In an era where economies and societies are deeply integrated into cyberspace, achieving a robust level of digital sovereignty has become an essential goal for nations aiming to preserve their security and strategic political autonomy, particularly during turbulent geopolitical times marked by complex global supply chains of critical technologies that ties systemic rivals. Digital sovereignty is a multifaceted, interdisciplinary, and dynamic pursuit that fundamentally relies on a nation's ability to have continuous access to dependable technological capabilities (CTCs) for storing, transferring, and processing domestically produced data. This paper identifies how access continuity or technological dependability could be threatened by several malicious actions from cyberattacks, supply chain tamperings, political or economic actions. By examining different approaches adopted by countries like the United States, China, and the European Union, we highlight different strategies to get access to CTCs depending on their political, economic and institutional nature.
翻译:在经济和社会深度融入网络空间的时代,实现强有力的数字自主权已成为各国维护其安全与战略政治自主性的关键目标,尤其是在地缘政治动荡时期——这一时期以复杂的全球关键技术供应链为特征,这些供应链将系统性竞争对手紧密相连。数字自主权是一项多维度、跨学科且动态的追求,其根本上依赖于一个国家持续获取可靠技术能力(CTCs)以存储、传输和处理本国数据的能力。本文分析了网络攻击、供应链篡改、政治或经济行动等多种恶意行为如何可能威胁获取的连续性或技术的可靠性。通过考察美国、中国和欧盟等国家采取的不同路径,我们根据各自的政治、经济和制度特性,重点阐述了获取可靠技术能力的不同策略。