Watching Cybernorms Get Made

By Richard Boucher

Ambassador Richard Boucher served 32 years at the U.S. Department of State, including roles as Ambassador to Cyprus, Assistant Secretary for South and Central Asia, and Spokesman for six different Secretaries of State. After retiring from the State Department, Boucher spent almost four years as Deputy Secretary-General of the Organization of Economic Cooperation and Development (OECD). Boucher currently teaches at Brown University, focusing on the intersection between diplomacy and economics.

Butch Cassidy graphically demonstrated that there ain’t no rules in a knife fight.  Well, so far, there ain’t no rules in cyberspace or precious few at least.  Establishing those rules and practices may take years, as it did for nuclear weapons or cold war spying.  The U.S. response to the Russian hacking is the Obama administration’s third effort to lay down a new norm: you don’t steal information to play in the other side’s politics.

Why do you bring a gift to a dinner at a friend’s house?  Why do neighbors get mad when your dog does his business on their lawn?  Is the guy who speeds down the empty lane beside you a jerk or a mathematician optimizing the merge function?  Attitudes depend on norms of behavior.  Norms come about when there is general agreement in societies, when the dominant group can assert their view or when everyone finds mutual benefit even without mutual interests.   What you can and cannot do in cyberspace doesn’t meet these conditions yet.  While there are many legal discussions, negotiations, and assertions, we’re really making it up as we go along.  President Barack Obama has just tried to assert a new norm.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:Tech/CyberTagged with:

Related Articles

Search

Close