Academia.eduAcademia.edu

From Cyber Threats to Cyber Risks

Chapter 2 in Friis and Ringsmose eds.: Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, London: Routledge, 2016.

Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. From Cyber Threats to Cyber Risks Karsten Friis and Erik Reichborn-Kjennerud Norwegian Institute of International Affairs (NUPI) Introduction While issues relating to cyber security have been on the security policy agenda for several decades, it is only recently that cyberspace has moved to the top of the national and international security agendas. As a result, discourses on cyber security have increasingly become dominated by militarised language and links between cyberspace and strategic threats. The use of metaphors of war and nuclear deterrence, talk of a new Cyber Cold War, and drawing analogies to catastrophic events such as Pearl Harbor and 9/11 are all examples of this (Kerry 2013; Bumiller and Shanker 2012; Lynn 2010). The debates surrounding cyber security reflect our growing dependency on cyberspace and the willingness of states and nonstate actors to exploit it for political, economic, military, etc. gain. This also means that cyber security is not merely a technical problem, but one that has ramifications throughout society. In addition, states, organisations and corporations have established various cyber security institutions to deal with the myriad of challenges stemming from increased dependency on cyber and the inherent vulnerabilities of cyberspace. This has led a number of scholars to examine whether cyberspace has been securitized; i.e. lifted out of the realm of regular politics and treated as an emergency, thus legitimising extraordinary countermeasures (Buzan et al. 1998). Although they find many cases of attempted securitization, such as the hyperbolic language mentioned above, these have had limited resonance and have rarely resulted in extraordinary countermeasures. At the same time, numerous high profile cyber attacks and empirical evidence show that cyber security is 1 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. of growing importance and is being practiced on a daily basis by security professionals in various locations at the national level throughout industries and commercial entities, and by individuals. In other words, cyber security has become vital to modern societies, despite not having been securitised. Why is cyber security produced despite successful securitization? In order to overcome the apparent limitations of securitization theory, this chapter proposes an alternative analytical model, based on risk theory, in order to analyse the ongoing practice and production of cyber security. The aim of this chapter is to contribute to the discussion on how to theorise about and how to study cyber security. We will argue that in order to develop sound theories on cyber security, we need to depart from the traditional threat-based logic of an actor's ability to realise its harmful intent, to a focus on cyber security that takes cyberspace as its starting point. This calls for a focus on the material aspects of cyberspace and the ongoing practice of cyber security, and not only the social process of defining something as a security problem, often associated with elite discourses. In addition, taking cyberspace as the starting point means that we need to acknowledge our societal dependency on cyberspace and the subsequent vulnerabilities. Cyber security will then shift away from a threat-based logic to a risk security logic. While threat-based security deals with the direct causes of harm, risk security centres on the conditions of possibility or constitutive causes of harm. This opens up a different logic which calls for long-term precautionary governance rather than exceptional short-term measures. Thus risk not only broadens, but transforms security, as different measures are introduced to deal with potential, hypothetical and less than existential dangers. Given the vulnerable nature of cyberspace and everyday cyber security challenges, measures to deal with cyber security are always in a state of flux. 2 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. Situating cyber security within the risk security logic, we follow Olaf Corry's theory of 'riskification' (Corry 2012) and argue that cyberspace has become riskified, but not securitized. This approach also enables us to better incorporate the nature of cyberspace, the material dimension, than traditionally permitted by securitization theory. In addition, it allows the incorporation of the everyday practices of cyber security into the analysis. Riskification theory thus has the potential to provide us with a better understanding and more accurate picture of cyber security The first section will discuss how the socio-political processes for securitizing cyber have been theorised thus far. The next section will briefly introduce risk theory, before we apply Corry's riskification model to cyber security. We will conclude with ethical reflections on the implications of applying risk theory to cyber security. Theorising Cyber Security Policies: Securitization According to Myriam Dunn Cavelty, 'political science literature on cyber-security (…) remains policy-oriented and does not communicate with more general international relations theory' (Cavelty 2013) The exception, she asserts, is 'a limited number of scholars have used frameworks 1 derived from Securitization Theory' (Cavelty 2012; Choucri 2012) . This predominantly constructivist approach to security rejects the notion that there is something like objective (in)security and focuses on the social process of defining something as security. It is never a priori given what and who represent a threat, to what or whom, and what to eventually do with it. In our case, where we seek to analyse the various interpretations of vulnerabilities, perceptions of dangers, the responses, policies and other attempts at creating cyber security, this theoretical approach is a good starting point. 