The unexpected norm-setters: Intelligence agencies in cyberspace
@article{Georgieva2019TheUN, title={The unexpected norm-setters: Intelligence agencies in cyberspace}, author={Ilina Georgieva}, journal={Contemporary Security Policy}, year={2019}, volume={41}, pages={33 - 54} }
ABSTRACT By implementing novel intelligence techniques in cyberspace, security and intelligence agencies have become major actors in the cybersecurity landscape. As they no longer just passively gather information for their governments but conduct both defense and offense operations in cyberspace, they signal international actors that their conduct is at least tolerable, even if not officially acceptable. Thereby, the intelligence agencies generate norms for the rest of the international…
7 Citations
Cyber security meets security politics: Complex technology, fragmented politics, and networked science
- Computer ScienceContemporary Security Policy
- 2019
The intellectual history is provided to situate this literature in its broader evolutionary context and conclude that it is a vibrant and diverse biotope that is benefitting from its interdisciplinarity, its relevance for policy, and its cognizance of the interplay between technological possibilities and political choices of state actors.
Attribution and Knowledge Creation Assemblages in Cybersecurity Politics
- Political ScienceJ. Cybersecur.
- 2021
It is claimed that the “truth” about cyber-incidents that is established through attribution is constructed through a knowledge creation process that is neither value-free nor purely objective but built on assumptions and choices that make certain outcomes more or less likely.
Idea entrepreneurs: The United Nations Open-Ended Working Group & cybersecurity
- BusinessTelecommunications Policy
- 2021
Copenhagen school and securitization of cyberspace in Turkey
- Computer SciencePropósitos y Representaciones
- 2021
The main goal of this article is to fill the gap in the Copenhagen school related to cyber security sector and specifically in Turkey’s response to events in cyberspace and construction of a cybersecurity discourse and culture.
The governance of 5G infrastructure: between path dependency and risk-based approaches
- Political ScienceJ. Cybersecur.
- 2021
This article provides a thematic analysis of the security arguments and policy options emerging in the early days of the 5G debates, and examines perceived risks and threats surfacing in the public discourse, as well as the main regulatory directions emerging in seven countries.
Public attribution of cyber intrusions
- Political ScienceJ. Cybersecur.
- 2020
The article examines the use of public attribution as a political strategy for attaining specific political effects beyond the dyadic attacker–victim relationship, including shaping the operational and normative environment of cyber operations, with the potential to exert an independent deterrent effect.
References
SHOWING 1-10 OF 79 REFERENCES
The Play of States: Norms and Security in Cyberspace
- Computer Science
- 2014
Efforts and strategies of states working through the United Nations and among coalitions of the “like-minded” to define and establish norms to restrain disruptive behaviors in cyberspace are evaluated.
Confronting and Adapting: Intelligence Agencies and International Law
- Political Science, Law
- 2016
Intelligence activity is — or, more accurately, was — the last bastion of foreign relations unconstrained by international law. States could steal diplomatic secrets, covertly assess rivals’ military…
Commercial and Industrial Cyber Espionage in Israel
- Computer Science
- 2014
The scope of cyber theft and cyber industrial espionage globally is examined, and how muchancial damage they cause in countries around the world and in Israel is estimated.
From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers
- LawLeiden Journal of International Law
- 2017
Abstract Several indicators point to a crisis at the heart of the emerging area of international cyber security law. First, proposals for binding international treaties by leading stakeholders,…
A Cyberwar of Ideas? Deterrence and Norms in Cyberspace
- Law
- 2012
This article relates American efforts to develop strategic ‘cyber deterrence’ as a means to deter adversarial actions in and through global cyberspace. Thus far, interests- based cyber deterrence…
Digital Disaster, Cyber Security, and the Copenhagen School
- Computer Science
- 2009
An analysis of cyber security, a concept that arrived on the post-Cold War agenda in response to a mixture of technological innovations and changing geopolitical conditions, theorizes cyber security as a distinct sector with a particular constellation of threats and referent objects.
Cyber Espionage and International Law
- Political Science, BiologyResearch Handbook on International Law and Cyberspace
- 2021
This chapter provides an international law response to the dramatic increase in state-sponsored cyber espionage in recent years and contends that cyber espionage is an inherently coercive act that compromises the political integrity of sovereign states and to this end constitutes a violation of the principle of non-intervention.
The Spy Who Came in from the Cold War: Intelligence and International Law
- Political Science
- 2007
International law has traditionally had little to say on the subject of intelligence in large part because outraged rhetoric has long been contradicted by widespread practice. This article surveys…
The Role of Effects, Saliencies and Norms in U.S. Cyberwar Doctrine
- Engineering
- 2017
How should the United States respond if an adversary employs cyber attacks to damage the U.S. homeland or weaken its military capabilities? More specifically, how should the United States choose…
The role of effects, saliencies and norms in US Cyberwar doctrine
- Computer ScienceJ. Cybersecur.
- 2017
It is found that under a simple effects-based logic, kinetic responses will often be more effective than cyber responses, although it is explained that cyber attacks that ’leave something to chance’ may be an effective deterrent under some circumstances.