Governing Cyberspace - SCUSA 63 - Final

advertisement
SCUSA 63
Thinking Beyond Boundaries:
Contemporary Challenges to U.S. Foreign Policy
Governing Cyberspace
To date, cyberspace is a domain where individuals, governments, the public sector, the
private sector, and civil society interact beyond traditional boundaries. Information, data,
commerce, and ideas flow freely between physical locations at light speed. Many take the fact
that cyberspace is a global commons, or open access resource, for granted.1 Like the Wild West,
risk-taking entrepreneurs—businessmen, thought leaders, and innovators—helped build this
newly discovered space. And just as in the Wild West weak governance over nascent territories
empowered cattle rustlers and outlaws, so in cyberspace the bad flourish alongside the good.
High-tech criminals steal from individuals and large businesses, hacktivists vandalize cyberspace
or disrupt the flow of information, and states lay claim to areas of cyber terrain that may lead to
conflict in cyberspace as well as terrestrially.
To ensure that cyberspace continues to promote cooperation, communication, and
prosperity among people of all nationalities, races, faiths, and ideologies, America has an interest
in building international support for cyberspace governance.2 But what does governing
cyberspace mean, and what role should America play in its governance? So far, efforts to
achieve global consensus on regulating, taxing, and securing access to the Internet have proven
unsuccessful. What, if anything, might make international consensus more achievable?
This paper explores the idea of governing cyberspace by developing norms that promote
communication, security, and prosperity.
Defining Norms
Before discussing these three focus areas for the United States’ international cyberspace
strategy, it is necessary to understand what norms are. In general terms, norms are accepted
standards of appropriate behavior. This definition can further include expectations of behavior
for “actors with a given identity,” which allows for the existence of multiple norms—different
norms for certain groups, such as governments, militaries, businesses, or individuals.3
Although norms establish accepted standards, norms do not institutionalize behavior.
Institutionalization of norms occurs though legalization, especially within the realm of
international law. The strength of international law lies along a continuum from “soft law,”
which seeks to facilitate compromise and cooperation, to “hard law,” which enshrines pre- and
Lawrence Lessig, “The Internet Under Siege,” Foreign Policy, November/December (2001), 56-65.
President Obama released his international strategy for cyberspace in May 2011, in which he emphasized the
importance of the U.S. leading the effort to develop international norms that will ensure the further promotion of
prosperity and civil liberties around the globe, while maintaining security in cyberspace. See Barack H. Obama,
International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (The White
House: Washington, 2011).
3
Martha Finnemore and Kathryn Sikkink, “International Norm Dynamics and Political Change,” International
Organization, vol. 52, no. 4 (1998): 891.
1
2
2
pro-scripted behavior into precise legally binding obligations.4 One can measure this strength
according to three dimensions: 1) precision, or the level of ambiguity in the definition of
prescribed or proscribed behavior; 2) obligation, or variation in boundedness to a rule or
commitment; and 3) delegation, or the level of authority granted to third parties to “implement,
interpret, and apply rules; to resolve disputes; and (possibly) to make further rules.”5 Again, this
institutionalization process starts with the existence of norms of accepted behavior.
The development of norms generally precedes the development of international law.
However, norms develop at different rates. Norms develop quickly when they are clear, useful,
and doable.6 Norms spread when they are simple and straightforward. Second, actors must see
that following the norms yields more benefits than costs. Finally, enabling actors to comply with
new norms increases the likelihood that they will follow the desired pre- or pro-scribed
behavior.7 Even norms that have all three of these winning characteristics are not immediately
accepted; instead, they follow an evolutionary adoption process that generally involves three
stages of development: 1) norm emergence—norm entrepreneurs lead an organized movement,
taking advantage of existing institutions when possible; 2) norm cascade—norm entrepreneurs
embark on an international socialization process to persuade or coerce those not following the
norms to do so; and 3) internalization—mainstreaming to ensure compliance with the norm.8
Given this background, policymakers must consider what the ideal norm evolution
process should look like for governing cyberspace? What can the United States do to encourage
norm emergence and cascade? How will other actors perceive a US effort to lead this process?
