In Cyber (Governance) We Trust

Published date01 February 2016
AuthorMark T. Fliegauf
DOIhttp://doi.org/10.1111/1758-5899.12310
Date01 February 2016
In Cyber (Governance) We Trust
Mark T. Fliegauf
stiftung neue verantwortung, Berlin
1. Securing cyber a Catch-22
When the Obama administration grudgingly announced a
massive data leak in the Off‌ice of Personnel Management
(OPM) in of 2015, an all too familiar pattern ensued: news
that hackers had retrieved personal and in many cases
highly sensitive information of more than 21 million indi-
viduals was accompanied by suspicions (Director of National
Intelligence James Clapper) and accusations (Hillary Clinton)
that the perpetrators were to be found in Beijing. Only for
the Chinese government to vehemently deny any involve-
ment and to dismiss the American claims as unscientif‌ic
and irresponsible.
1
The SinoAmerican exchange highlights simultaneously
the need for global cyber security governance and the chal-
lenges any meaningful international arrangements face. It
also raises two fundamental questions: Why have we made
so little progress in the realm of cyber security governance?
And what can we do about it?
Aiming to provide tentative answers to these two ques-
tions, I argue that states face an incentive problem. They are
prone to exploit digital vulnerabilities to access sensitive
data (cyber espionage) and/or to gain strategic advantages
in a militarized conf‌lict by, for example, temporarily incapac-
itating an opponents communication infrastructure. There-
fore, they generally prefer private rent-seeking over the
production of a public good (international cyber security)
which has lead to the securitization, militarization and
increasingly fragmentation of the Internet. The consequence:
a negative spiral of suspicion, mistrust and balkanization
that threatens the domain in toto. As of today, states
national securitization efforts have primarily diminished the
scale returns of networks (see Rose, 1986, pp. 768770)
rather than their own insecurity.
Something needs to change. We need common norms
and codes of conduct to govern the use and application of
cyber espionage and cyber conf‌lict. International institutions
and organisations could provide those rules of the game
and reduce the current cyber trust gap. Yet their establish-
ment requires trust in the f‌irst place a classic Catch-22
which is even more diff‌icult to establish under the condition
of a security dilemma.
2. Cyberspace meets realpolitik
Like most other technologies, the Internet and the artif‌icial
domain it created are double-sided in nature. Despite its ori-
gins in the Pentagons Advanced Research Projects Agency
(ARPA), cyberspace has never been designed with security
in mind (Ryan, 2013, pp. 1144). And thus ubiquitous loop-
holes have been exploited by criminals, terrorists and, as the
revelations over the past two year have strikingly shown,
governments alike.
State agencies face dual incentives: on the one hand to
exploit vulnerabilities for the sake of espionage and in case
of a military confrontation, on the other to secure national
infrastructures and prevent attacks not only from criminals
and terrorists but also from foreign intelligence services and
militaries. State governments have amply proven their desire
and capacity to utilise cyberspace to these ends. Armed
forces, defence departments, and intelligence agencies all
over the world have stressed the role of cyber in national
defence over the years and by reverse logic, their own role
in cyberspace (Fliegauf, 2012; van Eeten and Mueller, 2013, p.
730). The process of securitization or militarization is particu-
larly transparent in the US where various administrations
have continuously highlighted the dangers of a potential
cyber attack over the years with the catch phraseof a cyber
Pearl Harbor (see Arquilla, 2012; Nakashima, 2012; Rid, 2013)
while casting a wide net of digital surveillance schemes and
programs.
2
Yet we observe similar developments in China,
France, Germany, Russia and the UK. Overall, almost 50 states
have devised national cyber military strategies and several
countries have created military infrastructures (Lewis and
Neuneck, 2013, p. 1) from which the US Cyber Command
stands out. Meanwhile the American National Security
Agency (NSA), the British Government Communications
Headquarters (GCHQ) and other intelligence services have
tapped into the data resources provided by cyberspace via
the use and abuse of surveillance programs such as PRISM,
Tempora, XKeyscore and similar programs simply because
they have both the incentive and the ability to do so. In
short: cyberspace meets realpolitik.
Moreover, and not least as a consequence of the milita-
rization of cyberspace, national governments have engaged
in considerable efforts to re-nationalize the Internet and
related cyber infrastructures to either keep information out
of their countries or to prevent it from leaving. Russia and
China have long championed the concept of digital sover-
eigntybut countries like France and Germany do now too,
thus laying the ideological foundation for the digital disinte-
gration of the North Atlantic region. Frances national inno-
vation program, introduced by President Francßois Hollande
in the autumn of 2013, states the explicit goal of build[ing]
a France of digital sovereignty(Chander and Le, 2014, p.
12). And the German governments coalition agreement has
Global Policy (2016) 7:1 doi: 10.1111/1758-5899.12310 ©2016 University of Durham and John Wiley & Sons, Ltd.
Global Policy Volume 7 . Issue 1 . February 2016 79
Special Section Article

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT