Abstract
No frontier lasts forever, and no global commons extends endlessly. Today we are witnessing the fence building process of the cyberspace. The days of limited cyber spying through software backdoors or betrayals by trusted insiders, vandalism, or even theft had evolved into the ability to deliver devastating blows from afar. Thus, states are establishing sovereign control in the virtual world in the name of security and economic sustainability. This paper analyses the emergence of what we call cybered territorial sovereignty as a consequence of states’ efforts to secure their borders against cyber attacks. The case of Stuxnet is introduced as an instance of new threat faced in the cyberspace. We argue Stuxnet marks the beginning of a new cyber Westphalian world of virtual borders and national cyber commands. We have seen this phenomena before as states consolidated their position following the treaties of Onasbrucke and Munster. Existing theories about the emergence of international rules and institutions can help us understand how the Westphalian model will adapt to the demands of securing cyberspace.
This chapter is an updated and revised version of Chris C. Demchak and Peter Dombrowski. 2011. “Rise of a Cybered Westphalian Age”. Strategic Studies Quarterly. 5(1), 31–62.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Cybered conflict differs from cyber war or cyber battle. The latter is fully technological and could, in principle, be conducted entirely within a network. It is normally a component of the former. A cybered conflict is any conflict of national significance in which key events determining the path to the generally accepted outcome of the conflict could not have proceeded unless cyber means were non-substitutable and critically involved. The terms are distinctively and deliberately used in this article.
- 2.
Threats are considered so serious that cyber-security officials are now expected to have training in known hacker methods (Gertz 2010).
- 3.
This effect, according to John Mallery (2010), is a national cyber security means of increasing the “work factors”—conceptualized as computational complexity, cost, cognitive difficulty, risk and uncertainty, cultural factors, and information differentials—for bad actors.
- 4.
Three of the world’s largest sites are banding together with two of the largest content distribution networks, Akamai and Limelight, coordinated by the internet Society, to declare 8 June 2011 World IPv6 (internet Protocol version 6) Day.
- 5.
US laws enable “authorities” to draw legislative lines between offense (a military “Title 10” authority), defense (of military, “Title 18”; or of the wider government, a DHS mission), and the collection of national intelligence (a “Title 50” mission given the National Security Agency as primus inter pares electronic collector among other intelligence agencies).
- 6.
- 7.
See the website http://www.ssi.gouv.fr/site_rubrique97.html, hosted by ANSSI, which rather openly discusses its successes in strengthening cyber defenses.
- 8.
Private conversation with senior civilian cyber-security police official in Germany, October 2010.
- 9.
Even the Chinese government has felt the need to have a cyber command equivalent and publicly announced its creation of a cyber warfare unit as a defensive measure in response to the provocative actions of the US government in creating a cyber command (Branigan 2010).
- 10.
For more explanation of cybered conflicts see unpublished manuscript, currently under editorial review, Peter Dombrowski and Chris Demchak, “Cyber war, Cybered Conflict and the Maritime Domain.”
References
Aldrich, R. J. (2010). GCHQ: The uncensored story of Britain’s most secret intelligence agency. London: HarperCollins.
Anderson, R., Böhme, R., Clayton, R., & Moore, T. (2009). Security economics and European policy. In E. Johnson (Ed.), Managing information risk and the economics of security (pp. 55–80). New York: Springer.
Baker, J. (2010, November 23). EU and US join NATO cyber security pact. Computerworld UK online. http://www.computerworlduk.com/news/security/3249914/eu-and-us-join-nato-cyber-security-pact/. Accessed June 25, 2013.
Benson, P. (2010, November 18). Computer virus Stuxnet a ‘game changer,’ DHS official tells Senate. CNN online. http://edition.cnn.com/2010/TECH/web/11/17/stuxnet.virus/index.html. Accessed June 25, 2013.
Branigan, T. (2010, July 22). Chinese army to target cyber war threat. Guardian online. http://www.guardian.co.uk/world/2010/jul/22/chinese-army-cyber-war-department. Accessed June 25, 2013.
Brenner, S. W. (2004). Distributed security: Moving away from reactive law enforcement. International Journal of Communications Law & Policy, 9(2), 1–43.
Channel New Asia. (2009, July 9). South Korea to set up cyber command against North Korea—two years earlier than planned. Channel New Asia online.
Cheong, C. (2010, April 5). Fighting the Digital War with the great firewall (op-ed). Straits Times. http://wanderingchina.org/2010/04/05/fighting-the-digital-war-with-the-great-firewall-straits-times/. Accessed June 25, 2013.
Constantin, L. (2009, November 6). Attack hits Swedish signals intelligence agency’s website. Softpedia News. http://news.softpedia.com/news/Attack-Hits-Swedish-Signals-Intelligence-Agency-s-Website-126289.shtml. Accessed June 25, 2013.
Cornish, P., Hughes, R., & Livingstone, D. (2009). Cyberspace and the National Security of the United Kingdom. London: Chatham House.
Demchak, C. (2011). Wars of disruption and resilience: Cybered conflict, power, and national security. Athens: University of Georgia Press.
Douglass, D. B. (2009). An examination of the fraud liability shift in consumer card-based payment systems. Economic Perspectives, 33(1), 43–49.
Espiner, T. (2009, June 25). UK launches dedicated cyber security agency. ZDNet UK online. http://www.zdnet.com/uk-launches-dedicated-cybersecurity-agency-3039667231/. Accessed June 25, 2013.
Evans, M., & Whittell G. (2010, March 8). Cyber war declared as China hunts for the West’s intelligence secrets. The Times. http://www.thetimes.co.uk/tto/technology/article2463349.ece. Accessed June 25, 2013.
Falliere, N., Murchu, L. O., & Chien, E. (2010). W32.Stuxnet Dossier. Symantec security response. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf. Accessed June 25, 2013.
Gertz, B. (2010, March 4). Inside the ring: Hacker training. The Washington Times. http://www.washingtontimes.com/news/2010/mar/04/inside-the-ring-94616149/?page=all. Accessed June 25, 2013.
Gibler, D. M. (2007). Bordering on peace: Democracy, territorial issues, and conflict. International Studies Quarterly, 51(3), 509–532.
Golfman, E., & Eliason, L. (Eds.). (2003). The diffusion of military technology and ideas Stanford. Stanford, CA: Stanford University Press.
Hille, K. (2009, July 17). How China polices the internet. Financial Times. http://www.ft.com/intl/cms/s/0/e716cfc6-71a1-11de-a821-00144feabdc0.html#axzz2XDiG0U7M. Accessed June 25, 2013.
Kendall, N. (2010, February 22). Global cyber attacks on the rise. Report. The Times. http://www.thetimes.co.uk/tto/technology/article1859912.ece. Accessed June 25, 2013.
Krasner, S. (2004). Shared sovereignty: New institutions for collapsed and failing status. International Security, 29(2), 85–120.
La Franiere, S. (2010, January 19). China to scan text messages to spot ‘unhealthy content’. New York Times. http://www.nytimes.com/2010/01/20/world/20text.html. Accessed June 25, 2013.
Libicki, M. C. (2009). Cyber deterrence and Cyber war. Washington: RAND. www.rand.org/pubs/monographs/2009/RAND_MG877.pdf. Accessed June 25, 2013.
Lindsay, D. (2010). Liability of ISPs for end-user copyright infringements: The first instance decision in Roadshow Films Pty Ltd v iiNet Ltd (No 3). Telecommunication Journal of Australia, 60(2), 1–21.
Lloyd, A (2010, March 8). Britain applies military thinking to the growing spectre of cyber war. The Times (London). http://www.thetimes.co.uk/tto/technology/article2463358.ece. Accessed June 25, 2013.
Lynn, W. J. (2010). Defending a new domain: The Pentagon’s cyber strategy. Foreign Affairs, 89(5), 97–108.
MacKinnon, R. (2010, January 18). Commentary: Are China’s demands for internet ‘self-discipline’ spreading to the West? McClatchy Report: Washington Bureau. http://www.mcclatchydc.com/2010/01/18/82469/commentary-are-chinas-demands.html. Accessed 25 June 2013.
Mallery, J. C. (2010, September 17). Towards a strategy for Cyber Defense. Paper presented at the US Naval War College, Newport, RI.
Markoff, J., Sanger, D. E. & Shanker T. (2010, January 26). Cyber war: In digital combat, U.S. finds no easy deterrent. New York Times. http://www.nytimes.com/2010/01/26/world/26cyber.html?pagewanted=all. Accessed June 25, 2013.
Masnick, M. (2010, January 20). The similarity between ACTA and Chinese internet censorship. Tech-Dirt. http://www.techdirt.com/articles/20100120/0216537828.shtml. Accessed June 25, 2013.
Mayntz, R. (2008, May 30–31). The changing governance of large technical infrastructure systems (LTS). Paper presented at the Complexity and Large Technical Systems Conference, Michigan State University and University of Konstanz, Meersburg.
