towards a cyber war...

37
1 Brian Mazanec is currently a doctoral candidate at George Mason University and a senior defense analyst with the U.S. Government. He can be reached at [email protected] . TOWARDS A CYBER WAR TABOO? THE EMERGENCE OF NORMS FOR THE USE OF FORCE IN CYBERSPACE Brian M. Mazanec 1 Working Paper for the 54 th ISA Annual Convention April 3-6, 2013, San Francisco, CA

Upload: others

Post on 05-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

1 Brian Mazanec is currently a doctoral candidate at George Mason University and a senior defense analyst with the U.S. Government. He can be reached at [email protected].

TOWARDS A CYBER WAR TABOO?

THE EMERGENCE OF NORMS FOR THE USE OF FORCE IN CYBERSPACE

Brian M. Mazanec1 Working Paper for the 54th ISA Annual Convention April 3-6, 2013, San Francisco, CA

Page 2: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

2

“One resists the invasion of armies; one does not resist the invasion of ideas.” Sir Victor Hugo

Introduction

Early in the age of nuclear weapons, Lt. General James Gavin expressed the

contemporary wisdom when he said “nuclear weapons will become conventional for

several reasons, among them cost, effectiveness against enemy weapons, and ease of

handling.”2 However, as the nuclear era advanced a constraining norm developed that

made states more reluctant to possess or use nuclear weapons—thus helping prevent their

conventionalization. Views similar to those held by Gavin and others at the dawn of the

nuclear era regarding military utility and inevitable employment also existed with

strategic bombing at the advent of the ability to conduct aerial bombing of civilians

during wartime in the early 1900s3 and for anti-personnel (AP) landmines for most of

their existence.4 Today, early into the age of cyber warfare, a similar view is held

regarding the inevitability of significant military operations in cyberspace. International

security and U.S. national security may be enhanced by the emergence of some kind of

constraining norm for cyber warfare, similar to those developed in the past for these other

weapons. Cyber warfare poses a very real threat to U.S. national security and in response

to this threat in May 2011 the Obama Administration issued the International Strategy

for Cyberspace.5 One pillar of this strategy recognizes the “borderless” international

dimension of cyberspace and identifies the need to achieve stability and address cyber

2 Gavin, James. “War and Peace in the Space Age.” Harper Brothers. 1958. 3 Thomas, Ward. “The Ethics of Destruction: Norms and Force in International Relations.” Cornell University Press. 2001. p. 97-98. 4 Price, Richard. “Reversing the Gun Sights: Transnational Civil Society Targets Land Mines.” International Organization, Vol. 52, No. 3 (Summer, 1998), pp. 613-644. 5 United States. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington, D.C., May 2011

Page 3: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

3

threats through the development of international norms. In February 2013 the White

House Cybersecurity Coordinator, Michael Daniel, told computer security practitioners

attending the 2013 RSA Conference in San Francisco that diplomacy—including

fostering international norms and shared expectations—will be essential to prevent cyber

warfare against U.S. economic interests.6 This paper seeks to introduce the threat of

cyber warfare and suggest a framework and research agenda that may be helpful in better

understanding how cyber warfare norms are developing and will develop in the future.

The prospects for the development of cyber warfare norms can best advance through an

examination of case studies on the emergence of norms that are in some respects similar,

specifically norms for nuclear, biological, and chemical weapons (Weapons of Mass

Destruction or WMD), strategic bombing, and AP landmines. While other historical

examples regarding norm development may be helpful (such as norms for covert action,

assassination, or dueling), these three are the most promising in developing an

understanding of the best way ahead in forging effective cyber norms.

Cyberspace and Cyber Warfare

Before examining how international norms may develop for cyber warfare,

cyberspace and cyber warfare must be defined and understood. While consensus on key

terms and definitions regarding cyberspace are lacking, the domain itself is defined as the

global realm within the “information environment” consisting of the interdependent

network of information technology (IT) infrastructures, including the Internet,

telecommunications networks, computer systems, and embedded processors and

6 Chabrow. Eric. “Using Diplomacy to Stop Cyber-Attack.” GovInfoSecurity.com. March 1, 2013.

Page 4: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

4

controllers.7 The 2003 National Strategy to Secure Cyberspace highlighted economic

sectors particularly reliant on cyberspace as: agriculture; food; water; public health;

emergency services; government; defense industrial base; information and

telecommunications; energy; transportation; banking and finance; chemicals and

hazardous materials; and postal/shipping.8 Given that virtually all-encompassing list,

cyberspace is unmistakably a central element of the U.S. and global economy. Further,

the U.S. is utterly dependent on cyberspace with over 239 million regular Internet users

(a 77.3% penetration rate).9 This high civilian cyber vulnerability heightens the

importance of addressing the threat of cyber warfare through norms and other means. In

addition to its crucial role relative to the economy, cyberspace is a key, supporting

element of U.S. national power. The U.S. military relies on Department of Defense IT

networks for the planning and execution of operations and is moving towards fully

integrated Command, Control, Communications, Computer, Intelligence, Surveillance,

and Reconnaissance. Cyberspace is an incredibly important domain for the U.S.

government. This reliance on cyberspace, while particularly relevant for the U.S., applies

to the rest of the global community as well—cyberspace is truly a global commons. The

International Telecommunications Union, the United Nations agency for information and

communication technologies reported that over one third of the world’s seven billion

people were online at the end of 2011, a 17% increase since 2006.10 Multilateral security

organizations like the North Atlantic Treaty Organization (NATO) are still grappling

with how to approach cyber threats and develop consensus on norms and approaches for

7 Department of Defense, “Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms.” May 15, 2011. p.93 8 United States. Department of Homeland Security. U.S. National Strategy to Secure Cyberspace. 2003. 9International Telecommunication Union, ‘2010 U.S. Internet Usage and Broadband Report’ (2011). 10 International Telecommunications Union, The World in 2011—ICT Facts and Figures (December 2011).

Page 5: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

5

collective defense.11 Additionally, from the warfighter perspective, the Center for

Strategic and International Studies (CSIS) has also released a report on national doctrine

and organization for cyber warfare in 133 nations.12 While the open-source information

used is obviously limited, this CSIS report identifies dozens of nations that included

cyber warfare in their planning and organization. The Obama Administration’s new

International Strategy for Cyberspace points out that the unprecedented growth of the

internet and growing global reliance on information technology has

not been matched by clearly agreed-upon norms for acceptable state behavior in cyberspace. To bridge that gap, we will work to build a consensus on what constitutes acceptable behavior, and a partnership among those who view the functioning of these systems as essential to the national and collective interest.13

Further, the cyberspace domain is largely owned and controlled by private industry and

thus many actions in cyberspace require a public-private partnership.14 This raises a host

of legal and normative questions associated with conducting warfare through a domain

largely privately owned and controlled. For example, what are the normative

expectations and legal responsibilities of Internet Service Providers (ISPs) to detect,

report, and block malicious traffic intended to harm their host nations? These questions

and many have yet to be resolved.

Defining cyber warfare or cyber conflict is difficult—highlighting some of the

challenges regarding norms and expectations with this issue. Some schools of thought

divide cyber warfare into two categories based on the intended target, using the term

11 Spencer Ackerman, ‘NATO Doesn’t Yet Know How to Protect Its Networks’, Wired.com (1 February 2012). 12 Lewis, James, Timlin, Katrina. Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization. Center for Strategic and International Studies. 2011. 13 United States. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington, D.C., May 2011. p.9. 14 United States. Department of Homeland Security. U.S. National Strategy to Secure Cyberspace. 2003.

Page 6: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

6

“netwar” to refer to attacks targeting a noncombatant population and the term “cyberwar”

to refer to attacks targeting IT processes and interconnectivity among a military force.15

This distinction is not applicable when examining some actors, such as China. For

example, Chinese norms and culture traditionally fails to draw as firm of a distinction

between the two target sets, as described by Sun Yujun:

Due to the difference between the two countries’ culture and background, the meaning of “warfare” is also different. In my opinion, in English, warfare just refers to activities of warfighting. However, in Chinese, the meaning of warfare is more extensive. Not only the activities of warfighting are involved, but also many other kinds of activities, including rivalries. So we use the term “warfare” more times, such as commercial warfare.16

In the west, some definitions of cyber conflict are very broad, such as Alan Campen’s

information-focused 1995 definition of cyber conflict as conducting, or preparing to

conduct, military operations according to information-related principles.”17 Defined more

narrowly, cyber warfare can either be described as either Computer Network Attack

(CNA) or Computer Network Exploitation (CNE) or some blend of the two. CNA is the

use of computer networks to disrupt, deny, degrade, or destroy information resident in

enemy computers and computer networks, or the computers and networks themselves

while CNE is simply the exfiltration and exploitation of information through cyberspace

(i.e. espionage). Cyber warfare involves many special characteristics that often do not

apply to other forms conflict, especially conventional military conflict. These include the

challenges of attribution following their use; multi-use nature of the associated

technologies; target and weapon unpredictability; potential for major collateral damage or

15 Harknett, Richard J. “Information Warfare and Deterrence.” Parameters. Autumn 1996: 93-107. 16 Yujun, Sun. “Information Warfare: A Conceptual Understanding.” Hero Library. <http://www.herolibrary.org/p113.htm>. 17 Campen, Alan D. "Rush to Information-Based Warfare Gambles with National Security." SIGNAL. July 1995: 67-69.

Page 7: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

7

unintended consequences due to cyberspace’s “borderless” domain; questionable

deterrence value; the frequent use of covert programs to develop such weapons;

attractiveness to weaker powers and non-state actors as an asymmetric weapon; and the

use as a force multiplier for conventional military operations.18Adam Liff has argued that

the use of cyber warfare as a “brute force” weapon is likely to increase in frequency and

increased international interest in cyber warfare is further evidence that information

networks in cyberspace are becoming operational centers of gravity in armed conflict. 1920

Michael Horowitz’s Adoption Capacity Theory also indicates that cyber weapons are

likely to spread quickly if not checked. Adoption Capacity Theory argues that the

diffusion of innovation depends on two intervening variables: the financial intensity

involved in adopting the capability and the internal organizational capacity to

accommodate any necessary changes in recruiting, training, or operations to adopt the

capability.21 For cyber warfare, both the required financial intensity and organizational

capacity are low and thus Adoption Capacity Theory would indicate that the adoption of

cyber warfare will be widespread—heightening the need for widespread international

norms to regulate and constrain the threat.

As cyber warfare capabilities have proliferated and their use become more

common, there are now some noteworthy examples of significant cyber attacks worth

examining as an illustration of where cyber weapons and related norms are headed.

18 Koblentz, Gregory and Mazanec, Brian. “Viral Warfare: The Security Implications of Cyber and Biological Weapons.” Accepted for publication in Comparative Strategy, 2013. 19 Adam P. Liff, 'Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War', Journal of Strategic Studies vol. 35, no. 3 (2012) 401-428. 20 United States. Department of Defense. DoD Information Operations Roadmap. 30 October 2003. <http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.pdf>. 21 Horowitz, Michael. The Diffusion of Military Power: Causes and Consequences for International Politics. Princeton University Press. July 21, 2012.

Page 8: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

8

Specifically, the cyber attacks on Estonia in 2007, Georgia in 2008, and Iran in 2010(all

of which contained elements of both computer espionage and true computer attack) are

good examples of cyber warfare.

Cyber Warfare in Estonia

The spring 2007 Distributed Denial of Service (DDOS) cyber warfare operations

against the former Soviet state of Estonia’s government was the first time a sophisticated

cyber warfare attack focused on disruption and denial of services had been conducted

against a nation state. In late April 2007, the Estonian government’s efforts to relocate a

Soviet-era statue in their capital city of Tallinn prompted condemnation from the Russian

Federation and sparked riots throughout Estonia. Ethnic Russians considered the statue

to be a symbol of liberation from Nazi occupation, whereas ethnic Estonians viewed the

statue as a symbol of Soviet oppression. Russian nationalists protested in the Estonian

capital for three days, leading to approximately 1,000 arrests and 150 injuries.22 Shortly

afterward, on April 27, 2007, Estonian officials noticed significant disruptions on their

Internet and Web-based services that lasted for several weeks. Though Estonia was

unable to conclusively identify the attacker(s), officials believe that the malicious traffic

was a continuation of physical riots against the Estonian government. The attack on

Estonia was a cyber attack coordinated alongside non-cyber physical activity and was not

an exclusively cyber, stand-alone event as most prior cyber attacks had been.

22 Dates, figures and timelines discussed in this section are from the Cyber Conflict Studies Association’s annual symposium Implication for an Estonia-Like Cyber Conflict for the Government and the Private Sector held at Georgetown University on 26 February 2008.

Page 9: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

9

Over a two-week period, cyber warfare attackers were able to successfully disrupt

the Estonian government, media outlets, banking, ISPs and telecommunications websites

by launching 128 unique DDOS attacks. The attacks occurred in three waves, beginning

on April 27th, May 4th, and May 9th. The second wave on May 4, 2007 was the most

significant. At its peak, traffic originating from outside Estonia was 400 times higher

than its normal rate and involved approximately 100 million computers from more than

50 countries (highlighting some of the issues associated with the attribution challenge).

In addition to malicious traffic, after news of the attacks spread, Estonian websites were

inundated with added legitimate traffic originating around the world from individuals

with an interest in the country’s situation. After enduring the DDOS attack for several

days, Estonian officials determined that the attack was affecting their national security.

Given Estonia’s high reliance on the Internet for everything from voting to banking, the

potentially state-based (or at least state sanctioned/encouraged) DDOS attacks prohibited

some of the most basic functions, such as using a debit card to purchase food or fuel.

Online banking transactions had been almost completely stopped and Estonian

government websites were inoperable. With news servers disabled, many Estonians were

unable to locate accurate information regarding the riots and protests, leaving many

feeling anxious and having a significant negative psychological impact. The attackers

executed the attacks using a series of botnets and investigators determined that the attacks

were carefully coordinated in advance due to the fact that the attack did not propagate and

did not appear to be centrally controlled through an identifiable command and control

center.23 To alleviate the attacks, Estonian telecommunications companies and ISPs

23 Greenemeier, Larry. “Estonian ‘Cyber Riot’ Was Planned, But Mastermind Still A Mystery.”

Page 10: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

10

worked quickly to expand network capacity and move government sites to alternate

servers. Ultimately, with the fortuitous help of the U.S. Computer Emergency Response

Team, Estonia was able to coordinate with approximately 38 countries in order to

mitigate the malicious traffic and ultimately withstand the attack. NATO offered no

noteworthy assistance and did not invoke Article V of the Washington Treaty, which

would have considered the cyber warfare attack an attack on all NATO members and

compelled a more robust and unified reaction. This lack of action may have been a

product of the attribution challenge and the lack of clear norms and understanding

regarding this emerging threat of cyber warfare.

