Cybersecurity and International Relations

Topics of Current Interest

Prof. John E. Savage
Brown University

Updated

This curated website provides links to cybersecurity sources, broadly defined. It was created to support two Brown University courses, CSCI 1800, Cybersecurity and International Relations, that I taught for eleven years and EMC 2600, The Future of Cybersecurity: Technology and Policy, that I taught for two years. I have continued to expand it as new sources have been published or discovered. Items highlighted in red are particularly important or interesting.

Some of these references are used in the book Security in the Cyber Age: An Introduction to Policy and Technology by Derek S. Reveron and John E. Savage published by Cambridge University Press in November, 2023.

Go here to replace the following Table of Contents with one without links to subsections. The last section is evolving and currently contains information on emergency preparedness.

Table of Contents

Historical Context

  1. Motto of the Internet Engineering Community: We reject: kings, presidents and voting. We believe in: rough consensus and running code.
    This statement appears in "A Cloudy Crystal Ball — Visions of the Future," by David Clark, 24th Internet Engineering Task Force, 1992
  2. A Declaration of the Independence of Cyberspace by John Perry Barlow, February 8, 1996
  3. 40 maps that explain the internet by Timothy B. Lee, Vox, June 2, 2014
  4. A Declaration of the Dependence of Cyberspace by Moshe Y. Vardi, Communications of the ACM, Vol. 61 No. 3, Page 9, 2018
  5. NETmundial Multistakeholder Statement, April 23, 24, 2014
  6. Web of War: How the hair-trigger nuclear age and fears of Armageddon inspired visionary cold warriors to invent the internet by Sharon Weinberger, Aeon, March 9, 2017
  7. Stuxnet: the father of cyber-kinetic weapons: While Stuxnet is gone, the world now knows what can be accomplished through cyber-kinetic attacks. by Marin Ivezic, CSO, January 22, 2018
  8. Stopping the Next Cyber Conflict by Dmitri Alperovitch, The Cipher Brief, January 28, 2018
    The author briefly describes three generations of cyber conflict.
  9. The New Cyber Normal by Scott Malcomson, The Carnegie Reporter, June 7, 2018
    "In three new books, the next generation of security scholars try to parse cyber and war."
  10. (Opinion) To Understand China, Look to America's history: In Challenging Britain's hegemony a century ago, U.S. tactics look similar to Beijing's today by Katherine C. Epstein, The Wall Street Journal, March 19, 2019
    The author suggests that China may be seeking to emulate the US vis-a-vis Britain in World War I and use Huawei's strategic advantage in 5G to challenge US hegemony.
  11. (Opinion) Has Internet governance become irrelevant? by Geoff Huston, APNIC Blog, October 29, 2018
  12. In trade wars of 200 years ago, the pirates were Americans by Paul Wiseman, The Washington Post, March 28, 2019
  13. The Arpanet: Celebrating 50 years since 'LO', AAAS Annual Meeting, Washington, DC, February 17, 2019. (Video, 90 minutes)
    Speakers: Steve Crocker, Vint Cerf, Len Kleinrock, and Dave Walden.
  14. Founders to Futurists: 50th Anniversary of the Internet
    October 29 2019 marks 50 years to the day since Leonard Kleinrock's team sent the first message over the Arpanet, transforming his mathematical theory of packet switching into what would become the modern Internet. To celebrate the anniversary, the UCLA Samueli School of Engineering hosted a one-day conference. The program for the conference can be found here.
  15. The Internet is Rotting by Jonathan Zittrain, The Atlantic, June 30, 2021
    The author observes that the Internet has spawned the creation of important documents published on the web that contain embeded links whose URLs often disappear or are altered without making corrections to the documents citing them. As a consequence, documents meant to be publicly available are rendered incomplete or disappear altogether.
  16. Geopolitics and the Internet by Roger J. Cochetti, The Hill, March 19, 2022
    While these internet geopolitical struggles rarely get the media attention that political/military or even economic/financial struggles do, they are no less important and can have a great impact on the daily lives of people everywhere.
  17. Securing Cyberspace, Washington Post Live, October 13, 2022.
    A videotaped assessment of the current global cybersecurity landscape. A transcript of the video is available here.

    Back to Historical Context
    Back to Top

Internet Technology

  1. The Compositional Architecture of the Internet by Pamela Zave, Jennifer Rexford Communications of the ACM, March 2019, Vol. 62 No. 3, Pages 78-87
  2. The New IP Proposal
    1. Discussion Paper: An analysis of the 'New IP' proposal to the ITU-T by Hascall Sharp (author) and Olaf Kolkman (Internet Society Editor), Internet Society, April 24, 2020.
      [It] is concerning that a proposal has been made to ITU_T ... to start a further long-term research now and in the next study period to develop a 'top-down design for the future network.'"
    2. Some Notes on An Analysis of the 'New IP' proposal to the ITU-T by Dr. Richard Li, Futurewei Technologies and Chairman of ITU Focus Group NET2020, June 2, 2020
      Dr. Li also describes the New IP proposal in a 4min ITU Interview appearing on YouTube posted on September 4, 2019.
    3. The Emergence of Cyber Diplomacy in an Increasingly Post-Liberal Cyberspace by Andre Barrinha and Thomas Renard, Blogpost, The Council on Foreign Relations, June 10, 2020
      The power relations, values, and institutions that governed cyberspace since its initial development in the 1960s are being challenged by those that did not have a say in how it was structured. As conflicting visions for the future of the global internet inevitably collide, cyber diplomats will have to negotiate these difficult choices.
      This article describes several important Chinese initiatives designed to a) replace existing Internet protocols, dubbed New IP, b) rewrite the Cybercrime Convention, and c) engage in serious cyber diplomacy.

    Back to Internet Technology
    Back to Top

The Human Dimension

The Cybersecurity Threat

Responding to the Cybersecurity Threat

Policy Issues

Artificial Intelligence

New Technologies

Social Dimensions

International Issues

China Related Issues

Russian Federation Related Issues

Iran Related Issues

Last Modified: