Skip to main content

Between War & Peace: Considering the Statecraft of Cyberspace

  • Chapter

Abstract

This chapter considers how cyber-enabled diplomacy may be undertaken by the United States. While much discussion over the past decade has been dedicated to the topic of cyber warfare, less has attention has been directed at the use of cyber instruments (IT, social media, the blogosphere, etc.) in diplomatic engagement. Considered and critiqued here is the international cyber strategy enunciated by the Obama Administration in May 2011, regarding cyber issues and how that strategy factors into U.S. diplomatic initiatives. Covered are the: (a) emergence of cyberspace as venue for diplomacy; (b) framing of the strategy; (c) coverage of major incidents for consideration; and (d) prescriptive elements for policy development under the heading of cyber statecraft.

The research and views expressed in this paper are those of the individual researcher and do not necessarily represent the views of the James A. Baker III Institute for Public Policy or Rice University.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    On the broad concept of cyberpower, consider (Sheldon 2011b).

  2. 2.

    The flaw indicated here is the Internet’s development from the high-trust ARPANET research network, which was constructed to an architecture largely unconcerned with malicious actors’ access to it.

  3. 3.

    And warnings about information security issues (Johnson 2005).

  4. 4.

    This should be the raison d’etre for State’s 21st Century Statecraft initiatives, some of which echo the ideas contained within Condoleezza Rice’s concept of Transformational Diplomacy.

  5. 5.

    Established when the United States Information Agency merged with the Department of State in 1999.

  6. 6.

    The term “use case” is commonly utilized in IT management and software development projects. It simply is the definition of a user directed function, for example Print or Save.

  7. 7.

    Considering the how IT may either provide added evolutionary improvement or revolutionize the way business is done (Varian and Shapiro 1998).

  8. 8.

    The dialog is also multi-lingual, with comments in Arabic and French as well as English. Also, not to be discounted is Tunisian press coverage of leaked U.S. Embassy Tunis cables reporting excess and splendor among the ruling elite (Black 2011).

  9. 9.

    When a technology update was due to be undertaken by the company, a State Department official asked for the work to be delayed so that real time information would continue to flow from Tehran and other sites of protests against the election results after internal security forces silenced foreign correspondents and removed them from the country.

  10. 10.

    The Myanmar government severed its outbound Internet service within 24 hours of the killing of Japanese photojournalist Kenji Nagai on September 27, 2007 by a Burmese soldier.

  11. 11.

    Charney’s four categories: espionage, cybercrime, intellectual theft and cyberwar, is a useful heuristic (Charney 2010).

  12. 12.

    There is a very blurry gray area regarding the line between corporate and national espionage especially considering the role of nationally-subsidized or state run companies in many sectors, including energy, aviation, and telecommunications.

  13. 13.

    Cyber attacks against institutions in Estonia including telecommunications, banking and government services were precipitated by the Estonian government’s decision to move the Soviet Bronze Soldier of Tallinn monument to the Great Patriotic War to a military cemetery in Tallinn’s suburbs from a location in the city’s core.

  14. 14.

    A botnet is a network of compromised computers that perform instructions clandestinely at the direction of an unauthorized party.

  15. 15.

    A perfectly reasonable suggestion found in Clarke and Knake’s Cyberwar.

  16. 16.

    Despite numerous news stories detailing the vulnerability Stuxnet exploits in the Siemens S7-series process controllers, shares of Siemens AG rose from US$60 to over US$90 over the 52-week period ending on January 21, 2011. Stuxnet, nor any other major development in understanding SCADA vulnerability appears to have harmed the company’s valuation.

References

  • Adams, J. (2001). Virtual defense. Foreign Affairs. May/June 2001.

    Google Scholar 

  • Aid, M. (2009). The secret sentry: the untold history of the national security agency. New York: Bloomsbury Press.