Cyber Warfare in Georgia

The Russian attack on Georgia in July 2008 is a slightly more recent example of

cyber warfare conducted against a former Soviet state in order to achieve

political/military effects. More so than the Estonia example, the cyber warfare attack on

Georgia demonstrates that cyber warfare focused on achieving real-world effects has

moved beyond theory into practice. Beginning on July 20, 2008, (prior to the military

invasion) a large scale DDOS attack shut down Georgian servers, including the website

of the pro-western Georgian President Mikheil Saakashvili. As the invasion began, the

attacks increased:

… media, communications and transportation companies were also attacked… the attack against Georgia spread to computers throughout the government after Russian troops entered the Georgian province of South Ossetia. The National Bank of Georgia’s website was defaced at one point. Images of 20th-century dictators as well as an image of Georgia’s president, Mr. Saakashvili, were placed on the site.24

Information Week. 3 August 2007. 24 Markoff, John. “Before the Gunfire, Cyberattacks.” The New York Times. 13 August 2008.

Page 11: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

11

These cyber warfare attacks, conducted for psychological effect in support of the military

invasion, had limited impact on the conflict due to Georgia’s low cyber vulnerability.

Georgia ranks 74th out of 234 nations for the number of Internet addresses and, unlike

net-savvy Estonia, critical infrastructure is not yet extensively tied to the Internet.25 As

the invasion began, the cyber attacks increased, forcing the Georgian government to

move critical communication services to commercial U.S. sites as their own services

were shut down.26 While a direct link has not yet been established between the cyber

warfare attacks and the Russian government, many reports indicate such a link was

extremely likely. The attack was likely organized by the Russian government to support

its broader political and military objectives in the crisis, but executed by loosely-affiliated

“independent” hackers that strengthen the government’s plausible deniability.27

Cyber Warfare in Iran

In July 2010, a Belarusian computer security firm identified Stuxnet, an extremely

sophisticated computer virus designed to attack industrial control systems.28 As the global

computer security industry began deconstructing the virus, it became apparent that the

Iranian nuclear program was its likely target. Soon software patches were posted to

eliminate the vulnerabilities the Stuxnet exploited, and tools were provided that computer

users, including those in Iran, could use to cleanse their infected machines.29 Much

25 Keizer, Gregg. “Georgian Cyberattacks Suggest Russian Involvement.” ComputerWorld. 20 October 2008. 26 John Markoff, ‘Before the Gunfire, Cyberattacks’, The New York Times (August 13, 2008); and David Hollis, ‘Cyberwar Case Study: Georgia 2008’, Small Wars Journal (January 2011). 27 Keizer, Gregg. “Georgian Cyberattacks Suggest Russian Involvement.” ComputerWorld. 20 October 2008. 28 Kim Zetter, ‘How digital detectives deciphered Stuxnet, the most menacing malware in history’, Wired.com (11 July 2011). 29 Ibid.

Page 12: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

12

cleaning up was needed, as Stuxnet—in a little over a year—had spread prodigiously to

approximately 100,000 computers worldwide, 40,000 of which were located outside of

Iran.30 Stuxnet’s sophistication was in how it spread to an “air-gapped” system not

connected to the broader Internet, targeted a very specific industrial control system, and

while wrecking physical havoc on the system fooled operators into thinking everything

was normal.31 Stuxnet utilized many “zero-day” software exploits and its precision

targeting only activated its destructive payload when it found the specific Siemens

programmable logic control (PLC) used for Iranian centrifuges.32 33 When the target was

identified, Stuxnet then modified the code on the Siemens PLC in order to cause physical

damage while simultaneously masking its modifications to make the system appear to be

functioning normally. Experts projected that this likely delayed the Iranian nuclear

program by 6-18 months and destroyed approximately 1,000 P-1 centrifuges (20% of

those Iran’s total inventory).34 Despite all this sophistication, Stuxnet likely only cost in

the low double-digit millions of dollars to develop.35 Eugene Kaspersky, the founder of

an anti-virus software company, has said that now that Stuxnet’s code is available it

would be easy to use it to redesign similar follow-on weapons.36

Since the public became aware of Stuxnet, there was immediate suspicion that the

U.S. and Israel were behind the attack; nevertheless, as with the attacks on Estonia and

30 David Albright, Paul Brannan, and Christina Walrond, ‘Stuxnet Malware and Natanz’, Institute for Science and International Security (Washington, DC: 15 February 2011). 31 Paulo Shakarian, “Stuxnet: Cyberwar Revolution in Military Affairs.” Small Wars Journal (14 April 2011). 32 Ibid. 33 Zero-day vulnerabilities refer to previously unrecognized vulnerabilities in software code. Soon after they are exploited they are often patched by the software developer, eliminating the vulnerability. 34 Paulo Shakarian, “Stuxnet: Cyberwar Revolution in Military Affairs.” Small Wars Journal (14 April 2011). 35 Stephen Bell, ‘Cut-price Stuxnet successors possible: Kaspersky’, CSO Magazine (28 March 2011). 36 Ibid.

Page 13: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

13

Georgia, firm attribution was not possible. However, in June 2012 the New York Times

published a story written by David Sanger and based on unspecified U.S. sources, that

indicated Stuxnet was part of a series of U.S. cyber attacks organized under code-name

“Olympic Games.”37 Sanger reported that even after Stuxnet became public, the U.S.

decided to further accelerate additional cyber attacks on Iran—perhaps due to the

remarkable success of Stuxnet. Unlike previous cyber attacks, including those in Estonia

and Georgia, Stuxnet was, in the words of former Central Intelligence Agency director

Michael Hayden, “the first attack of a major nature in which a cyber attack was used to

effect physical destruction rather than just slow another computer, or hack into it to steal

data.”38 These three examples of cyber warfare help illustrate how ill developed current

norms and understandings are with regard to this emerging threat.

International Norms

International norms offer a prospective approach to addressing the threat of cyber

warfare. Norms are standards of right and wrong that form a prescription or proscription

for behavior. 39 Norms are considered one component of regimes, which are “principles,

norms, rules, and decision-making procedures around which actor expectations converge

in a given issue-area,” and thus constrain some actor behaviors.40 Essentially, norms are

37 David Sanger, “Obama Ordered Sped Up Wave of Cyberattacks Against Iran.” New York Times. (1 June, 2012). 38 Ibid. 39 Katzenstein, Peter, Wendt, Alexander, and Jepperson, Ronals, Norms, Identity, and Culture in National Security. The Culture of National Security: Norms and Identity in World Politics. Columbia University Press, 1996. p.54. 40 Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966. p. 364.

Page 14: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

14

non-binding shared expectations or “standards of appropriateness”41 and they can exist at

various levels and apply to different actors. Norms exist at the community level where

they apply to the behavior of individuals. For example, community norms governing

sexual behavior—such as the expectation that sexual intercourse was appropriate only

between married couples—has a constraining impact on individuals in the community

where the norm resides.42 This community norm may not be held by all individuals but its

existence influences everyone’s behavior and raise the cost and risks associated with

engaging in behavior discouraged by the norm (in this case, premarital sexual

intercourse). In addition to the community level, norms can influence organizations,

including governments at the national level and state behavior overall at the international

level. At the national level, norms can have a structural impact on internal behavior. As

perhaps an extreme example, in Saudi Arabia, the strong Islamic culture and resulting

norms support the existence and acceptance of a religious “morality” police force—

officially referred to as the Committee for the Promotion of Virtue and the Prevention of

Vice—which among other things ensure there is a separation of the sexes in public, etc.43

Beyond the national level, these non-binding shared expectations can to some degree

constrain and regulate behavior of international actors and, in that sense, have a structural

impact on the international system as a whole. Often international norms emerge from

national norms. Ronald Jepperson, Alexander Wendt, and Peter Katzenstein look at the

development of international norms through what they call “sociological

41 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p. 887. 42 John DeLamater, “The Social Control of Sexuality.” Annual Review of Sociology, Vol. 7, (1981), p. 263-290. 43 BBC News. "Saudi minister rebukes religious police." November 4, 2002.

