04.11.2014 Views

thesis

thesis

thesis

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Conclusion 273<br />

running Internet to useful agents that may voluntarily provide public services as<br />

long as they fit into overall governmental security strategies.<br />

Studying Internet security now requires that we revisit aspects of international<br />

relations. True, there are a number of aspects of Internet security in the areas of<br />

cybercrime and infrastructural security that do not raise national security concerns.<br />

But as the Internet has become a means, and an object of, vulnerabilities for national<br />

security interests, Internet security governance faces the same global governance<br />

and institutional issues that traditional security has.<br />

Known for texts usually as dense and legible as the obfuscated JavaScript files of<br />

Google’s (or Twitter’s or Facebook’s…) web applications, Immanuel Kant sardonically<br />

summed up the roots of the security problem of the human species: they are a<br />

“group of persons who can’t do without peaceful togetherness and yet can’t help<br />

but constantly loathe one another” (Kant 1796/2008, pp. 331; translation by author).<br />

The solution the saddler’s son proposed in the late 18 th century was to follow<br />

the guiding principle of the idea of a cosmopolitan society, in which citizens set up<br />

their rules and mutually ensure the following of these rules (1796/2008, p. 331).<br />

Apparently, Kant’s approach to overcoming the security problem was to globalise<br />

civic rationality and reason, and thereby both globalise the civic ideals and set the<br />

precondition for a civil society (Richter 1992, pp. 37-55).<br />

The Internet security community arguably produces security in a way that manages<br />

to bring together reason and globality. In the cases analysed in this study, the<br />

community re-established the Internet’s functionality and thereby provided security<br />

as a global public good. The cases exemplified what could be described as technological<br />

cosmopolitanism. The point of reference, in security studies lingo: the security<br />

object for the Internet security community is not humanity in its direct sense,<br />

but the borderless, global Internet and its functionality as a technical artefact. The<br />

Conficker response showed a stunning global collaborative effort to contain the<br />

risks that were inherent in this tremendous botnet, mostly irrespective of conflicts<br />

between the countries of some participants. The Estonian cyberattacks have probably<br />

been the first incident in the history of nation states in which a Minister of<br />

Defence stated that his country was under attack and that a national security situation<br />

existed, and yet the military had no role whatsoever in defending the country<br />

from such an attack.<br />

Students of international relations and political theory have long been haunted by<br />

the question of how to establish, create, and eventually protect the values of democratic,<br />

liberal societies in ways that do not endanger their civil pillars and that do<br />

not run afoul of their societies' humanistic values. In his book on the “Dissolution

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!