Cyberspace: An Anarchic System in an Anarchic World Order

 According to Kenneth Waltz, states are invariably stuck in the vicious circle of fear about the intentions of other states. Fear is a tool which makes Realists deliberate on the conditions of violence and war. Anarchy is a whereabout of fear and state behavior is majorly driven by the race for competition. With the technological inventions, the world order has changed considerably. With new inventions, both the desire for cooperation and fear have constantly been increasing. The cyber-world has been progressing at a fast pace, finding new methods to withstand the changing world. Cyber threats and espionage are not only giving challenges to the world but scholars and researchers also are finding it hard to understand the emergence of fears and their association with anarchy. In the previous two blogs, I dealt with the referent object, securitizing actor, threat objects, means, audience and various other things of Cyberspace. Secondly, I dealt with the emerging threats, entrants and also changing patterns of referent object, threat object and securitizing actor. This particular blog would be covering the aspects of cyberspace security, cyber terrorism and invisible anarchy and understanding of International Relations theories such as Realism, Liberalism, and Constructivism in the changing order of threats emerging from cyberspace. 


The internet of things is deeply rooted in our system, civil society, governance and decision making, critical infrastructure (deeply dealt with in the previous blog), trade and commerce, intelligence assimilation, judiciary and various other spheres creating diverse opinions, expectations, interests and threats. Moreover, it has allowed us to communicate with other actors, express their concerns, exchange ideas, cooperation and manipulative movements, etc. The internet, however, provides the same information to everyone without discriminating people, it has also allowed actors and non-state actors to share ideas and spread their concerns. The invisible boundaries of cyberspace are a major cause of concern for actors, eroding their sovereignty, leakages of government’s critical decisions and declassifying sensitive information undertaken by enemy governments, state-sponsored hacking groups, multinational companies, a person sitting in his room, or by a teenager. Having so many uncertainties and fears offered by the cyberspace domain we must look at the views of various international theories assuming anarchy as the prevailing order in the existing world. 

For Realists, the state acts as the main actor in the international arena. This assumption ignores the existence of non-state actors. However, in cyberspace, the non-state actors also play an equally significant role. The hacktivists (a more benign form of the term 'hacker') are the people who perform hacktivism by misusing computers and networks. Their main notion is to draw people’s attention to something which they perceive important in society. Usually, they target the tyrannical elements, expose them and reveal to people all their wrongdoings. Anonymous, WikiLeaks, Lulz Security, Syrian Electronic troops, etc, are a few names of hacktivist groups. Recently, the prominent ‘anonymous’ group supported the Ukrainian government against the ongoing war with Russia. This reflects the importance of non-state actors in the emerging cyber domain. Regarding the National security policy, the realist thinks of maximizing power, increasing arms and weapons, building alliances and preparing for war. In the cyber domain, all this is possible. Being the nature of cyberspace itself anarchical, it offers a state with strong potential to gather power without even involving in physical warfare. The realist concept of self-help (the only way of state's survival) in an anarchic world order can be fully satisfied in an anarchical domain of cyberspace where every state would have the power to counter enemy states from exploiting it. This would perhaps then further the level of fear and ambivalence about the intentions of other states. Regarding the balance of power, there are chances that in the age of complete cyberspace, there would be no hegemony and existence of a hegemon since technology is not an immovable domain nor it can be trapped at a geographical location. This would give rise to a multipolar world with non-state actors playing a relatively significant role in deciding the world order and related decisions. Moreover, to challenge a hegemon in a cyber world, the aggressive states would spend more on cyber technology to gain asymmetrical power. For instance, in the case of the US, the rival countries to challenge the US dominance and hegemony would better work upon their cyber capabilities except military capabilities to pose a significant challenge without ever going into physical warfare. 

James Adams in an article called “virtual defense” called cyberspace an emerging battlefield. The Rand Corporation also warned about the cyberwar and mentioned that “cyberwar is coming”. Among various other predictions, one recently is of British Prime Minister, Boris Johnson, calling to enhance its cyber power. He compared the development of airpower relatively a hundred years back to cyber power at present. The revolutionary cyber power is changing the way we live, behave and fight. The offensive Russian invasion of Ukraine initially involved cyberwar glimpses; however, it has been largely a conventional war to date. This conventionality has also been majorly reflective in Ukraine’s response to Russia. But the response of patriotic hackers and hacktivists paved the way for non-state actors in a realist assumed anarchical world order with the assistance of anarchical domain cyberspace. The use of the first cyber worm or virus called “Stuxnet '' against Iran’s nuclear plants (previously mentioned in the first blog) showed the government-sponsored cyber-attack on the critical infrastructures of other governments. State-sponsored cyberattacks in this sense would palpably give rise (in the realist terms) to increasing fear, mistrust, misunderstanding and harmful intentions between and among states.

