Sheldon 2014
Sheldon 2014
Sheldon 2014
To cite this article: John B. Sheldon (2014) Geopolitics and Cyber Power: Why Geography Still Matters, American
Foreign Policy Interests: The Journal of the National Committee on American Foreign Policy, 36:5, 286-293, DOI:
10.1080/10803920.2014.969174
Taylor & Francis makes every effort to ensure the accuracy of all the information (the Content) contained
in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no
representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the
Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and
are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and
should be independently verified with primary sources of information. Taylor and Francis shall not be liable for
any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever
or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of
the Content.
This article may be used for research, teaching, and private study purposes. Any substantial or systematic
reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any
form to anyone is expressly forbidden. Terms & Conditions of access and use can be found at http://
www.tandfonline.com/page/terms-and-conditions
American Foreign Policy Interests, 36:286293, 2014
Copyright # 2014 NCAFP
ISSN: 1080-3920 print=1533-2128 online
DOI: 10.1080/10803920.2014.969174
though the geography has become unmoored from the politics. While there
is undoubtedly a geographic foundation to cyberspace because of its
physical infrastructure of networked computers, cables, and satellites, it is
widely assumed that the geographic setting has no relevance to the political
use of cyber power by states and non-state actors. This article argues that
while cyberspace shrinks time and space in many obvious ways, the
geographic setting still matters in the use of cyber power. Further, compre-
hending the geopolitics of cyber power can help policymakers and analysts
understand the identity, motivations, and intentions of actors.
What role, if any, does cyber power play in classical geopolitics? This
question is the inspiration for this article, which seeks to discern the
interplay between the use of cyber powerthe ability in peace, crisis,
and war to exert prompt strategic effect to, from, and in cyberspaceand
John B. Sheldon, Ph.D., is the executive geopoliticsthe relation of international political power to the geographi-
director of the George C. Marshall cal setting.1
Institute in Arlington, Virginia; founder
and owner of the Torridon Group LLC, a As a phenomenon that is thought to render time and space irrelevant,
space and cyberspace consultancy; senior cyberspace at one point seemed to many to have finally killed off the tyr-
fellow at the Atlantic Council; and a senior
fellow in Global Security Studies at the
anny of geography and the concept of territorial sovereignty. This irrational
Munk School on Global Affairs at the exuberance has given way to a quiet, if rather vague, acknowledgment that
University of Toronto in Canada. Prior to cyberspace is, indeed, tied to a geographic setting and has geopolitical
his current positions, John was Professor
of Space and Cyberspace Strategic Studies meaning. Yet analyses about how and why this is the case are few and
at the U.S. Air Forces School of Advanced far between.2
Air and Space Studies (SAASS) at Maxwell
AFB, Alabama. For over six years, John
The reality is that geography and geopolitics do matter and matter a great
taught the National Security Space course deal in the use of cyber power. Furthermore, that reality goes well beyond
and founded, directed, and taught the the commonplace fact that the physical segment of cyberspacethe compu-
Intelligence, Information, and Cyberspace
course. A former British diplomat, John ters, cables, and satellites, among other physical infrastructureis geo-
holds bachelors and masters degrees graphically situated and operated and maintained by human beings who
from the University of Hull, UK, and a
Ph.D. in politics and international relations
must, by necessity, live on the land in politically organized communities
from the University of Reading, UK. in physically distinct and demarcated territories. Rather, geography and
286
geopolitics suffuses cyberspace in most, if not all, of philosophical reason to regard that future as less than
its characteristics and uses around the world and, desirable.