3 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. The Copenhagen School of security studies argues that security 'is the move that takes politics beyond the established rules of the game and frames the issue either as a special kind of politics or above politics' (Buzan et al. 1998, 23). Securitization theory defines a spectrum of possible policies, ranging from non-politicised (the state does not deal with it and it is not an issue of public debate) through politicised (the issue forms part of public policy, requiring government decisions) to securitized (an issue is presented as an existential threat, requiring emergency measures and justifying actions outside the normal bounds of political procedure). Based on a social constructivist epistemology, securitization theory is thus the placing of emphasis on the social construction of threats and the responses to these threats. Less emphasis is placed on the 'nature' of the threat (such as number of warheads), as this in any case needs to be interpreted and represented by human beings in a social setting (Hansen 2011)2. The basic pillars of the Copenhagen School are the securitizing actor(s) conducting a 'speech act', a reference object that is regarded to be under existential threat, and an audience responding to and (if the securitization is successful) accepting the securitization. The result of successful securitization is shared recognition that extraordinary countermeasures are necessary and legitimate in order to counter the threat. However, if the audience does not accept that the referent object is under an existential threat, the securitizing move will fail. Shared acceptance of the existence of the threat, as well as of its gravity (i.e. that it is critical to the survival of the referent object) is crucial in order to understand the dynamics of securitization theory. If these conditions are missing – i.e. if the audience does not recognise the threat or regards it as less imminent or grave as the securitizing actor – the securitization attempt will fail. In the case of cyber, one can therefore imagine a process where authoritative voices (cyber security experts, government officials, etc.) call out and warn about the new 4 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. dependencies and vulnerabilities following the digitisation of, for instance, critical infrastructure or information. The audience, for instance the US Congress, the President and the US public, is being convinced, which may subsequently lead to the establishment of new institutions, laws and resources to counter this threat. Through the Copenhagen framework, each step in such a process may be scrutinised more closely – and critically. As there is no a priori link between the resources spent and the 'objective' nature of the threat, securitization theory gives us an insight into inter alia governmental decision-making and resource allocation. Securitization – Or Not? Johan Eriksson made the first attempt to elaborate on this conceptualisation of cyber security in 2001. His approach is 'threat politics' which is 'how and why some threat images but not others end up on the political agenda' (Eriksson 2001, 211). By combining securitization theory with framing and agenda-setting theories, he argues that cyber and IT became securitized in Sweden after the Cold War. He shows that the 'military-bureaucratic security establishment' embarked upon the 'new threats' at the end of the Cold War, and framed them in terms of 'information warfare' and 'information operations'. By doing so they seized 'a dominant position in the securitization of IT' (Eriksson 2001, 215). Largely inspired by the USA, Swedish security experts framed and talked about the problem in the same way as in the USA. However, the policy responses were very different. Eriksson points to 'bureaucratic turf battles' taking place among the governmental agencies responsible for managing IT security. He also asserts that the 'securitisation of IT is sometimes far too exaggerated. All computer problems, bugs, dada diddling, spamming and break-in attempts are hardly existential threats to a sovereign state' (Eriksson 2001, 218). 5 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. Eriksson's main approach is framing theory; he therefore elaborates less on the securitization dimension. For instance, he does not specify what the referent object is (network vulnerability or the sovereign state?), and does not explain in depth what extraordinary measures were put in place to protect the referent object. It seems clear from his analysis that the militarybureaucratic establishment – as securitizing actors – attempted to securitise cyber security. However, it is less convincing that the audience (Swedish government and society) accepted this, and that extraordinary measures were put in place. The mentioned bureaucratic turf battles indicate a classic civil service response to new inter-sectoral challenges. Had the stakes been higher, time of the essence, and valuable institutions under an existential threat, the government most likely would have taken action and imposed solutions. The lack of such urgency indicates that securitization actually failed in Sweden. This is also how Bendrath, Eriksson and Giacomello describe cyber security in the USA during the Clinton years: much talk about cyber terrorism, but limited de facto responses (Bendrath et al. 2007). 'There was not much panic politics that moved beyond democratic procedures…The US government did talk the talk of securitization but they did not really walk the walk – not yet' (Bendrath et al. 2007, 67). However, Bendrath et al. argue that cyber security was properly securitized during the Bush years. This was done particularly in the wake of the 9/11 attacks, when specific immediate cyber security measures were implemented. The Patriot Act and other legislation criminalised certain computer activity, the President appointed a Special Advisor on Cybersecurity, and the Office of Cybersecurity and Communications was established. One may nevertheless ask whether this represents proper securitization of cyber. The measures taken were arguably limited compared to other sectors (such as airport security), and there was no indication of existential damage to critical infrastructure or other valuable referent objects. Most importantly, however, this was hardly a 6 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. securitization of cyberspace itself, but rather a dimension of the general securitization linked to the 'War on Terror' that followed the 9/11 attacks. The referent object here was thus the US state and society, not cyberspace as such. Irrespective of their views on this particular period, the authors recognise that securitization theory does not cover the 'less panicky ways' (Bendrath et al. 2007, 79) in which cyber threats are often framed. Instead, they argue that what they label the 'threat politics approach' is more appropriate to the study of cyber security. This approach largely builds on frame theory which 'may, but do not necessarily, include an identification of existential threat and a legitimisation of extraordinary measures' (Bendrath et al. 2007, 80). 