2,719
Views
3
CrossRef citations to date
0
Altmetric
Special Issue: International Cybersecurity Governance

Strategic narratives and the multilateral governance of cyberspace: The cases of European Union, Russia, and India

ORCID Icon & ORCID Icon

ABSTRACT

The last few years have seen the emergence of a cybersecurity regime complex divided into specialized forums discussing different sub-issues. But how do the main actors in cyberspace make sense of its fragmented governance, and how does that translate to their broader strategic narratives? Furthermore, to what extent are these in line with the predominant macro-narratives in the cyber-domain? To answer these questions, this article explores the strategic narratives of the European Union, Russia, and India in two of these specialized forums: one related to responsible state behavior in cyberspace, the other to cyber-crime. Through the study of narrative fragments — a new approach to the study of strategic narratives in multilateral settings — it concludes that these actors largely include these two issues within their broader strategic narratives. This highlights the importance of cross-issue analysis in the study of multilateral arrangements, particularly in the context of emerging regime complexes.

The governance of cyberspace is still rather incipient (Raymond, Citation2016; Stadnik, Citation2017) and spread across a multiplicity of sub-issue areas. For many, it is a regime complexFootnote1, that is, “loosely coupled sets of specific regimes” (Keohane & Victor, Citation2011, p. 7), in which inter-related issues, such as crime and international cybersecurityFootnote2, are seen as part of separate regimes (Nye, Citation2014; Pawlak, Citation2019). Its relative novelty means it is still very much open to being shaped, making the “discursive battlefields” (Pawlak, Citation2019, p. 170) that happen within each regime, and across them, particularly pertinent. This article explores how cyberspace’s main actors make sense of its multilateral compartmentalization. This will be done through the analysis of their strategic narratives.

The study of multilateralism tends to focus on dynamics of cooperation and contestation (Morse & Keohane, Citation2014). We propose a different starting point, that of narratives. Narrative is a “loose term,” which is “used to describe a wide range of phenomena broadly related to storytelling and communications” (Liveley, Citation2022, p. 4). According to Miskimmon et al. (Citation2017a, p. 7), a narrative contains five main components: characters or actors (agents); a setting, environment or space (scene); some sort of conflict or action (act); the identification of some form of behavior (agency); and, finally, a purpose that may lead to the resolution of the story. Narratives are also about time, about creating a logic sequence between the past, the present, and the future (Miskimmon et al., Citation2017a); they can offer a collective “sense of space and a sense of place” (Subotic, Citation2016, p. 611), one that needs to interact with other collective stories.

We start from the perspective that multilateral institutions are first and foremost a form of narrative-interaction, in which states project their interests through storytelling. Contrary to most materialist positions in International Relations, there is a significant consensus across the discipline that words matter in world politics, particularly since the “narrative turn” in the discipline (Miskimmon et al., Citation2017a, p. 5). Within this context, storytelling and rhetoric are seen as important tools in statecraft. They are often the basis for the articulation of narratives where worldviews are declared, and interests defined. Miskimmon et al. (Citation2017a) argue that narratives can have concrete policy impacts, particularly strategic narratives, “means by which political actors attempt to construct a shared meaning of the past, present, and future of international politics to shape the behavior of domestic and international actors” (p. 6). According to these authors, strategic narratives can be of three different types: system, identity, and policy. System narratives tell stories of how the international system works, including who its main actors are, and which of those “pose a challenge to the system” (Roselle, Citation2017, p. 57), whereas identity narratives “shape perceptions of what is appropriate for a state to do in any given context” (Miskimmon & O’Loughlin, Citation2017, p. 112). Finally, policy narratives “outline how an actor views the appropriate response to address a political challenge or crisis and articulates a position based on material interest, and/or, what is/might be a normatively desirable outcome” (Miskimmon & O’Loughlin, Citation2017, p. 112).

Obviously, this does not apply equally to all states. Either for a lack of interest, capacity or incompetence, states are not always able to articulate clear and consistent strategic narratives in all the areas in which they are asked to participate. But the main actors of each regime certainly are (or are expected to do soFootnote3).

However, they constrain and are constrained by macro-narratives—simplified worldviews which shape the dynamics of each regime or regime complex. In the cyber-regime complex, these tend to be articulated along three groups, each associated to a different macro-narrativeFootnote4: the liberals, the sovereigntists and the non-aligned.Footnote5 The first group includes the gatekeepers of cyberspace, those that set the rules and protocols that dictate how the internet works and that gave it its foundational ethos. The United States, the United Kingdom, the European Union (EU) and “like-minded” countries such as Japan and Australia are part of this group. The second group, led by China and Russia, have since the late 1990s been articulating a sovereigntist narrative that promotes a more state-centric approach to cyberspace, and its regulation along more territorialized lines.Footnote6 Finally, the non-aligned group includes a broad range of states which tend to have a position that oscillates between the other two depending on the issue—what Maurer and Morgus (Citation2014) labeled as “swing states,” or what Kim (Citation2022) considers to be the “open multilateral” group. Conceiving the multilateral governance of cyberspace along these lines is helpful for analytically positioning the words and actions of these actors in the cyber-domain.Footnote7 But how do the main actors in cyberspace make sense of its fragmented governance, and how does that translate to their broader strategic narratives? Also, to what extent do they offer an accurate correspondence to what states say in these international forums, and how much do they shape their positions and actions?

This article will answer these questions by comparatively analyzing the participation of three actors — the EU, Russia, and India — in three institutions that are part of what Sukumar et al. (Citation2024) labeled as the informality of the international cybersecurity regime complex: the Open-Ended Working Group (OEWG) on Information and Communications Technology (ICT) in International Security, and the Ad Hoc Committee to Elaborate a Comprehensive International Convention on Countering the Use of ICT for Criminal PurposesFootnote8 each of which represents one of the three above-mentioned groups.Footnote9

The OEWG was created in 2018 to amplify discussions around state responsibility in cyberspace that were taking place within the UN since the late 1990s, but until then limited to a very narrow group of states, mostly within the context of the United Nations Group of Governmental Experts (GGE) on Advancing Responsible State Behavior in Cyberspace in the Context of International Security.Footnote10 In December 2019, a few months after the start of the OEWG, and of a new GGE, both under the aegis of the UN General Assembly (UNGA) First Committee (responsible for Disarmament and International Security), resolution 74/247 led to the creation of the Ad Hoc Committee to Elaborate a Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes (AHC), this time within the UNGA Third Committee (responsible for Social, Humanitarian and Cultural issues). Three separate cybersecurity-related processes under two different UN Committees with different remits were now set to run in parallel. Whereas the simultaneous running of the OEWG and the GGE can be understood within the context of diplomatic tensions and UN institutional politics (see Raymond, Citation2021)—whose co-habitation ended up leading to complimentary discussions and final reports—the creation of the AHC under a different UNGA Committee was based on the assumption (often repeated by member states during the first OEWG) that discussions around responsible state behavior were separate from those focused on cyber-crime matters.Footnote11

This will allow us to understand whether these actors articulate distinct stories depending on the forum—OEWG and AHC—or whether they offer a constant set of narratives regardless of it. If the former, then we would be able to conclude that the existence of processes in two parallel UN committees is more than just the result of bureaucratic politics; if the latter, then the conclusion would be that the institutional separation of the two processes should not detract us from the continuities of purpose of the main actors in the cyber-domain.

In terms of structure, this article will now briefly discuss the importance of narratives in multilateral settings, followed by a note on methodology that will then open the door for the exploration of the three cases mentioned above. It will then proceed with an analysis of the main narrative features identified for each actor, the continuities and discontinuities across forums, and the potential points of contact between them.

Narratives matter

Strategic narratives are an integral part of world politics and, when employed as an analytical tool, can offer a valuable insight into multilateral processes by unveiling the underlying ideologies woven into the stories of world actors, as well as the broader cultural contexts and experiences that give rise to these narratives (Stokes, Citation2012). In comparison to other qualitative methods—like content analysis which has a more reductive nature, or discourse analysis which is primarily interested in how ideas, meanings and practices are expressed in textual form (Bischoping & Gazso, Citation2015)—narrative analysis goes beyond linguistic considerations to also account for the cultural, historical and ideological influences that shape narratives. In this context, narrative analysis allows us to gain a holistic understanding of the complexities of multilateral cybersecurity and cybercrime discussions, and how storytelling is played within it.

It is through stories that “we make sense of the world” (Ashworth, Citation2015, p. 321) they are fundamental to create any form of international order (Miskimmon & O’Loughlin, Citation2017, p. 113). The term “strategic narrative” was introduced in the IR lexicon by Freedman, who in 2006 talked about the strategic deployment of “compelling storylines” (as cited in Schmitt, Citation2018, p. 489) to challenge the enemy (Miskimmon & O’Loughlin, Citation2017). A few years later, in his work Strategy: A History, Freedman (Citation2013) would argue that the value of narratives was “not only their inherent quality but [also in] the resources behind them, reflected in the capacity for an organization to propagate its own myths and censor or counter contrary claims” (p. 618). In short, that there is a material component inherent to narratives and their dissemination.

