Cybersecurity Discourse in the United States


Book Description

This book examines the role of cyber-doom rhetoric in the U.S. cybersecurity debate. For more than two decades, fear of "cyber-doom" scenarios—i.e. cyberattacks against critical infrastructure resulting in catastrophic physical, social, and economic impacts—has been a persistent feature of the U.S. cybersecurity debate. This is despite the fact that no cyberattack has come close to realizing such impacts. This book argues that such scenarios are part of a broader rhetoric of cyber-doom within the U.S. cybersecurity debate, and takes a multidisciplinary approach that draws on research in history, sociology, communication, psychology, and political science. It identifies a number of variations of cyber-doom rhetoric, then places them into a larger historical context, assesses how realistic the fears expressed in such rhetoric are, and finally draws out the policy implications of relying on these fears to structure our response to cybersecurity challenges. The United States faces very real cybersecurity challenges that are, nonetheless, much less dramatic than what is implied in the rhetoric. This book argues that relying on cyber-doom rhetoric to frame our thinking about such threats is counterproductive, and encourages us to develop ways of thinking and speaking about cybersecurity beyond cyber-doom. This book will be of much interest to students of cybersecurity, foreign policy, public administration, national security, and international relations in general.




At the Nexus of Cybersecurity and Public Policy


Book Description

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.




Cyberspace and the State


Book Description

The major aim of Cyberspace and the State is to provide conceptual orientation on the new strategic environment of the Information Age. It seeks to restore the equilibrium of policy-makers which has been disturbed by recent cyber scares, as well as to bring clarity to academic debate on the subject particularly in the fields of politics and international relations, war and strategic studies. Its main chapters explore the impact of cyberspace upon the most central aspects of statehood and the state systempower, sovereignty, war, and dominion. It is concerned equally with practice as with theory and may be read in that sense as having two halves.




Cybersecurity and Human Rights in the Age of Cyberveillance


Book Description

Cybersecurity and Human Rights in the Age of Cyberveillance isa collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights. By considering the latest political events and case law, including the NSA PRISM surveillance program controversy, the planned EU data protection amendments, and the latest European Court of Human Rights jurisprudence, it provides an analysis of the ongoing legal discourse on global cyberveillance. Using examples from contemporary state practice, including content filtering and Internet shutdowns during the Arab Spring as well as the PRISM controversy, the authors identify limits of state and third party interference with individual human rights of Internet users. Analysis is based on existing human rights standards, as enshrined within international law including the Universal Declaration of Human Rights, International Covenant on Civil and Political Rights, European Convention on Human Rights and recommendations from the Human Rights Council. The definition of human rights, perceived as freedoms and liberties guaranteed to every human being by international legal consensus will be presented based on the rich body on international law. The book is designed to serve as a reference source for early 21st century information policies and on the future of Internet governance and will be useful to scholars in the information studies fields, including computer, information and library science. It is also aimed at scholars in the fields of international law, international relations, diplomacy studies and political science.




Cyber Politics In Us-china Relations


Book Description

Cyber issues are of utmost importance and sensitivity for US-China relations today. The combination of cyber and politics is also developing from 'low politics' to 'high politics'. This book discusses cyber politics in US-China relations from four distinct aspects: first, the overall analysis of the role and manifestation of cyber politics in international relations from a theoretical perspective; second, the main issues regarding cyber politics in US-China relations; third, the factors influencing cyber politics in US-China relations; and fourth, the prospect and practice of cyber politics in US-China relations.Based on an exploration of issues in cybersecurity, cyberspace governance, ideology and the power tussle in cyberspace between the US and China, as well as an analysis of the factors influencing cyber politics in the bilateral relations from the perspectives of strategy, discourse, and trust, this book asserts that cyberspace is rapidly becoming a new arena for the geopolitical games between the US and China. A new form of cyber geopolitics is thus emerging.




Cyber Mercenaries


Book Description

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.




The Real Cyber War


Book Description

Contemporary discussion surrounding the role of the internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources. Shawn Powers and Michael Jablonski conceptualize this real cyber war as the utilization of digital networks for geopolitical purposes, including covert attacks against another state's electronic systems, but also, and more importantly, the variety of ways the internet is used to further a state’s economic and military agendas. Moving beyond debates on the democratic value of new and emerging information technologies, The Real Cyber War focuses on political, economic, and geopolitical factors driving internet freedom policies, in particular the U.S. State Department's emerging doctrine in support of a universal freedom to connect. They argue that efforts to create a universal internet built upon Western legal, political, and social preferences is driven by economic and geopolitical motivations rather than the humanitarian and democratic ideals that typically accompany related policy discourse. In fact, the freedom-to-connect movement is intertwined with broader efforts to structure global society in ways that favor American and Western cultures, economies, and governments. Thought-provoking and far-seeing, The Real Cyber War reveals how internet policies and governance have emerged as critical sites of geopolitical contestation, with results certain to shape statecraft, diplomacy, and conflict in the twenty-first century.




Cyber-Security and Threat Politics


Book Description

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.




The Cyber Threat and Globalization


Book Description

In the post-industrial age, information is more valuable than territory and has become the main commodity influencing geopolitics today. The reliance of societies on cyberspace and information and communication technologies (ICTs) for economic prosperity and national security represents a new domain of human activity and conflict. Their potential as tools of social disruption and the low cost of entry of asymmetric conflict have forced a paradigm shift. The Cyber Threat and Globalization is designed for students of security studies and international relations, as well as security professionals who want a better grasp of the nature and existential threat of today’s information wars. It explains policies and concepts, as well as describes the threats posed to the U.S. by disgruntled employees, hacktivists, criminals, terrorists, and hostile governments. Features Special textboxes provide vignettes and case studies to illustrate key concepts. Opinion pieces, essays, and extended quotes from noted subject matter experts underscore the main ideas. Written to be accessible to students and the general public, concepts are clear, engaging, and highly practical.




Managing Cyber Attacks in International Law, Business, and Relations


Book Description

This book presents a novel framework to reconceptualize Internet governance and better manage cyber attacks. Specifically, it makes an original contribution by examining the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of the cloak and dagger world of cyber attacks to light and comparing and contrasting the cyber threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering outstanding issues in law, science, economics, and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace.