Abstract
Cyberspace is barely two decades old. Yet it is already globally pervasive, powerfully disrupting perceptions and realities in the legacy spaces; on the land, at sea and in the air where human beings live, move and work. The pace at which its influence is spreading and intensifying is amazing; the number and reach of the consequences arguably even more so, and they continue to emerge, mash-up and surprise. For humanity and its planet, an acceptable future depends on ‘seeing’ and understanding Cyberspace well enough to do two things; manage and exploit it successfully in the present, and make timely, flexible preparations for a future that is uncertain, except in that it will be different to today, in no small part because it will be substantially shaped by the state of and actions in the Cyberspace. This chapter is a first attempt to explain why Cyberspace has become so important so quickly and describe briefly the most meaningful of its initial consequences, all with the aim to promote strengthening the good in Cyberspace while keeping the bad in check.
Submitted: 4.10.16; Accepted: 3.11.2016.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Rare, but not never. Parts of Donald Trump’s 1995 tax returns were mailed in August 2016 to a NYT reporter. See http://www.nytimes.com/2016/10/02/us/politics/donald-trump-taxes.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=b-lede-package-region®ion=top-news&WT.nav=top-news&_r=0.
- 2.
In 2008, in a private discussion late one evening at the US Army War College in Carlisle, Penn with members of its Strategic Studies Institute, the author was asked if he had heard of the ‘theft from the US Treasury’. He had not, and said so, upon which he was told, confidentially, that ‘someone’ had ‘looted the US’ of more than 1 trillion ‘in the seconds it took for the defences to kick in’. The event was never reported in US media (or anywhere else for that matter, to the author’s knowledge).
- 3.
On 29 Jul 2016, John O. Brennan, the Director of the Central Intelligence Agency, made clear that while spying on each other’s political institutions is fair game, making data public—in true or altered form—to influence an election is a new level of malicious activity, far different from ordinary spy versus spy maneuvers. See http://www.nytimes.com/2016/07/31/us/politics/us-wrestles-with-how-to-fight-back-against-cyberattacks.html?&moduleDetail=section-news-2&action=click&contentCollection=Politics®ion=Footer&module=MoreInSection&version=WhatsNext&contentID=WhatsNext&pgtype=article.
- 4.
Foresight Canada (FC) definition of Strategic Foresight: The integrated capacity to see, think through and do what needs to be done NOW in the light of history-altering implications of the weak signals of change, while there is still time to act pro-actively and creatively and before hidden opportunities are lost and unseen threats have become crises.
References
Aeon (2016) The internet as an engine of liberation is an innocent fraud. Retrieved from https://aeon.co/essays/the-internet-as-an-engine-of-liberation-is-an-innocent-frau
Assange J (2016) WikiLeaks’ Assange promises leaks on US election. Canadian Press, 4 Oct 2016. Retrieved from http://www.msn.com/en-ca/news/world/wikileaks-assange-promises-leaks-on-us-election-google/ar-BBwYBiG
BBC (2016) Swiss endorse new surveillance powers. BBC 25 Sept 2016. Retrieved from: http://www.bbc.com/news/world-europe-37465853
Bell S (2016) Canada’s counter-radicalization efforts have ‘little national coherence,’ Public safety minister says. National Post, 14 Aug 2016. Retrieved from http://news.nationalpost.com/news/canadas-counter-radicalization-efforts-have-little-national-coherence-public-safety-minister-says
Buzan B (1987) An introduction to strategic studies: military technology and international relations. Palgrave Macmillan, London
Carr N (2016) Utopia is creepy: and other provocations. WW Norton & Company, New york
CBC News (2016) ‘He knew I was pregnant.’ Woman scrambling for housing after apartment scam. CBC News Toronto, 16 Sept 2016. Retrieved from: http://www.cbc.ca/news/canada/toronto/rental-scam-follow-1.3766908
Consumer Reports (2011) Your security. Consumer reports, June 2011
Cybersecurity Ventures (2016) Meet the hot cybersecurity companies to watch in 2016. Retrieved from http://cybersecurityventures.com/cybersecurity-500/
Economist (2014) Cyber-security: defending the digital frontier. The Economist, Special Report of 12th Jul 2014
Foreign Affairs (2016) ISIS’ Virtual Puppeteers. Foreign Affairs Daily Post, 23 Sept 2016
Gibson W (1984) Neuromancer. Ace Book, New York
Harries D (2016) Scanning. Ottawa workshop for the Canadian Association of the Club of Rome: Climate Change Foresight, 8–9 Aug 2016
