{"id":11314,"date":"2017-08-29T08:12:37","date_gmt":"2017-08-29T13:12:37","guid":{"rendered":"http:\/\/huewhite.com\/umb\/?p=11314"},"modified":"2017-08-29T08:12:37","modified_gmt":"2017-08-29T13:12:37","slug":"a-peek-into-international-relations","status":"publish","type":"post","link":"https:\/\/huewhite.com\/umb\/2017\/08\/29\/a-peek-into-international-relations\/","title":{"rendered":"A Peek Into International Relations"},"content":{"rendered":"<p>From a\u00a0<a href=\"https:\/\/www.lawfareblog.com\/security-dilemma-cyberspace-ancient-logic-new-problems\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/www.lawfareblog.com\/security-dilemma-cyberspace-ancient-logic-new-problems&amp;source=gmail&amp;ust=1504045176721000&amp;usg=AFQjCNG1s_rfbv9LPMMNY5W1IwdQTIxgnQ\">book review\u00a0<\/a>by Lucas Kello of Ben Buchanan&#8217;s\u00a0<em>The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations<\/em>\u00a0on\u00a0<i><b>Lawfare<\/b><\/i>:<\/p>\n<blockquote class=\"gmail_quote\"><p>Students of international relations are trained to read history\u2014even ancient history\u2014as a prelude to the future. Among the eternal notions that theorists commonly invoke, one enjoys special appeal: the security dilemma. It originates in Thucydides\u2019s famous claim that \u201cincreasing Athenian greatness and the resulting fear among the Spartans made [their] going to war inevitable.\u201d\u00a0 A similar fear had fueled Athens\u2019s grab at empire. Therein lies the dilemma: in the anarchic international system, the growing security of one state ensures the growing insecurity of others. This perverse logic produces occasional outbreaks of war, even when the contenders wish to avoid it, as in 431 B.C.<\/p>\n<p>In\u00a0<em>The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations<\/em>, Ben Buchanan argues that this ancient logic explains much of the incessant hostility that mars interstate dealings in cyberspace. The argument has three \u201cpillars.\u201d They can be summed up as follows: the development of offensive weapons requires advance intrusion into other states\u2019 networks; maximizing defense also necessitates intrusion; therefore, states penetrate foreign networks whenever they can\u2014even while interpreting intrusions against them as threatening. The cycle repeats incessantly.<\/p><\/blockquote>\n<p>Sounds like a negative feedback loop, and it&#8217;s fascinating, but retroactively obvious. Moving to the nuclear arms scenario of last century, the remark about 431 B.C. is fairly frightening; one wonders if any of the operational issues of surviving that period have applicability to the issues of controlling and suppressing cyberwarfare. I only bring this up because all options should be examined; I suspect the answer is\u00a0<b>No<\/b>, given the disparate nature of the weapons classes involved.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From a\u00a0book review\u00a0by Lucas Kello of Ben Buchanan&#8217;s\u00a0The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations\u00a0on\u00a0Lawfare: Students of international relations are trained to read history\u2014even ancient history\u2014as a prelude to the future. Among the eternal notions that theorists commonly invoke, one enjoys special appeal: the security dilemma. It originates in \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/huewhite.com\/umb\/2017\/08\/29\/a-peek-into-international-relations\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-11314","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/11314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/comments?post=11314"}],"version-history":[{"count":2,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/11314\/revisions"}],"predecessor-version":[{"id":11322,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/11314\/revisions\/11322"}],"wp:attachment":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/media?parent=11314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/categories?post=11314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/tags?post=11314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}