Hostname: page-component-586b7cd67f-gb8f7 Total loading time: 0 Render date: 2024-12-05T22:29:22.420Z Has data issue: false hasContentIssue false

What's in a Name? Metaphors and Cybersecurity

Published online by Cambridge University Press:  24 September 2020

Get access

Abstract

For more than a decade, the United States military has conceptualized and discussed the Internet and related systems as “cyberspace,” understood as a “domain” of conflict like land, sea, air, and outer space. How and why did this concept become entrenched in US doctrine? What are its effects? Focusing on the emergence and consolidation of this terminology, I make three arguments about the role of language in cybersecurity policy. First, I propose a new, politically consequential category of metaphor: foundational metaphors, implied by using particular labels rather than stated outright. These metaphors support specific ways to understand complex issues, provide discursive resources to some arguments over others, and shape policy contestation and outcomes. Second, I present a detailed empirical study of US military strategy and doctrine that traces the emergence and consolidation of terminology built on the “cyberspace domain.” This concept supported implicit metaphorical correspondences between the Internet and physical space, yielding specific analogies and arguments for understanding the Internet and its effects. Third, I focus on the rhetorical effects of this terminology to reveal two important institutional consequences: this language has been essential to expanding the military's role in cybersecurity, and specific interests within the Department of Defense have used this framework to support the creation of US Cyber Command. These linguistic effects in the United States also have implications for how other states approach cybersecurity, for how international law is applied to cyber operations, and for how International Relations understands language and technological change.

Type
Research Article
Copyright
Copyright © The IO Foundation 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

AJIL Unbound. 2017. Symposium on Sovereignty, Cyberspace, and Tallinn Manual 2.0. Available at <https://doi.org/10.1017/aju.2017.58>.CrossRef.>Google Scholar
Alexander, Keith B. 2007. Warfighting in Cyberspace. Joint Forces Quarterly 46:5861.Google Scholar
Alexander, Keith B. 2011. Building a New Command in Cyberspace. Strategic Studies Quarterly (Summer):312.Google Scholar
Alexander, Keith. 2013. Commander, United States Cyber Command, Statement before the Senate Committee on Armed Services. 12 March. Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-091.pdf>..>Google Scholar
Allen, Patrick D., and Gilbert, Dennis P. Jr. 2009. The Information Sphere Domain: Increasing Understanding and Cooperation. In The Virtual Battlefield: Perspectives on Cyber Warfare, edited by Czosseck, Christian and Geers, Kenneth, 132–42. IOS Press.Google Scholar
Arquilla, John, and Ronfeldt, David. 1993. Cyberwar Is Coming! Comparative Strategy 12 (2):141–65.CrossRefGoogle Scholar
Barlow, John Perry. 1996. A Declaration of the Independence of Cyberspace. Available at <https://www.eff.org/cyberspace-independence>..>Google Scholar
Benedikt, Michael, ed. 1991. Cyberspace: First Steps. MIT Press.Google Scholar
Betz, David J., and Stevens, Tim. 2013. Analogical Reasoning and Cyber Security. Security Dialogue 44 (2):147–64.CrossRefGoogle Scholar
Black, William B. 1997. Thinking Out Loud About Cyberspace. Cryptolog. Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-011.pdf>..>Google Scholar
Blavin, Jonathan H., and Cohen, I. Glenn. 2002. Gore, Gibson, and Goldsmith: The Evolution of Internet Metaphors in Law and Commentary. Harvard Journal of Law and Technology 16 (1):266–85.Google Scholar
Boer, Lianne J.M. 2017. “Spoofed Presence Does Not Suffice”: On Territoriality in the Tallinn Manual. In Netherlands Yearbook of International Law 2016: The Changing Nature of Territoriality in International Law, edited by Kuijer, Martin and Werner, Wouter, 131–45. Asser.CrossRefGoogle Scholar
