocitel/julio-04/ult-ciberseguridad_e.asp
OEA. Report of the Rapporteur of the Seventh Regular Session of the Inter-American Committee Against Terrorism. Appendix, 2007. Disponible en: http://www.oas.org/en/sms/cicte/Documents/Sessions/2007/CICTE%20VII_Rapporteur%20Report_CICTE001888E.pdf
OEA. Declaración “Fortalecimiento de La Seguridad Cibernética En Las Américas”, 2012a. Disponible en: https://www.oas.org/es/sms/cicte/documents/sesiones/2012/DEC%201%20rev%201%20DECLARACION%20CICTE00749S04.pdf
OEA. Remarks by Mr. Christopher Painter, Coordinator for Cyber Issues, Department of State, United States of America: Strengthening Cyber Security in the Americas, 2012b. Disponible en: https://www.oas.org/es/sms/cicte/documents/sesiones/2012/CICTE%20INF%204%20REMARKS%20BY%20CHRISTOPHER%20PAINTER%20CICTE00755E04.pdf
OEA. Report on Activities of the Secretariat of the Inter-American Committee against Terrorism, 2013. Disponible en: https://www.oas.org/en/sms/cicte/Documents/Sessions/2013/REPORT%20ON%20ACTIVITIES%20OF%20CICTE%20CICTE00820S03.pdf.
OEA. Report on the Activities of the Secretary of the Inter-American Committe Against Terrorism, 2014. Disponible en: https://www.oas.org/es/sms/cicte/documents/sesiones/2014/CICTE%20DOC%204%20REPORT%20ON%20ACTIVITIES%20OF%20THE%20SECRETARIAT%20CICTE00895E04.pdf
OEA. Informe de la Presidenta del Comité Interamericano Contra el Terrorismo 2014-2015, Jennifer May Loten, Representante Permanente Interina de Canadá ante la OEA, 2015a. Disponible en: https://www.oas.org/es/sms/cicte/documents/sesiones/2015/CICTE%20DOC%204%20COR%201%20INFORME%20DE%20LA%20PRESIDENTA%20DEL%20COMITE%20CICTE00962S04.pdf
OEA. Declaración Protección de Infraestructura Crítica ante las Amenazas Emergentes, 2015b. Disponible en: https://www.oas.org/es/sms/cicte/documents/sesiones/2015/CICTE%20DOC%201%20DECLARACION%20CICTE00955S04.pdf
OEA. Fortalecimiento de la Cooperación y del Desarrollo en la Seguridad Cibernética y la Lucha contra el Terrorismo en las Américas, 2016. Disponible en: http://www.oas.org/en/sms/cicte/Documents/2016/Declaration/CICTE%20DEC%201%20DECLARACION%20ESPANOL%20CICTE01037S04.pdf
OEA. Borrador de Medidas de Fomento de La Confianza (MFC) a Nivel Regional para Promover la Cooperación y Confianza en Ciberespacio, 2019a. Disponible en: http://scm.oas.org/doc_public/SPANISH/HIST_19/CICTE01271S03.doc.
OEA. Informe Anual 2018 del Comité Interamericano Contra El Terrorismo (CICTE) al Cuadragésimo Noveno Período Ordinario de Sesiones de La Asamblea General, 2019b. Disponible en: http://scm.oas.org/IDMS/Redirectpage.aspx?class=X.2.19%20CICTE/Doc&classNum=7&lang=s.
OEA. Informe Anual 2019 del Comité Interamericano Contra el Terrorismo (CICTE) al Quincuagésimo Período Ordinario de Sesiones de la Asamblea General, 2020a. Disponible en: http://scm.oas.org/IDMS/Redirectpage.aspx?class=X.2.20%20CICTE/doc.&classNum=5&lang=s
OEA. OEA, Cisco y La Fundación Citi Abren Postulaciones Para El Fondo de Innovación de Ciberseguridad, Dotado Con US$200.000, 4 Noviembre 4, 2020b. Disponible en: https://www.oas.org/es/centro_noticias/comunicado_prensa.asp?sCodigo=C-108/20.
OEA; TREND MICRO. Reporte de Seguridad Cibernética e Infraestructura Crítica de Las Américas, Washington DC, USA, 2015.
OEA; SYMANTEC. Tendencias de Seguridad Cibernética En América Latina y El Caribe. Washington DC, USA, 2014.
PAINTER, C. Remarks for Christopher Painter. Coordinator for Cyber Issues, U.S. Department of State, 2016. Disponible en: http://www.oas.org/en/sms/cicte/Documents/2016/Speeches/2016-02-25%20Remarks%20for%20Christopher%20Painter%20-%20CICTE%20National%20Points%20of%20Contact%20Meeting_FINAL.pdf.
POTTER, E. H. (ed.). Cyber-Diplomacy: Managing Foreign Policy in the Twenty-First Century. Montreal: McGill-Queen’s University Press, 2002.
RID, T. Cyber War Will Not Take Place. The Journal of Strategic Studies, vol. 35, n. 1, p. 5-32, 2012.
RIORDAN, S. Cyberdiplomacy: Managing Security and Governance Online. Cambridge, UK ; Medford, MA: Polity Press, 2019.
ROBINSON, W. I. Gramsci and Globalisation: From Nation-State to Transnational Hegemony. Critical Review of International Social and Political Philosophy, vol. 8, n. 4, p. 559–74, 2005.
SANCHO HIRARE, C. Ciberseguridad. Presentación Del Dossier. Revista Latinoamericana de Estudios de Seguridad, n. 20, p. 8–15, 2017.
SCHMITT, M. N. (ed.). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, 2nd ed. Cambridge: Cambridge University Press, 2017.
STONE, J. Cyber War Will Take Place!. Journal of Strategic Studies, vol. 36, n. 1, p. 101–8, 2013.
THE WHITE HOUSE. The National Strategy to Secure Cyberspace, 2003. Disponible en: https://us-cert.cisa.gov/sites/default/files/publications/cyberspace_strategy.pdf.
THE WHITE HOUSE. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, 2011. Disponible en: https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
THE WHITE HOUSE. National Cyber Strategy of the United States of America, 2018. Disponible en: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf.
THÉRIEN, J-P.; GORDON M.; GAGNÉ S. The Changing Dynamics of Inter-American Security: The Changing Dynamics of Inter-American Security. Latin American Policy, vol. 3, n. 2, p. 147–63, 2012.
UIT. Aspectos Generales de La Ciberseguridad, 2008. Disponible en: https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.1205-200804-I!!PDF-S&type=items.
UNASUR. Reunión de Ministras y Ministros Del Consejo de Defensa Suramericano. I Declaración de Cartagena, 2014. Disponible en: https://www.iri.edu.ar/images/Documentos/CENSUD/boletines/46/declaracion_cartagena.pdf.
VALERIANO, B.; MANESS, R.C. The Dynamics of Cyber Conflict between Rival Antagonists, 2001-11. Journal of Peace Research, vol. 51, n. 3, p. 347–60, 2014.
WEIFFEN, B. Persistence and Change in Regional Security Institutions: Does the OAS Still Have a Project?. Contemporary Security Policy, vol. 33, n. 2, p. 360–83, 2012.
WEST, S.M. Data Capitalism: Redefining the Logics of Surveillance and Privacy. Business & Society, v. 58, n. 1, p. 20–41, 2019.
YA’U, Y.Z. The New Imperialism & Africa in the Global Electronic Village. Review of African Political Economy, vol. 31, n. 99, p. 11–29, 2004.
ZITTRAIN, J. ‘Netwar’: The Unwelcome Militarization of the Internet Has Arrived. Bulletin of the Atomic Scientists, v. 73, n. 5, p. 300–304, 2017.
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a.Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal
b.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).