Skip to main content

The Monopoly of Violence in the Cyber Space: Challenges of Cyber Security

  • Chapter
  • First Online:
Power in the 21st Century

Part of the book series: Global Power Shift ((GLOBAL))

Abstract

The conceptualization of cyber security is currently in the making. In the last decade, the frequent concerns with power and control in the cyber space, coupled with attempts at diminishing the risks posed by ‘invisible actors’ to critical infrastructure while ensuring free access, have represented real challenges to the adoption of national cyber security frameworks. In spite of the wide acknowledgement of cyber threats as a global problem, limited efforts to adopt a common approach towards reducing risks were undertaken till now at the international level. With more than 26% of world’s population using the Internet as of 2009 (ITU 2010: ix), the cyber risks are growing. According to Libicki, only in the US, the “estimates of the damage from today’s cyber attacks range from hundreds of billions of dollars to just a few billion dollars per year” (2009: xv).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In “Economy and Society”, Max Weber provides the definition of the state as a political organization “upholding the claim to the monopoly on the legitimate use of physical violence in the enforcement of its orders” (1952b: 29).

  2. 2.

    See Braman 2007.

  3. 3.

    Cyberspace is a term coined by William Gibson, who described it as “a consensual hallucination… A graphic representation of data abstracted from the back of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data. Like city lights receding” (Gibson 1985: 51).

  4. 4.

    For a full overview of the taxonomy of definitions of information, see Braman (2007).

  5. 5.

    /11 refers to the terrorist attacks on the World Trade Center in New York on 11 September 2001.

  6. 6.

    Critical infrastructure protection does not refer only to preemptive actions, being “also about technology of control, constituting both a threat and a means of protection” (Dunn Cavelty and Kristensen 2008: 5).

  7. 7.

    Digitalization of values refers to the sources of value existent in the online realm; high dependence on ICT for business profits or large digital networks increases the risk of targeted attacks (Kshetri 2005).

  8. 8.

    Back in 1990, in his book entitled Powershift: knowledge, wealth and violence at the edge of the 21 st century, Toffler asserted that, in the age of new technology, “power, which to a large extent defines us as individuals and as nations, is itself being redefined” (Toffler 1990: 7).

  9. 9.

    Accordingly, “power applies to immediate everyday life which categorises the individual, marks him by his own individuality, attaches him to his own identity, imposes a law of truth on his which he must recognize and which others have to recognize in him. It is a form of power, which makes individuals subjects. There are two meanings of the word subject: subject to someone else by control and dependence, and ties to his own identity by a conscience or self-knowledge. Both meanings suggest a form of power which subjugates and makes subject to” (Foucault 1983: 212).

  10. 10.

    Barnes (1988: 57) explains that “any specific distribution of knowledge confers a generalized capacity for action upon those individuals who carry and constitute it, and that capacity for action is their social power, the power of the society they constitute by bearing and sharing the knowledge in question. Social power is the added capacity for action that accrues to individuals through their constituting a distribution of knowledge and thereby a society”.

  11. 11.

    This understanding is similar to that of capabilities (Hart 1989).

  12. 12.

    Though attacks were sometimes claimed by individual hackers, a dominant state interest is not excluded.

References

  • Ball, G. (1968). The discipline of power: Essentials of a modern world structure. Boston: Little, Brown and Company.

    Google Scholar 

  • Barnes, B. (1988). The nature of power. Cambridge: Polity.

    Google Scholar 

  • Barnett, M., & Duvall, R. (2005). Power in international politics. International Organization, 59, 39–75.

    Article  Google Scholar 

  • BBC News. (2007). Estonia hit by <Moscow cyber war>, 17 May 2007. http://news.bbc.co.uk/2/hi/europe/6665145.stm.

  • Billo, C., & Chang, W. (2004). Cyber warfare: an analysis of the means and motivations of selected nation states. Institute for Security Technology Study, Dartmouth College, report available at http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf.

  • Braman, S. (2007). Change of state: Information, policy, and power. Cambridge: MIT Press.

    Google Scholar 

  • Bridis, T. (2001). Net Espionage rekindles cold-war tensions – U.S. tries to identify hackers. Wall Street Journal, 27 June 2001. http://netwarfare.com/newcoldwar.htm.