in fact, exerts influence on how and where cyber As a partial remedy to this unwarranted optimism
power is applied. That this is the case should not and the generally vague notion that geography and
come as a surprise since the rise of the information geopolitics somehow matter, outlined below are
age and all that it has given us has not obviated the the various ways in which cyber power is suffused
fact that, as maritime strategic theorist Sir Julian by geography and geopolitics and also how the prac-
Corbett noted in the early twentieth century, tice of cyber power can impact the geopolitical con-
text. The article examines the geographic and
Since men live upon the land and not upon the sea, great
issues between nations at war have always been geopolitical implications of the physical infrastruc-
decidedexcept in the rarest caseseither by what your ture of cyberspace; the fact that targets in cyberspace
army can do against your enemys territory and national have a geographic setting and geopolitical meaning;
life or else by the fear of what the fleet makes it possible
the rise of megacities along an increasingly urba-
for your army to do.3
nized littoral; and the implications for classical geo-
It is only natural and inevitable, therefore, that cyber politics in the traditions of the great theorists of
power should have a significant geopolitical dimen- geopolitics, Sir Halford Mackinder and Nicholas
Downloaded by [Northern Illinois University] at 19:08 25 November 2014
needed to run the thousands of computer servers and by powerful geopolitical forces. Its structure is
located therein. also shaped by the existence and emergence of
Geographic and political considerations are central urban clusters, growing economic power, and mili-
to deciding where to place landing points for under- tary (geostrategic) requirements. These factors gave
sea cabling, such as taking into account transoceanic rise to the cyberspace we have today and will also
distances to control costs as well as shipping traffic influence the cyberspace we will have in years to
near the landing point in order to mitigate the risk comenot only in terms of network speeds,
of a ship tearing the cable.8 Similar considerations reliability, and access, but also in terms of the
framed decisions about the landing of submarine international governance of cyberspace and who, if
cables in the late nineteenth and early twentieth anyone, controls the Internet.13
centuries. Communication satellites in Earth orbit
must maintain their orbital positions and station in
what is, in fact, a complex EarthMoon space terrain THE TARGET IS ALWAYS IN THE
comprising the Earths gravity well, the drag
produced by traces of the Earths atmosphere even
PHYSICAL REALM
at 22,360 miles altitude, as well as the crowded In the continuous back and forth of what many
and increasingly contested geostationary territory call cyberwarfare, the shadow of geopolitics and
where orbital slots are becoming scarce. Further, geography also looms large. For starters, and
the launch of communication satellites can only be especially with regard to state-to-state (and their
done from a handful of locations around the world, proxies) cyber exchanges, geopolitical considera-
with the location of satellite ground control stations tions often determine the targets. Further, the target
chosen based on their ability to send signals to and itself is geographically located in that the computer
receive signals from satellites and distribute those network penetrated, the data pilfered or otherwise
signals via terrestrial networks.9 manipulated, and the political, economic, and mili-
Geographic imperatives suffuse the physical tary significance of that data are owned by and
infrastructure of cyberspace, and geopolitical consid- within the sovereign territory of some political entity.
erations further influence the makeup of how cyber- As a result, the actual and potential geopolitical
space is created. For example, in the late nineteenth implications of cyber exchanges should be obvious,
and early twentieth centuries, undersea cabling was although their overall impact is often mitigated by
dominated by Great Britain and its geopolitical the challenges posed in attributing the source of a
agenda centering around the maintenance of its cyber exchange. Attribution, of course, is important
empire and its domination of global trade. When and the forensic science behind it is improving rap-
Britain laid undersea cables across the North Atlantic idly. The problem: the forensics of attribution can
States, Israel, certain European countries, and and conflicts.18 Wherever geopolitical rivalries and
perhaps even the Russians or Gulf Arab states.14 tensions are present and wherever the physical locus
European countries such as the United Kingdom, of power resides, cyber exchanges occur. Terrorist
Germany, and France would certainly have had the use of cyberspace also has a geopolitical dimension
technical and financial wherewithal to mount a in that efforts to raise money and recruit are geopoli-
Stuxnet-like operation (and history may yet show tically focused toward diasporas and co-religionists
that any of these may have provided assistance in who have a geographic footprint.19 Last, it might even
some way), but not necessarily the political will. be claimed that the criminal use of cyberspace can
The Gulf Arab states, such as Saudi Arabia and the have a geopolitical aspect. Just as criminals rob
United Arab Emirates, do not have the technical banks because that is where the money is, modern
capacity to undertake such an operation, but do have criminals, often taking advantage of countries with
the financial ability to bankroll it. The problem with cyberspace infrastructure but weak governance, use
that theory, however, is that their proximity to Iran cyberspace to further their geographic reach and take
would probably have precluded their involvement advantage of global financial networks by focusing
because of the real possibility of blowback. Last, their efforts on corporations and publics in wealthy
Russian involvement was very unlikely despite their parts of the world such as North America, Europe,
technical capacity to undertake an operation like Gulf Arab states, and Australasia.
