01.12.2012 Views

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Explaining Politico-Strategic Cyber Security: The<br />

Feasibility <str<strong>on</strong>g>of</str<strong>on</strong>g> Applying Arms Race Theory<br />

Eli Jellenc<br />

Verisign (iDefense Security Intelligence), L<strong>on</strong>d<strong>on</strong>, UK<br />

Abstract: This paper applies existing <str<strong>on</strong>g>the</str<strong>on</strong>g>ories <str<strong>on</strong>g>of</str<strong>on</strong>g> arms races to explain key<br />

problems <str<strong>on</strong>g>of</str<strong>on</strong>g> cyber security am<strong>on</strong>g nati<strong>on</strong>-states. The motivating empirical<br />

problem (<strong>on</strong> which current <str<strong>on</strong>g>the</str<strong>on</strong>g>oretic approaches exhibit no grasp) is <str<strong>on</strong>g>the</str<strong>on</strong>g><br />

rapid and pervasive increase in cyber security preparati<strong>on</strong>s and malicious<br />

activity in a politico-strategic c<strong>on</strong>text. Moreover, policy debates c<strong>on</strong>cerning<br />

cyber security are fragmented, <str<strong>on</strong>g>of</str<strong>on</strong>g>ten incoherent, and lack c<strong>on</strong>sensus <strong>on</strong><br />

how even to judge <str<strong>on</strong>g>the</str<strong>on</strong>g> effectiveness <str<strong>on</strong>g>of</str<strong>on</strong>g> policies relative to problems. Primarily<br />

to blame for such c<strong>on</strong>fusi<strong>on</strong> is <str<strong>on</strong>g>the</str<strong>on</strong>g> absence <str<strong>on</strong>g>of</str<strong>on</strong>g> a comm<strong>on</strong>, tested<br />

c<strong>on</strong>ceptual framework. To date, nei<str<strong>on</strong>g>the</str<strong>on</strong>g>r scholars, nor policymakers, nor<br />

industry pr<str<strong>on</strong>g>of</str<strong>on</strong>g>essi<strong>on</strong>als have succeeded in deriving robust <str<strong>on</strong>g>the</str<strong>on</strong>g>oretic approaches<br />

to unify various islands <str<strong>on</strong>g>of</str<strong>on</strong>g> useful empirical research <strong>on</strong> <str<strong>on</strong>g>the</str<strong>on</strong>g> geopolitics<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> cyber security. However, such <str<strong>on</strong>g>the</str<strong>on</strong>g>oretic models and approaches<br />

are not <strong>on</strong>ly available, but show promise for adaptati<strong>on</strong> to specific cyber<br />

security problems. Cyber security is a new and complex class <str<strong>on</strong>g>of</str<strong>on</strong>g> issues, but<br />

it is, in <str<strong>on</strong>g>the</str<strong>on</strong>g> end, technologically mediated social behavior, and as such, it<br />

can be fruitfully studied as such. The increasing significance <str<strong>on</strong>g>of</str<strong>on</strong>g> cyber security<br />

to <str<strong>on</strong>g>the</str<strong>on</strong>g> internati<strong>on</strong>al system makes such inquiry necessary to help inform<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> behavior <str<strong>on</strong>g>of</str<strong>on</strong>g> states, firms, and o<str<strong>on</strong>g>the</str<strong>on</strong>g>r stakeholders. The research<br />

effort summarized here hypo<str<strong>on</strong>g>the</str<strong>on</strong>g>sizes that a cyber arms race is indeed underway,<br />

and all available findings provide no significant disc<strong>on</strong>firming challenge.<br />

In fact, <str<strong>on</strong>g>the</str<strong>on</strong>g> approaches to cyber security by <str<strong>on</strong>g>the</str<strong>on</strong>g> world’s major powers<br />

(and many minor <strong>on</strong>es) indeed exhibit all <str<strong>on</strong>g>the</str<strong>on</strong>g> features <str<strong>on</strong>g>of</str<strong>on</strong>g> a novel, multilateral<br />

arms race <str<strong>on</strong>g>of</str<strong>on</strong>g> hi<str<strong>on</strong>g>the</str<strong>on</strong>g>rto unseen complexity: a global cyber arms race.<br />

Moreover it is improbable that anything short <str<strong>on</strong>g>of</str<strong>on</strong>g> revoluti<strong>on</strong>ary legal or<br />

diplomatic initiatives will prevent severe, near-term increases in cyber c<strong>on</strong>flict<br />

activity. More generally, this research shows how existing <str<strong>on</strong>g>the</str<strong>on</strong>g>oretical<br />

work in political science, sociology, and communicati<strong>on</strong>s <str<strong>on</strong>g>the</str<strong>on</strong>g>ory can lend<br />

new rigor to <str<strong>on</strong>g>the</str<strong>on</strong>g> study <str<strong>on</strong>g>of</str<strong>on</strong>g> cyber security as a geopolitical issue.<br />

Keywords: cyber warfare, cyber c<strong>on</strong>flict, cyber espi<strong>on</strong>age, cyber security<br />

governance, arms races, social science <str<strong>on</strong>g>the</str<strong>on</strong>g>ory<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!