Apocalyptic Visions: Cyber War and the Politics of …...A cyber-apocalypse, suggests one...
Transcript of Apocalyptic Visions: Cyber War and the Politics of …...A cyber-apocalypse, suggests one...
1
Apocalyptic Visions: Cyber War and the Politics of Time
Tim Stevens, King’s College London (unpublished essay, 2013)
Abstract
This article contributes to the literature on representations of ‘cyber war’, specifically cyber war as a
potential form of inter-state war or strategic terrorism. It argues that cyber war can be examined
from a chronopolitical perspective; that is, with a concern for how collective understandings of time
and temporality influence political behaviours. This article argues that discourses of strategic cyber
war are contingent upon an apocalyptic temporality that is itself an expression of postmodernity.
Recent speculation on the likelihood of strategic cyber war constructs it as both imminent and
unavoidable, an existential catastrophe which forecloses temporal horizons and brings the future
forward as a key driver of politics in the present. Cyber war discourses are interrogated here as forms
of ‘catastrophic apocalypticism’, in which cyber war as apocalypse is permanently in abeyance, which
facilitates a range of opportunities for the politics of security and the expansion of the national
security apparatus.
Keywords
catastrophe; chronopolitics; cyber security; cyber war; international security; postmodernity.
2
Introduction
In a now notorious op-ed for The Washington Post, Mike McConnell, formerly director of both the
National Security Agency and of US National Intelligence, told readers: ‘The United States is fighting
a cyber-war today, and we are losing. It’s that simple’ (McConnell, 2010). His widely-reported
comments were notable both for the hostility they attracted and for their timely re-injection of the
‘cyber war’ concept into the heart of cyber security discourse. As historical studies of cyber security
show (Cavelty, 2008; Warner, 2012), war and the military have always been at the core of the
dynamic relationship between information technologies and security, not least as modern
computers were reared, if not born, in the global emergency of World War II (Ceruzzi, 2003). In the
post-war period, the intensive interplay between computers and security became increasingly
apparent but the terrorist attacks of 11 September 2001 took these concerns to ‘a new, more
complex and heightened level’ (Buzan and Hansen, 2009: 248). McConnell’s comments coincided
with a period during which publics worldwide were being re-sensitised to the national security
implications of information technologies with substantial media interest in issues previously the
preserve of security professionals and computer ‘geeks’ (Guitton, 2013).
Competing concepts of ‘cyber war’ have been around for at least two decades but it was perhaps
inevitable, in the sometimes febrile atmosphere of speculation about cyber security events and their
societal impacts, that recent evocations of future ‘cyber war’—both dangerous and glamorous—
would attract widespread attention. This article contributes to a maturing academic engagement
with the nature and character of this phenomenon. It argues that cyber war can be examined from a
chronopolitical perspective; that is, with a concern for how collective understandings of time and
temporality influence political behaviours (Maier, 1987; Hutchings, 2008; Klinke, 2013). This
constructivist perspective holds that our conceptions of time and space shape the stories we tell
about reality (Bakhtin, 1981). This article argues that discourses of strategic cyber war are contingent
upon an apocalyptic temporality that is itself an expression of postmodernity. Recent speculation on
3
strategic cyber war constructs it as both imminent and unavoidable, an existential catastrophe which
forecloses temporal horizons and brings the future forward as a key driver of politics in the present.
In this article, I propose that cyber war discourses represent a form of ‘catastrophic apocalypticism’,
in which cyber war as apocalypse is permanently in abeyance, thereby facilitating multiple
opportunities for the politics of security and the expansion of the national security apparatus.
