Abstract
The last century witnessed sweeping changes in the technologies of destruction and the abilities of states to suppress dissent. States now wield unprecedented capabilities to detect and target those who would concentrate force against them, whether on a battlefield or even in private spaces. Digital information processing accelerated these developments, to the point where the term “cyber war” now seems redundant. Such developments promise to continue as ideological regimes crave external threats to justify mobilization of their citizens. Anti-liberal rulers cannot tolerate open borders with liberal democracies; thus, they seek to keep those borders closed, or those neighbors less free. The boundaries around repressive regimes are now the tectonic plates of conflict, and of modern warfare. Technology has progressed to the point that these fault lines now extend into cyberspace, the newest domain of conflict.
Michael Warner serves as a historian in the US Department of Defense, which reviewed the foregoing and found no sensitive or classified information. The views expressed in this essay are his alone and do not necessarily reflect official positions of the Department or any US government entity.
The ideas in the essay emerged from my recent book The Rise and Fall of Intelligence: An International Security History (Washington: Georgetown University Press, 2014).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Surveillance, after the French term (versus its English cognate), appears “not in the narrow sense of ‘spying,’ explains Christopher Dandeker, but rather “to refer to the gathering of information about and the supervision of subject populations in organizations” (Dandeker, 1991, p. vii).
- 2.
Book 9 of Kautilya’s Arthasastra, for instance, has much to say about detecting plots and suppressing rebellions.
- 3.
After all, “political conflict is not like an intercollegiate debate in which the opponents agree in advance on a definition of the issues. As a matter of fact, the definition of the alternatives is the supreme instrument of power.…He who determines what politics is about runs the country” (Schattschneider, 1960, p. 66).
Bibliography
Anna Funder, Stasiland: Stories from Behind the Berlin Wall (London: Granta, 2003).
Alexander Cooley, “Countering Democratic Norms,” Journal of Democracy 26: 2 July 2015, pp. 49–63.
Christopher Dandeker, Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day, (New York: St. Martin’s, 1991). Niall Ferguson, Civilization: The West and the Rest (New York: Penguin, 2012).
Citizen Lab, Munk Centre for Global Affairs, University of Toronto, “Hacking Team and the Targeting of Ethiopian Journalists,” Feb. 12, 2014 https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/.
Elmer E. Schattschneider, The Semi-Sovereign People: A Realist’s View of Democracy in America (Boston: Wadsworth, 1975 [1960]).
Hillary Rodham Clinton, Hard Choices (New York: Simon & Schuster, 2014).
“Internet the key front in China’s battle with Western hostile forces: military paper,” Reuters, May 20, 2015; accessed May 23, 2015 at https://ca.news.yahoo.com/internet-key-front-chinas-battle-western-hostile-forces-120506329.html.
Kautilya, The Arthashastra, translated by L.N. Rangarajan (New Delhi: Penguin, 1992).
Leon Trotsky, Terrorism and Communism, 1920. https://www.marxists.org/archive/trotsky/1920/terrcomm/ch04.htm.
Machiavelli, The Prince, translated by Harvey Mansfield, Jr. (Chicago: University of Chicago Press, 1985).
Michael S. Schmidt and Helene Cooper, “ISIS Urges Sympathizers to Kill U.S. Service Members It Identifies on Website,” New York Times, March 21, 2015.
Niall Ferguson, Civilization: The West and the Rest (New York: Penguin, 2012).
North Atlantic Council, Wales Summit Declaration, September 5 2014.
P.M. Thomas, Barnett, the Pentagon’s New Map: War and Peace in the Twenty-First Century (New York: G.P. Putnam’s Sons, 2004).
Ron Diebert, “Cyberspace Under Siege,” Journal of Democracy 26: 2 July 2015, pp. 64–78.
Ronald Reagan, “National Policy on Telecommunications and Automated Information Systems Security,” National Security Decision Directive [NSDD]-145, September 17, 1984.
Samuel P. Huntington, The Clash of Civilizations and the Remaking of World Order (New York: Simon & Schuster, 1998).
Sean Gallagher, “Chinese Army newspaper calls for military role in Internet culture war: Claims West and “ideological traitors” use Internet to weaken Party’s authority,” Ars Technica, May 21, 2015; accessed May 23, 2015 at http://arstechnica.com/tech-policy/2015/05/chinese-army-newspaper-calls-for-military-role-in-internet-culture-war.
Seth G. Jones, Hunting in the Shadows: The Pursuit of Al Qa’ida since 9/11 (New York: Norton, 2012).
Stephen Biddle, Military Power: Explaining Victory and Defeat in Modern Battle (Princeton: Princeton University Press, 2004).
Sun Tzu, The Art of War, translated by Samuel B. Griffin (London: Oxford University Press, 1963).
Symantec, 2015 Internet Security Threat Report, Volume 20, April 2015.
Thomas Rid, Cyber War Will Not Take Place (Oxford: Oxford University Press, 2013).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Warner, M. (2017). Invisible Battlegrounds: On Force and Revolutions, Military and Otherwise. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_14
Download citation
DOI: https://doi.org/10.1057/978-1-137-53675-4_14
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-53674-7
Online ISBN: 978-1-137-53675-4
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)