Lost in Cyberspace: Harnessing The Internet, International Relations, and Global Security
Lost in Cyberspace: Harnessing The Internet, International Relations, and Global Security
Lost in Cyberspace: Harnessing The Internet, International Relations, and Global Security
of the
Atomic
Scientists
IT IS 5 MINUTES TO MIDNIGHT
Feature
Lost in cyberspace:
Harnessing the Internet,
international relations,
and global security
Abstract
International relations theory, analysis, policy, and strategy were derived from experiences in the nineteenth
and twentieth centuries and, therefore, were built on the assumptions that states are the relevant entities in
world politics, and agreements among states will reduce the potential for conflict and violence. This traditional view respects national borders and territorial integrity and assumes that cross-border transgressions
are exceptions. But some critical features of cyberspace do not correspond with this traditional view of the
state system and the usual ways that nations engage in politics and conflict. Cyberspace has created new ways
to aggravate global tensions and new opportunities for avoiding conflict. Already, new patterns of cyberbased conflict have been exposed, from transnational crime and espionage to cyberwar that could disrupt
military systems, shut down government servers, or damage critical infrastructure. While there is some
emergent cooperation in regard to cyberspace, such as cyber-crime treaties, these efforts are just beginning.
An understanding of how the cyber domain influences international relations theory and practiceincluding
its implications for power, politics, conflict, and waris crucial to the expansion and success of such efforts.
Keywords
cyber espionage, cyber security, cyberwar, Harvard, international relations, Iran, MIT, Stuxnet
71
72
73
74
75
76
Conclusion
If the ECIR mission is to be successful, it
must integrate the real and the cyber
Notes
1. Stuxnet infects Windows systems in its
search for industrial control systems, called
supervisory control and data acquisition
(SCADA) systems. The target systems
include code that automates industrial
machinery (Falliere, 2010). A majority of the
infected computers worldwide were located
in Iran, with uranium enrichment factories as
the supposed target of the Stuxnet worm
(Fildes, 2010). Stuxnet was first observed
and spread in early 2010, but the roots were
traced back roughly to June 2009. The
Russian cyber-security company Kaspersky
Lab claimed that the attack could only be
References
Broad WJ and Sanger DE (2010) Worm was perfect
for sabotaging centrifuges. New York Times,
November 18, p. A1.
Broad WJ, Markoff J, and Sanger DE (2011) Israel tests
on worm called crucial in Iran nuclear delay. New
York Times, January 15, p. A1.
Choucri N (forthcoming) Cyberpolitics in International
Relations. Cambridge, MA: MIT Press.
Clarke R (2011) The coming cyber wars: Obamas
cyber strategy is missing the point. Boston
Globe, July 31, Op-Ed.
Clarke R and Knacke R (2010) Cyberwar: The Next
Threat to National Security and What to Do
About It. New York: Ecco.
Council of Europe (2001) Convention on Cybercrime.
Available at: conventions.coe.int/Treaty/en/
Treaties/html/185.htm.
77
Department of Defense (2008) The Minerva
Initiative. Available at: http://minerva.dtic.mil/
index.html.
Department of Defense (2011) Department of Defense
Strategy for Operating in Cyberspace. July.
Available at: http://www.defense.gov/news/
d20110714cyber.pdf.
Falliere N (2010) Stuxnet introduces the first known
rootkit for industrial control systems. Symantec
blog, August 19. Available at: http://www.symantec.com/connect/blogs/stuxnet-introduces-firstknown-rootkit-scada-devices.
Fildes J (2010) Stuxnet worm targeted high-value
Iranian assets. BBC News, September 23.
Available at: http://www.bbc.co.uk/news/technology-11388018.
Keizer G (2010) Is Stuxnet the best malware ever?
Infoworld, September 16. Available at: http://
www.infoworld.com/print/137598.
Nakashima E (2011) US cyber approach too predictable for one top general. Washington Post, July 14.
Available at: http://www.washingtonpost.com/
national/national-security/us-cyber-approachtoo-predictable-for-one-top-general/2011/07/14/
gIQAYJC6EI_story.html.
Scheineson A (2009) The Shanghai Cooperation
Organization. Council on Foreign Relations,
March 24. Available at: www.cfr.org/international-peace-and-security/shanghai-cooperationorganization/p10883.
Author biographies
Nazli Choucri is professor of political science at MIT and principal investigator for
the Project on Explorations in Cyber
International Relations (ECIR) of the Minerva
Program.
Daniel Goldsmith is an affiliated researcher at
the MIT Sloan School of Management and a
principal consultant at the PA Consulting
Group.