'Threat politics' is also Myriam Dunn Cavelty's approach, where she combines securitization theory with frame analysis and agenda-setting theory (Cavelty 2008). She tells 'the story of how and why cyber-threats became to be considered one of the quintessential security threats of modern times in the United States' (Cavelty 2008, 1). She states that the framing of the problem has remained largely stable since the mid-1990s: critical infrastructure protection (CIP), including the digital information security dimension, has been the focal point of US cyber security measures for the past two decades. The focus on CIP primarily emerged in the wake of the 1995 Oklahoma City bombing; a focus not even altered by the 9/11 attacks (Cavelty 2008)3. As cyber is predominantly a civilian and largely privately-owned domain, traditional state security approaches have been of limited relevance. As a result, Dunn Cavelty concludes that what has taken place in the USA is 'failed securitization'. Although CIP is regarded as national security, 'no exceptional measures are envisaged that would traditionally fall under the purview of the national security apparatus' (Cavelty 2008, 132-133). Policies are neither taken out of 'normal bonds' nor are 'exceptional measures' implemented. Instead she argues that we are witnessing a new logic of security where technical security merges 7 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. with national security. Hence, security policy cannot be restricted to 'policy for extraordinary circumstances' (Cavelty 2008). In short, her empirical research reveals shortcomings of securitization theory when applied to cyber security. As the spectrum of potential threats is vast and fundamentally uncertain, and the list of potential malicious actors is so broad, it becomes challenging to identify key terms like 'existential threat'. Which referent object is under threat? In relation to CIP, it may be national key functions, but as Dunn Cavelty shows, this does not mobilise 'extraordinary measures'. It is more of a matter of day-to-day routine management. From an analytical perspective, it is thus difficult to say when a policy is extraordinary and when it is normal. Lene Hansen and Helen Nissenbaum also attempt to resolve these challenges by expanding on the Copenhagen School (Hansen and Nissenbaum 2009). They seek to link securitization theory to cyber security by combining constellations of referent objects, such as 'networks' and 'humans'. This allows a broader and inter-sectoral discursive analysis of the securitization process. They also introduce new 'grammars' into the Copenhagen framework, like 'technification', which highlights the role of ICT security professionals in defining the dangers and in responding to them. The important role of experts and the everyday practices in the production of security have also been highlighted in other contexts, where it is argued that security analysis should not be limited to elite discourses. Such a focus is vital to furthering our understanding of how security measures emerge bottom-up through an ongoing process of technocratic normalisation by security professionals (Bigo 2002; Balzacq 2010). In contrast to Dunn Cavelty, and in line with Bendrath et al., Hansen and Nissenbaum claim that cyber security has been successfully securitized in the USA, and list the various new 8 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. institutions and strategies that have been emerged since the mid-1990s as evidence of this. Again one must ask what is 'extraordinary' and what is 'normal', and the diverging conclusions regarding the USA illustrate that securitization theory is unclear on this. All agree that there have been several attempts to securitize cyber, but it is unclear whether the audience has accepted them, if the referent object(s) were considered to be under existential threat, and if the measures taken were exceptional or not. As Dunn Cavelty puts it: 'it remains largely unclear which audience has to accept what argument, to what degree, and for how long' (Cavelty 2008). Hansen and Nissenbaum's main case is the cyber attacks on Estonia in 2007, when Estonian officials went far to securitize the event. However, the inability to prove that it had been orchestrated by Russia and the lack of significant damage to the Estonian society resulted in the general failure of also this securitization attempt. NATO, the EU and the USA did not recognise them as an attack on Estonian sovereignty, which could have triggered NATO's Article 5. The attacks had several effects, such as contributing to 'cross-fertilisation' of cyber and terrorism, highlighting politically-motivated hacking, etc., which is illuminated by Hansen and Nissenbaum's theoretical framework, and the politically important establishment of NATO's Cooperative Cyber Defence Centre of Excellence in Tallinn. However, the core of securitization theory, to demonstrate how issues are lifted out of regular politics and into a higher order politics – legitimising extraordinary responses, was not applicable in this case. The Limits of Securitization Theory All of the contributions discussed above have found it necessary to expand upon or twist securitization theory in order to make it fit cyber security. The cases of attempted securitization are found mainly through hyperbolic statements, but they have had limited 9 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. resonance in various national and international audiences. Securitization has therefore failed. This begs the question: if securitization theory has limited value even for cases like Estonia, is it a useful theoretical lens for the analysis of cyber security? Given the unlikelihood that cyber attacks will cause massive death and physical destruction, can securitization ever be expected to be successful? Will it remain in the sphere of day-to-day management, rather than in the realm of urgent extraordinary means? Lowering the bar for defining securitization, as in Bendrath et al. and Hansen and Nissenbaum, is hardly a solution. The establishment of new institutions in the USA is not enough to qualify as securitization. In our view, the term securitization should be restricted to the extreme cases when there are sudden shifts in policy, urgent responses and heated debates. The theory is highly applicable to for instance the outbreak of civil wars, as it helps provide an understanding of why neighbours suddenly turn on each other. However, it is less applicable to the less dramatic non-kinetic discourses on cyber security. Another shortcoming in securitization theory is its relation to the material dimension of security. Claudia Aradau has argued that securitization theory has largely ignored the role of objects or 'things' – due to its association with the linguistic and social constructivist turn in IR. Material factors have often been relegated to the outside realm, as simply facilitating conditions for securitization (missiles, tanks, etc.) or as remnants of mainstream positivism. She asserts that as objects have the capacity to both enable and constrain effects on what can be said and done to secure them, it is important to understand the relation between matter and meaning. Matter should not simply be understood as an end product of discourse, as the effect of performative speech acts, but should be regarded as an active factor in material-discursive processes. In this sense, it can also be seen as facilitating conditions for speech acts (Aradau 10 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. 2010). Securitization theory thus has limited value in terms of illuminating how changes in the nature of cyberspace (as discussed in the Introduction) impact on security discourses and practices. Without attention to the material aspects of cyberspace, a proper analysis of the production of cyber security is hindered. Furthermore, the nature of cyberspace means that most of the day-to-day workings of cyber security are reactive, in the sense that the security professionals are always reacting (if they themselves are not engaged in offensive cyber operations), to new software and malware installed in the systems, patching known vulnerabilities and creating new anti-malware software4. This is a dynamic practice, where cyber security is constantly being co-produced by new malware and new practices to counter this malware, both constrained and enabled by the technical logic of cyberspace. The nature of cyberspace – and cyber security – is therefore ongoing and dynamic, and is being dealt with on a daily basis. The material or technical dimension is crucial in cyber security, but the kind of responses and countermeasures chosen are not given. Cyber security is not just a technical problem, but a practice that is co-produced by material-discursive processes. To address these shortcomings without dismissing securitization theory altogether, we propose a framework that systematically differentiates between securitization 'proper' and other, less dramatic but still serious, security challenges which also allow the analysis of the material aspects of cyberspace and the practices of cyber security experts. To do this, we need to distinguish between threats and risks. Threats and risks are both perceptions and representations of certain dangers but, as we see it, only the former can be securitised. Threats are representations of danger that imply an agent with intent and capabilities. The focus is thus outwards, towards the danger, and responses typically include deterrence, defence and 11 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. offense. Risk, on the other hand, has a different logic associated to it. Framing something as risk produces security practices that are about probabilities, prevention, future scenarios and management, as opposed to deterring adversaries or defending against or defeating identifiable and calculable threats. What is Risk? Risk analysis and management of risk has been applied to almost every facet of human endeavour, from finance and fishing to epidemiology, ecology, war and welfare. In the rationalist tradition, risk analysis is an instrument that is used to enhance decision-making by estimating future danger in terms of risk. It is premised on the belief that risks can be classified, quantified and thereby predict possible futures to be managed. In recent years, however, scholars from different theoretical backgrounds and political inclinations have begun to explore the concept of risk more critically. One can broadly lump security studies scholars within the field of risk into two camps; those who follow the work of Ulrich Beck and his risk society thesis and those who follow Michel Foucault and his work on governmentality (Rasmussen 2006; Coker 2002; Heng 2006; Ewald 1986; Dean 1999; Aradau and Munster 2007). The 'Beckians' start off with Beck's idea of the risk society, a theory that describes the macro-structural changes happening in the West as the bipolar world is fading away and we are 'moving from a world of enemies to one of dangers and risks' (Beck 1999, 3). Dangers are now conceptualised as risks in terms of their 'probabilities and magnitude of consequences' (Heng 2006), making risks much more open to subjective interpretations than threats. In Beck's definition of a risk, they are both seen as 'real' and 'socially constructed', but this interpretation hinges on a distinction between risk and danger. He argues that risk arises through assessments of future dangers and becomes 'real' 12 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. when one sees the possibility of acting to prevent or mitigate the potential effects of danger in the future. Thus, risks only occur when one locates a danger, assesses it and then decides whether to act on it. 'Risks concern the possibility of future occurrences and developments; they make present a state of the world that does not (yet) exist. Risks are always future events that may occur' (Beck 2009, 9). Risk is thus linked to interpretation and decision, while dangers are seen as 'existing'. The risk security writers that largely take Foucauldian governmentality as their starting point view risk as a tool used by certain actors (preliminary governments) to expand neo-liberal control mechanisms – rather than an inherent condition of the world. Risk, in this view, is a mode of governmentality that implies the expansion of regulatory regimes. It is a particular rationality of government that works to legitimise actions of power vis-à-vis the population. Such analyses of risk are interested in exposing 'how the world and existing problematizations are made into risks [and] what effects this form of ordering entails upon populations' (Aradau and Munster 2007, 97). As such, they move away from the Beckian critique of the attempts of security elites and policymakers to control uncertainty. Instead they focus critically on control regimes that seek to govern populations through strategies portraying the future as computable, calculable and manageable. We see that the two risk 'schools' reach different conclusions as to how risks are generated and how they are dealt with. Nevertheless, they agree that security is increasingly being framed in the language of risk and that there has been a cognitive shift in how we think about security. In addition, risk security writers agree that risk both transforms and broadens the logic of security. They are worried, albeit for different reasons, about how the logic of risk drives an expanding security agenda in which the precautionary principle and pre-emption 13 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. have become guiding principles in an ever-increasing 'routinisation' of security. In essence, they argue that risk has become the new security, and that the changing practices and meaning of security are thus best understood through a risk framework. We will therefore next discuss how we can apply risk theorisation on cyber security, while retaining the social construction elements of the Copenhagen School. Riskification Fortunately someone has already made such a marriage, albeit in a different sector (field) than cyber. Olaf Corry's term 'riskification' captures the idea of a 'social process of constructing something politically in terms of risks' (Corry 2012, 238). The term builds on the securitization framework, but can be placed between securitization and politicisation. It is not about existential threats, but less dramatic security challenges. Corry stresses the difference between threats and risk, as discussed above. He does this by particularly highlighting how risk focuses on future scenarios and policies aimed at preventing it from materialising. From this perspective, risk tends to depersonalise danger, as it does not require an enemy to do the threatening. As risks are considered a more or less permanent feature of modern societies, they cannot be eradicated, only managed, he claims. As a result, 'risk security measures will tend to be permanent features of society' (Corry 2012, 245). Securitization theory is unable to capture security policies related to risks, as risks are neither existential nor call for radically exceptional policy responses. Corry's riskification concept helps mitigate this weakness, as it remains within the same basic parameters of securitization theory. It still requires someone to advocate security measures to be put in place, a valued reference object to protect, and an audience that accepts the need for new security measures. 