Freedman’s view is on the more instrumental side of the spectrum when it comes to the understanding of narratives. As a concept, strategic narrative sits comfortably with multiple theoretical backgrounds, from rationalists like Freedman to “discourse inspired” approaches such as those of Michel Foucault or Judith Butler (Miskimmon et al., Citation2015, p. 342). Our approach is somewhere between what Miskimmon et al. (Citation2017b, p. 42) define as “thin” and “very thick” analyses, as we acknowledge states’ agency in the process of forming and projecting their narratives, but also that those narratives can then develop a “life of their own” and be framed or reframed in processes that can move away from the authors’ initial intention. We side with Freedman (Citation2013) when he argues that narratives are “not precise strategic instruments because they can convey a range of messages, not all of which may be understood” (p. 618). Ultimately, despite the direct intention of influencing an audience (Schmitt, Citation2018, p. 488), strategic narratives’ effectiveness can be hard if not almost impossible to fully grasp.

Effectiveness can also be impacted by the internal coherence of each narrative. As Subotic (Citation2016) argues, “even the most dominant narratives contain inherent contradictions that different political actors exploit” (p. 611). It is perfectly possible for identity or policy narratives to “undermine new system narratives” (Roselle, Citation2017, pp. 57–58). When that is the case, the overall strategic narrative of that actor is weakened, and its international actorness compromised.

Whereas Roselle et al.’s (Citation2014) tripartite conception of strategic narratives makes sense conceptually, the analysis of its deployment in multilateral settings addressing specific global governance issues is certainly blurrier and less structured than what the model anticipates. They argue that each of these types of narratives corresponds to a different level, going from the more generic (system narratives) to the more specific (policy narratives), but they can be deployed independently of each other. Although “strategic narratives employed at one level may affect narratives at other levels, and thus constrain future policy choices and behavior” (Citation2014, p. 77) that is not a given, which leaves open the possibility for these different narrative levels to operate autonomously from each other.

When looking from a multilateral governance perspective—and the context in which states deploy their narratives within specific institutional forums—these levels are not necessarily autonomous but can be incorporated in the lowest of the three (policy). An actor’s view of the world (system narrative) and of itself (identity narrative) is included in any articulation of a specific policy narrative, but such inclusion is fragmented. Communication in multilateral settings, such as specialized UN forums, is organized around the agenda of each meeting, which can cover different topics in different sessions. Within the context of the OEWG, for example, one session could be about the role of international law in cyberspace, and the next about cyber capacity building. Actors need to articulate key ideas central to their system and identity narratives within their policy narratives. In that regard, studying the deployment of strategic narratives in practice is about rescuing those fragments in a reconstitution exercise of strategic narratives in a multilateral environment.

Strategic narratives can diverge but also converge, or what Miskimmon et al. call “narrative alignment” (Miskimmon et al., Citation2015; Miskimmon & O’Loughlin, Citation2017). Narrative alignment happens when sides with different interests are able “to form a common identity and resolve conflict” (Miskimmon et al., Citation2015, p. 341). As mentioned earlier, part of the aim of this article is to see whether such an alignment exists between the actors under analysis.

To study these narratives, we propose a bottom-up approach, in which the statements and verbal contributions presented to these two forums—OEWG and AHC—will serve as the starting point for our analysis. From here, we will then see how they can be articulated as policy narratives and see what from those fragments can be linked to structure and identity. These fragments not only help us identify the key parts of these actors’ narratives that trickle down to the cyber-domain, but also how they work across the two sub-domains (international cybersecurity and cyber-crime). As an additional analytical layer, it will also be possible to link these fragments across different actors.

This exercise involves some previous knowledge of the actors’ broader strategic narratives. In that sense, for each of the actors under analysis, we have analyzed at least one strategic document and from there attempted to extract, whenever possible, narratives around system, identity and policy, or at least key themes that could work as enablers of such narratives. All data was publicly available and sourced from the UN website, or national ministries in the case of the strategic documents.

It should be pointed out that our analysis takes place at the level of projection only; it considers neither the formation nor the reception of those narratives (Roselle et al., Citation2014, p. 78). In that regard, it is also not about the effectiveness of narratives (Schmitt, Citation2018); it is about their consistency across regimes within the same complex and overlapping points between actors situated along distinct macro-narratives. The fact that one process is now concluded (the first OEWG) whereas the other is still ongoing (AHC) should not constitute a major methodological hurdle. On the contrary, the chronological disparity will help us reinforce the point on continuity (or not) between narratives, whereas the ongoing status of the AHC means we will limit our analysis to the statements issued up to the third session (September 2022). The high level of activism from all those involved in the process will give us a sufficiently broad sample from which we can infer the narratives put forward by each of these actors.

Our analysis was conducted in Nvivo 1.6.1. Using Miskimmon et al.’s (Citation2017a) model as an initial coding framework, a deductive approach was first applied to identify where each state applied fragments of their 1) identity or 2) system narratives, and 3) the main policy issues in which they were incorporated. Three further phases were carried out.

The first phase included identifying key themes and topics that emerged from the data. Under identity, these key themes were notions of self-perception, social values (particularly in terms of human rights and privacy rights) and political ideology. The main themes under system were sovereignty, governance model, and approach to international law and norms. Development, cooperation, and crime and security were the core themes under policy. The second phase involved identifying what strategic narratives (or fragments of narratives) were constructed by each actor around each theme. Finally, narrative (dis)continuities were identified by finding patterns and relationships within the categorized data between the two forums and each state. What now follows is a presentation of the results of our analysis.

Talking cyber(-narratives)

This section will look at the statements from the EU, Russia, and India in the OEWG and AHC. Each actor was analyzed according to the fragments of identity and structure narratives present in their most relevant policy narratives projected in these two forums.

European union

Although the EU has historically defined itself as a “paragon of international virtues” (Drent et al., Citation2018, p. 54), many authors have questioned such an interpretation, highlighting instead the multiplicity of divisions and incoherences inside the EU (see Garcia, Citation2017; Gilbert, Citation2008; Manners & Murray, Citation2015). In cyberspace the EU argues it has developed “a coherent and holistic international cyber policy” (EU, Citation2020l), which is in line with this article’s findings. In the OEWG and AHC, this is articulated through two main narratives: the EU as a force for good (identity) and as a defender of a rules-based liberal order (system) that is open to active participation of non-state actors through multistakeholderism (see Raymond & DeNardis, Citation2015).

In the 2016 Global Strategy, the EU claims to be “leading by example” in numerous areas (from sustainable development and climate change to global governance), identifying itself as “an agenda-shaper, a connector, coordinator and facilitator” (Citation2016, p. 43). After its positioning at the center of several developments for international ICT governance and security, the EU also began curating a narrative around responsible and liberal leadership in cyberspace. This is evident from the 2014 proposal on Internet policy and governance (European Commission, Citation2014) as well as the 2020 Cybersecurity Strategy for the Digital Decade which “sets out how the EU will […] advance international cooperation and lead in securing a global and open Internet” (EU, Citation2020l, p. 4), and contains a dedicated section on how the EU will continue to lead global developments on standards, norms and frameworks in cyberspace (EU, Citation2020l, p. 20).

Our analysis finds a continuation of the leadership narrative in both the OEWG and AHC, most notably through articulating the EU as an international cyber capacity building (CCB) leader. In the OEWG, the EU emphasized the broad geographical scope of its CCB programs, implemented across the world (EU, Citationn.d., p. 2). Committing over €100 million a year to finance CCB programs in developing countries and being the only actor to submit an additional non-paper on advancing CCB, the EU insinuates it is a, if not the, global leader in this area (Citationn.d., p. 2; Citation2020j). A similar story is laid out in the AHC: “the EU and its Member States already have a track record in funding and providing capacity building measures, in partnership with the Council of Europe and UNODC, to a large number of countries across the globe, and will continue to do so” (EU, Citation2022b, p. 3). As the EU expresses its future (as well as historical) commitment to CCB across both forums (EU, Citationn.d., p. 2, Citation2022h), it can be ascertained that the EU intends to continue projecting its global normative power (Manners, Citation2002) in cyberspace through CCB initiatives.

The EU’s overarching “force for good” narrative was also embedded within references to the EU’s value-driven nature. In the OEWG, the EU alluded to gender equality, diversity, sustainability, and climate change (OEWG, Citation2022b, p. 1, 8, Citationn.d., p. 1). However, the most strategic use of the EU’s narrative around values was observed in the AHC. Here, significant emphasis was put on safeguarding human rights, one of its five fundamental values. Among the 13 written statements provided by the EU to the AHC, human rights were explicitly referred to 159 times. The issue has become particularly prominent when discussing the scope of cyber-crime, with actors such as Russia and China advocating the extension of the concept to cyber-enabled crimes (Hakmeh, Citation2022), whereas the EU encouraged the committee to “avoid including broadly or vaguely defined criminal acts, since such vague definitions would risk leading to legal uncertainty [and] to unduly and disproportionately interfering with human rights and fundamental freedoms” such as online privacy, freedom of speech and the right to a fair trial (EU, Citation2022d, p. 3).