And at what point should the international community focus on developing international legal
standards for governing cyberspace as opposed to norms?
Communication
Individuals, governments, the private sector, and civil society recognize the benefits of
the interaction that cyberspace enables, so each of these groups has a stake in maintaining an
interoperable and open network. The issue area of communication within the realm of cyber
governance divides into two domains, one technical (interoperability) and the other
interpersonal.
What role do states have in ensuring global interoperability? Interoperability is promoted
by developing technical standards that allow multiple actors to interact across platforms and
boundaries. A further component of interoperability is network stability, which is respecting and
enabling the free flow of information between internationally interconnected infrastructures
across domestic networks.9 How should responsibility be shared between the public and private
sectors to develop and promulgate technical standards that ensure the security and resiliency of
the global infrastructure? How can the US promote the development of global standards?
Kenneth W. Abbott and Duncan Snidal, “Hard and Soft Law in International Governance,” International
Organization, vol. 54, no. 3 (2000): 421-424.
5
Kenneth W. Abbott, Robert O. Keohane, Andrew Moravcsik, Anne Marie-Slaughter, and Duncan Snidal, “The
Concept of Legalization,” International Organization, vol. 54, no. 3 (2000): 401.
6
Ibid, 401-404.
7
Martha Finnemore, “Cultivating International Cyber Norms,” in America’s Cyber Future: Security and Prosperity
in the Information Age, Vol. II, eds., Kristin M. Lord and Travis Sharp (Center for a New American Security:
Washington, 2011), 89-93.
8
Finnemore and Sikkink, 895-905. Finnemore, 93-99.
9
Barack H. Obama, 10 and 18.
4
3
In addition to ensuring interoperability and the technical flow of information across
networks, supporting interpersonal openness maintains the freedom of cyberspace. Cyberspace
enables people to share information, express opinions, expose malfeasance, and organize social
and political movements, on- and offline. At the same time, current weaknesses in cybersecurity
do not guarantee the protection of individual privacy, which may undermine the trust needed to
sustain social and political, as well as economic, activity on the Internet.10 What can the US do
to promote norms that support fundamental freedoms, such as expression and association, as well
as privacy? How can the US work with civil society to develop safeguards that protect
individuals from arbitrary state interference into their activities on, or deprivation of access to,
the Internet? Extending existing human rights law as described in the Universal Declaration of
Human Rights in order to protect fundamental freedoms and privacy is another potential
extension of US efforts in cyber governance.11 How will other nations such as China and Russia
react toward an expanding US role promoting interoperability and openness in cyberspace?
Security
Security is another multifaceted realm related to cyberspace governance. The technical
aspects of security encourage interoperability and openness, but security is also necessary to
promote commerce and protect national security. Again, the public and private sectors should
work together to develop technical standards to protect networks, ensuring their security,
reliability, and resilience.
Strategically, cyberspace has joined land, sea, air, and space as the newest domain of
warfighting. The US’s recognition of cyberspace as an operational domain allows for the
Department of Defense (DoD) to organize, train, and equip the US Armed Forces to support
national security interests specific to missions and challenges in cyberspace. The military now
has the clear strategic task guidance to prevent adversaries from exploiting, disrupting, denying,
or degrading the networks and systems upon which the Defense Department relies.12 The DoD’s
cyber strategy supports the White House’s effort to develop a norm of cybersecurity—namely,
that states have a responsibility “to protect information infrastructures and secure national
systems from damage and misuse.”13
While states still maintain a right of self-defense in response to aggressive acts by others,
consistent with Article 51 of the United Nations Charter, the rules for how to apply this principle
to 21st century cyber security challenges are not clear.14 The White House’s strategy for national
defense is based on the principles of dissuasion and deterrence. The US can dissuade adversaries
from attacking by creating robust defenses, as well as mitigation plans to isolate and limit the
damage of successful attacks. Deterrence demands that the US elevates the cost associated with
executing an attack beyond the perceived benefit any adversary hopes to achieve.15 One
challenge with cyber attacks, however, is attribution, or the ability to verify the source of an
attack. Further, with ubiquitous information technology, it is challenging and expensive for
10
Ibid, 23-24.