Borghard, Erica D., and Lonergan, Shawn W.. 2017. The Logic of Coercion in Cyberspace. Security Studies 26 (3):452–81.CrossRefGoogle Scholar
Bousquet, Antoine. 2009. The Scientific Way of Warfare: Order and Chaos on the Battlefields of Modernity. Hurst and Company.Google Scholar
Braman, Sandra. 2014. Cyber Security Ethics at the Boundaries: System Maintenance and the Tallinn Manual. In Proceedings: First Workshop on Ethics of Cyber Conflict, edited by Glorioso, Ludovica and Osula, Anna-Maria, 4958. NATO CCD COE.Google Scholar
Brooks, Risa. 2019. Integrating the Civil-Military Relations Subfield. Annual Review of Political Science 22:379–98.CrossRefGoogle Scholar
Brooks, Rosa. 2016. How Everything Became War and the Military Became Everything. Simon and Schuster.Google Scholar
Buchanan, Ben. 2016. The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations. Oxford University Press.Google Scholar
Builder, Carl H. 1989. The Masks of War: American Military Styles in Strategy and Analysis. Johns Hopkins University Press.Google Scholar
Buzan, Barry, Wæver, Ole, and de Wilde, Jaap. 1998. Security: A New Framework for Analysis. Lynne Rienner.Google Scholar
Carter, Ash. 2019. Inside the Five-Sided Box. Dutton.Google Scholar
Cartwright, James E. 2010. Memorandum: Joint Terminology for Cyberspace Operations. Available at <https://nsarchive2.gwu.edu//dc.html?doc=2692112-Document-10>..>Google Scholar
Choucri, Nazli. 2012. Cyberpolitics in International Relations. MIT Press.CrossRefGoogle Scholar
Clarke, Richard A., and Knake, Robert K.. 2019. The Fifth Domain. Penguin.Google Scholar
Cohen, Julie E. 2007. Cyberspace as/and Space. Columbia Law Review 107 (1):210–56.Google Scholar
Coles-Kemp, Lizzie, Ashenden, Debi, and O'Hara, Kieron. 2018. Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen. Politics and Governance 6 (2):4148.CrossRefGoogle Scholar
Collier, Stephen J., and Lakoff, Andrew. 2008. The Vulnerability of Vital Systems: How “Critical Infrastructure” Became a Security Problem. In Securing “the Homeland”: Critical Infrastructure, Risk and (In)security, edited by Cavelty, Myriam Dunn and Kristensen, Kristian Søby, 1739. Routledge.Google Scholar
Corn, Gary. 2017. Tallinn Manual 2.0—Advancing the Conversation. Just Security. 15 February 2017. Available at <https://www.justsecurity.org/37812/tallinn-manual-2-0-advancing-conversation/>..>Google Scholar
Crawford, Neta C. 2002. Argument and Change in World Politics. Cambridge University Press.CrossRefGoogle Scholar
David, Paul A. 1985. Clio and the Economics of QWERTY. The American Economic Review 75 (2):332–37.Google Scholar
Demchak, Chris C., and Dombrowksi, Peter J.. 2011. Rise of a Cybered Westphalian Age. Strategic Studies Quarterly 5 (1):3261.Google Scholar
DeNardis, Laura. 2014. The Global War for Internet Governance. Yale University Press.CrossRefGoogle Scholar
Department of Defense. 2010a. Instruction S-5240.23: Counterintelligence (CI) Activities in Cyberspace. 13 December. Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-041.pdf>..>Google Scholar
Department of Defense. 2010b. US Cyber Command Fact Sheet. 25 May. Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-038.pdf>..>Google Scholar
Department of Defense. 2011. Department of Defense Strategy for Operating in Cyberspace. Available at <https://nsarchive2.gwu.edu/dc.html?doc=2700131-Document-50>..>Google Scholar
Department of Defense. 2013. Instruction S-3325.10: Human Intelligence (HUMINT) Activities in Cyberspace. 6 June. Available at <https://nsarchive2.gwu.edu//dc.html?doc=2692127-Document-19>..>Google Scholar
Department of Defense. 2015. The Department of Defense Cyber Strategy. Available at <https://nsarchive2.gwu.edu/dc.html?doc=2692133-Document-25>..>Google Scholar
Department of Defense. 2018. Summary: Department of Defense Cyber Strategy. Available at <https://nsarchive2.gwu.edu//dc.html?doc=4936880-Department-of-Defense-Summary-Department-of>..>Google Scholar
Department of Defense. 2020. Critical Infrastructure Program Glossary. Available at <https://policy.defense.gov/OUSDP-Offices/ASD-for-Homeland-Defense-Global-Security/Defense-Critical-Infrastructure-Program/cip_glossary/>..>Google Scholar
Department of Homeland Security (DHS). 2003. Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection. Available at <https://www.dhs.gov/homeland-security-presidential-directive-7>..>Google Scholar
Department of Homeland Security. 2011. Cybersecurity Strategy for the Homeland Security Enterprise. Available at <https://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf>..>Google Scholar
Department of Homeland Security. 2016. Joint Statement from the Department of Homeland Security and Office of the Director of National Intelligence on Election Security. 7 October. Available at <https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national>..>Google Scholar
Department of Homeland Security. 2018. Secretary Kirstjen M. Nielsen Remarks to the National Election Security Summit. 10 September. Available at <https://www.dhs.gov/news/2018/09/10/secretary-kirstjen-m-nielsen-remarks-national-election-security-summit>..>Google Scholar
Drulák, Petr. 2006. Motion, Container and Equilibrium: Metaphors in the Discourse about European Integration. European Journal of International Relations 12 (4):499531.CrossRefGoogle Scholar
Dunn Cavelty, Myriam. 2012. The Militarisation of Cyber Security as a Source of Global Tension. In Strategic Trends 2012: Key Developments in Global Affairs, edited by Möckli, Daniel, 103–24. ETH-Zurich.Google Scholar
Dunn Cavelty, Myriam. 2013. From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse. International Studies Review 15:105–22.CrossRefGoogle Scholar
Dunn Cavelty, Myriam. 2018. Cybersecurity Research Meets Science and Technology Studies. Politics and Governance 6 (2):2230.CrossRefGoogle Scholar
Dunn Cavelty, Myriam, and Egloff, Florian J.. 2019. The Politics of Cybersecurity: Balancing Different Roles of the State. St. Antony's International Review 15 (1):3747.Google Scholar
Edwards, Paul N. 1996. The Closed World: Computers and the Politics of Discourse in Cold War America. MIT Press.Google Scholar
Farrell, Henry. 2012. The Consequences of the Internet for Politics. Annual Review of Political Science 15:3552.CrossRefGoogle Scholar
Farrell, Henry, and Glaser, Charles L.. 2017. The Role of Effects, Saliencies and Norms in US Cyberwar Doctrine. Journal of Cybersecurity 3 (1):717.Google Scholar
Finnemore, Martha, and Hollis, Duncan B.. 2016. Constructing Norms for Global Cybersecurity. American Journal of International Law 110 (3):425–79.CrossRefGoogle Scholar
Fritsch, Stefan. 2011. Technology and Global Affairs. International Studies Perspectives 12 (1):2745.CrossRefGoogle Scholar
Futter, Andrew. 2018. “Cyber” Semantics: Why We Should Retire the Latest Buzzword in Security Studies. Journal of Cyber Policy 3 (2):201–16.CrossRefGoogle Scholar
Gartzke, Erik. 2013. The Myth of Cyberwar. International Security 38 (2):4173.CrossRefGoogle Scholar
Gartzke, Erik, and Lindsay, Jon R.. 2015. Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace. Security Studies 24 (2):316–48.CrossRefGoogle Scholar
Gibbs, Raymond W. Jr., ed. 2008. The Cambridge Handbook of Metaphor and Thought. Cambridge University Press.CrossRefGoogle Scholar
Gibson, William. 1984. Neuromancer. Ace Books.Google Scholar
Giles, Keir, and Hagestad, William II. 2013. Divided by a Common Language: Cyber Definitions in Chinese, Russian and English. In 2013 Fifth International Conference on Cyber Conflict, edited by Podins, K., Stinissen, J., Maybaum, M., NATO CCD COE Publications. Available at <https://www.academia.edu/4187620/Divided_by_a_Common_Language_Cyber_Definitions_in_Chinese_Russian_and_English>.Google Scholar