Stuxnet because of their substantial commercial and The ubiquity of cyberspace and, in turn, cyber
strategic ties to Tehran. power should not confuse us about the role of
Neither the U.S. nor Israeli governments have geopolitics and geography in its use. In any cyber
officially acknowledged their involvement in the Stux- endeavor the geographic element looms large in that
net operation, but this has not stopped the Iranian activity must be started by a human being located
government from assigning blame to both. This charge somewhere geographically, on a machine and net-
has since been strengthened by leaks that point to a work similarly situated. That human being initiates
massive U.S.-Israeli operation that, if the stories are a cyber action for the purposes of national interest,
accurate, is remarkable in its scope, expense, and economic imperative, political ideology, perceived
complexity.15 Further, Iranian officials would have religious mandate, and=or criminal intent. The code
doubtless looked to the United States and Israel as that will in some manner manipulate data traverses
perpetrators given their technical, operational, and cyberspace through a number of physical entities
financial capacities to undertake such an endeavor, as natural and manmadeto its target that is also
well as their previously demonstrated political will in located somewhere geographically. That target
confronting Iranian nuclear activities. The larger point comprises machines and networks used by humans
here is that interstate cyber exchanges almost always (or even a targeted individual) who also reside
The ubiquity of cyberspace, and, therefore, the will become more acute as local agricultural sectors
potential for the practice of cyber power, is hardly shrink in size and foodstuffs must be imported from
uniform in its geographic coverage. There are still, abroad. This leads to potentially fragile supply lines
and will remain, places on Earth where cyberspace into megacities because of potential disruptions
will be difficult to access or in which its penetration ranging from the everyday economic challenges of
in a population will be shallow at best. Changes cur- supply and demand through to deliberate inter-
rently under way in economics, demographics, as ference such as embargoes, piracy, or the cyber
well as political decisions affecting issues such as interdiction of logistical networks.
agriculture, city planning, and the building of infra- Geographically, the emergence of megacities is
structure, are all creating a growing trend of massive largely occurring along the littorals of Eurasia, Africa,
urbanization throughout the world and the creation and Latin America, with the result that more than 70
of megacities.21 This mass urbanization has signifi- percent of the worlds population will live within
cant implications for cyberspace in terms of its 100 miles of a coastline by 2050.24 As well as megaci-
physical infrastructure as well as its use. ties becoming cyber hubs of regional networks, we
Mass urbanization will likely result in global clus- are also likely to see the merging of cyberspace
ters of cyber activity that will also have their own and the maritime domain. In many ways, this trend
geopolitical narratives and imperatives. Further, is already under way with the digitization of maritime
while the global cyber infrastructure that will link transportation and policing and with the more
these clusters will probably be technically uniform, advanced of the worlds navies already adopting
and perhaps even subject to some form of global and integrating cyberwarfare into their policies, doc-
governance, the infrastructure within these clusters trines, and tactics, and techniques and procedures
of megacities will most certainly not be. Rather, the (TTPs). This adoption and integration of cyber
cyber infrastructures in these megacitiesespecially effects and fires will further expand, and change,
in the developing worldwill likely be a hybrid the influence of maritime power against the urba-
mix comprising hardware from commercial carriers nized littoral. Conversely, more advanced parts of
on one hand and improvised, often illegally the urbanized littoral, leveraging their own cyber
acquired, hardware and networks jury-rigged by power that is integrated with sea and air defenses
technically competent individuals in particular as well as maritime-domain-awareness networks,
neighborhoods and communities within a megacity. will be able to counter attempts to impose offensive
This phenomenon is already under way in cities such maritime power. Such circumstances point to the
as Mumbai, Karachi, Accra, and Nairobi, and will urbanized littoral as the focal point of stand-alone
only expand in the coming decades given the cyber conflict, with implications for maritime trade
ever-lower bar for entry into cyberspace,22 as well and law and order, as well as cyber-enabled military
for urban warfare where friendly and adversarial must use their maritime power to prop up the littoral
cyber power will be a major element of the oper- of the Eurasian landmassthe Rimlandto prevent
ational environment in peace, crisis, and war.27 This the Heartland from gaining dominance.28 Since the
emerging phenomenon will likely see innovations in end of the cold war, this geopolitical approach has
TTPs, defensive and offensive technologies, and oper- generally receded from the considerations of policy-
ational concepts appropriate to the complex urban makers, but with recent geopolitical perturbations in
environment where cyber power is ubiquitous. These Eurasia it is likely to enjoy a newly found applica-
innovations and operational concepts will probably bility.29 Cyber power can enhance, even critically
involve the ability to disrupt, deny, and otherwise enhance, the criteria for geopolitical success on a
manipulate local networks; conduct psychological global scale, but is unlikely to change the nature of
and other information operations in digitally rich this grand competition.