As well as projecting a consistent “force for good” identity narrative, the EU has adopted a system narrative centered around the benefits of a rules-based liberal order, which it considers instrumental in maintaining international peace and prosperity (EU, Citation2016). The EU also considers rules-based multilateralism a tool for combatting global challenges, cybersecurity being chief amongst them, as exemplified in the 2016 Global Strategy within which the EU commits to “support[ing] multilateral digital governance and a global cooperation framework on cybersecurity, respecting the free flow of information” (EU, Citation2016, p. 42).

An analysis of the EU’s contributions to the OEWG shows that its rules-based order narrative directly translates into diplomatic discussions surrounding responsible state behavior in cyberspace. All three of its written statements to the OEWG reaffirm that “a universal cyber security framework can only be grounded in existing international law, including the Charter of the United Nations in its entirety, international humanitarian law, and international human rights law,” containing the normative principles of humanity, necessity, proportionality and distinction (EU, Citation2020a, pp. 3–4, Citation2021a, pp. 1–2, Citationn.d., p. 1-2, Citation2020e, Citation2020l). The EU also supported the development and implementation of pre-existing non-binding norms—particularly those established in the 2015 GGE (EU, Citation2020a, p. 6, Citation2021a, p. 1)—and called for support from regional organizations that share normative values, such as the OSCE and OAS (EU, Citation2019b, Citation2020i).

Although one could argue that the EU’s engagement in a forum (AHC) with the aim of drafting an internationally binding agreement in the cyber-domain was a de facto difference from its position in the OEWG (also in line with the other “like-minded” states), there was a continuation of its rules-based order narrative. For example, the EU strongly supported using pre-existing legal principles from the Budapest Convention (EU, Citation2022a, p. 4, Citation2022d, pp. 3–4), the UN Convention against Transnational Organized Crime, and the UN Convention against Corruption (EU, Citation2020k, p. 1, Citation2022a, p. 4) as models, rejecting proposals of other countries wanting to create an entirely new convention from scratch that could skirt around pre-existing laws and/or create legal loopholes.

A narrative around the benefits of “a democratic and efficient multi-stakeholder internet governance model” also remained consistent throughout the OEWG and AHC, with emphasis put on how insight from industry, academia and civil society would ensure “democracy,” “inclusiveness” and “transparency” throughout negotiations (EU, Citation2020k, p. 1). The tactical use of language reinforces and substantiates the EU’s value-driven identity; an example of how strategic narratives can converge. However, the multistakeholder narrative can perhaps most importantly be viewed as a means by which the EU sought to challenge the adversarial policy goals of other states and maintain the multistakeholder status quo (see Pawlak, Citation2019).

The assumption that “sovereign government-led, multilateral cyber governance will challenge the existing pattern of multi-stakeholder governance” (Rosenbach & Chong, Citation2019, para. 4) is a concern for the EU, as well as for other “like-minded” states, civil society groups and institutions which consider participation from non-state actors fundamental to maintaining a global, open, free, stable, and secure cyberspace that guarantees human rights protection (Azelmat & Ferrari, Citation2021; Human Rights Watch, Citation2022). Debates about the future role of multistakeholder engagement comprised a core dimension of negotiations in both forums, and to swing deliberations in favor of inclusive governance, the EU shed light on several areas where participation from non-state actors could, and should, be better incorporated (EU, Citation2020a, p. 2, Citation2020h).

Overall, the EU has adopted a fairly coherent approach across the two forums, highlighting its liberal credentials, and offering to lead in the promotion of an open, free and democratic cyberspace. As is often the case in strategic narratives, the narrator is also the main character, if not the hero (responsible, global, lawful). From the setting out of its positions—be it regarding its opposition to an international treaty regulating responsible state behavior in cyberspace or a broad definition of cyber-crime—we understand both the issue (act), and the implicit actors. From a strategic narratives’ perspective, it also becomes clear that the EU is fundamentally a status quo actor in this domain, as the resolution of each story mostly revolves around keeping things as they are (implementation of cyber-norms, rejection of a broad definition of cyber-crime), or reinforcing what it already does (capacity building, cooperation).

Russia

In part due to the ideological and identity crisis experienced in Russia after the collapse of the Soviet Union (see Prizel, Citation2013), narratives have assumed a crucial role in Russian politics, diplomacy, and foreign policy. The main objective of Russian narrative projection is to “convince its citizens and the whole world of Russia’s indomitable greatness and power, as well as to demonstrate the degradation of Europe and the West in general” (Karpchuk, Citation2021, p. 27). In the cyber-domain, this objective is achieved through the projection of narratives around sovereignty (system); multilateralism (system); Russophobia and anti-westernism (identity), propelled by a policy narrative focused on Russia as a norm-entrepreneur.

Since the dawn of international concern over ICTs, their use and security, Russia has been a central player in multilateral cyberspace negotiations, acting as the driving force behind various alliances, treaties and initiatives and making great effort to embed cybersecurity into the core of the UN First Committee’s agenda (Remler, Citation2020). Norm-entrepreneurs not only “call attention to an issue,” but they frame it, that is, “use language that names, interprets and dramatizes the problem” (Finnemore & Hollis, Citation2016, p. 447). Additionally, they “create organizational platforms from which to do the difficult work of promoting and embedding norms” (Finnemore & Hollis, Citation2016, p. 448, italic in the original). In Russia’s articulation of itself as a norm-entrepreneur, the 2016 Information Security Doctrine (ISD) outlined Russia’s orchestration of establishing new international frameworks and legal mechanisms, and fundamental role in shaping and coordinating the agenda of international organizations (Russian Federation, Citation2016).

This narrative remains central to Russia’s participation in the OEWG (also see Hansel, Citation2023). Russia reminds its audience that it was amongst the first to put ICT security on the international agenda and “attract the attention of the global community to the very sphere of international or cyber security” (Russian Federation, Citation2021d, p. 1). Using its self-defined status as the historical initiator of the GGE and OEWG as leverage, Russia attempts to garner recognition and appreciation for its leadership in cyber diplomacy,Footnote12 arguing that without its endeavors “the international community would be left with total uncertainty regarding the continuation of an inclusive and democratic negotiation process on ICT-security” (Russian Federation, Citation2021c, p. 5). In a subsequent written statement, Russia insinuates that its status as the “initiator of the OEWG” entitles it to greater decision-making authority (Russian Federation, Citation2021g, p. 1). Furthermore, despite recognizing that “to attribute this format solely to Russia would be fundamentally wrong,” Moscow continues to assert itself as the “penholder of the respective resolution” throughout (Russian Federation, Citation2021d, p. 1).

The norm-entrepreneur narrative was also championed in Russia’s contributions to the First Session of the AHC. It was emphasized that “Russia was the first to raise the question about the development, under the UN auspices, of a comprehensive convention to counter [ICT] crimes” (Russian Federation, Citation2022i, pp. 1–2) and, in a similar vein to the OEWG, Russia utilized its self-proclaimed status as “the initiator of the whole process” (Russian Federation, Citation2022o, p. 2) to advance its own policy objectives (Russian Federation, Citation2022h, p. 14).

Narratives that can generate emotional arousal amongst its recipients are often the most successful (Paul & Matthews, Citation2016), and Russia has often expressed emotive narratives of victimhood or “Russophobia”—the idea that that there is unjustified and systemic Western prejudice against Russian power and cultureFootnote13 (Oates et al., Citation2018). In the ISD, the West was condoned for “blatant discrimination,” promoting “extremist ideology” [and] “spread[ing] xenophobia and ideas of national exceptionalism for the purposes of undermining the sovereignty, political and social stability” of the Russian Federation and to “erode Russian traditional spiritual and moral values” (Russian Federation, Citation2016, para 12-23). This narrative is also articulated in the Russian National Security Strategy (NSS), with commentators reporting that methodical Western attacks on Russian values, culture and historical legacy now comprise “an epoch rather than an episode” (Trenin, Citation2021, para 2).

The defiant Russophobia narrative continued into the OEWG where it was strategically employed to support Moscow’s longstanding argument that the West does not treat Russia fairly or with political neutrality, but marginalizes it from negotiation processes (Russian Federation, Citation2021d, p. 1). Russia claimed that it had unfairly received negative attitudes purely because the OEWG was “a Russian initiative”, that “there are some countries strongly opposing anything that contains the word Russia” and who “are trying to create an impression that Russia, whatever it does, will not let others do the right thing” (Russian Federation, Citation2021d, pp. 2–3).Footnote14 Here Russia brings together, for greater dramatic effect, the two identity narratives—Russia as the norm-entrepreneur and Russia as the victim.

What is particularly noteworthy is that the Russophobia narrative did not emerge in Russia’s contributions to the Organizational, First or Second Sessions of the AHC, which were overshadowed by the Russian invasion of Ukraine. However, by the Third Session Russia argued that “the political situation should remain outside the doors of this hall” and left to the devices of other UN forums (Russian Federation, Citation2022a, p. 1). Fragments of the victimhood narrative began to re-emerge, such as when Russia complained of being “inappropriately” treated and excluded by the US: “[N]ot a single member of the official Russian delegation, with the exception of your obedient servant, has received an entry visa to the United States. This is another blatant violation by the United States of America of its obligations as the host of the UN headquarters” (Russian Federation, Citation2022a, p. 1).

As summarized by Ziegler (Citation2016), anti-Western narratives have been an attribute of Russian political discourse since the 1990s. Although they have gone through phases of greater and lesser intensity, these narratives have been characterized by “a reaction to the West as Other, and by the Russian elite’s interpretation of the West’s efforts to contain, marginalize, and weaken Russia” (Ziegler, p. 564). The strategy behind Russian anti-Western narratives is to depict the West as attempting to “destabilize a given situation” (Gorenburg, Citation2019, para 15) whilst painting a favorable picture of itself as a good multilateralist and responsible, outcome-driven global leader.

Our analysis suggests the anti-Western narrative has trickled down into the cyber-domain, acting as a prime example of how narratives can be utilized to de-legitimize one’s opponents (Miskimmon et al., Citation2017a, p. 2). In the OEWG, Russia’s response to the Zero Draft criticized the West for being politically and ideologically discriminatory: “The way we see it, the zero draft Report is biased, does not include views and opinions of many countries. It does not reflect fundamental elements of Russia’s approach in this sphere” (Russian Federation, Citation2021c, p. 1). This bias was not just targeted against Russia, but also the wider group of states that align with Russia’s policy objectives including Belarus, Burundi, China, Nicaragua, and Tajikistan (Russian Federation, Citation2021c, p. 3). Nevertheless, Russia did express wanting to “concentrate on points of convergence rather than on objective differences in States’ positions,” showing there was still some willingness to compromise and cooperate, a point later reiterated by their head of delegation, Ambassador Andrei Krutskikh, in the final session of the first OEWG after the conclusions had been approved.

In the AHC, the anti-Western narrative targeted Western incompetence, and attempted to portray the West as having declining influence. A primary aspect of the narrative was to argue that the West was hindering the development and progress of the convention by blocking proposals and suggestions from non-Western countries. In relation to the West’s call for a limited convention scope only including cyber-dependent crime (and some, distinctly defined, cyber-enabled crime) Russia claimed: “resolution 75/282 […] was adopted by consensus, so Member States that are now advocating the reduction of the scope to only computer crimes [originally] agreed with such scope” (Russian Federation, Citation2022o, p. 2). Moreover, Russia criticized the Western approach to the AHC as a “puzzle” and argued that if requests for a narrow convention scope, along with a reluctance to hold the private sector accountable under international law and the use of technologically neutral terminology were accepted, the convention would be rendered an “impractical framework” and “go straight to the UN library just as an item” (Russian Federation, Citation2022o, p. 3). Russia was pushing for a more “responsive multilateralism,” a type of narrative it shares with other BRICS’ countries, as identified by Van Noort (Citation2017).

Indeed, Russia has a multilateralist narrative which seeks a more statist and restrictionist international system (Allison, Citation2017; Raymond & Sherman, Citation2024). Russia claims to fervently uphold and respect the UN Charter, with emphasis placed on the fifth pillar (international law) of which Russia adopts a narrow interpretation, sometimes referred to as “traditional” or “hard” sovereignty (Allison, Citation2015). This narrative—repeatedly articulated in the ISD—was also strongly communicated in the discussions around the OEWG pre-draft conclusions, with Russia stressing that principles of sovereignty in cyberspace should be better incorporated into the report, whilst “redundant references to the problems of sustainable development, […] human rights and gender equality” should be excluded for not pertaining to international peace and security (Russian Federation, Citation2020a, p. 2). The Russian OEWG delegation also rejected the inclusion of “political attribution” and recommendations for greater cooperation through data repositories due to risks of being used as “leverage against States in order to expose their positions on sensitive issues related to their national security” (Russian Federation, Citation2020a, p. 3).

A similar narrative is present in the AHC, such as when it was declared that “the issue of protecting sovereignty must be closely interlinked with the issue of jurisdiction” and that “the convention should not confer on the competent authorities of one State Party the right to exercise in the territory of another State the jurisdiction and functions relating to the exclusive competence of that other State” (Russian Federation, Citation2022o, p. 2). Another narrative continuity is found in the prioritization of national interest over human rights, where Russia argues the AHC is “drawing up a specialized legal treaty, not a human rights convention.” Therefore, there should be a balance between human rights provisions and the view firmly expressed by dozens of delegations regarding national sovereignty, territorial integrity, and non-interference in internal affairs (Russian Federation, Citation2022o, p. 2). Speaking on behalf of others, Moscow reaffirms its norm-entrepreneur status through its sovereignty narrative.

Russia also projects a fragment of its system narrative around how cyberspace should be governed—privileging multilateralism over multistakeholderism. Moscow has previously taken a critical stance towards the multistakeholder model due to concerns that too much involvement from the private sector, civil society and academia would endanger its sovereignty and state-control over the internet. Russia’s public support of the International Telecommunication Union and the absence of any references to multistakeholder engagement in the ISD are cases in point (Strickling & Hill, Citation2017). This sentiment is continued into the OEWG where it argued, “The importance of [a] “multi-stakeholder approach’ with emphasis on the contribution of non-governmental sector, business and academia to ensuring responsible behavior in the information space is artificially exaggerated” (Russian Federation, Citation2020a, p. 2).

However, during the AHC, the narrative is of a slightly different nature, with Russia recognizing how external stakeholders can help “develop strategies and plans to combat crime in this area”, help create new principles and standards, and aid “cooperation between state parties on capacity building” (Russian Federation, AHC TS II, p. 2). In fact, Russia argues that the convention should emphasize “the positive impact of the state’s partnership with civil society, the private sector and the scientific community”, and the benefit states will gain from utilizing the experience and knowledge of stakeholders associated to the convention (pp. 1-6). Although not openly embracing multistakeholderism, Russia seems more willing to engage with non-state actors in the cyber-crime domain.

Russia’s position in both the OEWG and AHC has been, with a few nuances (such as regarding the role of non-state actors), marked by the combination of system and identity narratives that focus on the centrality of sovereignty (system), multilateralism (system), Russophobia and anti-westernism (identity). These have all fed into policy narratives that are particularly marked by Russia norm-entrepreneurship—visible in both forums—and very much in line with its role as a key custodian of multilateralism in cyberspace.

Examining strategic narratives according to Miskimmon et al.’s model (Citation2017a), it is evident that the characters central to Moscow’s narrative projection are Russia and the West. Using its agency as a norm-entrepreneur, Moscow acts to challenge Western liberalism to establish a new set of legal and normative rules in cyberspace. Thus, the resolution of the Russian story is to create an alternative framework that aligns with its own interests and challenges the dominance of Western norms in the digital domain.

Overall, Russia’s narrative projection in the OEWG and AHC aligns with the conclusions of other scholars who find “remarkable consistency” between Russian narratives (Sakwa, 2011, pp. 958-959) and which have remained “essentially unchanged” from Soviet times (Karpchuk, Citation2021, p. 27). Collectively, such findings suggest Russian narratives are confined by strict historical and cultural boundaries, helping to connect the past, the present, and the future (Miskimmon et al., Citation2017a) and provide a collective “sense of space and a sense of place” (Subotic, Citation2016, p. 611).

India

As a postcolonial country with a complicated and turbulent political history, India has struggled to use unifying narratives, both at home and abroad. In fact, Rajil Malhotra claims there to be “an outright civil war of divisive narratives based on minorityism, casteism, religion and racism” (Malhotra, Citation2018, p. 14). This lack of unity clashes with India’s attempt to promote itself as “a prominent global power in the contemporary post-Cold war era” (Sullivan, Citation2015, p. 15). Withholding significant technological capabilities, resources and manpower, the cyber-domain has been anticipated to be an avenue through which this Indian grand narrative be reinforced and used to articulate India as a serious and committed forerunner in cyber-diplomacy (see Basu, Citation2023). India does project several narratives in cyberspace, our analysis finding emphasis on sovereignty (system), multilateralism (system), democracy (identity) and developing nation (identity), exercised through policy narratives around technological autonomy and national security (including the fight against cyber-terrorism).

India has previously articulated itself as a “norm-setter” and “innovator or inflector of particular forms of global knowledge and values” (Sullivan, p. 16). Considering its rapidly developing technological ability and self-promotion in the 2013 National Cyber Security Policy (NCSP)—which conveys India as a “global player” at the forefront of enhancing international cooperation in cyberspace and best practices for information security (India, Citation2013, p. 5)—it had been anticipated that India would harness its status as an influential cyber-diplomacy actor. However, in both the OEWG and AHC, the Indian delegations frequently fell back on a multi-alignment approach, supporting suggestions from both sides of the ideological divide.