Apocalyptic Cyber War
Contemporary discourses of cyber war are notable in the diversity of the conceptualisation and
deployment of this term. There has been a widening definition and use of ‘war’ with respect to
‘cyberspace’ in recent years (Cavelty, 2010; Lawson, 2012) and the meaning of war in this context
risks degenerating into ‘a mere metaphor’ (Rid, 2012: 7). For present purposes, we can identify at
least three principal meanings attributed to and derived from the term, ‘cyber war’.1 One, an
operational mode characterised by state militaries’ tactical use of information and networked
information technologies, originally formulated as ‘cyberwar’ by RAND analysts John Arquilla and
David Ronfeldt in the early 1990s (Arquilla and Ronfeldt, 1993), although best described as cyber
warfare. Two, a generalised notion of societal warfare waged by state and non-state actors through
information-technological means. This is war in its metaphorical register, a state of permanent
‘cyber conflict’ (Karatzogianni, 2009) between criminals, ‘black hat’ hackers, protest networks,
citizens, hacktivists, terrorists, insurgents and the forces of government and business arrayed against
them. This form of ‘cyber war’ is portrayed as a Hobbesian bellum omnium contra omnes, a constant
low-level conflict or perpetuall cyber warre of all against all (see also, Arquilla, 2011: 40).
The third category of cyber war is strategic, in which ‘cyber war’ is war like any other war, as
understood in international law and convention. This category of cyber war is central to our
subsequent discussion: ‘cyber war proper’ is driven by political desires, and information-
1 For a detailed review of ‘cyberwar’ terminology and typology, see Cavelty (2010). See also: cyberwar as the
simulation and virtualisation of war (Virilio, 2005; Der Derian, 2009) and cyberwar as global information deterrence (Virilio, 2000).
4
technological means are used to force the capitulation of adversaries to one’s will. This category is
here taken to include acts of strategic cyber terrorism, should such acts ever come to pass, on the
basis that, first, large-scale terrorism may be considered strategic (Neumann and Smith, 2005) and,
second, that since 9/11, cyberterrorism on this scale would likely be framed as an act of war eliciting
a militarised response. The question of whether any ‘cyber attack’—state or non-state—actually
satisfies the criteria of an ‘act of war’ is at the heart of an unresolved debate over the likelihood of
cyber war in the academic literature on strategic theory (Rid, 2012, 2013a, b; Stone, 2013).
It is also questionable whether cyber war could constitute the totality of an inter-state war. Cyber
operations would probably be part of a military campaign also involving other elements of national
military power (Betz and Stevens, 2011; Betz, 2012). Taken together, these issues call into question
whether there can exist a pure inter-state cyber war; if it isn’t conducted solely through information-
technological—‘cyber’—means, is it not just ‘war’? The alleged Russian military cyber attacks on
Georgian information assets in 2008 illustrate this well (Deibert et al, 2012). There was no strategic
‘cyber war’ between Russia and Georgia as commonly claimed but tactical/operational cyber
warfare used in conjunction with other Russian military capabilities: in other words, cyber warfare as
part of war.
Discourses of cyber security—of which ‘cyber war’ is a distinct subset—are heavily reliant on the
articulation of catastrophic ‘cyber doom’ scenarios to mobilise political resources (Cavelty, 2008;
Lawson, 2013). Strategic cyber war is also framed in ways prioritising the catastrophic nature of
these scenarios, although their nature and character remain poorly understood. In the absence of
historical events or processes definitively identified as strategic cyber war, cyber war can only be
imagined rather than remembered. Moreover, rather than portraying cyber war as a protracted and
heterogeneous process analogous to the unfolding of ‘real’ wars, cyber war is often reduced to a
single image or identity, a textual cipher standing in for a more complex phenomenon. One of the
5
principal ways in which cyber war is imagined is as a cataclysmic and transformative event, which
can be understood through the lens of apocalypse. The details of cyber war are described once this
initial identity has been established, not before. This deductive rationale identifies cyber war as
‘catastrophic’ or ‘apocalyptic’, with its character inferred from this initial assertion of its nature. This
is not to suggest those who promote apocalyptic interpretations of cyber war reached their
conclusions in similar fashion—in most cases, the opposite is likely to be true—but this is how cyber
war is often presented publicly by a wide range of politicians, policymakers, defence and intelligence
personnel, computer security professionals and academics. Cyber war discourses are disseminated
through the general intercourse of broadcast and online news media, in popular culture—including
films, television, novels—and other elements of the new media ecology (Hoskins and O’Loughlin,
2010). Explicit references to cyber war qua apocalypse are common but what we are seeking to
identify is an apocalyptic aesthetic, a way of imagining and thinking cyber war rather than the overt
framing of cyber war as apocalypse per se.
In the 1990s, information-technological apocalypse was something unleashed militarily on an
adversarial Other. A 1995 Time magazine cover story on ‘cyber war’—in our typology, cyber
warfare—drew attention to the ‘new Armageddons’ to be inflicted on America’s enemies through
digital military means. The scenarios imagined by military planners resounded ‘with almost Biblical
force’ as Washington ‘visits upon the offending tyranny a series of thoroughly modern plagues’
(Waller, 1995). Today, the apocalypse is also within one’s sovereign borders and, consequently, in
one’s own time. In the post-9/11 mindset, ‘war’ is something that can happen ‘here’ as well as
‘there’. Strategic cyber war is couched regularly in awkward neologisms drawn from Judaeo-
Christian doctrines of the end-times: cybergeddon, cyberarmageddon, cybarmageddon, cyber-
apocalypse. A ‘cyber-apocalypse’, suggests one dictionary, is ‘a cyber attack that could wreak havoc
on the nation by bringing down critical information infrastructures’ (Schell and Martin, 2006: 78).
The scale of such an event ‘would make 9/11 look like a tea party’ (The Economist, 2012).
6
Cybergeddon is ‘one of the greatest existential threats facing the United States’, writes one senior
lawyer in The New York Times (Bharara, 2012). Eugene Kaspersky, founder and CEO of information
security company Kaspersky Lab, told an audience in Tel Aviv: ‘it will be the end of the world as we
know it …. I’m scared, believe me’ (Cohen and Lubell, 2012). Even if few security professionals
actually fear ‘cybergeddon’ is imminent (Glenny, 2011)—and many are openly skeptical—this does
not detract from a widespread sense of fatalism. The ‘sky is falling’, writes one defence information
security professional, albeit ‘very slowly’ (Geers, 2009).
As if to illustrate the truism that ‘all of cyberspace comes to ground somewhere’ (Goodman et al,
2007: 196-197), the sheer physicality of cyber war scenarios contrasts sharply with the ‘virtuality’
and immateriality of the informational component of ‘cyberspace’. Richard Clarke and Robert Knake
(2010: 64-68) describe what happens ‘When Cyber Warriors Attack’. As critical information
infrastructures fail, aircraft fall from the sky, trains derail, cars crash, gas pipelines explode, chemical
plants expel poison gas, financial systems freeze, and satellites spin out of orbit. Food, water and
energy distribution falters, citizens panic and, ultimately, the government is unable to maintain
control and the social order disintegrates. Even sober commentators suggest that ‘concatenating
these sorts of events can trigger the economic and political panic that no recent war has ever
brought to an advanced society’ (Bobbitt, 2008: 96).
Although they might not always be couched in explicitly apocalyptic language, these dark futures are
often reinterpreted in an apocalyptic light. One reviewer of Clarke and Knake, for example, describes
the above scenario as a ‘pithy five-page vision of this coming apocalypse’ (Glenny, 2010). This
suggests that the explicit language of apocalypse does manifest in discourse but also that apocalypse
acts as an archetypal resource through which to frame strategic cyber war in general. In the
following section, we examine in more detail how narratives of strategic cyber war exhibit signs of
apocalyptic thought.
