This book is in draft until March 10th, 2025 for informational interviews.
Call for Contributions from Authors and AcademicsWe invite authors, researchers, and academics to contribute essays, chapters, or articles related to the topic of digital sovereignty. Your expertise and unique perspectives will help shape a well-rounded, interdisciplinary approach to understanding the geopolitical, legal, and technological implications of digital sovereignty. If you are interested in submitting your work or collaborating on this project, please reach out using the contact form below or schedule an interview to discuss your ideas.
Below are the chapters and brief outlines. Not a writer yourself? If there is a topic you feel should be discussed in greater depth, please suggest it in the comment box at the end of this page and start a conversation.
Below are the chapters and brief outlines. Not a writer yourself? If there is a topic you feel should be discussed in greater depth, please suggest it in the comment box at the end of this page and start a conversation.
Chapter One:
How Digital Sovereignty Shapes Nations
An introduction exploring global perspectives on how digital sovereignty is impacting nations today. This chapter delves into privacy, data rights, and emerging policy influenced by the historical evolution of human rights in the digital context.
- How Digital Sovereignty Shapes Nations
- An introduction from around the globe
- Privacy, data rights and emerging policy influenced by human rights history in digital context.
Chapter Two:
A Primer on Categorical Security
This chapter explores the intersection of NIST, ICAR, and Applied Category Theory, providing an understanding of the security knowledge graph and formal security methods. It outlines how security and sovereignty differ but how privacy practices can align with formal standards of both.
- NIST, ICAR and Applied Category Theory
- Security are sovereignty are not the same thing, but privacy practices can preform the same formal standard as this:
- Understanding the ecosystem behind formal methods of the security knowledge graph
Chapter Three:
A Primer on Modern Sovereignty
This chapter examines the evolving concept of sovereignty in a digital age. Topics covered include geopolitical sovereignty, changing borders, national privacy, human rights, and digital sovereignty. The chapter will also address computational justice and the extra-territoriality of digital spaces and regulation.
- Geopolitical Sovereignty
- Modern Sovereigns
- Changing Borders
- Changing Minds
- National Privacy Explained
- Human Rights vs Autonomy
- Digital Sovereignty
- Human Rights in Digital Commons
- Computational Justice
- Extra-territoriality of Digital Spaces and Regulation
- Modern Sovereigns
Chapter Four:
Limits and Advances in Criminal Sovereignty
Focusing on the boundaries of criminal sovereignty, this chapter explores privacy controls over open-source projects, the challenges of "Jekyll and Hyde" issues in technology, and innovative approaches such as honeypot surveillance and generative information rate-limiting.
- The Art of Removing Oneself
- Privacy controls over OS projects
- Solving for the Jekyll and Hyde Problem
- Designing for the power user
- Rate limiting generative information
- Getting creative with honeypot surveillance
Chapter Five:
National, Civil and Cyber Security
This chapter explores the sovereignty of nations from a digital perspective, examining how nations balance physical, political, and digital autonomy. Case studies include the Maur’i digital rights standards and their impact on privacy protections beyond national borders. The chapter will also cover the legacy of international treaties and their role in global politics.
- Nation Sovereignty - Nations with Sovereign Political Power
- Sovereign Autonomy in Action
- Each entity functions under three aspects of sovereignty: physical autonomy in geographic regions, political autonomy of citizens, and digital autonomy as formally recognized by a nation: like the Maur’i digital rights standards that are a world first for stringent privacy protections, and extend beyond their borders.
- Limits of Sovereign Engagement
- Recursive Publics and Traditional Sovereignty: Odd Bedfellows
- Legacy of International Treaty Enactments
- Dependent Nation Sovereignty - Treaties Relations in Global Politics
- Sovereign Autonomy in Action
Chapter Six:
Nation-State Strategies
An exploration of the traditional and digital use of force by nation-states, blending defense and open-source strategies. This chapter highlights the importance of transparency, specifically in secure kernel environments, and explores the significance of defence mechanisms in the digital age.
- The traditional use of Force, and Digital Force
- A Blended Reality: Defence and Open Source
- Understanding Kernel Transparency
- Defence in Transparency: the secure kernel before the internet
Chapter Seven:
sovereignty in Space Technology
This chapter examines how nations are asserting sovereignty in space technology, including the legal and political challenges surrounding space exploration, satellite technologies, and space-based communications.
1. Space Law and Treaties
2. Space Based Surveillance and Security
3. Control over Satellite and Communication Networks
4. Commercialisation of Space and Sovereignty
5. Future of Space Sovereignty
1. Space Law and Treaties
2. Space Based Surveillance and Security
3. Control over Satellite and Communication Networks
4. Commercialisation of Space and Sovereignty
5. Future of Space Sovereignty
Chapter Eight:
How Nations shape Digital Sovereignty
This chapter covers the relationship between modern citizens and the digital sovereignty they navigate. It also compiles global perspectives and notes on how nations are shaping their digital futures.
1. Modern Citizens and Subjects of Digital Sovereignty
2. Notes and Perspectives from around the World
1. Modern Citizens and Subjects of Digital Sovereignty
2. Notes and Perspectives from around the World