by CyJurII Scholar
Mariam BREGVADZE;[1]
29 July 2025
PDF available
ABSTRACT
Digital diplomacy, which is gaining traction alongside the development of the Internet, is critical for any state and its diplomatic ties. However, there are questions about how well the privacy of this connection is safeguarded and how breaking this privacy threatens national security.
Diplomacy, as a technique of establishing international connections and effectively implementing them, has changed international relations between states as a result of digital technological advancement. As a result, technical developments have covered all aspects of international interactions, including diplomacy. To avoid future problems, it is in the best interests of any state to secure its affairs to the greatest extent possible. Today, everything is based on digital broadcasting, which, on the one hand, enables inter-state contact while, on the other, jeopardizes the security of information conveyed via digital tools.
Based on a comparative analysis, we examine the activities of various nations and explore the factors that make digital diplomacy a threat to state unions.
Keywords: Digital diplomacy, States Security, Cyber Security, International Relations.
Introduction
The emergence of digital tools such as the telegraph, computer, and smartphone has revolutionized how diplomacy is conducted. With ongoing innovation, faster-acting tools were needed to support states' diplomatic functions. Social networks like Twitter and Facebook became integral to this evolution. For instance, "Twiplomacy," born from Twitter's diplomatic use, illustrates how digital diplomacy incorporates social platforms into traditional practices.
Diplomacy, the art of conducting foreign policy, continuously adapts to global trends. Classical diplomacy, which originated centuries ago, has evolved into digital diplomacy with the rise of modern technologies.
Since the COVID-19 pandemic, digital diplomacy has become even more vital. The global lockdown forced states to rely on digital means for communication. Government agencies increasingly used social media to share messages. This marked a new era beginning in the early 2000s.
Digital diplomacy brings about substantial change. However, it raises concerns: Is digital diplomacy adequately protected? As digital tools proliferate, so do cyber threats. These include cyber espionage, attacks on diplomatic missions, disinformation campaigns, and cyber manipulation. Thus, we must ask: how secure is digital diplomacy, and what reforms are necessary?
The Evolution of Diplomacy in the Digital Era
Classical diplomacy dates back to ancient Greece and Rome but has continually evolved. In the cyber age, diplomacy addresses not only political matters but also security, economic, and cultural issues.
The "digitalization" of diplomacy began with the use of the telegraph and radio. In the 1860s, British Prime Minister Lord Palmerston famously remarked, "Oh God, this is the end of diplomacy," upon the telegraph's introduction. Despite his pessimism, it marked a new era. Subsequent innovations included cable phones, cell phones, and fax machines.
The Internet's rise in the 1990s further integrated technology into diplomacy. In 2007, Sweden opened a virtual embassy in Second Life, symbolizing this shift. The first major digital diplomacy event of the 21st century was the Arab Spring (2010–2012).
In Tunisia, Mohamed Bouazizi's self-immolation sparked mass protests, widely publicized through Facebook and Twitter. Citizens bypassed state-controlled media, while international organizations used social media to respond. The US State Department even communicated directly with protesters. Conversely, authoritarian regimes used cyber tools to suppress dissent.
The Arab Spring revealed digital diplomacy's dual nature—empowering citizens yet enabling state repression.
Cybersecurity Challenges in International Relations
The invention of personal computers and the Internet in the late 20th century gave rise to cybercrime. Cyberspace, which developed throughout the 1970s to 1990s, presented new challenges.
To address these threats, states introduced domestic laws. The Council of Europe's Convention on Cybercrime (2001) was the first international treaty for cooperation in emergencies.
Today, the UN is drafting a global cybercrime convention to protect both individuals and states.
Cyber threats in diplomacy include:
· Disinformation: E.g., Russia allegedly used misinformation to oppose Sweden's NATO bid (2017).
· Cyber Attacks: Embassies may face viruses or server attacks, disrupting communication.
· Cyber Sabotage: The WikiLeaks release (2010) strained U.S. diplomatic relations.
· Cyber Manipulation: Russian hackers breached the German Bundestag (2015), prompting EU sanctions.
Such attacks undermine diplomatic trust and reveal the fragility of digital security. The vast nature of cyberspace makes it difficult to regulate effectively.
Digital Diplomacy as a Tool for Security
Despite risks, digital diplomacy also strengthens security. "Cyber diplomacy" refers to negotiations dealing with cyberspace-related issues.
Cyber diplomacy helps prevent social engineering attacks (e.g., phishing) and promotes global cooperation to mitigate cyber threats. It aims to balance national security and individual rights.
Although an explicit legal framework is lacking, some governments pursue bilateral agreements:
· US–Russia (2013, 2021): Dialogues on information security.
· US–China (2015): Agreement to reduce cyber espionage.
The Tallinn Manual 2.0 is a key resource outlining legal norms, though non-binding.
Cyber diplomacy remains essential in today’s realpolitik, helping states regulate threats and maintain global peace.
Conclusion
Digital diplomacy plays a vital yet paradoxical role in international relations. As a tool for both connection and conflict, it can either enhance state security or expose vulnerabilities.
To mitigate risks, states must:
· Develop clear international frameworks to govern cyberspace.
· Enhance cybersecurity at diplomatic missions.
· Promote transparency and trust among global actors.
Policy Recommendations:
· Create binding multilateral treaties on cyber norms.
· Train diplomatic staff in cybersecurity.
· Launch joint monitoring initiatives through UN agencies.
Future Research Directions:
· Analyze the role of AI and quantum tech in diplomacy.
· Study digital diplomacy’s influence on non-state actors and hybrid warfare.
Until stronger global mechanisms are established, digital diplomacy will remain an unstable equilibrium between progress and peril.
References:
Adesina, Olubukola S. 2017. "Foreign Policy in an Era of Digital Diplomacy." Cogent Social Sciences, August 31. https://doi.org/10.1080/23311886.2017.1297175
Bradshaw, Samantha. 2015. "Digital Diplomacy - #NotDiplomacy." Centre for International Governance Innovation, April 7. https://www.cigionline.org/articles/digital-diplomacy-notdiplomacy/
Council of Europe. 2001. Convention on Cybercrime. European Treaty Series No. 185. Budapest, November 23. https://rm.coe.int/16800cce5b
European Council. 2020. "Malicious Cyber-Attacks: EU Sanctions Two Individuals and One Body over 2015 Bundestag Hack." October 22. https://www.consilium.europa.eu/en/press/press-releases/2020/10/22/malicious-cyber-attacks-eu-sanctions-two-individuals-and-one-body-over-2015-bundestag-hack/
Federal Office for Information Security (BSI). 2015. The State of IT Security in Germany 2015. https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2015.pdf
Ghosh, Kathakali Abhijit. 2019. "The Evolution of Diplomacy: From Classical to Modern." Millennial Asia.
Heller, Kevin Jon. 2007. "Sweden Opens Second Life Embassy." Opinio Juris, January 30. https://opiniojuris.org/2007/01/30/sweden-opens-second-life-embassy/
Mushtaq, Abdul Qadir, and Muhammad Afzal. 2017. "Arab Spring: Its Causes and Consequences." Journal of the Punjab University Historical Society 30 (1). https://tehqeeqat.com/downloadpdf/25342
Özekin, Muhammed Kürşad, and Hasan Hüseyin Akkaş. 2014. "An Empirical Look to the Arab Spring: Causes and Consequences." Alternatives: Turkish Journal of International Relations 13 (1-2). https://ciaotest.cc.columbia.edu/journals/tjir/v13i1/f_0033740_27513.pdf
Radanliev, Petar. 2024. "Cyber Diplomacy: Defining the Opportunities for Cybersecurity and Risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing." Journal of Cyber Policy. https://doi.org/10.1080/23742917.2024.2312671
Ray, Michel. 2024. "WikiLeaks, a Media Organization and Website."
Ritto, Luis. 2014. "Diplomacy and Its Practice vs Digital Diplomacy." Diplomat Magazine, September 7. https://diplomatmagazine.eu/2014/10/18/diplomacy-practice-vs-digital-diplomacy-2/
Rollins, John W. 2015. "U.S.–China Cyber Agreement." October 16. https://sgp.fas.org/crs/row/IN10376.pdf
Schjolberg, Stein. 2008. "The History of Global Harmonization on Cybercrime Legislation: The Road to Geneva." December. https://www.cybercrimelaw.net/documents/cybercrime_history.pdf
Schmitt, Michael N. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. https://www.onlinelibrary.iihl.org/wp-content/uploads/2021/05/2017-Tallinn-Manual-2.0.pdf
The White House Office of the Press Secretary. 2013. "FACT SHEET: U.S.-Russian Cooperation on Information and Communications Technology Security." June 17. https://obamawhitehouse.archives.gov/the-press-office/2013/06/17/fact-sheet-us-russian-cooperation-information-and-communications-technol
Topor, Lev, and Alexander Tabachnik. 2021. "Russian Cyber Information Warfare: International Distribution and Domestic Control." Journal of Advanced Military Studies 12 (1). https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-12-no-1/Russian-Cyber-Information-Warfare/
United Nations. 2024. "Member States Finalize a New Cybercrime Convention." United Nations Office on Drugs and Crime, August 9. https://www.unodc.org/unodc/frontpage/2024/August/united-nations_-member-states-finalize-a-new-cybercrime-convention.html
World Economic Forum. 2021. "What the Biden-Putin Summit Reveals about Future of Cyber Attacks - and How to Increase Cybersecurity." June 17. https://www.weforum.org/agenda/2021/06/joe-biden-vladimir-putin-summit-cybersecurity/
[1] MA Diplomacy and International Politics;
mariambregvadze2@gmail.com