Goldman, Emily O., and Arquilla, John, eds. 2014. Cyber Analogies. Naval Postgraduate School.CrossRefGoogle Scholar
Goldsmith, Jack L. 1998. The Internet and the Abiding Significance of Territorial Sovereignty. Indiana Journal of Global Legal Studies 5 (2):475–91.Google Scholar
Graham, Mark. 2013. Geography/Internet: Ethereal Alternate Dimensions of Cyberspace or Grounded Augmented Realities? The Geographical Journal 179 (2):177–82.CrossRefGoogle Scholar
Greathouse, Craig B. 2014. Cyber War and Strategic Thought: Do the Classic Theorists Still Matter? In Cyberspace and International Relations Theory, Prospects and Challenges, edited by Kremer, Jan-Frederik and Müller, Benedikt, 2140. Springer.CrossRefGoogle Scholar
Hansen, Lene, and Nissenbaum, Helen. 2009. Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly 53 (4):1155–75.CrossRefGoogle Scholar
Hayden, Michael V. 2011. The Future of Things “Cyber.” Strategic Studies Quarterly 5 (1):37.Google Scholar
Hayden, Michael V. 2016. Playing to the Edge: American Intelligence in the Age of Terror. Penguin.Google Scholar
Healey, Jason. 2017. Claiming the Lost Cyber Heritage. Available at <https://www.airuniversity.af.edu/CyberCollege/Portal/Article/Article/1198929/claiming-the-lost-cyber-heritage/>..>Google Scholar
Healey, Jason, ed. 2013. A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association.Google Scholar
Heftye, Erik. 2017. Multi-Domain Confusion: All Domains Are Not Created Equal. The Strategy Bridge. Available at <https://thestrategybridge.org/the-bridge/2017/5/26/multi-domain-confusion-all-domains-are-not-created-equal/>..>Google Scholar
Henriksen, Andres. 2019. The End of the Road for the UN GGE Process: The Future Regulation of Cyberspace. Journal of Cybersecurity 5 (1). Available at <https://doi.org/10.1093/cybsec/tyy009>.CrossRefGoogle Scholar
Herrera, Geoffrey L. 2006. Technology and International Transformation: The Railroad, the Atom Bomb, and the Politics of Technological Change. SUNY Press.Google Scholar
Herrera, Geoffrey L. 2007. Cyberspace and Sovereignty: Thoughts on Physical Space and Digital Space. In Power and Security in the Information Age, edited by Cavelty, Myriam Dunn, Mauer, Victor, and Krishna-Hensel, Sai Felicia, 6793. Ashgate.Google Scholar
Hollis, Duncan B., and Ohlin, Jens David. 2018. What If Cyberspace Were for Fighting? Ethics and International Affairs 32 (4):441–56.CrossRefGoogle Scholar
Hunter, Dan. 2003. Cyberspace as Place and the Tragedy of the Digital Anticommons. California Law Review 91 (2):439520.CrossRefGoogle Scholar
Johnson, David R., and Post, David. 1996. Law and Borders—The Rise of Law in Cyberspace. Stanford Law Review 48 (5):1367–402.CrossRefGoogle Scholar
Joint Chiefs of Staff. 2000. Joint Vision 2020. Joint Forces Quarterly (Summer):5776.Google Scholar
Joint Chiefs of Staff. 2004. The National Military Strategy of the United States of America. Available at <https://archive.defense.gov/news/Mar2005/d20050318nms.pdf>..>Google Scholar
Joint Chiefs of Staff. 2006. The National Military Strategy for Cyberspace Operations. Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-023.pdf>..>Google Scholar
Joint Chiefs of Staff. 2018. Joint Publication 3-12: Cyberspace Operations. 8 June 2018. Available at <https://nsarchive2.gwu.edu/dc.html?doc=4560063-Joint-Chiefs-of-Staff-Joint-Publication-3-12>..>Google Scholar
Joint Chiefs of Staff. N.d. Joint Publication 1-02. The Department of Defense Dictionary of Military and Associated Terms. Older versions available at <http://webapp1.dlib.indiana.edu/virtual_disk_library/index.cgi/4240529/FID3171/ACDOCS/OLD_PUBS/JP1_02.PDF>; current version available at <https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf>.;+current+version+available+at+.>Google Scholar
Kamis, Ben, and Thiel, Thorsten. 2015. The Original Battle Trolls: How States Represent the Internet as a Violent Place. PRIF Working Paper No. 23. Peace Research Institute Frankfurt. Available at <https://www.hsfk.de/fileadmin/HSFK/hsfk_downloads/PRIF_WP_23.pdf>..>Google Scholar