India’s alignment with the West was evident in two primary themes, the first being that the OEWG and AHC should not be starting from scratch but develop on existing, relevant regional and UN processes. In the OEWG, India described the (mostly) European-led Program of Action as “a welcome development” (India, Citation2021d, p. 1). Furthermore, India claimed that the AHC would “benefit from the existing operating regional conventions against Cybercrimes” (India, Citation2021e, p. 1); this is perhaps surprising, given the most notable of existing cyber-crime conventions—the EU’s Budapest Convention—has been criticized by India for being “discriminatory, ineffective and detrimental to state sovereignty” (Ebert, Citation2020, p. 398), and for not having “a broader consultation mechanism during the drafting process, which deprived many countries of the opportunities to provide comments on the text” (Pawlak, Citation2019, p. 179).

Another way in which India, at least at the discursive level,Footnote15 had a “narrative alignment” (Miskimmon et al., Citation2015), with the West was through emphasizing its commitment to democratic values as the largest democracy in the world. In the OEWG, India stated that, “[a]s democracies, we are particularly vulnerable to these threats” (India, Citation2020e), in a sense distancing itself from non-democratic regimes. In the AHC, too, India emphasized its commitment to protecting democratic values and repeatedly committed itself to “maintaining an open, inclusive, free, fair, transparent, secure, stable and accessible process for all Member States to negotiate the International Convention on Cybercrimes on consensus basis” (India, Citation2021e, p. 1). Additionally, India shared how it was “heartening to note that a large number of countries have emphasized the issues of human rights, fundamental freedom, privacy of individual, protection of data and protection for victims of cybercrimes” (India, Citation2022b, p. 3).

However, in the OEWG India also showcased both its “developing nation” and sovereigntist narratives, praising itself for “contribut[ing] to the process in every way possible so that both the developing and developed countries voices are heard in right spirit” (India, Citation2021d, p. 1), and by supporting policy initiatives largely attributable to the “sovereigntist” group. In the OEWG, this was most apparent in India’s prioritization of international norms over law, and openness to the creation of new normative frameworks (India, Citation2021d, p. 1). Although India has previously acknowledged the applicability of international law to cyberspace (see Callanan et al., Citation2022, p. 15), in the OEWG India repeatedly calls for further deliberations on how to incorporate and define it, whilst refraining from outlining its own perspective (India, Citation2021d, p. 1; Citation2019b).

In the AHC, India sided with Russia, Iran and China by calling for a broad convention scope that included all crimes committed using ICTs, a key objective for authoritarian governments wanting stricter state control over online behavior, counter to the more narrowly defined scope put forth by most liberal states (India, Citation2022e, pp. 2–3; Citation2022g), and again in line with the responsive multilateralism advocated by the BRICS countries (Van Noort, Citation2017).

There is a partial misalignment between the narrative(s) India projected about the international system and how it should function. In the OEWG, the main insight into India’s view of the global order is through references to a top-down state approach to cyberspace (state-centrism) that privileges national security. For example, India was cautious of how cyber-activities could violate national sovereignty (India, Citation2019c) prioritizing instead its “national interest.” In the First Session of the AHC, India applied this same narrative to cyber-crime, arguing that UN Member States were the main actors in this domain and, although it “welcome[d] the participation of multi-stakeholders in giving their suggestions, feedbacks, etc. to UN Ad Hoc Committee on Cybercrime,” it was clearly outlined that decision-making and responsibility for the convention’s development lay primarily with states (India, Citation2021e, p. 1). By the Third Session of the AHC, the narrative changed slightly (akin to Russia), and became more in tune with that articulated in the NCSP which recognized the significance of private and corporate sector participation, the importance of public-private partnerships in cyberspace, and the need for creating a “consortium of government and private sector” (Citation2013, p. 6).

India acknowledged that it was important to consult with both the private sector and civil society on cyber-crime matters (India, Citation2022j), and suggested using Interpol to better communicate between stakeholders (India, Citation2022c, p. 1). India is very much concerned with cyber-crime (see Ebert, Citation2020)—as demonstrated by the multiple references to it in the OEWG—and places the private sector at the center of its policy response (India, Citation2022j, p. 2). Nevertheless, the ambiguity of India’s position on inclusive governance substantiates the claim that India oscillates between multilateralism and “nuanced multilateralism”—where stakeholders are welcome to be part of the conversation but not of the decision-making, the latter remaining a state prerogative (Abraham et al., Citation2018)—in cyberspace.

In the context of its national security narrative—and despite little evidence to suggest that cyberspace has been used for terrorism purposes (Ebert, Citation2020)—India seems particularly focused on cyberterrorism as a major threat to be addressed, a point also mentioned in the OEWG (India, Citation2019a). India has experienced numerous terrorist attacks which investigations found were facilitated by ICTs, albeit to varying degrees (Ebert, Citation2020, p. 385), spurring the government to implement harsher content moderation policies. Whilst cyber-terrorism is not discussed in India’s 2013 NCSP, more recent actions to counter cyber-terrorist threats include securing bilateral agreements on security and defense with Russia (in 2013, 2016 and 2018), and strengthening anti-terrorism partnerships within the Shanghai Cooperation Organization.

In the AHC, it was clearly expressed by India that cyber-terrorism “must be one of the major objectives of the convention on cybercrime” (India, Citation2022a, p. 2). In the First Session, India described a broad but vague list of ways in which ICTs can be used for terrorist purposes (India, Citation2022a, p. 2). During the Second Session, India submitted an extended contribution on cyber-terrorism, which recognized that “freedom of speech and expression of individuals is of paramount importance and should be protected,” but that society can only continue to “enjoy their fundamental freedoms, human rights and privacy rights provided that the social order is not disturbed by the malicious use of ICTs to propagate terrorism” (India, Citation2022d, p. 1). Finally, in the Third Session of the convention, India warned of how social media was radicalizing youths and financing terrorist activity (India, Citation2022j, p. 1).

As mentioned earlier, and in keeping with Indian Prime Minister Narendra Modi’s Atmanirbhar Bharat (self-reliant India) concept, one of India’s dominant policy narratives is around autonomy. To become a more autonomous cyber-actor, India prioritizes cyber-capacity building, creating resilient infrastructures and a more sophisticated cybersecurity framework. Illustrated in the 2013 NCSP which made plans for developing and manufacturing “indigenous security technologies” and “indigenously manufactured ICT products,” India views technological autonomy as a mean to achieving a trustworthy and secure cyber-ecosystem (p. 3, 8).

In the OEWG, the autonomy policy narrative is constructed around creating trustworthy supply chains. The Indian delegation claimed, “the lack of integrity of supply chains and use of harmful hidden functions can affect the entire ICT systems and potentially threaten the security of a State” (India, Citation2021c, p. 1). As a result, India requested greater emphasis was put on the need for states to “use trusted products and recognize the need to establish national measures for acquiring such items from trusted suppliers” (India, Citation2021c, p. 1). This is consistent with the state’s domestic initiatives to strengthen testing and regulation requirements for telecommunications, and characteristic of the Trusted Telecom Portal introduced in the 2021 National Security Directive (Deb, Citation2021). It is also likely part of India’s plan to reduce its dependence on Chinese supply chains, seen as a potential threat to Indian national cybersecurity (Ebert, Citation2020).

Although multi-alignment (Tharoor, Citation2013) has proven useful to India for advancing national interests, maintaining sovereignty and independence, and pursuing a more flexible and dynamic foreign policy on other multilateral fronts (Hall, Citation2016), it has also contributed to conflicting narratives in the OEWG and AHC, including on the balance between online freedoms and state sovereignty. India’s unclear stance on how international law applies in cyberspace further complicates India’s narrative projection and discursive ability to shape negotiations.

Despite the ambiguity that comes with adopting this multi-alignment position, India’s narratives utilize its agency to portray itself as an alternative voice, of a via media, between the authoritarian and liberal camps. Whereas the EU and Russia’s narratives are mostly targeting an international audience, India’s narratives have a stronger domestic message, most notably by highlighting its ambition to become a secure and technologically autonomous nation. In that regard, the resolution to India’s storylines often involves a bipartite development of its internal digital apparatus and the external regulation of cyberspace (both regarding crime and international security) that combines some of the priorities of the authoritarian group (focus on sovereignty) with those of the developing nations (stronger investment in capacity building). This conclusion is line with Basu’s broader point that much of India’s diplomatic contribution has been focused on “shoring up domestic cybersecurity resilience and building capacity” (Citation2023, p. 199). For how much longer India can straddle the competing interests of the liberals and sovereigntists on these issues without defining a clear vision of its own remains unclear, especially with no further update on the long-awaited Indian Cybersecurity Strategy.

Conclusion

The analysis of the EU, Russia, and India’s contributions to the OEWG and AHC offers us very significant insights into these actors’ positions vis-à-vis the multilateral governance of cyberspace. From a vertical perspective, we can assess the extent to which these actors’ system and identity narratives feed into their respective policy narratives around the two cyber-related issues. From a horizontal perspective, we can evaluate what the narrative continuities (or discontinuities) that have emerged between the two forums tell us about how cyber-crime is approached as part of a distinct regime from that of international cybersecurity. Additionally, we can draw conclusions as to whether each actor’s narratives align with the typical interests of their respective “grouping”—the liberals, the sovereigntists or the swing states, and what it means for the cyber-regime-complex more generally.

As presented in , the three actors analyzed in this article projected, with some nuance, their respective system and identity narratives to the international cybersecurity and cyber-crime domains. Our assumption was that these system and identity narratives would not be autonomous, but rather incorporated in the lowest of the three types—policy narratives. In all cases this assumption stands true. The EU’s force for good identity narrative and rules-based order system narrative directly facilitated its policy narratives around cooperation, development and capacity building; Russia’s identity narratives (Russophobia and anti-Westernism) and system narratives (sovereignty and multilateralism) served to justify Moscow’s policy narrative around norm-entrepreneurship; and even India, whose narratives were the most ambiguous of the three, managed to articulate its narratives around sovereignty (system), multilateralism (system), democracy (identity) and developing nation (identity) to support its policy narrative around technological autonomy and national security.

Table 1. EU, Russia, and India’s narratives, and the continuities and discontinuities between the OEWG and AHC.

Unlike other studies on the EUFootnote16, our research suggests that Brussels projects a coherent set of system and identity narratives in both the OEWG and AHC statements. The fact that the EU’s position in multilateral settings has to be agreed by its member states means its statements are more likely to stay close to its broader strategic narratives while also not deviating significantly between forums. Moreover, significant “similarities and synergies” have been found between the national cyber-strategies of EU member states and the cyber-policies of the EU itself, demonstrating that member-states take a generally unified approach to cybersecurity outside the confines of the Union (Štitilis et al., Citation2016, p. 1163).

The EU’s narratives seem to have two main goals: to counter threats to the status quoFootnote17 (rejection of international treaties to regulate responsible state behavior in cyberspace, refusal to expand the concept of cyber-crime) and to reinforce and promote the expansion of its liberal worldviewFootnote18 (through a democratic-value narrative, capacity building proposals and the defense of multistakeholderism). Underpinning these narratives is a certain idea of Westlessness, a sense of a world increasingly less Western-centric (Chen & Yang, Citation2022).

Russia’s strategic narratives are also visibly projected through the articulation of Russia’s policy preferences both within the OEWG and the AHC. Although some minor discontinuities were identified between forums in how Russia depicted the West, both portrayals can still be viewed as fragments of Russia’s wider narratives that seek to counter and delegitimize the Western liberal order. In that regard, and apart from a slightly more accommodating role for non-state actors, there’s not much evidence from Russia’s strategic narratives to suggest it views cyber-crime much differently to international cybersecurity, supporting the general assumption that the creation of the AHC was primarily about countering existing legal and diplomatic structures that tend to liberal ideals and processes. These conclusions tie neatly into Raymond and Sherman’s discussion of “authoritarian multilateralism” (Citation2024) and the role Russia plays alongside China in attempting to contest and transform the Western rules-based order, in cyberspace and beyond.

Our research also suggests that Russia actively uses the cyber-domain, regardless of the forum’s intended focus, to project its broader worldview, attempt to advance its position in the international system and influence policy to its advantage. Such a position is often warped around a narrative of being the voice of the majority, and, although we are not in a position to establish a causal link between its narratives and the effectiveness of Russia’s positions in this domain, the reality is that Russia’s proposals in both the OEWG and AHC have always found a strong supportive majorityFootnote19 amongst UN member states, particularly in Africa, where Russia’s influence in the cyber-domain has been very significant in the recent past (Ifeanyi-Ajufo, Citation2023).

India, on the other hand, is still in the process of developing a grand narrative that reflects the structure of the current international order and India’s role within it. The impact of this is reflected in multi-alignment, with India band-wagoning on the back of both the liberals and sovereigntists where it suits, without defining its own clear vision. This results in relatively disjointed fragments of system, identity and issue narratives emerging in the cyber-domain that in some instances do not align, and thus are likely to be less influential (Miskimmon et al., Citation2017a, p. 3). Whilst India may not have articulated a consistent set of narratives, there was significantly more engagement from the Indian delegation in the AHC than there was in the OEWG, and it is clear that India has a few domestic issues it seeks to prioritize in the cyber-domain (technological autonomy, cyber-terrorism). Some of these idiosyncrasies—such as India’s concern with cyber-terrorism in both the OEWG and AHC, or its constant balancing act between security and human rights—could potentially be explained by studying the articulation between its strategic narratives and domestic political agendas.Footnote20

A clearer willingness to engage in the AHC could thus be explained by the finding that “India’s attitudes toward multilateral agreements hinge on the latter’s ability to advance national interests” (Basu & Nachiappan, Citation2020, para 2). Nevertheless, India’s multi-alignment strategy is fundamentally symbolic of its status as a swing state. It could be argued that India is using strategic narratives at the UN neither to its full advantage, nor to show “a substantive or long-term commitment to advance an international agenda” in cyberspace (Deb, Citation2021).

As mentioned earlier, there’s a certain linearity to narratives as they help link the past, present and the future (Miskimmon et al., Citation2017a; Subotic, Citation2016). In a novel domain such as cyber, there is not much to dwell on when it comes to the past. The incorporation of (system and identity) narratives used elsewhere in cyberspace—be it a normative (EU), an anti-Western (Russian), or democratic (India) narrative—helps absorb the new into the old and therefore ensure a certain continuity of action for each actor.

In short, the existence of two different forums each on its own UNGA committee does not seem to impact significantly on the coherence of each of these actors’ strategic narratives, and it seems to fit within the macro-narratives in which they operate. The coherence issues identified in the Indian case are mostly related to the lack of clear—or potentially contradictory—identity and system narratives; they are not exclusive to cyberspace.

These conclusions have two implications for the study of both multilateralism and regime complexes, within cyberspace and beyond. First, despite the institutional separation of cyber-crime from international cybersecurity, all three actors understand there is a very strong continuum across the regime complex. In practice, this means that both issues—cyber-crime and international cybersecurity—benefit from being considered in a more holistic fashion. Second, the analysis of strategic narratives comes across as a highly valuable tool in understanding the overlaps and differences across different regimes of a complex in a multilateral setting.Footnote21 Starting from that point of interaction and moving backwards towards the strategic documents that frame an actor’s international behavior helps identify both the vertical dynamics mentioned earlier, but also the density of a regime complex measured in terms of how holistically its main actors treat the issue underpinning the complex, particularly in its early stages of formation as is the case with cyberspace.

Through the concept of narrative fragments, we have offered a new approach to the study of strategic narratives in multilateral settings, combining the analysis of broader strategic documents with the statements issued and uttered regarding specific issues in specific multilateral forums. In our view, this contributes to a more robust articulation between the three types of strategic narratives identified by Miskimmon et al. (Citation2015, Citation2017a, Citation2017b). Further studies on the other components of the cyber-regime complex may help substantiate what, for now, is only an insightful but partial claim.

Acknowledgements

The authors would like to thank Arindrajit Basu, Mark Raymond, Cristina Del Real, Xymena Kurowska, the special issue and journal editors, and the two anonymous reviewers for their very useful comments and suggestions. The usual disclaimer applies.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This work was supported by the Engineering and Physical Sciences Research Council [grant no EP/S022465/1] and by the Leverhulme Trust [grant no RF-2019-466].

Notes

1 By regimes, we adopt Krasner’s definition as “sets of implicit or explicit principles, norms, rules, and decision-making procedures around which actors' expectations converge in a given area of international relations” (Citation1985, p. 2).

2 For instance, in Nye’s model (Citation2014) crime is a standalone issue, whereas other security matters are divided into multiple issues such as war, sabotage, or espionage. Following a slightly different approach, Pawlak (Citation2019) divides the cyber-regime complex into six types of regimes: cyber-crime, peace and stability, security, internet governance, development and growth, and human rights.

3 Segal (Citation2016, p. 34) considers having the capacity to tell an attractive story about cyberspace as key to being a cyber-power. In his work on cyberspace as a metaphor, Branch (Citation2021) also highlights the importance of words in institutionally shaping how cyberspace is treated as a policy issue.

4 In that sense, they should not be confused with macro level narratives (see Shanahan et al., Citation2018).

5 Or multi-aligned (Tharoor, Citation2013), as many of the members of this group tend to choose sides depending on the issue. We thank Arindrajit Basu for making this point.

6 For a comparative analysis of US and Russia’s international cybersecurity narratives see Hansel, Citation2023.

7 Following Joseph Nye’s definition, “the cyber domain includes the Internet of networked computers but also intranets, cellular technologies, fiber-optic cables, and space-based communications. Cyberspace has a physical infrastructure layer that follows the economic laws of rival resources and the political laws of sovereign justification and control” (2011, p. 19).

8 We do not include the GGE in the analysis as these were not public meetings.

9 Although the EU is not a nation-state, it operates in these two forums as an aggregator of its member states’ positions. Whenever the EU intervenes or issues a statement, its member states will generally start their own interventions by supporting the EU’s. It is therefore a particularly helpful actor to analyse in terms of narratives.

10 What was supposed to be a short-lived expert forum eventually became a decade and a half long process, culminating in four consensual reports (2009, 2013, 2015, and 2021), the recognition of the applicability of international law to cyberspace (2013), and the development of 11 norms of responsible state behavior in cyberspace (2015).

11 To learn more on cyber-crime, see Shires (Citation2024).

12 In a piece co-authored by the Head of the Russian delegation, Andrei Krutskikh, argues that despite the early claims that the internet could be self-governed, it eventually “turned out that the warning of the Russian Federation about the possibility of threatening international peace and security through the malicious and hostile use of ICT on the Internet was well grounded” (Krutskikh & Streltsov, Citation2020, p. 261).

13 The Russian victimhood trope dates back to the Tsarist period that symbolizes “the rivalry of two cultural and civilizational models, as well as the conflict between two systems of values, those of the East and those of the West” (Darczewska & Żochowski, Citation2015, p. 6).

14 As pointed out by Krutskikh and Streltsov in a piece published during the first OEWG, Russia has frequently been at the receiving end of Western media’s “groundless accusations” (Citation2020, p. 262), including those associated with the interference in the 2016 US Presidential election. During the Second Substantive Session of the 3rd OEWG Meeting (February 2020), Ambassador Krutskikh would return to this issue in an unscripted intervention where he asked: “if international law as everyone is saying right now is applicable then I would like to ask: what are we doing here? If we're praying, then good for us. We are all turning to God and saying that cyberlaw exists and it’s applicable, but if it's applicable then why are foreign hackers electing the president of the US?”

15 The alignment of words does not necessarily ensure an alignment of priorities or intentionality.

16 According to Miskimmon’s assessment, “[t]he formation, projection, and reception of the EU strategic narrative is complicated by the hybrid nature of the institution—reflecting both supranational and intergovernmental aspects, which frustrates efforts to speak with a single European voice in international affairs” (2017, p. 85). However, as recognized in a later work, the current European Commission has been pushing for a more “forceful EU role in the world” (Miskimmon & O’Loughlin, Citation2021, p. 38). This could ultimately result in more coherent narratives across other foreign and security policy domains. This is certainly an area that deserves further research.

17 Pawlak (Citation2019) offers some useful insights on this when he says: “Given that most of the institutions and rules within the cyber regime complex were established in the 1990s and early 2000s, primarily under the European and American leadership, it is rather understandable why the positions adopted by the EU tend to favor status quo rather than support the emergence of new institutional and legal frameworks. It is clear, for instance, that any international negotiations for a new treaty for cyberspace would be more advantageous to the emerging economies and countries that did not fully participate in shaping the early days of the global cyber regime complex rather than to the EU. For this reason, the EU has also objected any attempts at regime shifting and contestation of existing institutions by China, India or Russia” (p. 186).

18 This is also in line with much of the literature, including Chen and Yang’s (Citation2022) assessment of the EU’s actorness in this domain.

19 This does not seem to come at the expense of the EU and like-minded states as seen in the voting for the Program of Action to advance responsible State behavior in the use of information and communications technologies in the context of international security—a diplomatic priority for the West. In November 2022, the OEWG adopted resolution A/C.1/77/L.73 with 157 votes in favor, 6 against and 14 abstentions. This happened a week after a Russian-led resolution A/C.1/77/L.23/Rev.1 reaffirming the centrality of the OEWG, was adopted by a recorded vote of 112 to 52, with 10 abstentions.

20 We would like to thank one of the anonymous reviewers for making this point.

21 As suggested by one of the reviewers, at a more generic level, additional work could be done on the potential effectiveness of narratives within and across UN forums and processes.

Reference list

  • Abraham, S., Batra, M., Hariharan, G., Barooah, S., & Bopanna, A. (2018). India's contribution to internet governance debates. NLUD Delhi Student Law Journal, 5, 1–25. cis-india.org/internet-governance/files/indias-contribution-to-internet-governance-debates/.
  • Allison, R. (2015). Contested understandings of sovereignty, the use of force and the wider international legal order: The political context. European Leadership Network, https://www.europeanleadershipnetwork.org/wp-content/uploads/2017/10/ELN-Narratives-Conference-Allison.pdf.
  • Allison, R. (2017). Russia and the post-2014 international legal order: Revisionism and realpolitik. International Affairs, 93(3), 519–543. https://www.jstor.org/stable/48569646.
  • Ashworth, L. (2015). Taking narratives seriously … taking history seriously? Critical Studies on Security, 3(3), 321–322. https://doi.org/10.1080/21624887.2015.1103006
  • Azelmat, M., & Ferrari, V. (2021, February 24). Let's talk cyber: Towards multistakeholder dialogue on cybersecurity. Association for Progressive Communications. https://www.apc.org/en/news/lets-talk-cyber-towards-multistakeholder-dialogue-cybersecurity.
  • Basu, A. (2023). India’s “passive” multistakeholder cyber diplomacy. In I. Johnstone, A. M. Sukumar, & J. Tractman (Eds.), Building an international cybersecurity regime. Multistakeholder diplomacy (pp. 199–217). Edward Elgar Publishing.
  • Basu, A., & Nachiappan, K. (2020, December 16). Will India negotiate in cyberspace? Leiden Security and Global Affairs. https://www.leidensecurityandglobalaffairs.nl/articles/will-india-negotiate-in-cyberspace.
  • Bischoping, K., & Gazso, A. (2015). Analyzing talk in the social sciences. SAGE Publications.
  • Branch, J. (2021). What's in a name? Metaphors and cybersecurity. International Organization, 75(1), 39–70. https://doi.org/10.1017/S002081832000051X
  • Callanan, C., Chandola, B., Ebert, H., Heinl, C., & Sarma, A. (2022). Enhancing global cybersecurity cooperation: European and Indian perspectives. Observer Research Foundation and ESIWA.
  • Chen, X., & Yang, Y. (2022). Different shades of norms: Comparing the approaches of the EU and ASEAN to cyber governance. The International Spectator, 57(3), 48–65. https://doi.org/10.1080/03932729.2022.2066841
  • Darczewska, J., & Żochowski, P. (2015). Russophobia in the Kremlin’s strategy: A weapon of mass destruction. (Report No. 56). Centre for Eastern Studies.
  • Deb, S. (2021, December 28). Cyber Security at the UN: Where Does India Stand? Part 2. The Centre for Communication Governance Blog. https://ccgnludelhi.wordpress.com/2021/12/28/cyber-security-at-the-un-where-does-india-stand-part-1/.
  • Drent, M., Holderied, M., Schout, A., Kassim, H., Korteweg, R., Van Loon, Y., Luining, M., Lukkexen, J., Molenaar, F., Schwieter, C., Vandenbroucke, F., & Zweers, W. (2018). State of the Union 2018: Towards better European integration. Netherlands Institute of International Relations.
  • Ebert, H. (2020). Hacked IT Superpower: How India secures its cyberspace as a rising digital democracy. India Review, 19(4), 376–413. https://doi.org/10.1080/14736489.2020.1797317
  • European Commission. (2014). Internet Policy and Governance: Europe’s Role in Shaping the Future of Internet Governance. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions.
  • European Commission. (2020). The EU’s cybersecurity strategy for the digital decade. Joint Communication to the European Parliament and the Council.
  • European External Action Service. (2016). Shared Vision, Common Action: A Stronger Europe: A Global Strategy for the European Union’s Foreign and Security Policy.
  • Finnemore, M., & Hollis, D. B. (2016). Constructing norms for global cybersecurity. The American Journal of International Law, 110(3), 425–479. https://ssrn.com/abstract=2843913.
  • Freedman, L. (2013). Strategy: A history. Oxford University Press.
  • Garcia, L. B. (2017). The ‘New narrative project’ and the politicization of the EU. Journal of Contemporary European Studies, 25(3), 340–353. https://doi.org/10.1080/14782804.2017.1348340
  • Gilbert, M. (2008). Narrating the process: Questioning the progressive story of European integration. Journal of Common Market Studies, 46(3), 641–662. https://doi.org/10.1111/j.1468-5965.2008.00795.x
  • Gorenburg, D. (2019). Russian foreign policy narratives. (Report No. 42). George C. Marshall European Center for Security Studies.
  • Hakmeh, J. (2022, March 31). Can a cybercrime convention for all be achieved? Chatham House. https://www.chathamhouse.org/2022/03/can-cybercrime-convention-all-be-achieved.
  • Hall, I. (2016). Multialignment and Indian foreign policy under narendra modi. The Commonwealth Journal of International Affairs, 105(3), 271–286. https://doi.org/10.1080/00358533.2016.1180760
  • Hansel, M. (2023). Great power narratives on the challenges of cyber norm building. Policy Design and Practice, 6(2), 182–197. https://doi.org/10.1080/25741292.2023.2175995
  • Human Rights Watch. (2022, March 1). Human Rights Watch’s Statement to Ad Hoc Committee on Cybercrime. https://www.hrw.org/news/2022/03/01/human-rights-watchs-statement-ad-hoc-committee-cybercrime.
  • Ifeanyi-Ajufo, N. (2023). Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation. Policy Design and Practice, 6(2), 146–159. https://doi.org/10.1080/25741292.2023.2199960
  • Karpchuk, N. (2021). The Russian federation propaganda narratives. Torun International Studies, 1(14), 19–30. https://doi.org/10.12775/TIS.2021.002
  • Keohane, R. O., & Victor, D. G. (2011). The regime complex for climate change. Perspectives on Politics, 9(1), 7–23. https://www.jstor.org/stable/41622723.
  • Kim, S. (2022). Roles and limitations of middle powers in shaping global cyber governance. The International Spectator, 57(3), 31–47. https://doi.org/10.1080/03932729.2022.2097807
  • Krasner, S. (1985). Structural causes and regime consequences: Regimes as intervening variables. In S. Krasner (Ed.), International regimes (pp. 1–22). Cornell University Press.
  • Krutskikh, A., & Streltsov, A. (2020). International information security: problems and ways of solving them. (E. Tikk, Trans.). In E. Tikk, & M. Kerttunen (Eds.), Routledge handbook of international cybersecurity (pp. 260–268). Routledge.
  • Liveley, G. (2022). Stories of cyber security combined report. Research Institute for Sociotechnical Cyber Security.
  • Malhotra, R. (2018). Weaving India’s MAHAKATHA (grand narrative) for the 21st century. Indian Institute of Advanced Studies.
  • Manners, I. (2002). Normative power Europe: A contradiction in terms? Journal of Common Market Studies, 40(2), 235–258. https://doi.org/10.1111/1468-5965.00353
  • Manners, I., & Murray, P. (2015). The End of a noble narrative? European integration narratives after the nobel peace prize. Journal of Common Market Studies, 54(1), 185–202. https://doi.org/10.1111/jcms.12324
  • Maurer, T., & Morgus, R. (2014). Tipping the Scale: An Analysis of Global Swing States in the Internet Governance Debate (Paper No. 7). Global Commission on Internet Governance.
  • Ministry of electronics and information technology. (2013). National Cyber Security Policy 2013.
  • Miskimmon, A., & O’Loughlin, B. (2017). Russia’s narratives of global order: Great power legacies in a polycentric world. Media, War & Conflict, 5(3), 111–120. https://doi.org/10.17645/pag.v5i3.1017
  • Miskimmon, A., & O’Loughlin, B. (2021). The EU’s struggle for a strategic narrative on China. In A. Miskimmon, B. O’Loughlin, & J. Zeng (Eds.), One belt, One road, One story? Towards an EU-China strategic narrative (pp. 19–43). Palgrave Macmillan.
  • Miskimmon, A., O’Loughlin, B., & Roselle, L. (2015). Strategic narratives: A response. Critical Studies on Security, 3(3), 341–344. https://doi.org/10.1080/21624887.2015.1103023
  • Miskimmon, A., O’Loughlin, B., & Roselle, L. (2017a). Introduction. In A. Miskimmon, B. O’Loughlin, & L. Roselle (Eds.), Forging the world. Strategic narratives and international relations (pp. 1–22). University of Michigan Press.
  • Miskimmon, A., O’Loughlin, B., & Roselle, L. (2017b). Strategic narratives: Methods and ethics. In A. Miskimmon, B. O’Loughlin, & L. Roselle (Eds.), Forging the world. Strategic narratives and international relations (pp. 23–55). University of Michigan Press.
  • Morse, J. C., & Keohane, R. O. (2014). Contested multilateralism. The Review of International Organizations, 9, 385–412. https://doi.org/10.1007/s11558-014-9188-2
  • Nye, Jr., J. S. (2014). The Regime Complex for Managing Global Cyber Activities. (Paper No. 1). Global Commission on Internet Governance.
  • Oates, S., Burrett, T., & Dubrovskaya, T. (2018). Russia’s public foreign policy narratives. Russian Analytical Digest, 229, 2–15. https://doi.org/10.3929/ethz-b-000311091
  • Paul, C., & Matthews, M. (2016). The Russian “firehose of falsehood” propaganda model: Why It might work and options to counter It. (Report No. PE-198-OSD). RAND Corporation.
  • Pawlak, P. (2019). The EU’s role in shaping the cyber regime complex. European Foreign Affairs Review, 24(2), 167–186. https://doi.org/10.54648/EERR2019011
  • Prizel, I. (2013). Nationalism in post-communist Russia: from resignation to anger. In A. Sorin (Ed.), Between past and future: The revolutions of 1989 and their aftermath (pp. 332–356). Central European University Press.
  • Raymond, M. (2016). Engaging security and intelligence practitioners in the emerging cyber regime complex. The Cyber Defense Review, 1(2), 81–94. https://www.researchgate.net/publication/311486874.
  • Raymond, M. (2021). Social practices of rule-making for international Law in the cyber domain. Journal of Global Security Studies, 6(2), 1–24. https://doi.org/10.1093/jogss/ogz065
  • Raymond, M., & DeNardis, L. (2015). Multistakeholderism: anatomy of an inchoate global institution. International Theory, 7(3), 572–616. https://doi.org/10.1017/S1752971915000081
  • Raymond, M., & Sherman, J. (2024). Authoritarian Multilateralism in the Global Cyber-Regime Complex: The Double Transformation of an International Diplomatic Practice. Contemporary Security Policy, 45(1), 110–140. https://doi.org/10.1080/13523260.2023.2269809.
  • Remler, P. (2020). Russia at the united nations: Law, sovereignty, and legitimacy. Carnegie Endowment for International Peace.
  • Roselle, L. (2017). Strategic narratives and great power identity. In A. Miskimmon, B. O’Loughlin, & L. Roselle (Eds.), Forging the world. Strategic narratives and international relations (pp. 56–84). University of Michigan Press.
  • Roselle, L., Miskimmon, A., & O’Loughlin, B. (2014). Strategic narrative: A new means to understand soft power. Media, War & Conflict, 7(1), 70–84. https://doi.org/10.1177/1750635213516696
  • Rosenbach, E., & Chong, S. M. (2019). Governing cyberspace: State control vs. the multistakeholder model. Belfer Center for Science and International Affairs.
  • Russian Federation. (2016). Doctrine of Information Security of the Russian Federation.
  • Schmitt, O. (2018). When are strategic narratives effective? The shaping of political discourse through the interaction between political myths and strategic narratives. Contemporary Security Policy, 39(4), 487–511. https://doi.org/10.1080/13523260.2018.1448925
  • Segal, A. (2016). The hacked world order: How nations fight, trade, maneuver, and manipulate in the digital age. Public Affairs.
  • Shanahan, E. A., Jones, M. D., & McBeth, M. K. (2018). How to conduct a narrative policy framework study. The Social Science Journal, 55(3), 332–345. https://doi.org/10.1016/j.soscij.2017.12.002
  • Shires, J. (2024). Career connections: negotiating content offences in the Budapest Convention on cybercrime. Contemporary Security Policy, 45(1), 45–71. https://doi.org/10.1080/13523260.2023.2274775
  • Stadnik, I. (2017). What is an international cybersecurity regime and how can we achieve it? Masaryk University Journal of Law and Technology, 11(1), 129–154. https://doi.org/10.5817/MUJLT2017-1-7
  • Stokes, J. (2012). How to Do media and cultural studies. SAGE Publications.
  • Strickling, L., & Hill, J. F. (2017). Multi-stakeholder internet governance: Successes and opportunities. Journal of Cyber Policy, 2(3), 296–317. https://doi.org/10.1080/23738871.2017.1404619
  • Subotic, J. (2016). Narrative, ontological security, and foreign policy change. Foreign Policy Analysis, 12, 610–627. https://www.jstor.org/stable/26168124.
  • Sukumar, A., Broeders, D., & Kello, M. (2024). The pervasive informality of the international cybersecurity regime: Geopolitics, non-state actors and diplomacy. Contemporary Security Policy, 45(1), 7–44. https://doi.org/10.1080/13523260.2023.2296739.
  • Sullivan, K. (2015). Competing visions of India in world politics: India’s rise beyond the rest. Palgrave Macmillan.
  • Štitilis, D., Pakutinskas, P., & Malinauskaite, I. (2016). EU and NATO cybersecurity strategies and national cyber security strategies: a comparative analysis. Security Journal, 30, 1151–1168. https://doi.org/10.1057/S41284-016-0083-9
  • Tharoor, S. (2013). Pax Indica. Penguin Books.
  • Trenin, D. (2021). Russia’s national security strategy: A manifesto for a New Era. Carnegie Endowment for International Peace.
  • Van Noort, C. (2017). Study of strategic narratives: The case of BRICS. Politics and Governance, 5(3), 121–129. https://doi.org/10.17645/pag.v5i3.961
  • Ziegler, C. (2016). Russia as a nationalizing state: Rejecting the Western liberal order. International Politics, 53, 555–573. https://doi.org/10.1057/s41311-016-0008-6

Document list used primary resources