Kasulis K (2016) YouTube may be teaching someone to spy on you. Boston globe, 24 Sept 2016. Retrieved from: http://www.bostonglobe.com/ideas/2016/09/24/youtube-may-teaching-someone-spy
La Pointe C, Levin PL (2016) Automated war. Foreign Affairs Daily Post, 5 Sept 2016. Retrieved from: https://www.foreignaffairs.com/articles/2016-09-05/automated-war?cid=nlc-fatoday-20160907&sp_mid=52244007&sp_rid=amRzaGFycmllc0BiZWxsLm5ldAS2&spMailingID=52244007&spUserID=MjEwNDg3MDc3MTcwS0&spJobID=1001299689&spReportId=MTAwMTI5OTY4OQS2
MacFarquhar N (2016) A powerful russian weapon: the spread of false stories. NYT, 28 Aug 2016. Retrieved from: http://www.nytimes.com/2016/08/29/world/europe/russia-sweden-disinformation.html
McGill A (2016) Can Twitter fit inside the Library of congress? The Atlantic, 4 Aug 2016
Morgan S (2016) Cyber crime costs projected to reach $2 trillion by 2019. Retrieved from: http://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#7ac44e733bb0
Nakashima E (2016) Powerful NSA hacking tools have been revealed online. Washington Post, 16 Aug 2016. Retrieved from: https://www.washingtonpost.com/world/national-security/powerful-nsa-hacking-tools-have-been-revealed-online/2016/08/16/bce4f974-63c7-11e6-96c0-37533479f3f5_story.html
New York Times (2016a) Snowden leaks lllegal but were ‘a public service,’ eric holder says, The New York Times, 1 Jun 2016. Retrieved from: http://www.nytimes.com/2016/06/01/us/holder-says-snowden-performed-a-public-service.html?action=click&contentCollection=U.S.&module=RelatedCoverage®ion=EndOfArticle&pgtype=article
New York Times (2016b) Is democratic national committee email hacker a person or a russian front experts aren’t? NYT 28 Jul 2016. Retrieved from: http://www.nytimes.com/2016/07/28/us/politics/is-dnc-email-hacker-a-person-or-a-russian-front-experts-arent
New York Times (2016c) US wrestles with how to fight back against cyberattacks. NYT, 31 Jul 2016. Retrieved from: http://www.nytimes.com/2016/07/31/us/politics/us-wrestles-with-how-to-fight-back-against-cyberattacks.html?&moduleDetail=section-news-2&action=click&contentCollection=Politics®ion=Footer&module=MoreInSection&version=WhatsNext&contentID=WhatsNext&pgtype=article
New York Times (2016d) Hack of Democrats’ Accounts was wider than believed, officials say, NYT 11 Aug 16. Retrieved from: http://www.nytimes.com/2016/08/11/us/politics/democratic-party-russia-hack-cyberattack.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=first-column-region®ion=top-news&WT.nav=top-news&_r=0
Ramzy A (2016) Australia stops online collection of census data after cyberattacks. NYT 10 Aug 2016. Retrieved from: http://www.nytimes.com/2016/08/11/world/australia/census-cyber-attack.html?ref=world
Ruiz RR (2016) Russian hackers leak U.S. star athletes’ medical information. Retrieved from: http://www.theglobeandmail.com/sports/wada-claims-russian-cyber-espionage-group-has-hacked-its-systems/article31849291/
Sanger DE (2016) U.S. wrestles with how to fight back against cyberattacks, NYT 30 Jul 2016. Retrieved from: http://www.nytimes.com/2016/07/31/us/politics/us-wrestles-with-how-to-fight-back-against-cyberattacks.html?&moduleDetail=section-news-
Satter R, Cheslow D (2016) Apple issues iOS patch to thwart powerful spyware. Boston Globe, 25 Aug 2016. Retrieved from: http://www.bostonglobe.com/business/2016/08/25/apple-boosts-iphone-security-after-mideast-spyware-discovery/9vbGynNGtoCrFlJXVD0mOI/story.html?s_campaign=email_BG_TodaysHeadline&s_campaign=
Snowden E (2014) NYT 11 Aug 2016. Retrieved from: http://www.nytimes.com/2016/08/11/us/politics/democratic-party-russia-hack-cyberattack.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=first-column-region®ion=top-news&WT.nav=top-news&_r=0
Tsygankov A (2016) How cyber power fits into Russia’s current foreign policy, russia direct, 3 Oct 2016. Retrieved from: http://www.russia-direct.org/profile/andrei-tsygankov
Tremonti AM (2016) The Current. 22 Aug 2016. Retrieved from: http://www.cbc.ca/radio/thecurrent
Waterloo Chronicle (2016) Chinese in Canada feel chill of Beijing’s reach. Retrieved from: http://m.waterloochronicle.ca/news-story/6827912-chinese-in-canada-feel-chill-of-beijing-s-reach
Weintraub P (2016) The world-wide cage. Retrieved from: https://aeon.co/essays/the-internet-as-an-engine-of-liberation-is-an-innocent-fraud
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Harries, D. (2017). Narrative Mapping of Cyberspace. Context and Consequences. In: Ramírez, J., García-Segura, L. (eds) Cyberspace. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-54975-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-54975-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54974-3
Online ISBN: 978-3-319-54975-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)