14 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. A shared starting point is the constructivist epistemology position on dangers. According to Corry, nothing is inherently a threat or a risk as 'different dangers can be constructed in terms of either risk or threat at different times' (Corry 2012, 246). To understand the difference between threat security policies and risk security policies, one can therefore not define the former as graver or more dangerous than the latter. Rather, Corry argues that risk security can be distinguished from threat security by three features: First, it implies a different kind of causality. Risk makes us think of the 'constitutive causes of harm', rather than the direct causes of harm (as in threats) (Corry 2012). Riskification relates to the factors that make a danger possible, such as vulnerability of societies, weak international regimes and the existence of weapons. In contrast, the threat and securitization of for instance terror is 'connected to particular agents believed to exist and have malicious intent and capability to commit acts of terror' (Corry 2012). This is a more direct causation of harm than a risk, and produces a different logic for action. Furthermore, Corry argues, '(t)hinking in terms of constitutive causes draws attention to background factors and structures (material or discursive) that make certain actions or events possible' (Corry 2012). The focus on constitutive background factors thus opens for the inclusion of material factors – such as malware – into the analysis. Second, there is a change of locus of security action: 'whereas securitization involves a plan of action to defend a valued referent object against a threat, riskification implies a plan of action to govern the conditions of possibility of harm' (Corry 2012, 247). Threats cannot be governed, only defended against. The attention is therefore outward, while a risk policy looks inward. 'Security thus has to take on modus operandi other than defence' (Corry 2014). It is not about deterrence, defence or fighting, but about understanding dependencies and 15 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. vulnerabilities, precaution and governance. It is about reducing the chances of possible future harm through preventive policies, resilience and international governance. Third, while securitization calls for immediate and short-term responses through extraordinary measures, riskification promotes long-term thinking, investment in governance capabilities, investment in precautionary measures and resilience. In contrast to securitization, it may open debates and increase transparency in the discourse on security (Corry 2012, 248). To sum up, riskification is not characterised by an existential threat to a valued referent object leading to exceptional measures against external and ungovernable threatening others. Rather, it posits risks (understood as condition of possibly harm) to a referent object. This thus leads to programmes for permanent changes aimed at reducing vulnerability and boosting governance-capacity of the valued reference object itself' (Corry 2012). Riskification of Cyber Armed forces worldwide are generally constrained to protecting their own information and communications technology (ICT) systems. Main responsibility for securing cyberspace, on the other hand, lies with civilian and commercial agencies. This means that cyber security is mostly dealt with on a day-to-day basis by cyber security professionals in civilian and commercial organisations rather than military 'cyber warriors'. In contrast to securitization theory, riskification may be a relevant tool for the analysis of these less dramatic responses and the everyday production of cyber security. This includes preparations to sustain larger attacks, while keeping the door open for escalation and securitization under particular circumstances. By applying Corry's three characteristics of riskification (constitutive 16 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. causality, governance, and long-term), in the following we will see how this applies to cyber security. Constitutive Causality Cyber danger is better depicted as a constitutive rather than a direct cause of harm. The risk of cyber attacks cannot be reduced to malicious actors' intent and capabilities alone. This is partly due to the problem of attribution in cyberspace (Singer and Friedman 2014) and as such it is the dependencies, vulnerabilities and resilience of own systems that largely define the probability and consequences of an attack. In other words, it is the 'background factors' that make action possible that defines the dangers, not actors' intent and capabilities alone. Furthermore, in most cases cyber attacks are not regarded as an immediate threat, but an ongoing risk and a potential scenario. Risks occur through assessments of future dangers and efforts to prevent or mitigate these. Of course, cyber attacks may occur as spillovers from political conflicts and tensions in other regions, such as Estonia in 2007 and Georgia in 2008 (O’Connell 2012) or the muchpublicised cyber conflict between China and the USA (Lindsay et al. 2015). If a state is in the midst of such a crisis or war, the problem of attribution in cyberspace is less of a mystery. In these cases, urgency is more of a concern, and securitization is a better way to characterise the processes taking place. In these cases, cyber security is simply a sub-set of a larger political conflict, not a security sector in and of itself. However, the dangers stemming from a cyber attack in peacetime are better depicted as risks. It should be noted, however, that ongoing cyber operations blur the line between peace and conflict. Security policies focus on our societal dependencies and the vulnerable nature of 17 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. cyberspace, and aim to reduce the negative implications of a potential future attack (resilience). An analysis of today's cyber security policies would need to capture the entire spectrum of these constitutive causes of harm; the interpretation and representation of the risks, the proposed countermeasures among various public, corporate and private actors, the international efforts and the networks between all these actors. Thinking in terms of constitutive causes allows us to also draw attention to cyberspace itself, to the digital materiality of malware, and to the vulnerabilities in our own systems. A wouldbe riskifying actor would need to point to the evolution of cyberspace; new dependencies and vulnerabilities and the constantly changing syntactic level. The evolution of the technical or material aspects of cyberspace is thus an integral part of any risk assessment. This does not mean that there is no room for interpretation or social and political factors, but that the dynamic nature of cyberspace requires an ongoing rephrasing and reassessment of the risks at hand. In other words, there is no material determinism, but an 'active' material dimension which constantly plays into – and constitutes – the social dimension. Taken together, these factors constitute the risk of a cyber attack. Governance Riskification is about governing, not preventing, the possibility of harm. The focus on cyber security is more internal (vulnerability focus) than external (friend-enemy focus), as the locus and nature of the threat is unknown. Resilience of one's own systems is therefore key, as there are limits to what firewalls and anti-virus systems can do to protect them. Most attention is given to precautionary measures, such as patching holes in the systems, updating software, encryption and improving back-ups (Harrop and Matteson 2013-14). Cyber defence organisations, such as computer emergency readiness teams (CERT), obviously also monitor 18 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. the cyber system as a whole and look for patterns and early indicators of attacks. However, as most severe cyber attacks usually exploit unknown vulnerabilities in a system, so-called zeroday attacks (Andress and Winterfeld 2011), setting up a defence makes little sense, as they are by definition unknown. Cyber security experts therefore never know exactly what to look for, but once malware is identified, countermeasures are put in place. Malware is therefore often labelled single-shot guns – it can only be used once. As a result, cyber security is always reactive 5 and an attack is usually only discovered long after it has been launched. Furthermore, cyber security professionals are busy on day-to-day basis, revealing and managing the myriads of small and large attacks. They do not wait passively for an enemy to intrude, but actively scan the horizon for dangers to manage. This is cyber security practice at its core. The focus on internal management makes the technical cyber security professionals the focal points of cyber security. This bottom-up and technically-heavy nature of cyber security also reinforces the point that this is management, not defence. In this respect, the inter-sectoral nature of cyber risks makes it necessary to look at governance broadly, from industry to civilian governance to the military. There is little use in mobilising only one sector, one agency or institution to manage cyber risks of scale. Technical cooperation and shared situational awareness is a necessity in order to succeed in both the day-to-day risk management and in the event of larger attacks. The nature of cyber makes international CERT collaboration necessary. This allows the teams to assist each other in the event of an attack and build shared situational awareness. The numerous international efforts to improve internet governance and management indicate that cyber security is being dealt with actively on the international level, although the 19 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. effectiveness can be debated There are several government and inter-governmental initiatives in the UN, the ITU 6 , the OSCE 7 and in trade organisations. There are also 'I*star' organisations which deal with critical internet resources, protocols, etc., like ICANN8. Finally, there are multi-stakeholder initiatives, where governments, the private sector and nongovernmental actors meet, such as the Internet Governance Forum, and similar conferences (Kleinwächter 2013). These international efforts aim to reduce vulnerabilities in the system and share information, but also to generate confidence-building measures between countries with political differences or conflicting views on how to regulate the internet. All of these national and international governance initiatives focus on governing risk, not preventing it. The Long-term Perspective Cyber security cannot be confined to the military security sector alone, which is true of much of the traditional security discourse. In particular, the private sector, telecommunications and internet providers are critical in terms of security. The myriad of actors involved in cyber security complicates the matter, as they often have diverging interests and different political aims. As such, cyber security efforts are often aimed at 'soft' measures like 'awareness building', 'information sharing', 'confidence building' and 'best practices' such as encryption, cyber hygiene, etc. in order to manage the various challenges associated with the intersectoral cyberspace. These are long-term investments and precautionary measures aimed at reducing vulnerabilities and thereby risk, not defending against an attack. Because urgency is less of a factor in risk than in securitization, riskification allows for contemplation, debate and numerous online discussions about the various risks at hand. It is long-term security building, not driven by urgency or panic, although much of the discourse around cyber security is precisely this. 20 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. Efforts to enhance cyber security are more transparent and openly debated than most traditional security fields. It is the technical nature that keeps much of the discourse 'encrypted' for outsiders, rather than deliberate attempts to keep the processes secret. Obviously, detailed information about CERTs' and intelligence services' methodologies, or private companies' cyber security strategies are kept secret, but the overarching discussions of principle and strategy are open and transparent. The important role of the private corporate sector and civil society like 'white hat hackers' in cyber security also enhances transparency. The latter spend their days trying to worm their way into clients' computer systems to see how vulnerable they are to cyber-criminals, spies and other nefarious 'black hats'9. Edward Snowden's revelations about the NSA's cyber security programmes may arguably counter this argumentation. The secret cyber conflict taking place between the NSA and its Chinese counterpart is far from transparent and open. There is little doubt that intelligence services and numerous other global actors in cyberspace operate with a high degree of secrecy. Nonetheless, this tug of war also takes the form of open debates about risks. It was for instance a private US security company, Mandiant, which revealed the location of a Chinese cyber operation's headquarters in Shanghai in 201310. Furthermore, the most famous cyber attack to date, the Stuxnet worm, became publicly known, despite initially being a highly secret computer network attack (CNA). This demonstrates that even the most sophisticated and secret malware cannot be contained for ever – and eventually will leak out to the public (Lindsay 2013). By introducing riskification and Corry's three features as an analytical category between politicisation and securitization, we have opened for a more nuanced understanding of how states and societies respond to cyber security, domestically and internationally. This allows 21 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. the necessary breadth in scope in terms of domains and actors, and the decoupling of the analysis from the binary logic inherent in threat politics. By doing so, we move away from a focus on enemy actors and capabilities, and the corresponding terminology of deterrence, defence, urgency, immediacy, and direct causes of harm, and turn to probabilities, future scenarios, management and governance. We thus move from an outward look at the world 'out there' to a more inward focus on internal dependencies, vulnerabilities, responses and resilience. Most importantly, riskification allows an analysis of the material aspects as well as the crucial role of the day-to-day cyber security professional in the provision of cyber security. Finally, the move from threats to risk also facilitates a more critical approach towards the hyperbolic attempts to securitize cyber. However, a focus on risk also means attention to vulnerabilities. This can have positive and negative effects. One could argue that looking at vulnerabilities instead of at external actors can result in an unhealthy focus on worst-case catastrophes – which again may lead to increased militarisation of cyberspace (Cavelty 2012). On the other hand, such a focus may lead to an effort to reduce vulnerabilities, thus minimising certain risks, such as systemic failures and cyber crime. In addition, a focus on vulnerabilities rather than actors may have the benefit of cyber security not becoming a self-fulfilling prophecy of a new Cyber Cold War. We will conclude this chapter with further ethical considerations regarding the impact of our theoretical approach. Conclusion The inherent normative approach of the Copenhagen School is that securitization may often not be a good thing: 'security should be seen as negative, as a failure to deal with issues as normal politics' (Buzan et al. 1998). De-securitization, in other words a return to normal 22 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. politics with less dramatic features, is therefore often seen as desirable. This particularly applies to sectors like human security or environmental security, where state-centric and militarised solutions may exacerbate rather than reduce tensions (Hansen 2012). As we argued at the outset of this chapter, the same can be said about cyber security. Attempts at securitization have placed part of the cyber debate, particularly in the USA, in the military logic of friend and foe, deterrence and war. This may also have 'legitimised' some of the intrusive privacy practices of the NSA, as revealed by Edward Snowden. However, Corry warns that de-securitization may also have negative effects. In the case of climate change, it could lead to 'de-riskification', thus 'removing climate change away from this precautionary logic and into ‘normal' politics of distribution of goods and bads' (Corry 2012, 255). This is where climate sceptics would like to see the debate; in other words as entirely decoupled from security and heightened political attention. For others, climate change is something that requires particular attention and preparedness, as it is on a higher policy level than day-to-day politics. In the cyber domain, few voices seek to reject the risks altogether, but the normative imperative of talking in terms of risk rather than threats de-escalates the discourse. If that were to fail, cyber security would become a domain totally dominated by security and intelligence agencies, technical experts and not least the booming 'cyber-security militaryindustrial complex' that simultaneously cries wolf and offers solutions (Deibert 2013). Riskification is thus an analytical tool that can be applied in order to empirically capture cyber security efforts, the representation of the danger and the policies formulated to address it, as well as a way to conduct critical analysis aimed at unmasking securitization efforts in this 23 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. field. Empirical analysis will most likely find that the riskification in certain places and at certain times begins to resemble securitization. As with climate change, such securitization of cyber can be criticised while offering an alternative security frame, so that a return to normal politics no longer is the only option. Nonetheless, following a Foucauldian approach to risk, one may argue that risk policies are as dangerous to the freedom of society as securitization and militarisation, since the former represent a more creeping and gradual change to the security and control measures of neoliberal regimes of power that call for a permanent process with no end. The slow processes normalise security policies that would arguably have met resistance had they been put in place abruptly. From this perspective, replacing securitization with riskification may not be a positive move if the valued referent object is a free and transparent cyberspace. Applying riskification analytically therefore does not need to automatically correspond to advocating riskification of cyber security politically. That is a value judgement. Riskification as an analytical tool can be applied without taking a normative stance on these matters, but it can also be applied as a platform for critical judgements of current policies. As we see it, applying riskification to the study of cyber security has important benefits. It allows analysts to capture processes that may be at the boundary between risk and threat, perhaps not existential, but still grave. It further allows escalation and de-escalation within the same basic analytical parameters, and can also be combined with some of the proposed 'new grammars' of the Copenhagen School discussed here, such as 'technification'. Importantly, it allows for a deeper understanding of the intended and unintended material aspects of and the role of cyber security professionals in production of cyber security. Furthermore, riskification 24 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. does not preclude the continued use of other theoretical tools like 'frame analysis' and 'agenda setting-theory'. It helps us escape the hyperbolic language of threats and dangers while remaining seriously committed to recognising and understanding the risks and vulnerabilities of our networked societies. It may also serve as a normative platform for the defence of internet freedom against the growing pressure from the intelligence services and the surveillance industry towards increased control and surveillance. With a less dramatic representation of the cyber dangers, legitimate countermeasures will most likely be less intrusive and omnipotent. References Andress, Jason and Steve Winterfeld. 2011. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Waltham, MA: Syngress Elsevier. Aradau, Claudia. 