and complex geographies; and conduct sophisticated The geopolitical frameworks of Sir Halford Mack-
deception-and-denial operations against adversaries inder and Nicholas Spykman still have relevance in
and neutral audiences. Indeed, the 2014 conflict todays world and can easily accommodate the rise
between Israeli Defense Forces and Hamas in Gaza of cyber power that has occurred over the past few
will probably be seen as one of the progenitors of this decades.30 Looked at from the grandest of scales,
kind of warfare where the brutalities and horror of the competition between the United States and its
war in a crowded, complex urban environment are Western allies on one hand, and Russia, China, and
combined with an endlessly contested and chaotic their respective allies on the other, is, in essence, a
information environment. continuation of the competition over whether the
geopolitical Heartland can achieve superiority over
a geographically dispersed Rimland along the littoral.
BLURRED LINES: THE HEARTLAND, Cyberspace is suffused throughout both the Heart-
PIVOTS, AND RIMLANDS AND land and Rimland regions, but because of the grow-
CYBER POWERS INFLUENCE ON ing urbanization along the littoral, the strategic
expression of cyberspacecyber powerwill be
GEOPOLITICS more pronounced.31
On a global scale, cyber power is very unlikely to Diplomacy, economic statecraft, and land, sea, air,
change the nature of the eternal geopolitical struggle and space power still matter in the twenty-first-
between continental and maritime powers. This century geopolitical competition, but we can add
struggle centers around the idea that developments to this list of areas of competition the realm of
in transportation technologies (e.g., railways, ship cyberspace. What makes cyber power unique in geo-
propulsion, air power) and thus the means with politics is its influence not only as an instrument of
Publishers, 2007; first published in 1942); Jakub J. Grygiel, Spykman believed that Mackinder exaggerated its potential
Great Powers and Geopolitical Change (Baltimore, MD: The power. Spykman promulgated the concept of the Rimland,
Johns Hopkins University Press, 2006); and C. Dale Walton, arguing that it was susceptible to the influence of offshore
Geopolitics and the Great Powers in the Twenty-First maritime powers, thus hemming in any dominant Eurasian
Century: Multipolarity and the Revolution in Strategic power. Also implicit in these theories is that Heartland
Perspective (Abingdon, UK: Routledge, 2007). powers tend to be prone to authoritarianism, whereas
21. On the rise of megacities, see Frauke Krass, Surinder Aggarwal, offshore powers tend to be liberal democracies.
Martin Coy, and Gunter Mertins, eds., Megacities: Our Global 29. On these geopolitical perturbations, see Walter Russell
Urban Future (Dordrecht, Netherlands: Springer, 2014). Mead, The Return of Geopolitics: The Revenge of the
22. On this, see Scott Smith, Shanzai! The Era of DIY Warfare, Revisionist Powers, Foreign Affairs 93, no. 3 (May=June
Current Intelligence 3, no. 8 (August 2011), http://www. 2014): 6979.
currentintelligence.net/columns/2011/7/18/shanzai-the-era-of- 30. See Colin S. Gray, In Defence of the Heartland: Sir Halford
diy-warfare.html. Mackinder and His Critics a Hundred Years On, Comparative
23. On smart cities, see Anthony M. Townsend, Smart Cities: Big Strategy 23, no. 1 (Spring 2004): 925.
Data, Civic Hackers, and the Quest for a New Utopia (New 31. See Walton, op. cit.
York: W. W. Norton, 2013). 32. See, for example, John B. Sheldon, Deciphering
24. On the increasing urbanization of the worlds population up Cyberpower: Strategic Purpose in Peace and War, Strategic
to the year 2015, see Department of Economic and Social Studies Quarterly 5, no. 2 (Summer 2011): 95112.