Introduction
Introduction
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
New America is collaborating with JSTOR to digitize, preserve and extend access to this
content.
When one hears the word “cyber,” it is most often risk, deterring attacks. In short, it is a notion
paired with one of these words: security, threats, of “security” that is predominantly a Western
vulnerabilities, exploits, intrusions, attacks, or war. oriented concept tightly linked to politicization and
Indeed, the entire landscape of “cyber” is seen as militarization. As international relations scholar
insecure and hostile. Attempting to make sense Mohammad Ayoob explains, security is seen as
of this space, authors invoke metaphors like the invulnerability, and invulnerability becomes
“Wild West,”1 or something akin to public health linked to “the primacy of political variables,” for
safety concern,2 or they analogize it as a new type those political variables determine “the degree of
of “public commons” 3 like the sea or space, or as a security that states and regimes enjoy.”5 An object,
“state of nature”—and with it a state of war—where thing, or person only becomes important enough to
no law governs and anarchy reigns.4 With each warrant “security” when the state recognizes one as
metaphor or analogy, scholars and practitioners threatening its security. He notes,
suggest ways of solving problems related to
insecurity. In the case of the Wild West, we need Different types of vulnerability, including
a “sheriff” to impose order. In the public health those of the economic and ecological
instance, we need a way of monitoring, responding varieties, become integral components of
and quarantining when necessary for the safety this definition of security only if and when
of others. And for the public commons, we need they become acute enough to take on overtly
a useful way of solving collective action problems political dimensions and threaten state
and resource distribution and protection. When it boundaries, state institutions, or regime
comes to war, however, we need strong capabilities survival.6
to defend our interests and rights.
Ayoob’s insights apply, in many respects, to
Cybersecurity on all of these readings, however, cybersecurity. The vulnerability of cyberspace,
becomes defined as vulnerability reduction or of infrastructures connected through information
elimination. Reducing vulnerabilities is about technologies, the intellectual property of firms, the
protecting oneself, building up defenses, mitigating fragility of a networked economy, are all items that
must be addressed under a Comprehensive National
Cybersecurity Initiative. As President Obama
Much of the scholarship on cyber
explains, the United States must view the cyber
peace assumes that it is merely threat as a threat to national (i.e. state) security,
the absence of any hostile actions. and by doing so: establish a front line of defense,
2 CYBERSECURITY INITIATIVE