Michael, J. B., Sarkasain, J. F., Dementis, G., & Dementis, G. (2010). Integrating legal and policy factors in cyber preparedness. Computer, 43(4), 90–92.
Mills, E. (2010, March 25). Web traffic redirected to China in mystery mix-up. CNET. http://news.cnet.com/8301-27080_3-20001227-245.html. Accessed June 25, 2013.
Nakashima, E. (2010a, May 11). Gen. Keith Alexander confirmed to head cyber-command. Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2010/05/10/AR2010051005251.html. Accessed June 25, 2013.
Nakashima, E. (2010b, November 6). Pentagon’s Cyber Command seeks authority to expand its battlefield. Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2010/11/05/AR2010110507304.html. Accessed June 25, 2013.
Nye, J. S., Jr. (2010). Cyber power. Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School. http://belfercenter.ksg.harvard.edu/publication/20162/cyber_power.html. Accessed June 25, 2013.
NYT Technology Section. (2005, December 6). China keeping closer eye on phone text messages. New York Times. http://www.nytimes.com/2005/12/06/technology/06iht-sms.html. Accessed June 25, 2013.
O'Connell, R. L. (1989). Of arms and Men: A history of war, weapons, and aggression. London: Oxford University Press.
Porche, I. (2010, December 9). Stuxnet is the world’s problem. Bulletin of the Atomic Scientists. http://www.thebulletin.org/stuxnet-worlds-problem. Accessed June 25, 2013.
Sanger, D. E. (2010, September 25). Iran fights strong virus attacking computers. New York Times. http://www.nytimes.com/2010/09/26/world/middleeast/26iran.html?_r=0. Accessed June 25, 2013.
Shackelford, S. J. (2009). From nuclear war to net war: analogizing cyber attacks in international law. Berkeley Journal of International Law, 25(3), 191–250.
Shambaugh, D. (2013). China goes global: The partial power. Oxford: Oxford University Press.
Shiode, N. (1997). Toward the construction of cyber cities with the application of unique characteristics of cyberspace. Online Planning Journal. http://www.casa.ucl.ac.uk/planning/articles21/urban.htm. Accessed June 25, 2013.
Tandon, R., & Mohanty, R. (2000). Civil society and governance: A research study in India. Part of a global comparative research study on civil society and governance. Sussex: Society for Participatory Research in Asia.
Tilly, C. (1989). Cities and states in Europe, 1000-1800. Theory and Society, 18(5), 563–584.
Tilly, C. (1992). Coercion, capital, and European states, AD 990-1992. Malden, MA: Blackwell.
Tuutti, C. (2010, October 1). European Union considers stronger cyber security, stricter penalties for hackers. New internet (TNNI) online. http://www.thenewnewinternet.com/2010/10/01/european-union-considers-stronger-cybersecurity-stricter-penalties-for-hackers/. Accessed 25 June 2013.
Vijayan, J. (2010, April 7). After Google-China dust-up, cyber war emerges as a threat: The episode highlighted cyber threats facing the U.S., but it’s not a war—yet. Computerworld. http://www.computerworld.com/s/article/9174558/After_Google_China_dust_up_cyberwar_emerges_as_a_threat. Accessed June 25, 2013.
Whitney, L. (2010, March 23). U.S. Cyber command prepped to launch. CNET News-Security. http://news.cnet.com/8301-1009_3-10470186-83.html. Accessed June 25, 2013.
Wines, M., LaFraniere, S., & Ansfield, J. (2010, April 7). China’s censors tackle and trip over the internet. New York Times. http://www.nytimes.com/2010/04/08/world/asia/08censor.html?pagewanted=all. Accessed June 25, 2013.
Wong, G. (2010, February 8). Chinese police shut down hacker training business. The Guardian. http://www.guardian.co.uk/world/feedarticle/8935515. Accessed June 25, 2013.
Worthen, B. (2006, July 15). Internet strategy: China’s next generation internet. CIO.com. http://www.cio.com/article/22985/internet_Strategy_China_s_Next_Generation_internet. Accessed June 25, 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Demchak, C.C., Dombrowski, P.J. (2014). Rise of a Cybered Westphalian Age: The Coming Decades. In: Mayer, M., Carpes, M., Knoblich, R. (eds) The Global Politics of Science and Technology - Vol. 1. Global Power Shift. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55007-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-55007-2_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55006-5
Online ISBN: 978-3-642-55007-2
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)