    Google Scholar 

  • Amoroso, E. (2011). Cyber attacks: protecting national infrastructure. Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Bain, B. (2007). Chat room diplomacy. Federal Computer Week. 3 September 2007.

    Google Scholar 

  • Bendrath, R., Eriksson, J., & Giacomello, G. (2007). From ‘cyberterrorist’ to ‘cyberwar’, back and forth: how the United States securitized cyberspace. In J. Eriksson & G. Giacomello (Eds.), International relations and security in the digital age, Routledge: London.

    Google Scholar 

  • Black, I. (2011). Tunisia: the WikiLeaks connection. The Guardian. 15 January 2011.

    Google Scholar 

  • Broad, W. (2010). Report suggests Iran’s nuclear effort has problems. New York Times. 24 November 2010.

    Google Scholar 

  • Broad, W., Markoff, J., & Sanger, D. E. (2011). Israeli test on worm called crucial in Iran nuclear delay. The New York Times. 15 January 2011.

    Google Scholar 

  • Bronk, C. (2010). Treasure trove or trouble: cyber-enabled intelligence and international politics. American Intelligence Journal, 28(2).

    Google Scholar 

  • Charney, S. (2010). Rethinking the cyber threat. Microsoft Corporation. May 2010.

    Google Scholar 

  • Clarke, R. (2010). Cyberwar: the next threat to national security and what to do about it. New York: Ecco.

    Google Scholar 

  • Clinton, H. (2010). The first quadrennial diplomacy and development review. Washington: U.S. Department of State, p. 7.

    Google Scholar 

  • Crosston, M. (2011). World gone cyber MAD—how ‘mutually assured debilitation’ is the best hope for cyber deterrence. Strategic Studies Quarterly. Spring 2011.

    Google Scholar 

  • Deibert, R., & Rohozinski, R. (2011). The new cyber military-industrial complex. The Globe and Mail. 28 March 2011.

    Google Scholar 

  • Demchak, C., & Dombrowski, P. (2011). Rise of a cybered Westphalian age. Strategic Studies Quarterly. Spring 2011.

    Google Scholar 

  • Dipert, R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4). December 2010.

    Google Scholar 

  • Dizard, W. (2001). Digital diplomacy: U.S. foreign policy in the information age. Washington: Center for Strategic and International Studies.

    Google Scholar 

  • Dodds, P., & Satter, R. (2011). International law covers threats, cyber chief says. Associated Press.

    Google Scholar 

  • Dunn Cavelty, M. (2008). Cyber-security and threat politics: US efforts to secure the information age. London: Routledge.

    Google Scholar 

  • Johnson, J. (2005). Cyber security at state: the stakes get higher. Foreign Service Journal. September 2005.

    Google Scholar 

  • Johnson, J. (2009). The next generation. Foreign Service Journal. October 2009.

    Google Scholar 

  • Kissinger, H. (2011). The China challenge. Wall Street Journal. 14 May 2011.

    Google Scholar 

  • Langner, R. (2011). How to hijack a controller: why stuxnet isn’t just about Siemens’ PLCs. http://www.controlglobal.com/articles/2011/IndustrialControllers1101.html. Retrieved 27 January 2011.

  • Lewis, J. (2010). Cyber war and competition in the China-U.S. relationship. Remarks delivered at the China Institutes of Contemporary International Relations. 13 May 2010.

    Google Scholar 

  • Manjikian, M. M. (2010). From global village to virtual battlespace: the colonizing of the Internet and the extension of realpolitik. International Studies Quarterly, 54(2).

    Google Scholar 

  • Morozov, E. (2011). The net delusion: the dark side of Internet freedom. New York: Public Affairs.

    Google Scholar 

  • Munro, N. (1995). The Pentagon’s new nightmare: an electronic Pearl Harbor. Washington Post. 16 July 1995.

    Google Scholar 

  • Nye, J. (2010). Cyber power. Belfer Center for Science and International Affairs. May 2010.

    Google Scholar 

  • Nye, J. (2011). The future of power. New York: Public Affairs.

    Google Scholar 

  • Obama, B. (2011). International strategy for cyberspace, prosperity, security and openness in a networked world. Washington: The White House.

    Google Scholar 

  • Panetta, L. (2011). Strategy for operating in cyberspace. Washington: U.S. Department of Defense.

    Google Scholar 

  • Pellerin, C. (2011). White house launches international cyber strategy. American Forces Press Service. http://www.defense.gov/news/newsarticle.aspx?id=63966.

    Google Scholar 

  • Perlez, J. (2001). State dept.’s work rules: Powell’s free and easy guide. New York Times. 26 January 2001.

    Google Scholar 

  • Safire, W. (2004). The farewell dossier. The New York Times. 2 February 2004.

    Google Scholar 

  • Schmidt, H. (2011). Launching the U.S. international strategy for cyberspace. The White House Blog. 16 May 2011.

    Google Scholar 

  • Schneier, B. (2010). Book Review: Cyber war, Schneier on Security. 21 December 2010. http://www.schneier.com/blog/archives/2010/12/book_review_cyb.html. Retrieved 2 January 2011.

  • Shanker, T. (2010). Cyberwar nominee sees gaps in law. New York Times. 14 April 2010.

    Google Scholar 

  • Sheldon, J. (2011a). Stuxnet and cyberpower in war. World Politics Review. 19 April 2011.

    Google Scholar 

  • Sheldon, J. (2011b). Deciphering cyberpower, strategic purpose in peace and war. Strategic Studies Quarterly. Summer 2011.

    Google Scholar 

  • Shirky, C. (2011). The political power of social media. Foreign Affairs. January–February 2011.

    Google Scholar 

  • Sommer, P., & Brown, I. (2011). Reducing systemic cybersecurity risk. Future Global Shocks, OECD.

    Google Scholar 

  • Spafford, E. (2003). Cyber terrorism: the new asymmetric threat. Testimony before the House Armed Services Committee Subcommittee on Terrorism, Unconventional Threats and Capabilities. 24 July 2003.

    Google Scholar 

  • The Economist (2011). The leaky corporation. 26 February 2011.

    Google Scholar 

  • Varian, H., & Shapiro, C. (1998). Information rules: a strategic guide for the information economy. Cambridge: Harvard University Press.

    Google Scholar 

  • Wall, D. (2007). Cybercrime: the transformation of crime in the information age. Malden: Polity Press.

    Google Scholar 

  • Westby, J. (2010). First worldwide cybersecurity summit, Dallas, Texas, 4 May 2010.

    Google Scholar 

  • Wheeler, D. (2006). Empowering publics: information technology and democratization in the Arab World: lessons from Internet cafes and beyond (Oxford Internet Institute Research Report No. 11). The best answer is likely both.

    Google Scholar 

  • Y (2011). A national strategic narrative. Woodrow Wilson International Center for Scholars.

    Google Scholar 

  • Zuckerberg, M. (2012). One billion people on Facebook. 4 October 2012. http://newsroom.fb.com/News/One-Billion-People-on-Facebook-1c9.aspx. Accessed 19 October 2012.

Download references

Acknowledgements

This paper was aided in no small measure by conversation and correspondence with Shiu-Kai Chin, William A. Conklin, John Dinger, Edward Djerejian, Sandro Gaycken, Gary Galloway, Rex Hughes, Kamal Jabbour, Cody Monk, Stefaan Verhulst, John Villasenor and Dan Wallach.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chris Bronk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Bronk, C. (2013). Between War & Peace: Considering the Statecraft of Cyberspace. In: Krüger, J., Nickolay, B., Gaycken, S. (eds) The Secure Information Society. Springer, London. https://doi.org/10.1007/978-1-4471-4763-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4763-3_1

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4762-6

  • Online ISBN: 978-1-4471-4763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics