The unexpected norm-setters: Intelligence agencies in cyberspace

  title={The unexpected norm-setters: Intelligence agencies in cyberspace},
  author={Ilina Georgieva},
  journal={Contemporary Security Policy},
  pages={33 - 54}
  • Ilina Georgieva
  • Published 2 January 2020
  • Computer Science
  • Contemporary Security Policy
ABSTRACT By implementing novel intelligence techniques in cyberspace, security and intelligence agencies have become major actors in the cybersecurity landscape. As they no longer just passively gather information for their governments but conduct both defense and offense operations in cyberspace, they signal international actors that their conduct is at least tolerable, even if not officially acceptable. Thereby, the intelligence agencies generate norms for the rest of the international… 
Cyber security meets security politics: Complex technology, fragmented politics, and networked science
The intellectual history is provided to situate this literature in its broader evolutionary context and conclude that it is a vibrant and diverse biotope that is benefitting from its interdisciplinarity, its relevance for policy, and its cognizance of the interplay between technological possibilities and political choices of state actors.
Attribution and Knowledge Creation Assemblages in Cybersecurity Politics
It is claimed that the “truth” about cyber-incidents that is established through attribution is constructed through a knowledge creation process that is neither value-free nor purely objective but built on assumptions and choices that make certain outcomes more or less likely.
Copenhagen school and securitization of cyberspace in Turkey
The main goal of this article is to fill the gap in the Copenhagen school related to cyber security sector and specifically in Turkey’s response to events in cyberspace and construction of a cybersecurity discourse and culture.
The governance of 5G infrastructure: between path dependency and risk-based approaches
This article provides a thematic analysis of the security arguments and policy options emerging in the early days of the 5G debates, and examines perceived risks and threats surfacing in the public discourse, as well as the main regulatory directions emerging in seven countries.
Public attribution of cyber intrusions
The article examines the use of public attribution as a political strategy for attaining specific political effects beyond the dyadic attacker–victim relationship, including shaping the operational and normative environment of cyber operations, with the potential to exert an independent deterrent effect.


The Play of States: Norms and Security in Cyberspace
Efforts and strategies of states working through the United Nations and among coalitions of the “like-minded” to define and establish norms to restrain disruptive behaviors in cyberspace are evaluated.
Confronting and Adapting: Intelligence Agencies and International Law
Intelligence activity is — or, more accurately, was — the last bastion of foreign relations unconstrained by international law. States could steal diplomatic secrets, covertly assess rivals’ military
Commercial and Industrial Cyber Espionage in Israel
The scope of cyber theft and cyber industrial espionage globally is examined, and how muchancial damage they cause in countries around the world and in Israel is estimated.
From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers
Abstract Several indicators point to a crisis at the heart of the emerging area of international cyber security law. First, proposals for binding international treaties by leading stakeholders,
A Cyberwar of Ideas? Deterrence and Norms in Cyberspace
This article relates American efforts to develop strategic ‘cyber deterrence’ as a means to deter adversarial actions in and through global cyberspace. Thus far, interests- based cyber deterrence
Digital Disaster, Cyber Security, and the Copenhagen School
An analysis of cyber security, a concept that arrived on the post-Cold War agenda in response to a mixture of technological innovations and changing geopolitical conditions, theorizes cyber security as a distinct sector with a particular constellation of threats and referent objects.
Cyber Espionage and International Law
  • R. Buchan
  • Political Science, Biology
    Research Handbook on International Law and Cyberspace
  • 2021
This chapter provides an international law response to the dramatic increase in state-sponsored cyber espionage in recent years and contends that cyber espionage is an inherently coercive act that compromises the political integrity of sovereign states and to this end constitutes a violation of the principle of non-intervention.
The Spy Who Came in from the Cold War: Intelligence and International Law
International law has traditionally had little to say on the subject of intelligence — in large part because outraged rhetoric has long been contradicted by widespread practice. This article surveys
The Role of Effects, Saliencies and Norms in U.S. Cyberwar Doctrine
How should the United States respond if an adversary employs cyber attacks to damage the U.S. homeland or weaken its military capabilities? More specifically, how should the United States choose
The role of effects, saliencies and norms in US Cyberwar doctrine
It is found that under a simple effects-based logic, kinetic responses will often be more effective than cyber responses, although it is explained that cyber attacks that ’leave something to chance’ may be an effective deterrent under some circumstances.