Page 15: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

15

institutionalism.”44 This essentially means that norms, as part of a global political culture,

impact our national security environment by actively shaping views regarding issues such

as national sovereignty, international law, and diplomacy. This dynamic of constantly

changing norms influences the character of states and acceptable state behavior.

International norms, such as the norm against the use of nuclear weapons, are developed

and influenced by the “logic of consequences”—a realist and rationalist argument

regarding self-interest perceived negative users would experience and the “logic of

appropriateness” which reflects the fact that norms themselves actually influence states’

identity and reinforce and determine appropriate behavior through iteration over time. 45

While both pure realists and advocates of the role of normative factors in international

relations have difficulty quantifying the comparative explanatory power of norms—the

example of norms for nuclear weapons demonstrate that they have some impact.

International norms similar to this nuclear norm have emerged regarding other forms

unconventional weapons, such as biological and chemical weapons and strategic

bombing.

In addition to applying to various levels (community, national, and international),

norms can generally fall into two categories—constitutive and regulative norms.46

Constitutive norms “create new actors, interests, or categories of action” and do not

create any particular duty or permission.47 An example of a constitute norm is the idea of

the institution of marriage whereby men and women form a particular type of bond. This

44 Jepperson, Wendt, and Katzenstein. “ Norms, identity, and culture in national security.” Culture and National Security, 1996. pp. 33-75. 45 Paul, T.V. The Tradition of Non-Use of Nuclear Weapons. Stanford Security Studies. January 2009. 46 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p. 891. 47 Ibid. p. 891.

Page 16: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

16

example of a constitutive norm also highlights how such norms can enable regulative

norms as the institution of marriage must exist before an expectation of being marriage

under certain conditions or before engaging in certain behaviors can emerge. In contrast

to constitutive norms, regulative norms (sometimes also referred to as deontic norms)

“order and constrain behavior” and actually have some kind of overt prescriptive

quality.48 An example of a regulative norm would be the view in the 1920s and 1930s of

submarine attacks against merchant ships as heinous and immoral.49 This paper is

focused on regulative norms rather than constitutive norms as those are the types of

norms that most directly influence conflict between states and apply to particular

weapons, including novel and unconventional weapons such as cyber weapons.

Norm Development Theory

There is a wide ranging and interdisciplinary literature that discussed the

emergence and development of international regulative norms. Norms have frequently

been utilized as a lens for understanding international activity due to behavioral and

microeconomic research.50 Ann Florini introduced an evolutionary analogy based on

natural selection to explain how international norms change over time.51 Natural

48 Ibid. p. 891. 49 Jeffrey W. Largo. “Which Norms matter? Revisiting the “Failure” of Internationalism.” International Organization. Vol 51, No.1 (Winter 1997), p. 32. 50For example, see: Gary Goertz. International Norms and Decision making: A Punctuated Equilibrium Model. Rowman & Littlefield Publishers. June 2003.; Rublee, Maria Rost. “Nonproliferation Norms: Why States Choose Nuclear Restraint.” University of Georgia Press. 2009.; Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998.; Jeffrey T. Checkel, “Institutions, and National Identity in Contemporary Europe.” International Studies Quarterly, Vol. 13, No.1 (March 1999), p.83-114; and Katzenstein, Peter, Wendt, Alexander, and Jepperson, Ronals, “Norms, Identity, and Culture in National Security.” The Culture of National Security: Norms and Identity in World Politics. Columbia University Press, 1996. 51 Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966. p. 363-389.

Page 17: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

17

selection, introduced by Charles Darwin in his book On the Origin of Species, is the

gradual, non-random process by which biological traits thrive or perish in a population.52

Norms too can also thrive or perish. Natural selection entails variation in traits,

differentiation (or selection) in reproduction, and replication through hereditary

genetics.53 This evolutionary approach to norms contributes significantly to the theory of

norm development by helping explain why particular norms change over time.54 Norms,

like genes, are instructional unit that influence the behavior of their host organisms. For

regulative norms, their phenotype55 is the particular behavior they address. Genes and

norms are both transmitted through inheritance—in the case of norms it is from one state

to another (horizontal reproduction) or internally within a state (vertical reproduction).56

Vertical norm reproduction refers to a continuation of a norm through leaders in a single

state and norms reproduced in this way rarely change. In contrast, horizontal norm

reproduction is diffusion across multiple states in a single generation. It is this type of

norm reproduction that is most relevant when considering norms governing weapon

technology and warfare as such norms need to be spread across multiple states in order to

influence state-to-state conflict. Overall, norm development theory identifies three major

stages in a norm’s potential life-cycle. These three stages are 1) norm emergence; 2)

norm cascade; and 3) norm internalization.57 Collectively, these life-cycle stages cover

the full spectrum of norm development—from the nascent emergence of a novel norm to

52 Darwin, Charles. On the Origin of Species. 1859. Signet Classics. < http://darwin-online.org.uk/> 53 University of California Berkley. Understanding Evolution. <http://evolution.berkeley.edu/evolibrary/article/evo_25> 54 Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966. p. 364. 55 A phenotype is an organism’s observable characteristics or traits. 56 Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966. p. 367-368. 57 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p. 887-917.

Page 18: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

18

a norm’s total adoption and codification across the globe. However, a norm may never

move through all three stages and can reach its terminal development at any of the three

stages and possibly even regress and dissipate.

Norms—like genes—are contested, meaning that there is competition with other

norms and as a result norm prevalence in a population changes over time. Different

norms have different levels of “reproductive advantage,” meaning a different likelihood

of being transmitted.58 Norm emergence is the stage where a new norm initial comes into

existence, often tenuously. Norm development theory—borrowing from evolutionary

theory—offers some specific conditions that are essential for a new “mutant” or emergent

norm to replace an existing one. For example, a norm currently emerging is the norm

intended to constrain the illicit spread of small arms and light weapons such as

submachine guns, rifles, automatic weapons, and light machine guns.59 This small arms

norm—intended to create expectations regarding weapon possession and transfers—is

not yet established and must actively be supported in order to emerge. The first condition

needed for norm success at this stage is whether a norm is prominent enough in the

existing “norm pool” to gain a “foothold”.60 This concept is similar to the idea of gene

prominence that often occurs when a population is geographically isolated and able to

separate from the “noise” of the environment that can overwhelm small mutations. For

norms emergence, that prominence usually occurs when a particular actor is energetically

supporting and promoting the norm—referred to as a “norm entrepreneur.” Norm

58 Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966. p. 367-368. 59 Garcia, Denise. Small Arms and Security: New Emerging International Norms. Oxon, UK: Routledge, 2006. 60 Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966. p.374.

Page 19: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

19

entrepreneurs arise as agents and advocates of a particular norm and use organizational

platforms as a mechanism to begin changing existing norms and promote the new norm.

Finnemore and Sikkink identify Henry Dunant (a Swiss banker who helped found what

ultimately became the Red Cross) as an example of a strong norm entrepreneur who—

following his experience at the battle of Solferino in 1859—successfully advocated for

the norm that medical personnel and the wounded be treated as neutrals and

noncombatants during conflict.61 These individual norm entrepreneurs are often

motivated by factors such as altruism, empathy, or ideological commitment and primarily

use persuasion as a mechanism to promote their norm, although they may engage in

disruptive behavior such as civil disobedience in order to advocate for their norm in a

contested normative environment.62 They either call attention to the new norm they are

promoting or even create it through reinterpretation or “framing” of the issue. An

interesting and yet unclear dynamic is the emergence of non-state actors that could be

considered “anti-norm-entrepreneurs;” that is the emergence of non-state actors such as

terrorists who completely ignore norms. William Potter has explored how nuclear norms

may be changing with the rise of these terrorist actors who seek nuclear weapons and are

not influenced or constrained by existing nuclear norms. He argues that terrorist use of

nuclear weapons may actually not erode (and could perhaps enhance) the norm against

nuclear weapon use—in a way ironically making those non-state actors who contravene

the norm inadvertent norm entrepreneurs.63 Another key element for norm emergence is

61 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p. 898-897. 62 Ibid. p. 897. 63 Potter, William. “In Search of the Nuclear Taboo: Past, Present, and Future.” The Institut Français des Relations Internationales. Winter 2010.

Page 20: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

20

an organizational platform for the norm entrepreneur to use to promote their norm.64 This

can be a nongovernmental organization (NGO) or standing international organizations

such as the World Bank. Different organizational platforms provide different types of

resources and advocacy networks that can be used to secure the support of state actors.

Through these norm entrepreneurs and organizational platforms norm emergence largely

builds as some states (considered norm leaders) internally respond and adopt norms.

In addition to norm prominence and the existence of entrepreneurs and

organizational platforms, norm development theory indicates that various additional

factors can fuel or stifle a norm’s growth and development during the emergence stage of

the life-cycle. Norm leaders often internally respond and adopt norms for domestic

political reasons. For example, domestic political concerns were the driving factor

behind codifying norms regarding human rights.65 These domestic political concerns can

also be grassroots in nature (i.e. from the bottom-up), meaning emerging from views held

by the general public who then influenced their domestic political leaders.66 States

insecure about their international status and seeking international “legitimation” are more

likely to adopt emerging norms. Eventually enough states adopt the new norm and a

“tipping point” is reached.67 Evidence of this tipping point can be seen as the norm

begins to become institutionalized in specific international rules and organizations,

64 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p.899. 65 Moravcsik, Andrew. “The origins of human rights regimes”. International Organization, 54. 2000. Pp. 217-252. 66 Tannenwald, Nina. The Nuclear Taboo: The United States and the Non-Use of Nuclear Weapons since 1945. Cambridge University Press, 2008. 67 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p. 895-901.

Page 21: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

21

although such institutionalization may not fully occur until after the tipping point is

reached and a norm cascade occurred.

Connections to certain ideas, such as a prohibition of bodily harm to innocent

bystanders or making an “adjacency” claim that connects the norm to existing norms can

help a new norm take root.68 This idea that how successfully a new norm interacts with

existing and widespread norms with which it is not directly competing is referred to as

coherence.69 Coherence is similar to the idea of grafting on to existing norms and it helps

lend legitimacy to a nascent norm. Making these adjacency claims may require proactive

construction of connections and ideational bridges by norm entrepreneurs. Florini points

out that this cultural transmission facilitated by norm entrepreneurs occurs primarily

through mechanisms such as “memes.” 70 A meme is an “idea, behavior, style, or usage

that spreads from person to person within a culture” and can include things like a

normative catch-phrase or particular fashion.71 Tools such as these allow norm

entrepreneurs to help attack the new norm to existing and widely accepted norms—in this

case the norm against indiscriminate killing of civilians. This coherence and grafting

conveys additional legitimacy on new norms as they become viewed as a “reasonable

behavioral response to the environmental conditions facing the members of the

community.”72 In a sense, this means emerging norms thrive when they are viewed as

logical extensions or necessary changes to existing norms.

68 Ibid. p.908. 69 Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966. p. 376. 70 Ibid. p. 367-368. 71 Mirriam-Webster. < http://www.merriam-webster.com/dictionary/meme> 72Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966. p. 367-368.

Page 22: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

22

Additionally, various items associated with the environmental conditions facing

the “norm pool” can further bolster the success of an emerging norm. This can include

the specific states involved as norm leaders and their environmental factors such as the

distribution of power, prevailing levels of technology, availability of natural and human

resources, etc.73 In addition to grafting and framing the issue effectively—environmental

factors such as the overall geopolitical conditions (i.e. the absence of major conflict or

wars), the effects of globalization, and the attitude of other actors in the international

system can serve as major elements of the success of an emerging norm.74 Also, the large

scale turnover of decision makers (revolutions, etc.), the obvious failure of norms from a

previous norm “generation;” and the emergence of new issue area in which prevailing

norms are not yet well established (such as cyber warfare, perhaps) can further establish a

fertile environment for a new norm to emerge and grow.75 However, specific to norm

development theory for emerging technology weapons, the presence of some of these

environmental factors may actually be counterproductive for norm emergence. This is

due to the uncertainty regarding the new weapons themselves and associated

technological constraints.

Once a tipping point has been reached the second stage in the norm life-cycle—a

norm cascade—begins. Norm scholars caution, however, that there is no way to specify a

priori when a tipping point will be reached or precisely how many states will need to take

up a norm for it to crest over this critical threshold. That said, empirical research

indicates that generally a norm tipping point is rarely reached without at least one third of

73 Ibid. p.377. 74 O’Dwyer, Diana. “First Landmines, Now Small Arms? The International Campaign to Ban Landmines as a Model for Small Arms Advocacy.” Irish Studies in International Affairs, Vol. 17 (2006), p. 77-97. 75 Florini, Ann. “The Evolution of International Norms.” International Studies Quarterly, Vol. 40, No. 3, Special Issue: Evolutionary Paradigmsin the Social Sciences. September 1966.p.377-379.

Page 23: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

23

the total number of states in the international system adopting the norm.76 However, the

specific states adopting the norm sometimes matter more than the total number of states

involved. Some states have more “moral stature” or are otherwise considered critical to

the norm due to their role in whatever the norm affects (e.g. states that use or produce AP

landmine for any norm regarding such weapons). Finnemore and Sikkink point out that

once the tipping point is reached and the norm cascade begins, international norm

adoption begins at a much more rapid pace. No longer is norm adoption largely a

function of domestic of domestic movements and pressure but instead it spreads through

“international socialization.”77 At this stage norms are more likely to spread and be

internalized if they are held by states viewed as desirable models—a phenomenon

referred to as prominence.78 During this norm cascade, states respond to this

international socialization for a variety of reasons, but most often legitimating,

conformity, and esteem.79 States that are norm leaders will often use bilateral or

multilateral diplomatic praise or censure (sometimes to include material pressure such as

sanctions) to encourage norm adoption and NGOs and non-state advocacy networks can

also apply social pressure. Globalization and increased international interdependence

have spawned increased opportunities for norm socialization. Sometimes this

socialization is done to advance a particular state or group of states’ interests. However,

over time the memories of these state interests fade and the norm remains as an

independent force.80 81 During this socialization process as a norm cascade grows,

76 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p.901. 77 Ibid. p.902. 78 Ibid. p.906. 79 Ibid. p.902-903. 80 Price, Richard. The Chemical Weapons Taboo. Cornell University Press. 1997.

Page 24: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

24

persuasion and framing continue to play a major role. For example, internationally

categorizing certain weapons as “unconventional” and “weapons of mass destruction”

can contribute to the development of norms constraining their use. 82 Additionally, during

this stage “world time”—a shock or major international event—can help push a norm to

this tipping point or accelerate its internalization.83 For example, the norms associated

with the losing side in a war or with an economic collapse leading to a depression may be

rapidly discredited and alternative norms sought.84 The current globalized international

environment can also be considered an aspect of the current “world time” and some have

argued it has accelerated the prospects for some norms moving through the three stages

of the norm life-cycle. For example, the woman suffrage norm took 120 years to move

through the first two stages in an environment lacking globalization while the norms

associated with violence against women progressed to the same degree in only 20 years

due to increased global interdependence.85

The third and final stage in their norm life-cycle (which may never be reached), is

norm internalization. This phase is the effort to deeply codify the norm and achieve

universal or near universal adherence.86 At this stage, the norm is so deeply and broadly

internalized that it achieves “taken-for-granted” status. Norm scholars point out that this

can actually make the norm hard to discern because all debate and controversy

81 Price, Richard. “A Genealogy of the Chemical Weapons Taboo.” International Organization, Vol. 49, No. 1 (Winter, 1995), p. 73-103. 82 Tannenwald, Nina and Price, Richard. "Norms and Deterrence: The Nuclear and Chemical Weapons Taboos." The Culture of National Security: Norms and Identity in World Politics. Columbia University Press. 1996. pp. 114-152. 83 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p.909. 84 Ibid. p. 909. 85 Ibid. p. 909 86 Ibid. p.904.

Page 25: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

25

surrounding it is resolved. 87 As with the earlier stages, various internal and external

factors contribute to a norm’s movement in this stage. For example, Andrew Moravcsik

looks at the adoption and emergence of norms relative to human rights and again

identifies domestic political concerns as the catalyst for internalization of norms

regarding human rights.88 Specifically, norms regarding human rights have adopted by

nascent democracies out of concerns that non-democratic forces may later gain power

and that they want to “lock-in” norms in order to constrain these potential future domestic

actors. However, generally speaking domestic factors play a lesser role at this stage than

they do in the earlier stages.89 External factors can include the norm’s role in shaping

identifies. For example, the nuclear norm—while still not necessarily internalized—has

become associated with the idea of what constitutes a “civilized nation.”90

Other identified factors that can contribute to successful norm internalization are

professions and iterated behavior and habit.91 Finnemore and Sikkink identify professions

as a powerful tool for socializing individuals to various norms; once a norm is built into

the professional training its internalization is greatly facilitated. 92 Additionally, frequent

repeated behavior and interaction in governmental bureaucracies and relevant professions

(connected in some way to the norm) leading to habits helps further institutionalize the

norm over time. Again, as with the previous stages, the intrinsic characteristics of the

norm are also factors that can help explain why or why not a norm spreads and is

87 Ibid. p.904. 88 Moravcsik, Andrew. “The origins of human rights regimes”. International Organization, 54. 2000. Pp. 217-252. 89 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p. 893 90 Tannenwald, Nina. The Nuclear Taboo: The United States and the Non-Use of Nuclear Weapons since 1945. Cambridge University Press, 2008. 91 Finnemore and Sikkink. “International norm dynamics and political change.” International Organization, 52. 1998. p.905. 92 Ibid. p.905.

Page 26: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

26

internalized. Norms that are both clear and specific (vs. ambiguous and complex) or

make universal clams rather than localized ones are generally more likely to have a

transnational impact.93 Additionally, certain norms have a particular coherence (as in the

earlier stages) with the overall environment that facilitates their internalization. For

example, some argue that the norm against chemical weapons is so well internalized

because it is grounded in longstanding and near-universal primitive human experience

with poisonous snakes and associated ancient mysticism.94

Given this rich body of research on norms, it is apparent that norms for cyber

warfare will invariably develop. Theories and scenarios regarding how they will develop

could be produced by examining lessons from the emergence of norms that are in some

respect particularly similar or relevant. As mentioned earlier, norms have emerged

regarding other forms of weapons, such as WMD, strategic bombing, and AP landmines.

While not always successful (with the demise of the strategic bombing norm in World

War II being perhaps the best example), some of these norms have had an effect in

restraining the widespread development, proliferation, or use of these weapons.

Experience with the emergence (and in some cases collapse) of these norms will be

particularly helpful in developing this understanding due to various commonalities

between these weapon-types and cyber warfare.

Weapons of Mass Destruction Norms

With WMD and cyber, both of these forms of non-conventional weapons are in

many respects similar and share many of the same special characteristics that have 93 Ibid. p.907. 94 Cole, Leonard. “The Poison Weapons Taboo: Biology, Culture, and Policy.” Politics and the Life Sciences, Vol. 17, No. 2 (Sep., 1998), pp. 119-132

Page 27: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

27

significant international security implications. For example, these shared characteristics

can include speed and global power projection, offense dominance; potential for major

collateral damage/unintended consequences; anonymity/attribution challenges; target and

weapon unpredictability; multi-use nature of the associated technologies; questionable

deterrence value (for some types of WMD); and the frequent use of covert programs to

develop such weapons.95 Due to these characteristics, both of these weapons are also

attractive to non-state actors or those seeking anonymity resulting in a lack of clarity

regarding the responsible party. Because of these common dynamics, lessons regarding

norm emergence and other issues can be learned from WMD experiences that are

applicable to U.S.’s nascent efforts to address the emerging threat of cyber warfare. Some

WMD norms are codified in contractual obligations and binding agreements such as

treaties, as was the case with biological weapons when the Convention on the

Prohibition of the Development, Production, and Stockpiling of Bacteriological

(Biological) and Toxin Weapons and on Their Destruction, commonly referred to as the

Biological Weapons Convention or BWC, entered into force in 1975. The BWC codified

the existing norm against development, production, and stockpiling of biological

weapons and declared their use to be “repugnant to the conscience of mankind.” The

BWC now has 155 States Parties. Earlier norms against use of these weapons led to the

1925 Geneva Protocol’s prohibition on their first use in a conflict (states retained their

right to retaliate with such weapons). Other binding agreements codifying norms

associated with other WMD modalities have also been enacted such as limits on nuclear

proliferation in the Nuclear Nonproliferation Treaty and an outright prohibition on all

95 Koblentz, Gregory and Mazanec, Brian. “Viral Warfare: The Security Implications of Cyber and Biological Weapons.” Accepted for publication in Comparative Strategy, 2013.

Page 28: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

28

chemical weapons in the Chemical Weapons Convention. Examining the factors leading

to these successes will be helpful in addressing the cyber threat.

Specific to norms regarding WMD, the bulk of the existing literature focuses on

the widely perceived success in the emergence of constraining norms regarding nuclear

weapons. As noted by Nobel Laureate Thomas Schelling, the rapid emergence of norms

against the use of nuclear weapons was so effective in constraining action that President

Eisenhower’s Secretary of State, John Foster Dulles, when contemplating the use of

nuclear weapons in 1953, said that “somehow or other we must manage to remove the

taboo from the use of [nuclear] weapons.”96 The norm against the employment of nuclear

weapons was so strong that President Truman did not use them against Chinese troops

during the Korean War, President Nixon did not use them in Vietnam, the Soviet Union

did not use them in Afghanistan, and Israel did not use them in the 1973 war with

Egypt—all circumstances where the opponent lacked such weapons and their use made

some degree utilitarian sense. With nuclear norms—as well as other WMD norms—

internationally categorizing certain weapons as “unconventional” and “weapons of mass

destruction” contributed to the development of norms constraining their use. 97 This work

of international dialogue (facilitated through organizations like the Aspen Institute and

the Institute for Strategic Studies in London) helped spread and promote the norm against

nuclear use to “new” members of the nuclear club—such as India and Pakistan. This is

in effect the ongoing work of the “norm cascade” identified by Finnemore and Sikkink.

In 2008, Nina Tannenwald published perhaps the seminal work on the nuclear “taboo”

96 Schelling, Thomas. “The Nuclear Taboo.” MIT International Review. Spring 2007. 97 Tannenwald, Nina and Price, Richard. "Norms and Deterrence: The Nuclear and Chemical Weapons Taboos." The Culture of National Security: Norms and Identity in World Politics. Columbia University Press. 1996. pp. 114-152.

Page 29: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

29

which builds on Schelling’s overview.98 Tannenwald found that norms against use played

an important role in the history of non-use of nuclear weapons (in addition to the

rationalist cost-benefit calculations and realist focus on power and self-interest, among

other things). Her principle evidence of the explanatory power of the nuclear norm is that

possessors of nuclear weapons did not use them when facing non-nuclear adversaries,

such as during the Korean War, as realist power considerations would dictate they

should. The nuclear norm has become self-reinforcing, with its unintentional and

fortuitous genesis being grassroots in nature (i.e. from the bottom-up), meaning it

emerged from views held by the general public who then influenced their domestic

political leaders.99 Tannenwald argues that these nuclear norms have been effective in

influencing U.S. nuclear policy in three ways: defining limits of acceptable actions and

strategies; shaping identities (such as what constitutes a “civilized nation”), and shielding

“complementary” practices from scrutiny (such as the use of non-nuclear conventional

weapons). However, T.V. Paul has approached the issue or nuclear norms through a

practical realist lens and is somewhat less bullish on how engrained nuclear norms

currently are—pointing out that they are somewhat ambiguous and there are no explicit

or legally-binding prohibitions against the use of nuclear weapons. 100 Basically the third

and final stage in the norm life-cycle, norm internalization, has not yet occurred and thus

Paul considers the nuclear norm a “tradition” or non-use rather than a more constraining

or binding “taboo.”

98 Tannenwald, Nina. The Nuclear Taboo: The United States and the Non-Use of Nuclear Weapons since 1945. Cambridge University Press, 2008. 99 Ibid. 100 Paul, T.V. “The Tradition of Non-Use of Nuclear Weapons.” Stanford Security Studies. January 2009.

Page 30: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

30

Other WMD modalities—such as chemical and biological weapons—share some

similarities with nuclear weapons in terms of norm emergence.101 Scholars argue that

these other weapons are also not used, at least in part, due to normative factors. Richard

Price has examined norms constraining chemical weapons, utilizing various case studies

along with this the genealogical method developed by Friedrich Nietzsche and

popularized by Michel Foucault. Chemical weapon norms initially developed to

complement the interests of the major powers but over time memories of these interests

faded and the norm remained as an independent force.102103 Leonard Cole goes back even

further than Price and Tannenwald in his genealogical analysis and argues that the

chemical and biological weapons taboo is grounded in longstanding and near-universal

primitive human experience with poisonous snakes and associated ancient mysticism. 104

This is reflective of the same ideas popularized by anthropologist Mary Douglass’ work

examining the concepts of pollution and taboo and their normative effects on culture.105

Strategic Bombing Norms

For strategic bombing and cyber, with the advent of airpower and the early use of

airplanes to drop bombs on cities, states had to grapple with a brand new technology and

approach to warfare. As with WMD, strategic bombing shares some special

characteristics with cyber warfare and thus is well suited as an example for drawing

101 Tannenwald, Nina and Price, Richard. "Norms and Deterrence: The Nuclear and Chemical Weapons Taboos." The Culture of National Security: Norms and Identity in World Politics. Columbia University Press. 1996. pp. 114-152. 102 Price, Richard. “The Chemical Weapons Taboo.” Cornell University Press. 1997. 103 Price, Richard. “A Genealogy of the Chemical Weapons Taboo.” International Organization, Vol. 49, No. 1 (Winter, 1995), p. 73-103. 104 Cole, Leonard. “The Poison Weapons Taboo: Biology, Culture, and Policy.” Politics and the Life Sciences, Vol. 17, No. 2 (Sep., 1998), pp. 119-132 105 Douglass, Mary. Purity and Danger: An Analysis of the Concepts of Pollution and Taboo. Ark Paperbacks. 1984 (first published in 1966).

Page 31: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

31

lessons on norm emergence. Strategic bombing made civilian populations highly

vulnerable, was difficult defend against, and used technology which also had peaceful

applications (air travel and transport)—all of which can also be said about the threat of

cyber war today. At the end of the nineteenth century technology had advanced to the

point where substantial aerial bombing of civilian and military targets from aerial

balloons was possible. Such “strategic bombing,” particularly of civilian targets,

appeared to conflict with the existing norm of noncombatant immunity. At the Hague

Peace Conference of 1899 the participants agreed to prohibit the “discharge of explosives

or projectiles from balloons” for a period of five years. The codification of this nascent

norm struggled through various debates in before, during, and after World War I but by

the 1930s there was a core consensus that bombing civilians was wrong. Hitler even

proposed a ban on strategic bombing in 1935. However, this norm collapsed during

World War II. As the effort to constrain strategic bombing through normative influences

was not ultimately successful, it is particularly well suited as a case study of the limits of

norms and how other factors may impede or reverse norm development.

Compared to the robust dialogue on the emergence and growth of WMD norms,

there is relatively little that directly examines norms for strategic bombing, perhaps since

this norm failed so spectacularly in World War II. Thomas Ward looked at norms in

international relations and offered a detailed case study of development of norms for

acceptable behavior of airpower during war during the twentieth century.106 He traces the

early international discourse and debates on the appropriateness of aerial bombing of

civilian and military targets, culminating in the Hague Peace Conference of 1899’s five

106 Thomas, Ward. “The Ethics of Destruction: Norms and Force in International Relations.” Cornell University Press. 2001. p. 97-98.

Page 32: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

32

year prohibition on aerial bombing.107 However, due to competing interests and

viewpoints further debates only led to an agreement to apply the laws of land warfare to

aerial bombing. The last hope to enact a legal constraint on strategic bombing was the

Disarmament Conference in Geneva in 1932-1934, which failed due to the fear that

civilian aircraft could be easily converted to military purposes and thus the proposed

restrictions on possessing such weapons were not practically effective.108 The U.S. in fact

had some of the greatest concerns about codifying a restrictive norm in this area because

some in the U.S. inaccurately held out hope that technological advances would soon

make strategic bombing an effective tool at preventing war altogether.109 This was

grounded in the perception that strategic bombing could be so horrible and decisive so as

to make lengthy wars of attrition such as World War I unthinkable.110 The 1932-1934

Disarmament Conference in Geneva included a restriction on targeting civilians but given

technological constraints (i.e. the challenge of avoiding indiscriminate collateral damage

due to a lack of precision) and other factors, this simple norm was not effective. As John

Keegan points out, as World War II broke out in 1939, the United Kingdom and Nazi

Germany both complied with this norm and were very stringent in their aerial targeting.

However, by 1940 this norm deteriorated rapidly.111 This erosion was in part due to

“inadvertent escalation” resulting from strategic bombing’s compatibility with the war-

107 Ibid. 99. 108 Uri Bialer. “The Shadow of the Bomber: The Fear of Air Attack and British Politics, 1932-1939.” London: Royal Historical Society, 1980. 109 Howard, Michael. The Laws of War: Constraints on Warfare in the Western World. Yale University Press (February 27, 1997) 110 In part, this view was encouraged through sensational novels such as H.G. Wells’ 1908 novel The War in the Air. 111 Keegan, John. “The Second World War.” New York: Viking, 1989.

Page 33: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

33

fighting culture of each nation’s military services.112 Beyond a military being culturally

susceptible to escalation into strategic bombing, the erosion of the restraint in bombing

was driven by the increasing desperation of the state actors and their calculation that the

moral opprobrium wrought by violating the norm was secondary to the existential benefit

as well as pivotal technological change, such as the invention of the Norden bombsight

and improved inertial navigation that made strategic bombing more militarily effective.113

Similar types of improvements in technology in the 1990s with precision guided

munitions has reinvigorated the norm against strategic bombing of civilian targets as it

has made such an approach feasible while retaining the ability to bomb military targets.

Anti-Personnel Landmines Norms

With AP landmines and cyber warfare, again there are important factors that

make it a good weapon-type to examine when looking to see how cyber norms will

develop. Landmines are low-cost, simple in application, and historically widely used and

available; however in the modern era their use has been deemed barbaric and they have

been banned by 159 countries. International norms against AP landmines were codified

with the Anti-Personnel Landmine Convention (also known as the Ottawa Treaty)

entering into force in 1999 and with 159 States Parties as of September 2011. The

Ottawa Treaty requires participants to cease the production and stockpiling of AP

landmines and destroy its existing stockpile within four years of ratification. As of 2009

44 million AP landmines were destroyed under the treaty. The IT and computers needed

112 Legro, Jeffrey. “Military Culture and Inadvertent Escalation in World War II.” International Security, Vol. 18, No. 4 (Spring, 1994), p. 108-142. 113 Wrage, Stephen. “Compliance with Aerial Bombing Norms: A Study of Two Periods, 1939 – 1945 and 1990 – 2004.” Annual Convention of the Joint Services Conference on Professional Ethics. 2004.

Page 34: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

34

to conduct cyber warfare are also already extremely widespread and economically

accessible, so learning how norms constraining the use of AP landmines developed

despite their prevalence will have valuable lessons for cyber norms.

Considering the relative newness of the ongoing efforts of the International

Campaign to Ban Landmines and the Ottawa Treaty, there is a great deal of literature

discussing the growing norm against AP landmines. Non-governmental organizations

(NGO), such as Human Rights Watch, Handicap International, Physicians for Human

Rights, Medico International, Mines Advisory Group, and the Vietnam Veterans of

America Foundation have played a major role as norm entrepreneurs and organizational

platforms.114 115This NGO-led campaign has led the “teaching” of this emerging norm

through the use of tools such as the use of grafting, persuasive memes, and shame.116

Norm entrepreneurs deliberately sought to graft their nascent norm against AP landmines

to the widespread prohibition on indiscriminate killing of civilians due to the adverse

impact of millions of old and forgotten AP landmines worldwide.117 Further, those

advocating for the Mine Ban Treaty and norms against AP landmines and cluster

munitions employ specific advertisements in developed, mine-free nations with themes

such as “If there were landmines here, would you stand for them anywhere?” and videos

of a young girls soccer match in the U.S. where an apparent landmine explodes and

injures players.118 Additionally, another framing mechanism used by norm entrepreneurs

114 Parlow, Anita. “Banning Land Mines.” Human Rights Quarterly, Vol. 16, No. 4 (Nov., 1994), p. 715-739. 115 Matthew, Richard and Rutherford, Kenneth. “The Evolutionary Dynamics of the Movement to Ban Landmines.” Alternatives: Global, Local, Political, Vol. 28, No. 1 (Jan.-Feb. 2003), p. 29-56. 116 Price, Richard. “Reversing the Gun Sights: Transnational Civil Society Targets Land Mines.” International Organization, Vol. 52, No. 3 (Summer, 1998), p. 613-644. 117 Parlow, Anita. “Banning Land Mines.” Human Rights Quarterly, Vol. 16, No. 4 (Nov., 1994), p. 715-739. 118 < http://www.stoplandmines.org/slm/index.html>. Accessed February 2013

Page 35: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

35

to advance their emerging norm is shifting of the burden of proof. An example of this—

again based on the experience of the emerging AP landmine norm—is is the use of a

proselytizing advocacy network setup by the NGO to foster a “transnational Socratic

method” forcing nations retaining AP landmines and resisting the norm to publicly justify

their actions (essentially shifting the burden of proof). This shaming and shifting of the

burden onto the holdouts led to the rapid emergence and success of the AP landmine

norm in the 1990s.119 For the effort to establish the norm for AP landmines—in addition

to grafting and framing the issue effectively—environmental factors such as the overall

geopolitical conditions (i.e. the absence of major conflict or wars), the effects of

globalization, and the attitude of other actors in the international system were major

elements of its success as an emerging norm.120

A Research Agenda to Identify Important Lessons for Cyber Warfare Norms

Each of the three main case studies introduced above—in addition to general

norm development theory—alludes to various important actors, motives, and factors that

have helped the various norms emerge, grow, or collapse. Some of these important

elements are summarized in table 1 below.

119 Price, Richard. “Reversing the Gun Sights: Transnational Civil Society Targets Land Mines.” International Organization, Vol. 52, No. 3 (Summer, 1998), p. 613-644. 120 O’Dwyer, Diana. “First Landmines, Now Small Arms? The International Campaign to Ban Landmines as a Model for Small Arms Advocacy.” Irish Studies in International Affairs, Vol. 17 (2006), p. 77-97. 121 Developed based on work of authors cited throughout this manuscript.

Table 1: Factors Supporting WMD, Strategic Bombing, and AP Landmine Norm

Emergence and Growth121

Legitimacy

Page 36: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

36

Examining the experience with norms for nuclear, biological, and chemical weapons,

strategic bombing, and AP landmines in order to further develop and understand these

factors and their relevance to the emerging area of cyber warfare will be particularly

State seeking international legitimation

Prominence

Key or model states adopted the norm

Vigorous support from actors or special relevance of state(s) where norm emerges

Intrinsic qualities of the norm

Clear and specific

Universal claims

Connection to prohibition of bodily harm to innocent bystanders or concepts of poison and purity

Adjacency

Connected or related to existing norms

World time

Shock/reaction to a major international event

Utility for domestic political concerns

Locking in norms to constrain potential future domestic actors

Coherence

Compatibility with existing norms and environment

Favorable norm environment

State distribution of power, prevailing levels of technology, availability of natural and human

resources, etc. favor the norm

Large scale turnover of decision makers

Recognized failure of norms from a previous “norm generation”

Emergence of a new issue area where prevailing norms not well established

Page 37: TOWARDS A CYBER WAR TABOO?files.isanet.org/ConferenceArchive/e2b7eefd536e462fa4ed980dfe93bf17.pdfstrategic bombing at the advent of the ability to conduct aerial bombing of civilians

WORKING DRAFT Please Do Not Cite Without Author Permission

37

helpful in developing an understanding of how cyber warfare norms will develop. This

initial analysis of prospective lessons from these case studies indicate that some of these

factors and conditions—such as the ability to graft new norms onto existing normative

concepts, categorizing or branding weapons as different, or the importance of utilizing

existing organizations to foster norm emergence—that were instrumental in fostering or

inhibiting norms for these related weapon-types will be critical for the emergence of

constraining cyber norms. Further work in this area is needed to develop plausible

scenarios for how cyber warfare norms may develop as well as suggested lessons for

policy makers seeking to encourage this process. With this knowledge, effective cyber

warfare norms can emerge more rapidly as a mechanism to contain this growing threat.