As initially mentioned in this piece, the emergence of non-state actors such as Anonymous, WikiLeaks, Lulz Security, etc, in the domain of cyberspace, would fall in a parallel assumption revolving around the liberal understanding of International Relations and the existence of anarchy. The Liberal side’s probable focus would be around the multiplexity of actors and their involvement in bringing peace and cooperation in cyber conflicts. For unrecognized non-state actors in the realists' understanding, it would be comparatively hard to build their states by conventional means, for instance by maintaining armies, collecting weapons and other material means. However, in the cyber domain, for them to achieve cyber superiority over powerful states would cost relatively less. Therefore, the low cost of entry in the cyber world compared to gaining conventional war tactics and power would maximize the entry of new non-state entrants. In the cyber battlefield, even a weaker state can pose enough challenges to a strong state and probably become a threatening agent. The fact that states own most of the resources, influence and technology can be counterargued as non-state actors can easily exploit such resources of governments given that little expertise in the cyber domain. 

As the Liberalism theory argues, cooperation can never be prevented by anarchy and notions of the security dilemma, however, both of them can inhibit it. The first strike capability to end the security dilemma (which seeks to ensure no retaliation from the other side once an oppressive full-fledged military strike is made against that state), finds no place in the cyber domain. Given that, the states and nonstate actors are unaware of the cyber-attacks of other states or non-state actors. Thus, making it hard for the ‘first striker’ to completely obliterate and disconnect the other from the world and leaving it in no condition to retaliate. Anticipating the cyber-attack and cyber-attack aided other physical attacks such as the launch of missiles becomes comprehensively hard. Cyber security’s security dilemma, under the liberal understanding, can be tackled with the creation of international institutions.

The constructivists' understanding of anarchy and constructivists' observations about the internet might offer us a few unique perspectives on the coming cyber conflicts. As the constructivists see the relations between two states based on identities and interests; based on these assumptions they can probably argue about the internet having its own identity and self-evolved. About the emerging cyber conflicts, their understanding would largely deal with the reasons for the emergence of such conflicts. Moreover, to find out why and how materials such as software, hardware and viruses are used against each other and by people? Since the effects of anarchy are dependent on the intersubjective meanings we associate with it, the same can be said about cyberspace anarchy. 

The constructivist assumption is that there exist certain norms and values and, in their absence, fear emerges within an anarchical system. If there is continuous interaction (in the cyber world interactions can be provided by cyber technology) between the states it is possible to uproot the fear. In this context, the anonymous hacking group could be seen as fighting for the rights of safeguarding internet rights, freedom of speech (both online and offline), and censorship of information in any part of the world. 

The growing cyber technology is playing a greater role in wars against enemies, in offices to education; public, private to individual life etc. The role played by hacktivists, cyber militia and professional hackers including patriot hackers is dominant and growing. With this, the role of non-state actors is influenceable growing. Their dominant position in the world today is recognizable given the domain of cyberspace and its anarchical condition. The domain’s anarchical situation seeks collective efforts and cooperation from all the states, international institutions and non-state actors. Furthermore, it requires sharing of all types of information on how to tackle coming cyber conflicts, without showing any unwillingness or hesitation. States need to share all the cybersecurity-related information without prioritizing their self-interests and cyber technology. In such a cooperative situation, the cyber attackers, traitors and infringers of cyber security laws can easily be identified and punished.  

 

References: -

The Economic Times. n.d. “Britain Must Boost Cyber-Attack Capacity, PM Boris Johnson Says.” Accessed May 5, 2022. https://economictimes.indiatimes.com/news/international/world-news/britain-must-boost-cyber-attack-capacity-pm-boris-johnson-says/articleshow/81491005.cms?from=mdr.

Rand Corporation. 2019. “Cyber Warfare.” Rand.org. 2019. https://www.rand.org/topics/cyber-warfare.html.

Adams, James. 2001. “Virtual Defense.” Foreign Affairs. Foreign Affairs Magazine. May 2001. https://www.foreignaffairs.com/articles/2001-05-01/virtual-defense.

“What Is Hacktivism?” n.d. SearchSecurity. Accessed May 5, 2022. https://www.techtarget.com/searchsecurity/definition/hacktivism#:~:text=During%20this%20initiative%2C%20a%20member.

“Realism in the Age of Cyber Warfare.” 2021. Ethics & International Affairs. April 26, 2021. https://www.ethicsandinternationalaffairs.org/2021/realism-in-the-age-of-cyber-warfare/.

Comments

Popular posts from this blog

Protecting Self In A War With Russia

Analyzing the Security Implications of the Russian-Ukraine Crisis

Dehumanization of women’s bodies: During a crisis