Cyberdiplomacy
eBook - ePub

Cyberdiplomacy

Managing Security and Governance Online

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Cyberdiplomacy

Managing Security and Governance Online

Book details
Book preview
Table of contents
Citations

About This Book

The world has been sleep-walking into cyber chaos. The spread of misinformation via social media and the theft of data and intellectual property, along with regular cyberattacks, threaten the fabric of modern societies. All the while, the Internet of Things increases the vulnerability of computer systems, including those controlling critical infrastructure. What can be done to tackle these problems? Does diplomacy offer ways of managing security and containing conflict online?

In this provocative book, Shaun Riordan shows how traditional diplomatic skills and mindsets can be combined with new technologies to bring order and enhance international cooperation. He explains what cyberdiplomacy means for diplomats, foreign services and corporations and explores how it can be applied to issues such as internet governance, cybersecurity, cybercrime and information warfare. Cyberspace, he argues, is too important to leave to technicians. Using the vital tools offered by cyberdiplomacy, we can reduce the escalation and proliferation of cyberconflicts by proactively promoting negotiation and collaboration online.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Cyberdiplomacy by Shaun Riordan in PDF and/or ePUB format, as well as other popular books in Política y relaciones internacionales & Relaciones internacionales. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Polity
Year
2019
ISBN
9781509534098

1
Introduction

The Threat

In January 2018 the British minister of defence, Gavin Williamson, warned that a Russian cyberattack against the UK's critical infrastructure could leave thousands dead.1 This may have been a bid to increase the defence budget, yet in May 2017 the Wannacry ransomware attack caused chaos in Britain's hospitals, as well as hitting corporate giants such as FedEx and the Spanish telecommunications giant Telefonica. The aim was criminal, freezing computers and then unfreezing them in return for a ransom payment in the digital currency Bitcoin, but it demonstrated the vulnerability of critical infrastructure.2 Cyberattacks against governments and companies appear to be continual, whether to steal data (including intellectual property) or money or in preparation for future attacks. Most are never reported in public, either because governments do not want to reveal sensitive information or because companies want to protect their reputations and share price. But enough does enter the public domain to reveal a digital space parallel to the physical space, where digital equipment and information interact, and where bad things are happening. The effect of these bad things is not limited to this digital space but can impact on the physical space. For example, when the Wannacry virus hit computers in British hospitals, blocking access to key data, operations had to be suspended and emergency units closed down. This put at risk the security and welfare of thousands of patients, even if this was not the initial intention of the hackers who had launched the ransomware attack.
So far, attacks against computers and other digital systems designed to cause real damage in the physical world (what the military refer to as ‘kinetic effects’) have been rare. The best known is the Stuxnet campaign against the Iranian nuclear enrichment facilities, especially the facility at Natanz. This allegedly joint US–Israeli operation, code-named Olympic Games, targeted the centrifuges essential to the enrichment of uranium, exaggerating their speeds until they broke.3 It is possible that the United States has also launched cyberattacks against North Korea's ballistic missile programme, provoking failures in missile tests.4 But, even if the number of cyberattacks with kinetic effects is so far small, the number of broader cyberattacks, and the range of state and non-state actors developing the capacity to launch them, is growing. These cyberattacks can be broadly categorised as cyberwar, cyberterrorism, cyberespionage and cybercrime. In cyberwar, state actors penetrate foreign computer systems with the aim of damaging the systems themselves, using them to create kinetic effects in the physical world or to prepare the ground to launch attacks in the future. In cyberterrorism, non-state groups penetrate computer systems with the intention of damaging the systems or using them to create kinetic effects. Interestingly, we have not yet seen genuine cyberterrorism. Terrorist groups such as Islamic State have undoubtedly recruited internet engineers, but their online activities have so far been limited to cybercrime (bank raids to raise funds) or online information warfare (see below). In cyberespionage, state and non-state actors penetrate systems to steal information (including personal data, data about capabilities and intentions, and intellectual property). In cybercrime, non-state actors (criminals) penetrate computer systems to generate financial income illegally. This might include straightforward theft (the Russian GameOver criminal network simply drained $6.9 million in a single attack) but also the stealing of information to blackmail companies or using ransomware (the same GameOver network is thought to have made over $1 million from ransomware attacks). These distinctions are not watertight. Governments may work with criminals, piggy-backing criminal attacks for cyberwar or cyberespionage purposes.
Apart from attacking computer systems, state actors can use social media and other digital tools to spread information and propaganda. Russia has been accused of using social media such as Facebook and Twitter to influence elections in the US and France and the Brexit referendum in the UK.5 Extremist groups use social media to increase social tensions, spread hate messages and recruit members. Concern is growing in the West about the use of social media to spread misleading or distorted information, or sometimes plain lies, increasingly referred to as ‘fake news’. Talk has begun of cyber information warfare.6 The EU has created a strategic communication task force (the EU East StratCom Task Force) to counter what it sees as misinformation being spread by state-backed Russian media. Sometimes the use of social media is combined with penetration attacks. During the 2016 US presidential election campaign, Russian hackers penetrated the computer systems of the Democratic National Committee, in particular the emails of John Podesta, which were then released through WikiLeaks. It is not clear what impact they had on the election result, but they did portray a Democratic candidate out of touch with the concerns of ordinary voters.
Cyberspace is a controversial term, with many different definitions. However, it captures the idea of a space parallel to physical space but closely interrelated with it, where digital information and equipment interact. As we have seen, what happens in cyberspace can impact on what happens in physical space. But what happens in physical space also impacts on cyberspace. In as far as cyberspace consists of digital information and equipment designed and built by humans, it is a man-made creation. Its shape and functioning are defined by human decisions, whether state or non-state actors. It grows with every new piece of digital equipment and application. The developing Internet of Things, where everyday household items, cars, and other machinery and equipment are connected to the internet, represents another significant expansion of cyberspace. Putting ‘things’ online in this way increases not only convenience and productivity but also vulnerabilities, both of individuals and of the system. The introduction of fifth-generation mobile telephony (5G) will represent another increase in connectivity and in the scope of cyberspace. But, as a man-made creation, cyberspace needs man-made rules to govern it. Internet governance may not seem as exciting as the cybersecurity issues outlined above, but it is crucial to how the internet and global society will develop in the twenty-first century. How the internet is governed will shape how, and in whose interests, cyberspace operates. The key issues reflect debates in physical space. Who manages the physical structure of the internet? How are online service providers to be regulated, and where do they pay their taxes? Shall the internet be global or national? What is the balance between freedom of expression and the control of extremism and hate speech? How can we protect privacy and individuals’ data, and what are the prices we are willing to pay in economic efficiency and security? How to combat fake news and manipulation of social media? At the core of these debates is a more general point that has nothing to do directly with cyberspace. How can we agree new international rules in a multipolar world where the old Western consensus on international norms and institutions has broken down, and where non-state as well as state actors play an increasingly important role?7

Cyberdiplomacy vs Digital Diplomacy

Diplomats have always been behind the curve in cyberspace. Concerns about security, and the obsession with secrecy, made them reluctant to use computers, let alone link up to the internet (the massive release to WikiLeaks of US diplomatic cables suggests that their fears may not have been misplaced). Most foreign ministries did not use emails until the turn of millennium. Since then a plethora of terms has entered the vocabulary as diplomats and scholars of diplomacy have played desperate catch-up. Most prominent have been digital diplomacy, cyberdiplomacy and e-diplomacy. These have often been used interchangeably, causing not a little confusion in the process. Some time ago I suggested distinguishing between digital diplomacy and cyberdiplomacy.8 I suggested that digital diplomacy should refer to the use of digital tools to pursue wider diplomatic objectives, and that cyberdiplomacy should refer to the use of diplomatic tools and mindsets in resolving, or at least managing, the problems in cyberspace. Thus digital diplomacy is the application of digital tools to diplomacy, whereas cyberdiplomacy is the application of diplomacy to cyberspace. Gradually this distinction seems to be catching on (with the term e-diplomacy slipping from common usage). These are the definitions I will use here.
This book will focus on cyberdiplomacy. It aims to explore how a diplomatic approach can help resolve or manage the cybersecurity, online information warfare and internet governance problems identified above. Much has been written about digital diplomacy, whether in books, academic journals or more popular blogs.9 The nature and importance of digital diplomacy has been, appropriately, much debated through social media. However, very little has been written about cyberdiplomacy (a paper written by André Barrinha and Thomas Renard in Global Affairs sets out the key challenges).10 In part this reflects a prejudice that sees cyberspace as so different and separate from physical space that only technical solutions apply. If cyberspace is where digital equipment interacts with digital solutions, then digital solutions must be found for the problems that arise there. But in this book I will argue that, as cyberspace is as much a human creation as physical space (in many respects more so), non-technical approaches must accompany technical solutions. Relying only on technical solutions to resolve the governance, security, criminal and espionage issues arising in cyberspace is equivalent to relying only on military solutions in physical space. Cyberdiplomacy must complement technical measures in cyberspace just as diplomacy complements military measures in physical space.
This book will not ignore digital diplomacy completely. Digital diplomacy will feature through offering digital tools which cyberdiplomacy can deploy in pursuing its broader objectives. In this sense, as in many others, cyberdiplomacy is little different from ordinary diplomacy. It is distinguished primarily by being applied to cyberspace rather than the physical space. A theme that will be explored in this book is how much differ...

Table of contents

  1. Cover
  2. Table of Contents
  3. Dedication
  4. Title page
  5. Copyright page
  6. Preface
  7. 1: Introduction
  8. 2: The Diplomat in Cyberspace
  9. 3: Regulating Cyberspace
  10. 4: Mitigating Cyberconflict
  11. 5: Business and Cyberdiplomacy
  12. 6: Algorithms and Internet Companies
  13. 7: Conclusion: Building Diplomacy Online
  14. Index
  15. End User License Agreement