See United Nations, Universal Declaration of Human Rights (UN Department of Public Information: New York,
1948).
12
Department of Defense, Department of Defense Strategy for Operating in Cyberspace, (Department of Defense:
Washington, 2011), 1-6.
13
Barack H. Obama, 10.
14
United Nations, Charter of the United Nations and Statute of the International Court of Justice, (United Nations:
San Francisco, 1945).
15
Barack H. Obama, 12-14.
11
4
defenders to increase an attacker’s cost beyond the perceived benefit.16 What would the US need
to do to overcome these challenges to deterrence? How can the US promote norms that create
taboos for certain behaviors by state or non-state actors in cyberspace?17 Are there alternative
national security strategies the US can pursue besides dissuasion and deterrence, whether
through diplomacy or by strengthening public and private partnerships?
Prosperity
Cyberspace generates vast wealth. The existing openness and interoperability of the
Internet have enabled commerce at all levels, from small businesses to multinational
corporations, and between individuals. Cyberspace is thus a potential tool to promote domestic
and international economic development. Long-term investment in cyber infrastructure can
provide access to new markets for goods and services. Should the US sustain and expand the
current free-trade environment, institutionalized in the form of the World Trade Organization, in
order to enable governance over economic activity in cyberspace? What responsibility does the
US have to share technology with others in order to empower less-advantaged populations?
While cyberspace has created enormous wealth due to innovation, intellectual capital
investments have also become the target of cyber theft, leading to unprecedented volumes of
illegal wealth transfer.18 How can the US promulgate norms or international law that guarantees
respect for property? What incentives will induce states to protect and enforce intellectual
property rights—patents, trade secrets, trademarks, and copyrights—through their domestic laws
and judicial systems?
Conclusion
Sustaining open and interoperable communication while providing security and spreading
prosperity requires states and non-state actors to think about how to govern cyberspace. The
White House has so far addressed this contemporary challenge to US foreign policy by
promoting norms. Yet while norm development in each of these issue areas can be mutually
supportive, the development of norms in one area might also threaten effectiveness or efficiency
in another area. One of the major challenges in developing governance norms for cyberspace is
determining how to balance competing interests. What are the necessary security compromises
that must be made to ensure citizens are protected from unfettered surveillance? What necessary
compromises in our civil liberties must be made to protect citizens from multifaceted threats,
both criminal and national security related? What is the balance between encouraging private
sector-driven prosperity and keeping the Internet open and secure? To address these vexing and
still-emerging questions requires that policymakers think beyond the boundaries that divide
norms from laws, the private from the public sectors, and nations from one another.
16
Martin C. Libicki, Cyberdeterrence and Cyberwar, (RAND Corporation: Santa Monica, 2009).
Nina Tannenwald, “Stigmatizing the Bomb: Origins of the Nuclear Taboo,” International Security, vol. 29, no. 4
(2005): 5-49.
18
Dmitri Alperovitch, “Revealed: Operation Shady RAT,” (McAfee: Santa Clara, 2011), 2.
17
5
Recommended Readings
Finnemore, Martha. “Cultivating International Cyber Norms.” In America’s Cyber Future:
Security and Prosperity in the Information Age, Vol. II, edited by Kristin M. Lord and Travis
Sharp, 87-101. Center for a New American Security: Washington, 2011.
http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume%20II_2.pdf.
Finnemore, Martha and Kathryn Sikkink. “International Norm Dynamics and Political Change.”