Kaplan, Fred. 2016. Dark Territory: The Secret History of Cyber War. Simon and Schuster.Google Scholar
Karas, Thomas H., Moore, Judy H., and Parrott, Lori K.. 2008. Metaphors for Cyber Security. Sandia Report SAND2008-5381.Google Scholar
Kello, Lucas. 2017. The Virtual Weapon and International Order. Yale University Press.CrossRefGoogle Scholar
Kerttunen, Mika, and Tikk, Eneken. 2019. Strategically Normative. Norms and Principles in National Cybersecurity Strategies. Cyber Policy Institute, EU Cyber Direct. April.Google Scholar
Khong, Yuen Foong. 1992. Analogies at War: Korea, Munich, Dien Bein Phu, and the Vietnam Decisions of 1965. Princeton University Press.CrossRefGoogle Scholar
King, Angus, and Gallagher, Mike. 2020. Cyberspace Solarium Commission. Available at <https://www.solarium.gov/>..>Google Scholar
Kinsella, Helen. 2005. Discourses of Difference: Civilians, Combatants, and Compliance with the Laws of War. Review of International Studies 31 (S1):163–85.CrossRefGoogle Scholar
Koh, Harold Hongju. 2012. Remarks: International Law in Cyberspace. 18 September. Available at <https://2009-2017.state.gov/s/l/releases/remarks/197924.htm>..>Google Scholar
Kratochwil, Friedrich. 1989. Rules, Norms, and Decisions: On the Conditions of Practical and Legal Reasoning in International Relations and Domestic Affairs. Cambridge University Press.CrossRefGoogle Scholar
Krebs, Ronald R. 2015. How Dominant Narratives Rise and Fall: Military Conflict, Politics, and the Cold War Consensus. International Organization 69 (1):137.CrossRefGoogle Scholar
Krebs, Ronald R., and Jackson, Patrick Thaddeus. 2007. Twisting Tongues and Twisting Arms: The Power of Political Rhetoric. European Journal of International Relations 13 (1):3566.CrossRefGoogle Scholar
Kreps, Sarah, and Schneider, Jacquelyn. 2019. Escalation Firebreaks in the Cyber, Conventional, and Nuclear Domains: Moving Beyond Effects-Based Logics. Journal of Cybersecurity 5 (1):111.CrossRefGoogle Scholar
Lakoff, George, and Johnson, Mark. 1980. Metaphors We Live By. University of Chicago Press.Google Scholar
Lakoff, George. 1992. The Contemporary Theory of Metaphor. In Metaphor and Thought, 2nd ed., edited by Ortony, Andrew, 202–51. Cambridge University Press.Google Scholar
Lambach, Daniel. 2020. The Territorialization of Cyberspace. International Studies Review. 22 (3):482506.CrossRefGoogle Scholar
Lapointe, Adriane. 2011. When Good Metaphors Go Bad: The Metaphoric “Branding” of Cyberspace. Center for Strategic and International Studies. 9 September.Google Scholar
Larsson, Stefan. 2017. Conceptions in the Code: How Metaphors Explain Legal Challenges in Digital Times. Oxford University Press.CrossRefGoogle Scholar
Latour, Bruno. 1987. Science in Action: How to Follow Scientists and Engineers Through Society. Harvard University Press.Google Scholar
Lawson, Sean. 2012. Putting the “War” in Cyberwar: Metaphor, Analogy, and Cybersecurity Discourse in the United States. First Monday 17 (7), 2 July.CrossRefGoogle Scholar
Lawson, Sean. 2014. Nonlinear Science and Warfare: Chaos, Complexity, and the US Military in the Information Age. Routledge.Google Scholar
Lawson, Sean. 2020. Cybersecurity Discourse in the United States: Cyber-Doom Rhetoric and Beyond. Routledge.Google Scholar
Lawson, Sean, and Middleton, Michael K.. 2019. Cyber Pearl Harbor: Analogy, Fear, and the Framing of Cyber Security Threats in the United States, 1991–2016. First Monday 24 (3), 4 March.Google Scholar
Lemley, Mark A. 2003. Place and Cyberspace. California Law Review 91 (2):521–42.CrossRefGoogle Scholar
Lessig, Lawrence. 1999. Code and Other Laws of Cyberspace. Basic Books.Google Scholar
Libicki, Martin C. 2012. Cyberspace Is Not a Warfighting Domain. I/S: A Journal of Law and Policy for the Information Society 8 (2):321–36.Google Scholar
Lindsay, Jon. 2013. Stuxnet and the Limits of Cyber Warfare. Security Studies 22 (3):365404.CrossRefGoogle Scholar
