The Virtual Weapon and International Order

The Virtual Weapon and International Order

LUCAS KELLO
Copyright Date: 2017
Published by: Yale University Press
DOI: 10.2307/j.ctt1trkjd1
Pages: 320
https://www.jstor.org/stable/j.ctt1trkjd1
  • Cite this Item
  • Book Info
    The Virtual Weapon and International Order
    Book Description:

    An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international orderThe cyber revolution istherevolution of our time. The rapid expansion of cyberspace brings both promise and peril. It promotes new modes of political interaction, but it also disrupts interstate dealings and empowers non-state actors who may instigate diplomatic and military crises. Despite significant experience with cyber phenomena, the conceptual apparatus to analyze, understand, and address their effects on international order remains primitive. Here, Lucas Kello adapts and applies international relations theory to create new ways of thinking about cyber strategy.Kello draws on a broad range of case studies, including the Estonian crisis, the Olympic Games operation against Iran, and the cyber attack against Sony Pictures. Synthesizing qualitative data from government documents, forensic reports of major incidents and interviews with senior officials from around the globe, this important work establishes new conceptual benchmarks to help security experts adapt strategy and policy to the unprecedented challenges of our times.

    eISBN: 978-0-300-22629-4
    Subjects: Technology, Political Science

Table of Contents

  1. Front Matter
    (pp. i-vi)
    DOI: 10.2307/j.ctt1trkjd1.1
  2. Table of Contents
    (pp. vii-viii)
    DOI: 10.2307/j.ctt1trkjd1.2
  3. List of Tables
    (pp. ix-ix)
    DOI: 10.2307/j.ctt1trkjd1.3
  4. Acknowledgments
    (pp. x-xii)
    DOI: 10.2307/j.ctt1trkjd1.4
  5. Introduction
    (pp. 1-20)
    DOI: 10.2307/j.ctt1trkjd1.5

    Every historical era begins with a revolution: it comes of age when revolution becomes the new normal. The Reformation began when a disaffected Augustinian friar asked, What authority has the Pope? It achieved its peak when the schism in Christianity became a source not of religious war but of stable social structures. The Romantic period started with the philosophical challenge, What is a state if not also an integral nation? It matured when nationalism in Europe became less a cause of violence than of political cohesion. The present era, too, can be defined by a revolutionary question, one rooted in...

  6. PART I THEORY AND CONCEPTS
    • CHAPTER 1 The Quest for Cyber Theory
      (pp. 23-57)
      DOI: 10.2307/j.ctt1trkjd1.6

      Cyber studies is a clash of conceptions. Few thinkers know about this clash because few venture outside their home field of learning. The clash involves not the arcane quarrels of theorists within a specific discipline, which is the ordinary activity of science, but a more elemental divide among entire professions, which occurs only rarely, when a subject arises of such magnitude and complexity that it convulses established jurisdictions of learning. Many scientific disciplines touch on the cyber question. Each imposes upon it its own ideal type, a perception of the essence of the related technology or its effects on the...

    • CHAPTER 2 The Cyber Curse: COMPLICATIONS OF DEFENSE
      (pp. 58-79)
      DOI: 10.2307/j.ctt1trkjd1.7

      Is the cyber threat real or inflated? It is superfluous to explore the virtual weapon’s revolutionary potential without first answering this question. For if the threat is but a mirage – as some skeptics claim¹ – then there is little need to expend energy assessing its problems for theory and statecraft. Alternatively, the need for analysis exists merely to puncture the threat inflation and the associated presumption of a technological revolution that pervade in the highest strata of governments. The gravity of the threat, if real, does not by itself signify a technological revolution, but the virtual weapon cannot be revolutionary unless...

    • CHAPTER 3 Technological Revolution and International Order
      (pp. 80-116)
      DOI: 10.2307/j.ctt1trkjd1.8

      What is a technological revolution? If the answer to this question rested in the technology itself, we would not need political thinkers to remedy the causes of revolution or to grasp its consequences. Its study could recede into esoteric quarters of learning: into the technical minds of inventors unconcerned with the affairs of states and their peoples. Because this concept of revolution begins and ends in the technical realm, laypersons would not have to trouble themselves with its problems. Engineers and natural scientists could define lines of inquiry as if by decree, possibly in consultation with specialists in other scientific...

  7. PART II DEGREES OF THE CYBER REVOLUTION
    • CHAPTER 4 Third-Order Cyber Revolution: PROBLEMS OF INADVERTENT CONFLICT
      (pp. 119-142)
      DOI: 10.2307/j.ctt1trkjd1.9

      The virtual weapon is a force of systemic disruption in international affairs. The new capability is disturbing regularized patterns of rivalry among rational, self-interested state contenders. There are the problems of instrumental instability: a disturbance of the conventional states system featuring familiar contests for security by the appearance of a largely untested weapon whose use is difficult to model and regulate. Yet even within the narrow bounds of this type of change, the least transforming of the three orders of technological revolution, these effects are limited. They are not of a magnitude that matches the change implied by the great...

    • CHAPTER 5 Second-Order Cyber Revolution: THE PROBLEM OF THE REVOLUTIONARY STATE
      (pp. 143-159)
      DOI: 10.2307/j.ctt1trkjd1.10

      The virtual weapon influences not only the strategic dealings of rational states, which the previous chapter considered, but also the behavior of revolutionary states. Thus we arrive at the problem of how new technology fuels ideological defection, or what the revolutions framework presented in Chapter 3 labeled systemic revision: the presence and activity in the international system of subversive units who, in pursuance of unorthodox ideologies, whether the whims of a single dictator or the extremist ideals of a state or a group of states, behave in a manner that challenges the basic political framework of international society, the fundamental...

    • CHAPTER 6 First-Order Cyber Revolution: PRESSURES FROM OUTSIDE THE STATES SYSTEM
      (pp. 160-192)
      DOI: 10.2307/j.ctt1trkjd1.11

      Were technological revolution disruptive solely of interstate dealings, its study could stop at the external borders of the international system. Having explored the impact of new inventions upon the competition of ordinary states bound by common basic ends or upon the ideological strivings of revolutionary states bent on subverting them, international relations specialists would not need to consider the influence of players alien to the system. And having reached the system’s frontier posts, the concept of technological revolution would have safely exhausted its relevance.

      This viewpoint is mainly accurate. Historically, the basic goal of national security policy is to preserve...

  8. PART III PROBLEMS OF STRATEGY AND POLICY
    • CHAPTER 7 The Deterrence Puzzle: DOCTRINAL PROBLEMS AND REMEDIES
      (pp. 195-211)
      DOI: 10.2307/j.ctt1trkjd1.12

      The ordinary goal of deterrence policy is to prevent an attack. Thus it is futile to speak of “degrees” of success in deterrence: it either succeeds or it fails. Failure is absolute. There is no reverting to a situation in which the attack did not happen. Consider the nuclear realm of conflict from which deterrence theory emerged. Initial attempts to enshrine strategies of “limited war” in policy did not go far.¹ Aversion to the loss of a single American or Soviet city and its entire population convinced the superpowers that an exchange of nuclear blows must be avoided at all...

    • CHAPTER 8 Russia and Cyberspace: MANIFESTATIONS OF THE REVOLUTION
      (pp. 212-228)
      DOI: 10.2307/j.ctt1trkjd1.13

      For all their confidence in the universal triumph of liberal ideals, for all their pretensions about the political backwardness of the historic adversary Russia, Western powers have confronted the resurgence of the colossal Russian threat on their Eastern periphery. At a time when the West’s economic and military architectures absorbed formerly captive nations of the Soviet empire, just as the prophecies of the End of History seemed on the verge of realization,¹ a new weapon came into view. The unsophisticated but intense cyberattacks against Estonia’s vital computer infrastructures in the spring of 2007 were a virtual demonstration shot that rang...

    • CHAPTER 9 Private Sector Active Defense: AN ADEQUATE RESPONSE TO THE SOVEREIGNTY GAP?
      (pp. 229-246)
      DOI: 10.2307/j.ctt1trkjd1.14

      The technological forces of systems change and the resulting sovereignty gap in cyberspace have far-reaching implications for the private sector: it can no longer take for granted the ability of the government to protect it against all relevant threats. Thus the challenge of cybersecurity is essentially one ofcivil defense: how to equip the private sector to protect its own computer terrain in the absence of decisive government involvement.

      Ordinarily, civil defense in the new domain has involved passive measures, such as resilience and redundancy, which aim to harden defenses and deflect offensive hits. But foiling a sophisticated offensive operation...

    • CHAPTER 10 Cyber Futures
      (pp. 247-257)
      DOI: 10.2307/j.ctt1trkjd1.15

      A revolution can be mastered only if it is recognized. This task imposes different demands on analysts than it does on practitioners. Analysts must develop conceptual models that make unprecedented chaos seem ordinary. Practitioners must apply these models to craft regulatory devices that render it orderly. The two efforts are closely related, because policy succeeds or fails based on the correctness of the theory that underlies it. It is only when statesmen grasp the relevance or irrelevance of old axioms and adapt their habits to new realities that the revolutionary condition ends.

      In our times the challenge of adaptation to...

  9. Notes
    (pp. 258-300)
    DOI: 10.2307/j.ctt1trkjd1.16
  10. Bibliography
    (pp. 301-314)
    DOI: 10.2307/j.ctt1trkjd1.17
  11. Index
    (pp. 315-320)
    DOI: 10.2307/j.ctt1trkjd1.18