Conflict and Negotiation in Cyberspace
Feb 8, 2013
This report looks at the political-military aspects of cybersecurity and attempts to place it in the larger context of international security. Networks are embedded in our economies and our political and social life. They have become the central tool for human activity. These networks form cyberspace. They hold information of immense value, and they control the machinery that provides critical services. They create immense economic benefit, but they are also a major source of risk to nations. Governments have been hesitant to interfere with the golden economic machine, and the result is a weakly governed space, much like a failed state or contested terrain.
Because of the newness of technology, the lack of explicit agreement among states, and rampant cyber espionage and cybercrime, this unstable environment invites miscalculation, misinterpretation, and inadvertent escalation of conflict. Changing this requires identifying which instruments of statecraft are most effective and where we may need new institutions, norms, and laws. Progress in cybersecurity requires manipulating complex international processes to change what governments consider as acceptable national behavior in cyberspace.
Cybersecurity has been an issue for national security since the 1990s, but the U.S. response has been ad hoc and reactive, marked by uncertainty over how to deal with a major new problem for international security. This report identifies six principles that should guide the United States in developing a strategic approach:
Publisher CSIS/Rowman & LittlefieldISBN 978-1-4422-2451-3 (pb)
- Cyberspace is not a unique environment. States will behave in this environment as they would in any other.
- We cannot “disarm” in cyberspace, and there will be no “global zero” for a cyberattack.
- We have entered a period of sustained, low-level competition for influence where opponents’ miscalculations and misperceptions are a source of risk to the United States.
- U.S. interests are best served by embedding cyberattack and cyber espionage in the existing framework of international law, and long-term U.S. interests are best served by winning international agreement to this.
- America’s immediate goal in negotiation should be to increase the risks of launching a cyberattack or engaging in malicious cyber activity for both state and nonstate opponents.
- There is a limit to what negotiation can achieve in reducing risk; there will always be risk. The U.S. goal should be to decrease and bound this risk as part of its larger efforts to strengthen international security.
Find More From:
James Andrew Lewis
In the News
New York TimesFeb 4, 2016Defense and Security, Geopolitics and International Security, Defense Industry, Acquisition, and Innovation, Counterterrorism and Homeland Security, Technology and Cybersecurity, Space, Trade and Economics, Cybersecurity, Governance and Rule of Law, Intelligence, Surveillance, and Privacy, Military Technology
Christian Science MonitorFeb 4, 2016Defense and Security, Geopolitics and International Security, Defense Industry, Acquisition, and Innovation, Counterterrorism and Homeland Security, Technology and Cybersecurity, Space, Trade and Economics, Cybersecurity, Governance and Rule of Law, Intelligence, Surveillance, and Privacy, Military Technology
ReportDec 30, 2015
ReportNov 23, 2015
Dec 18, 2015
Dec 9, 2015
- AudioDec 16, 2015
- VideoDec 16, 2015