2010. “Security That Matters: Critical Infrastructure and Objects of Protection.” [In English]. Security Dialogue 41 (5): 491‒514. Aradau, Claudia and Rens van Munster. 2007. “Governing Terrorism through Risk: Taking Precautions, (Un)Knowing the Future.” European Journal of International Relations 13 (1) (March): 89‒115. Balzacq, Thierry, Tugba Basara, Didier Bigo, Emmanuel-Pierre Guittet and Christian Olsson. 2010. “Security Practices.” In International Studies Encyclopedia Online, edited by Robert A. Denemark, 1‒30. New York: Blackwell. Beck, Ulrich. 2009. World at Risk. 2nd edition. Cambridge: Polity. 25 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. Beck, Ulrich. 1999. World Risk Society. Malden, MA: Polity Press. Bendrath, Ralph, Johan Eriksson and Giampiero Giacomello. 2007. “Cyberterrorism to Cyberwar, Back and Forth: How the United States Securitized Cyberspace.” In International Relations and Security in the Digital Age, edited by Johan Eriksson and Giampiero Giacomello, 57‒82. London: Routhledge. Bigo, Didier. 2002. “Security and Immigration: Toward a Critique of Governmentality of Unease.” Alternatives 27 (1): 62‒92. Bumiller, Elisabeth and Thom Shanker. 2012. Panetta Warns of Dire Threat of Cyberattack on U.S. New York Times. http://www.nytimes.com/2012/10/12/world/panetta-warns-of-direthreat-of-cyberattack.html?pagewanted=all&_r=0; Buzan, Barry, Jaap de Wilde and Ole Wæver. 1998. Security: A New Framework for Analysis. Boulder, Colorado: Lynne Rienner. Cavelty, Myriam Dunn. 2008. Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age. London: Routledge. ———. 2012. The Militarisation of Cyberspace: Why Less May Be Better. 4th International Conference on Cyber Conflict, edited by C. Czosseck, R. Ottis and K. Ziolkowski: 141-53. Talinn: NATO CCD COE Publications. 26 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. ———. 2013. “From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse.” International Studies Review 15 (1): 105‒22. Choucri, Nazli. 2012. Cyberpolitics in International Relations. Cambridge, Mass.: MIT Press. Coker, Christopher. 2002. “Globalisation and Insecurity in the Twenty-First Century -- Nato and the Management of Risk.” Adelphi Papers 345. New York: Routledge. ———. 2009. War in an Age of Risk. Cambridge: Polity. Corry, Olaf. 2012. “Securitisation and 'Riskification': Second-Order Security and the Politics of Climate Change.” [In English]. Millennium-Journal of International Studies 40 (2): 235‒ 58. ———. 2014. “From Defence to Recilience: Environmental Security Beyond NeoLiberalism.” International Political Sociology 8 (3): 256‒47. Dean, Mitchell. 1999. Governmentality: Power and Rule in Modern Society. London, Thousand Oaks, Calif.: Sage Publications. Deibert, Ronald. 2013. Black Code: Surveillance, Privacy, and the Dark Side of the Internet. Expanded edition. Toronto: McClelland & Stewart. Eriksson, Johan. 2001. “Cyberplagues, It, and Security: Threat Politics in the Information Age.” Journal of Contingencies and Crisis Management 9 (4): 211‒22. 27 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. Ewald, François. 1986. L'etat Providence [the Welfare State]. Paris: Editions Grasset. Hansen, Lene. 2011. “The Politics of Securitization and the Muhammad Cartoon Crisis: A Post-Structuralist Perspective.” [In English]. Security Dialogue 42 (4-5): 357‒69. ———. 2012. “Reconstructing Desecuritisation: The Normative-Political in the Copenhagen School and Directions for How to Apply It.” Review of International Studies 38 (03): 525‒46. Hansen, Lene and Helen Nissenbaum. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” [In English]. International Studies Quarterly 53 (4): 1155‒75. Harrop, Wayne and Ashely Matteson. 2013-14. “Cyber Resilience: A Review of Critical National Infrastructure and Cyber Security Protection Measures Applied in the Uk and USA.” Journal of Business Continuity & Emergency Planning 7 (2): 149‒62. Heng, Yee-Kuang. 2006. “War as Risk Management : Strategy and Conflict in an Age of Globalised Risks.” Contemporary Security Studies. London ; New York: Routledge. Kerry, John. 2013. “Foreign Hackers Are '21st Century Nuclear Weapons'.” Huffington Post. http://www.huffingtonpost.com/2013/01/24/john-kerry-hackers_n_2544534.html. Kleinwächter, Wolfgang. 2013. “Internet Governance Outlook 2014: Good News, Bad News, No News?” CIRLEID. 28 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. http://www.circleid.com/posts/20131231_internet_governance_outlook_2014_good_news_ba d_news_no_news/. Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyberwarfare.” Security Studies 22 (3): 365–404. Lindsay, John R., Tai Ming Cheung and Derek S. Reveron. 2015. China and Cybersecurity: Espionage, Strategy and Politics in the Digital Domain. New York, NY: Oxford University Press. Lynn III, William J. 2010. “Defending a New Domain: The Pentagon's Cyberstrategy.” Foreign Affairs 89 (5). O'Connell, Mary Ellen. 2012. “Cyber Security without Cyber War.” Journal of Conflict & Security Law 17 (2): 187–209. Rasmussen, Mikkel Vedby. 2006. The Risk Society at War: Terror, Technology and Strategy in the Twenty-First Century. Cambridge; New York: Cambridge University Press. Singer, P. W. and Allan Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press. Notes 29 Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, Karsten Friis and Jens Ringsmose eds., London: Routledge, 2016. 1 This claim can be challenged, as other theories also have been applied. Nazli Choucri, Cyberpolitics in International Relations (Cambridge, Mass.: MIT Press, 2012), is but one example of a comprehensive theorising of cyber security in international relations which is not based on the Copenhagen framework. 2 The 'nature of threats' in the Copenhagen School is widely debated. See for instance Lene Hansen for an overview of the discussion: Lene Hansen. 2011. "The Politics of Securitization and the Muhammad Cartoon Crisis: A Post-Structuralist Perspective," Security Dialogue 42 ( 4-5). 3 However, 9/11 resulted in a return to identifying 'terrorists' as the main cyber perpetrators – as opposed to 'states' in the early Bush administration. 4 However, vulnerabilities that have not been exploited previously, so-called zero-day vulnerabilities, are sometimes kept as secrets by governments and sold by various entities on the black market rather than patched. See e.g. http://www.wired.com/2014/11/what-is-a-zero-day/. 5 It should be noted that offensive computer network operations (CNO) are also part of cyber security in order to bolster emergency preparedness and in some cases prevent attacks from occurring. 6 International Telecommunication Union, http://www.itu.int/en/ITU-D/Cyber security/Pages/default.aspx. 7 Organization for Security and Cooperation in Europe, http://www.osce.org/cio/126475. 8 The Internet Corporation for Assigned Names and Numbers, https://www.icann.org/. 9 'White hats to the rescue', The Economist, February 22, 2014, available at: http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-badguys-white-hats-rescue. 10 See http://intelreport.mandiant.com/. 30