Lindsay, Jon. 2017. Restrained by Design: The Political Economy of Cybersecurity. Digital Policy, Regulation and Governance 19 (6):493514.CrossRefGoogle Scholar
Lucas, George R. 2016. Emerging Norms for Cyberwarfare. In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley Jay Strawser, 1333. Oxford University Press.CrossRefGoogle Scholar
Lupovici, Amir. 2016. The “Attribution Problem” and the Social Construction of “Violence”: Taking Cyber Deterrence Literature a Step Forward. International Studies Perspectives 17 (3):322–42.Google Scholar
Lute, Jane Holl, and McConnell, Bruce. 2011. Op-Ed: A Civil Perspective on Cybersecurity. Wired, 14 February.Google Scholar
Lynn, William J. III. 2010. Defending a New Domain: The Pentagon's Cyberstrategy. Foreign Affairs 89 (5):97108.Google Scholar
Maglio, Paul P., and Matlock, Teenie. 1998. Metaphors We Surf the Web By. Proceedings of Workshop on Personalized and Social Navigation in Information Space (1–9). Swedish Institute of Computer Science. Available at <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.49.6289&rep=rep1&type=pdf>..>Google Scholar
Manjikian, Mary. 2010. From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik. International Studies Quarterly 54 (2):381401.CrossRefGoogle Scholar
Manjikian, Mary. 2015. Confidence-Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes. Strategic Studies Institute and US Army War College Press.CrossRefGoogle Scholar
Manjikian, Mary. 2016. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies. Strategic Studies Institute and US Army War College Press.Google Scholar
Matlock, Teenie, Castro, Spencer C., Fleming, Morgan, Gann, Timothy M., and Maglio, Paul P.. 2014. Spatial Metaphors of Web Use. Spatial Cognition and Computation 14 (4):306–20.CrossRefGoogle Scholar
Maurer, Tim. 2020. A Dose of Realism: The Contestation and Politics of Cyber Norms. Hague Journal on the Rule of Law 12: 283305. Available at <https://doi.org/10.1007/s40803-019-00129-8>.CrossRefGoogle Scholar
Mayer, Maximilian, Carpes, Mariana, and Knoblich, Ruth, eds. 2014. The Global Politics of Science and Technology. 2 vols. Springer.CrossRefGoogle Scholar
McCarthy, Daniel R. 2017. Technology and World Politics: An Introduction. Routledge.CrossRefGoogle Scholar
McCarthy, Daniel R. 2018. Privatizing Political Authority: Cybersecurity, Public-Private Partnerships, and the Reproduction of Liberal Political Order. Politics and Governance 6 (2):512.CrossRefGoogle Scholar
Milliken, Jennifer. 1999. The Study of Discourse in International Relations: A Critique of Research and Methods. European Journal of International Relations 5 (2):225–54.CrossRefGoogle Scholar
Mueller, Milton. 2017a. Is Cybersecurity Eating Internet Governance? Causes and Consequences of Alternative Framings. Digital Policy, Regulation and Governance 19 (6):415–28.CrossRefGoogle Scholar
Mueller, Milton. 2017b. Will the Internet Fragment? Sovereignty, Globalization, and Cyberspace. Polity.Google Scholar
Mueller, Milton. 2019. Against Sovereignty in Cyberspace. International Studies Review. <https://doi.org/10.1093/isr/viz044>.Google Scholar
Nakasone, Paul M. 2019a. An Interview with Paul M. Nakasone. Joint Forces Quarterly 92 (1):49.Google Scholar
Nakasone, Paul M. 2019b. A Cyber Force for Persistent Operations. Joint Forces Quarterly 92 (1):1014.Google Scholar
Nakayama, Bryan. 2019. Air, Land, Sea, Space … and Cyberspace? The Development of Military Domains. Unpublished paper.Google Scholar
National Defense Authorization Act (NDAA) for Fiscal Year 2019, Pub L. No. 115-232 132 Stat. 1636.Google Scholar
National Security Act of 1947, Pub L. No. 80-253 61 Stat. 495.Google Scholar
National Security Agency (NSA). 1995. SIGINT and INFOSEC in Cyberspace. Cryptolog. Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-008.pdf>..>Google Scholar
North Atlantic Treaty Organization. 2014. Wales Summit Declaration. 5 September. Available at <https://www.nato.int/cps/ic/natohq/official_texts_112964.htm>..>Google Scholar
Nye, Joseph S. Jr. 2011. Nuclear Lessons for Cyber Security? Strategic Studies Quarterly 5 (4):1838.Google Scholar
Onuf, Nicholas G. 1989. World of Our Making: Rules and Rule in Social Theory and International Relations. University of South Carolina Press.Google Scholar
Onuf, Nicholas G. 2013. Making Sense, Making Worlds: Constructivism in Social Theory and International Relations. Routledge.CrossRefGoogle Scholar
Osenga, Kristen. 2013. The Internet Is Not a Super Highway: Using Metaphors to Communicate Information and Communications Policy. Journal of Information Policy 3:3054.CrossRefGoogle Scholar
Perkovich, George, and Levite, Ariel E., eds. 2017. Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press.Google Scholar
Quadrennial Defense Review (QDR). Available at <http://history.defense.gov/Historical-Sources/Quadrennial-Defense-Review/>..>Google Scholar
Raymond, Mark. 2019. Social Practices of Rule-Making in World Politics. Oxford University Press.CrossRefGoogle Scholar
Raymond, Mark. 2020. Social Practices of Rule-Making for International Law in the Cyber Domain. Journal of Global Security Studies. doi:10.1093/jogss/ogz065.Google Scholar
Raymond, Mark, and DeNardis, Laura. 2015. Multistakeholderism: Anatomy of an Inchoate Global Institution. International Theory 7 (3):572616.CrossRefGoogle Scholar
Rid, Thomas. 2013. Cyber War Will Not Take Place. Oxford University Press.Google Scholar
Rid, Thomas. 2016. Rise of the Machines: A Cybernetic History. W.W. Norton.Google Scholar
Rid, Thomas, and Buchanan, Ben. 2018. Hacking Democracy. SAIS Review 38 (1):316.Google Scholar
Risse, Thomas. 2000. “Let's Argue!” Communicative Action in World Politics. International Organization 54 (1):139.CrossRefGoogle Scholar
Sandholtz, Wayne. 2008. Dynamics of International Norm Change: Rules Against Wartime Plunder. European Journal of International Relations 14 (1):101–31.CrossRefGoogle Scholar
Sauter, Molly. 2015. Show Me on the Map Where They Hacked You: Cyberwar and the Geospatial Internet Doctrine. Case Western Reserve Journal of International Law 47 (1):6378.Google Scholar
Schmidt, Vivien A. 2008. Discursive Institutionalism: The Explanatory Power of Ideas and Discourse. Annual Review of Political Science 11:303–26.CrossRefGoogle Scholar
Schmitt, Michael N., ed. 2013. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press.CrossRefGoogle Scholar
Schmitt, Michael N., ed. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.CrossRefGoogle Scholar
Schneider, Jacquelyn G. 2019. Persistent Engagement: Foundation, Evolution and Evaluation of a Strategy. Lawfare. 10 May. Available at <https://www.lawfareblog.com/persistent-engagement-foundation-evolution-and-evaluation-strategy>..>Google Scholar
Schön, Donald A. 1993. Generative Metaphor: A Perspective on Problem-Setting in Social Policy. In Metaphor and Thought. 2nd ed, edited by Ortony, Andrew, 137–63. Cambridge University Press.CrossRefGoogle Scholar
Secretary of Defense. 2009. Memorandum: Establishment of a Subordinate Unified US Cyber Command Under US Strategic Command for Military Cyberspace Operations. 23 June. Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-029.pdf>..>Google Scholar
Semino, Elena. 2008. Metaphor in Discourse. Cambridge University Press.Google Scholar
Sheniak, Amit. 2014. The Emergence of the State in the Online Frontier: A Theoretical and Historical Comparison. Dado Journal for Operational Art 3:1045.Google Scholar
Smeets, Max W.E., and Lin, Herbert. 2018. A Strategic Assessment of the US Cyber Command Vision. In Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations, edited by Lin, Herbert and Zegart, Amy, 81104. Brookings Institution Press.Google Scholar
Stevens, Tim. 2016. Cyber Security and the Politics of Time. Cambridge University Press.Google Scholar
Sulmeyer, Michael. 2017. Much Ado About Nothing? Cyber Command and the NSA. War on the Rocks 19 July. Available at <https://warontherocks.com/2017/07/much-ado-about-nothing-cyber-command-and-the-nsa/>..>Google Scholar
Tikk, Eneken, and Kerttunen, Mika. 2018. Parabasis: Cyber-diplomacy in Stalemate. NUPI Policy Brief 5/2018.Google Scholar
Townes, Miles. 2012. The Spread of TCP/IP: How the Internet Became the Internet. Millennium 41 (1):4364.CrossRefGoogle Scholar
United Kingdom Cabinet Office. 2009. Cyber Security Strategy of the United Kingdom. Available at <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/228841/7642.pdf>..>Google Scholar
United Nations General Assembly (UNGA). 2013. Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. A/68/98. 24 June. Available at <https://www.un.org/ga/search/view_doc.asp?symbol=A/68/98>..>Google Scholar
United Nations General Assembly. 2015. Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. A/70/174. 22 July. Available at <https://www.un.org/ga/search/view_doc.asp?symbol=A/70/174>..>Google Scholar
United States Air Force. 1995. Cornerstones of Information Warfare. Available at <https://catalog.hathitrust.org/Record/101681332>..>Google Scholar
United States Air Force. 2011. Air Force Doctrine Document 3-12: Cyberspace Operations, Incorporating Change 1 (30 November). Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-060.pdf>..>Google Scholar
United States Army. 2010. Cyberspace Operations Concept Capability Plan 2016–2028. 22 February. Available at <https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-033.pdf>..>Google Scholar
United States Coast Guard. 2015. United States Coast Guard Cyber Strategy. Available at <https://nsarchive2.gwu.edu//dc.html?doc=2692134-Document-26>..>Google Scholar
United States Cyber Command. 2016. Order: To Establish Joint Task Force (JTF)-ARES to Counter the Islamic State of Iraq and the Levant (ISIL) in Cyber Space. 5 May. Available at <https://nsarchive2.gwu.edu//dc.html?doc=3678213-Document-07-USCYBERCOM-to-CDRUSACYBER-Subj>..>Google Scholar
United States Cyber Command. 2018. Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command. Available at <https://nsarchive2.gwu.edu//dc.html?doc=4421219-United-States-Cyber-Command-Achieve-and-Maintain>..>Google Scholar
United States Navy. 2012. Navy Cyber Power 2020. Available at <https://nsarchive2.gwu.edu//dc.html?doc=2692124-Document-16>..>Google Scholar
United States Strategic Command. 2009. The Cyber Warfare Lexicon. 5 January. Available at <https://nsarchive2.gwu.edu//dc.html?doc=2692102-Document-1>..>Google Scholar
Valeriano, Brandon, and Maness, Ryan C.. 2015. Cyber War Versus Cyber Realities: Cyber Conflict in the International System. Oxford University Press.CrossRefGoogle Scholar
Vinge, Vernor. 1981. True Names. Dell.Google Scholar
Wagner, Ben. 2019. Constructed “Cyber” Realities and International Relations Theory. In Science, Technology, and Art in International Relations, edited by Singh, J.P., Carr, Madeline, and Marlin-Bennett, Renee, 6070. Routledge.CrossRefGoogle Scholar
Warner, Michael. 2012. Cybersecurity: A Pre-history. Intelligence and National Security 27 (5):781–99.CrossRefGoogle Scholar
Warner, Michael. 2015. Notes on Military Doctrine for Cyberspace Operations in the United States, 1992–2014. The Cyber Defense Review, 27 August.Google Scholar
White House. 1984. National Security Decision Directive Number 145: National Policy on Telecommunications and Automated Information Systems Security. 17 September. Available at <https://fas.org/irp/offdocs/nsdd145.htm>..>Google Scholar
White House. 2012. Presidential Policy Directive/PPD-20: US Cyber Operations Policy. 16 October. Available at <https://nsarchive2.gwu.edu/dc.html?doc=2725521-Document-2-9>..>Google Scholar
Yen, Alfred C. 2002. Western Frontier or Feudal Society? Metaphors and Perceptions of Cyberspace. Berkeley Technology Law Journal 17 (4):1207–63.Google Scholar
Zeng, Jinghan, Stevens, Tim, and Chen, Yaru. 2017. China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of “Internet Sovereignty.” Politics and Policy 45 (3):432–64.CrossRefGoogle Scholar