International Organization, vol. 52, no. 4 (1998): 887-917.
http://graduateinstitute.ch/webdav/site/political_science/shared/political_science/Multilat
eral%20Governance%20Autumn%202010/finnemore%20and%20sikkink%201998.pdf
Lessig, Lawrence. “The Internet Under Siege.” Foreign Policy, November/December (2001),
56-65.
http://www.lessig.org/content/columns/foreignpolicy1.pdf.
Lewis, James A. “Why Privacy and Cyber Security Clash.” In America’s Cyber Future: Security
and Prosperity in the Information Age, Vol. II, edited by Kristin M. Lord and Travis Sharp, 123142. Center for a New American Security: Washington, 2011.
http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume%20II_2.pdf.
Libicki, Martin C. Cyberdeterrence and Cyberwar. RAND Corporation: Santa Monica, 2009.
http://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf.
Obama, Barack H. International Strategy for Cyberspace: Prosperity, Security, and Openness in
a Networked World. The White House: Washington, 2011.
http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cybe
rspace.pdf.
Additional Readings
Abbott, Kenneth W., Robert O. Keohane, Andrew Moravcsik, Anne Marie-Slaughter, and
Duncan Snidal. “The Concept of Legalization.” International Organization, 54, no. 3 (2000):
401-419.
http://www.princeton.edu/~amoravcs/library/concept.pdf.
6
Abbott, Kenneth W., and Duncan Snidal. “Hard and Soft Law in International Governance.”
International Organization 54, no. 3 (2000): 421-456.
http://web.efzg.hr/dok/pra/hhorak/Hard%20and%20soft%20law%20in%20international%
20governance.pdf.
Alperovitch, Dmitri. “Revealed: Operation Shady RAT.” McAfee: Santa Clara, 2011.
http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf.
Department of Defense. Department of Defense Strategy for Operating in Cyberspace.
Department of Defense: Washington, 2011.
http://www.defense.gov/news/d20110714cyber.pdf.
Fontaine, Richard and Will Rogers. Internet Freedom: A Foreign Policy Imperative in the
Digital Age. Center for a New American Security: Washington, 2011.
http://www.cnas.org/files/documents/publications/CNAS_InternetFreedom_FontaineRog
ers_0.pdf.
Lord, Kristin M. and Travis Sharp, eds. America’s Cyber Future: Security and Prosperity in the
Information Age. Center for a New American Security: Washington, 2011.
http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume%20I_0.pdf
[Vol. 1]
http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume%20II_2.pdf
[Vol II]
Nye, Joseph S. Jr. “Power and National Security in Cyberspace.” In America’s Cyber Future:
Security and Prosperity in the Information Age, Vol. II, edited by Kristin M. Lord and Travis
Sharp, 5-24. Center for a New American Security: Washington, 2011.
http://www.cnas.org/files/documents/publications/CNAS_Cyber_Volume%20II_2.pdf.
Segal, Adam. “Cyberspace Governance: The Next Step.” In Policy Innovation Memorandum No.
2. Council on Foreign Relations: New York, 2011.
http://www.cfr.org/cybersecurity/cyberspace-governance-next-step/p24397.
Singer, Peter W. and Noah Shactman. “The Wrong War: The Insistence on Applying Cold War
Metaphors to Cybersecurity Is Misplaced and Counterproductive.” Brookings Institution:
Washington, 2011.
http://www.brookings.edu/articles/2011/0815_cybersecurity_singer_shachtman.aspx.
7
Tannenwald, Nina. “Stigmatizing the Bomb: Origins of the Nuclear Taboo.” International
Security 29, no. 4 (2005): 5-49.
http://www.mitpressjournals.org/doi/pdf/10.1162/isec.2005.29.4.5.
United Nations. Charter of the United Nations and Statute of the International Court of Justice.
United Nations: San Francisco, 1945.
http://treaties.un.org/doc/Publication/CTC/uncharter.pdf.
United Nations. Universal Declaration of Human Rights. UN Department of Public Information:
New York, 1948.
http://www.ohchr.org/en/udhr/pages/language.aspx?langid=eng.
Download