  • British- North American Committee. (2007). Cyber attack: A risk management primer for CEOs and directors. http://www.acus.org/docs/071212_Cyber_Attack_Report.pdf.

  • Castells, M. (1998). End of millennium, the information age: Economy, society and culture (Vol. III). Oxford: Blackwell.

    Google Scholar 

  • Conway, M. (2008). Media, fear and the Hyperreal: The construction of cyberterrorism as the ultimate threat to critical infrastructures. In M. Dunn Cavelty & K. S. Kristensen (Eds.), Securing ‘The Homeland’: Critical infrastructure, risk and (In)security (pp. 109–129). London: Ashgate.

    Google Scholar 

  • Cornish, P., Hughes, R., & Livingstone, D. (2009). Cyberspace and the national security of the United Kingdom Chatham House Report. http://www.chathamhouse.org.uk/files/13679_r0309cyberspace.pdf.

  • De Kloet, J. (2002). Digitisation and its Asian discontents: The Internet, politics and hacking in China and Indonesia. First Monday, 7(9). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1789/1669.

  • Denning, D. (2000). Hacktivism: An emerging threat to diplomacy, American Foreign Service Association. http://www.fsjournal.org/sept00/Denning.cfm.

  • Dunn Cavelty, M. (2007). Critical information infrastructure: Vulnerabilities, threats and responses. UNIDIR Disarmament Forum, 2007(3), 15–22.

    Google Scholar 

  • Dunn Cavelty, M. (2010). Cyber-threats. In M. Dunn Cavelty & V. Mauer (Eds.), The Routledge handbook of security studies. London/New York: Routledge.

    Google Scholar 

  • Dunn Cavelty, M., & Kristensen, K. S. (2008). Securing the homeland: Critical infrastructure, risk and (in)security. In M. Dunn Cavelty & K. S. Kristensen (Eds.), Securing ‘the Homeland’: Critical infrastructure, risk and (in)security. London: Routledge.

    Google Scholar 

  • Dunn Cavelty, M., & Rolofs, O. (2011). From cyberwar to cybersecurity: Proportionality of fear and countermeasures. Munich Security Conference, Munich, 3–4 Feb 2011. Paper available at http://www.securityconference.de/Article-Details.94.0.html?&no_cache=1&L=1&tx_ttnews[tt_news]=560&tx_ttnews[backPid]=92&cHash=55e618dc7b.

    Google Scholar 

  • Everard, J. (2000). Virtual states: The Internet and the boundaries of the nation–state. London: Routledge.

    Google Scholar 

  • Foucault, M. (1983). The subject and power. In H. Dreyfus & P. Rabinow (Eds.), Michel Foucault: Beyond structuralism and hermeneutics (2nd ed., pp. 208–226). Chicago: Chicago University Press.

    Google Scholar 

  • Galliers, R. (2004). Reflections on information systems strategizing. In C. Avgerou, C. Ciborra, & F. Land (Eds.), The social study of information and communication technology (pp. 231–262). Oxford: Oxford University Press.

    Google Scholar 

  • Geers, K. (2010). A brief introduction to cyber warfare, Common Defense Quarterly (Spring), 16–17

    Google Scholar 

  • Gibson, W. (1985). Neuromancer. New York: Ace Books.

    Google Scholar 

  • Granger, J. (1978). Technology and international relations. San Francisco: Freeman.

    Google Scholar 

  • Hart, J. A. (1976). Three approaches to the measurement of power in international relations. International Organization, 30(2), 289–305.

    Article  Google Scholar 

  • Hart, J.A. (1989), ISDN and power, Discussion Paper 7, Center for Global Business, the Business School of Indiana University

    Google Scholar 

  • Hart, J. A. & Kim, S. (2000). Power in the information age. In J. Ciprut (Ed.), Of fears and foes: Security and insecurity in an evolving global political economy (pp. 35–58). Westport: Praeger.

    Google Scholar 

  • Hayashi, M. (2007). The information revolution and the rules of jurisdiction in public international law. In M. Dunn, S. F. Krishna-Hensel, & V. Mauer (Eds.), The resurgence of the state: Trends and processes in cyberspace governance (pp. 59–83). Aldershot/Hampshire: Ashgate.

    Google Scholar 

  • Herrera, G. L. (2007). Cyberspace and Sovereignty: Thoughts on physical space and digital space. In M. Dunn Cavelty, V. Mauer, & S. F. Krishna-Hensel (Eds.), Power and security in the information age: Investigating the role of the state in cyberspace (pp. 67–94). Aldershot/Hampshire: Ashgate.

    Google Scholar 

  • Hughes, R. (2010). A treaty for cyberspace. International Affairs, 86(2), 523–541.

    Article  Google Scholar 

  • IBM. (2010). Meeting the cybersecurity challenge: Empowering Stakeholders and. Ensuring Coordination. IBM U.S. Federal. White Paper. http://www-304.ibm.com/easyaccess3/fileserve?contentid=192188.

  • International Telecommunication Union. (2010). Measuring the Information Society. http://www.itu.int/ITU-D/ict/publications/idi/2010/Material/MIS_2010_without_annex_4-e.pdf.

  • Jordan, T. (1999). Cyberpower: The culture and politics of cyberspace and the internet. London: Routledge.

    Book  Google Scholar 

  • Kirk, D. (2009). What’s behind cyber attacks on South Korea, US?. CSMonitor, 8 July 2009. http://www.csmonitor.com/World/Asia-Pacific/2009/0708/p06s24-woap.html.

  • Krause, K. (2009). War, violence and the state. In M. Brzoska & A. Krohn (Eds.), Securing peace in a globalized world (pp. 183–202). London: Palgrave Macmillan.

    Google Scholar 

  • Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11, 541–562.

    Article  Google Scholar 

  • Kuehl, D. (2009). From cyberspace to cyberpower: Defining the problem. In F. Kramer, S. Starr, & L. K. Wentz (Eds.), Cyberpower and national security (pp. 24–42). Washington, DC: National Defense University Press.

    Google Scholar 

  • Lenk, K. (1997). The challenge of cyberspacial forms of human interaction to territorial governance and policing. In B. D. Loader (Ed.), The governance of cyberspace: Politics, technology and global restructuring. London: Routledge.

    Google Scholar 

  • Libicki, M. (2007). Conquest in cyberspace. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Libicki, M. (2009). Cyberdeterrance and cyberwar. Santa Monica: RAND.

    Google Scholar 

  • Loader, B. D. (1997). The governance of cyberspace: Politics, technology and global restructuring. In B. D. Loader (Ed.), The governance of cyberspace: Politics, technology and global restructuring. London: Routledge.

    Chapter  Google Scholar 

  • McMahon, P. (2002). Global control: Information technology and globalization since 1846. Cheltenham: Northampton.

    Google Scholar 

  • Mills, E. (2009). Botnet worm in DOS attacks could wipe data out on infected PCs, CNet News, 10 July 2009. http://news.cnet.com/8301-1009_3-10284281-83.html.

  • Moses, A. (2008). Georgian websites forces offline in <cyber war>, Sunday Morning Herald, 12 Aug 2008. http://www.smh.com.au/news/technology/georgian-websites-forced-offline-in-cyber-war/2008/08/12/1218306848654.html.

  • Myers, S. L. (2007). Cyberattack on Estonia stirs fear of <virtual war>. New York Times, 18 May 2007. http://www.nytimes.com/2007/05/18/world/europe/18iht-estonia.4.5774234.html.

  • Nazario, J. (2008). Georgia DDoS attacks - a quick summary of observations, Arbor Networks, 12 Aug 2008. http://asert.arbornetworks.com/2008/08/georgia-ddos-attacks-a-quick-summary-of-observations/.

  • Nye, J. (2010). Cyber power. Harvard Kennedy School, Belfer Center for Science and International Affairs. http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf.

  • Ottis, R., & Lorents, P. (2010). Cyberspace: Definition and implications. Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia. http://www.ccdcoe.org/articles/2010/Ottis_Lorents_CyberspaceDefinition.pdf.

  • Price, M. (2002). Media and sovereignty: The global information revolution and its challenge to state power. Cambridge/London: MIT Press.

    Google Scholar 

  • Sabourin, C. (2011). Chinese hackers behind cyber attack on Canada: Report, Psysorg.com (February 17). http://www.physorg.com/news/2011-02-china-hackers-cyber-canada.html.

  • Sassen, S. (2000). Digital networks and the state: Some governance questions. Theory Culture & Society, 17(4), 19–33.

    Article  Google Scholar 

  • Shahin, H. (2007). The reassersion of the state: Governance and the information revolution. In M. Dunn, S. F. Krishna-Hensel, & V. Mauer (Eds.), The resurgence of the state: Trends and processes in cyberspace governance. Aldershot/Hampshire: Ashgate.

    Google Scholar 

  • Singh, J. P. (2007). Meta-power, networks, security and commerce. In M. Dunn Cavelty, V. Mauer, & S. F. Krishna-Hensel (Eds.), Power and security in the information age: Investigating the role of the state in cyberspace (pp. 45–66). Aldershot/Hampshire: Ashgate.

    Google Scholar 

  • Sommer, P., & Brown, I. (2011). Reducing systemic cybersecurity risk. OECD report for Future Global Shocks Project. http://www.oecd.org/dataoecd/3/42/46894657.pdf.

  • Sperling, J. (2010). The post-Westphalian state, national security cultures, and the global security governance, EU-GRASP Working Paper no. 15. http://www.eugrasp.eu/uploads/media/WP15_final.pdf.

  • Stone, A. (2001). Cyberspace: The next battlefield. USA Today, 19 June 2001. http://www.usatoday.com/tech/news/2001-06-19-cyberwar-full.htm.

  • Sulek, D., & Moran, N. (2009). What analogies can tell us about the future of cybersecurity. In C. Czosseck & K. Geers (Eds.), The virtual battlefield: Perspectives on cyber warfare (pp. 118–131). Amsterdam: Ios Press.

    Google Scholar 

  • Technews. (2011). Catastrophic effects that cyber-attacks may have. 28 Jan 2011. http://techweek.org/25041catastrophic-effects-that-cyber-attacks-may-have.html.

  • Tikk, E., Kaska, K., Rünnimeri, K., Kert, M., Talihärm, A.-M., & Vihul, L. (2008). Cyber attacks against Georgia: Legal lessons identified. Analysis document by the Cooperative Cyber Defense Center of Excellence (Tallinn, Estonia). http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf.

  • Toffler, A. (1990). PowerShift: Knowledge, wealth, and violence at the edge of the 21 st century. New York: Bantam Books.

    Google Scholar 

  • Traynor, I. (2007). Russia accused of unleashing cyberwar to disable Estonia. The Guardian, 17 May 2007.

    Google Scholar 

  • van Loon, J. (2000). Virtual risks in an age of cybernetic reproduction. In B. Adam, U. Beck, & J. van Loon (Eds.), The risk society and beyond: Critical issues for social theory (pp. 165–182). London: Sage.

    Google Scholar 

  • Weber, M. (1952a). Class, status, party. In H. Gerth & C. Wright Mills (Eds.), From Max Weber (pp. 180–195). London: Routledge.

    Google Scholar 

  • Weber, M. (1952b). In G. Roth & W. Claus (Eds.), Economy and society: An outline of interpretive sociology. Berkeley: University of California Press.

    Google Scholar 

  • Whitelaw, K. (2007). A high-tech Achilles heel: Washington plans stepped up defenses against cyberattacks. U.S. News and World Report, 26 Oct 2007. http://www.usnews.com/news/national/articles/2007/10/26/washington-plans-stepped-up-defenses-against-cyberattacks.

  • Wulf, H. (2004). The bumpy road to re-establish a monopoly of violence. Paper prepared for Study Group on Europe’s Security Challenges, London School of Economics. http://www.lse.ac.uk/Depts/global/Publications/HumanSecurityReport/Wulfdraft.pdf.

  • Yonhap (2009). North Korean ministry behind July cyber attacks: Spy chief, 30 Oct 2009. http://english.yonhapnews.co.kr/northkorea/2009/10/30/0401000000AEN20091030002200315.HTML.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roxana Georgiana Radu M.A. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Radu, R.G. (2012). The Monopoly of Violence in the Cyber Space: Challenges of Cyber Security. In: Fels, E., Kremer, JF., Kronenberg, K. (eds) Power in the 21st Century. Global Power Shift. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25082-8_8

Download citation

Publish with us

Policies and ethics