7
Anatomy of an Apocalypse
Apocalyptic thinking is inherently eschatological and interprets history through the prism of finitude:
contemporary events are imbued with eschatological meaning and are interpreted as ‘signs’ of
impending apocalypse (Robbins and Palmer, 1997: 4-5). The roll-call of signs of cyber war will be
familiar: Cuckoo’s Egg, Eligible Receiver, Morris Worm, ILOVEYOU, Code Red, Estonia, Georgia,
Conficker, Operation Aurora, Stuxnet, Flame, Duqu, and so on.2 This litany of signs—although
internally heterogeneous—imparts metonymic gravitas to cyber war narratives and fulfils a
significant mnemonic function in reminding audiences continually of the seriousness of cyber
threats. They become ‘signifiers of the no-longer-future-but-reality of cyber-war’ (Cavelty, 2013).
Their historical specificity is elided in their construction as discrete events, the frequency of which is
always increasing (e.g. Herrera-Flanigan, 2013), and which lead inevitably to cyber war.
The prophets who read these apocalyptic signs and pronounce upon them—the ‘Cassandras of cyber
warfare’ (Rid, 2012: 6)—do not, like their religious counterparts, restrict themselves to specific dates
and times upon which terrible events will occur, so have no need to excuse themselves from
incorrect predictions; they can never be wrong. However, they do have in common their talents as
‘masterful bricoleurs, skilfully recasting elements and themes within the constraints of their
respective traditions and reconfiguring them to formulate new, meaningful endtimes scenarios’
(Wojcik, 1997: 148). The specific vectors of ‘cyber insecurity’ may change, and the timescales expand
and contract, but the certainty in apocalypse does not waver. A degree of ‘apocalyptic intensity’ is
maintained and can be heightened further by making predictions that are ‘imminent but
indeterminate’, legitimising a constant state of readiness in which adherents ‘feel themselves to be
standing poised on the brink of time’ (Bromley, 1997: 36). In fact, it is always ‘only a matter of time’
before a ‘cyber-apocalypse’ occurs (Gable, 2010). This uncertainty is shared with other forms of
2 Although it is not commonly invoked in contemporary cyber war discourses, we might add Y2K to this list,
with its own particular apocalyptic connotations (Tapia, 2003).
8
security, which thrive on a ‘denotative imprecision …. simultaneous appeal to the hard and the
vacuous, the precise and the imprecise …. vague generalities about everything and nothing’ (Walker,
1997: 63). The tension inherent in this epistemic polarity is partially resolved in the case of cyber war
by reading the signs as corroboration of a deterministic ‘script’ of the future (Robbins and Palmer,
1997: 5). When events and scenarios converge, the narrative of cyber war gains explanatory power
in its own right. In periods of ‘thickened history’ like this, it becomes ever more difficult to
comprehend these events—‘to see the wood for the trees’, as it were—and they become part of
their own causal structure (Beissinger, 2002: 27). In this case, the impression is that if cyber war is
not already occurring, it very soon will be.
The initiation of the apocalypse is frequently reduced to the familiar digital motif of a finger hovering
above the button or, in this case, positioned in readiness for a final, decisive mouse-click or emphatic
keystroke. The former prime minister of Australia provides an excellent example of this symbolic
genre: ‘There was a time when war was begun with a shot. Now it can begin with the simple click of
a mouse. A silent attack that you may never even know occurred until it all unfolds in front of you’
(Rudd, 2011). During the early Cold War, the image of the US president’s finger poised above a
‘nuclear button’ became the standard symbol of military power available to the commander-in-chief
(Strong, 2005: 34) but in an age of cyber war, the power to foment societal chaos is available to all:
as UK armed forces minister Nick Harvey warned, ‘the finger hovering over the button could be
anyone from a state to a student’ (Hopkins, 2011). The difficulties of representing cyber threats
visually (Hansen and Nissenbaum, 2009: 1165) partially explain the popularity of this imagery but
like the nuclear case—for which substantial visual resources were available—there is semantic
power in this reduction of immense sociotechnical complexity to a simple manual action (Plotnick,
2012). Like the informational bits mediating the human will to prosecute these actions, the decision
to proceed is also binary: on/off, yes or no. We might never know who hit us or why but this single
9
physical act brings the future rushing catastrophically into the present, the moment of ‘cosmic
ecstasy’ (Chernus, 1982) in which all apocalyptic predictions are validated.
This suggests apocalypse is also an object of desire, something to be welcomed and, perhaps,
brought into being (e.g. Cook, 2004). Although eschatology is concerned with the end-times,
apocalypse is not merely the end but also a beginning, a time of both revelation and transformation.
An apocalyptic belief in the transformation of the human condition through catastrophe informs the
rhetoric of, for instance, the US-led ‘war on terror’ as much as it does the jihadism of those who
prompted it (McLaren, 2002; Jackson, 2005: 103-105). This applies even if the utopian ideal of
delivering a world free of ‘terror’ is as unlikely as millennial Islam’s dreams of a global caliphate
(Gray, 2007). They remain visions no matter how hard one strives to achieve them and are part of a
‘catastrophic’ strand of apocalypticism which pits good against evil and privileges dystopian and
pessimistic views of human nature (Wessinger, 1997). Cyber war scenarios frequently express this
catastrophic apocalypticism, yet these eventualities are not entirely unwelcomed. Cyber war as
apocalypse is ‘an illumination unveiled precisely at the very moment of the greatest darkness and
danger’ (Aho, 1997: 65), a light to dispel the night of political foot-dragging and insufficient cyber
security. The catastrophic materialisation of the ‘virtual’ threat is the necessary catalyst through
which to achieve this transformation. In this respect, apocalypse operates in its primary sense of
‘revelation’, a ‘singular instant both revealing the meaning of the past and announcing the future’
(Bousquet, 2006: 756), in this case the political errors of the past and the sunlit uplands of a ‘cyber
secure’ future.
Understood not only as catastrophe but as the moment of revelation and the wellspring of
transformation, apocalypse need not be viewed in a wholly negative light. Millennial beliefs in a
better future are not exclusive to religion and are amply demonstrated in scientific movements like
eugenics, cryonics and space exploration, all of which share a conviction humankind can be
10
transformed and improved through technology (Bozeman, 1997). The posthumanist movement,
specifically in its attention to the coming ‘technological singularity’—the ‘rapture of the nerds’
(Doctorow and Stross, 2012)—is overtly apocalyptic in orientation but also emphasises the positive
social benefits an information-technological transformation will bring (DeLashmutt, 2006). The
technological singularity may be a violent rupture but not necessarily; it may, some argue, have
happened already—we just didn’t notice.3 Apocalypse need not be catastrophic but can be
‘progressive’, affirming collective cooperation in bringing about earthly salvation (‘progress’) without
the radical violence of divine retributive justice (Wessinger, 1997). These utopian and transformative
impulses are in a long lineage of technoscientific thought, expressing secular rather than religious
apocalypticism (Hughes, 2012). We must enquire further how apocalyptic cyber war is located with
reference to this spirit of apocalyptic modernity and postmodernity.
Cyber War and Apocalyptic (Post)modernity
We might identify in the specific invocation of apocalypse as the omnipresent threat of existential
catastrophe a distinct characteristic of postmodernity. Ecological disaster, nuclear cataclysm,
population pressure and a range of ‘wicked problems’ (Rittel and Webber, 1973) characterise our
contemporary global condition and serve to foreshorten our temporal horizons, altering our
relationship with the future. Teleological notions of social progress and the open horizons of
‘positive’ futures are replaced by an ‘extended present’ in which existential concerns about the
future shape the present, rather than its converse (Nowotny, 1994: 51). The roots of this sensibility
are prehistoric, an epistemic crisis emerging with the separation of man from nature (Lewis, 2012),
which expresses itself through religious and, in modernity and postmodernity, secular narratives of
apocalypse. From Nietzsche’s ‘death of God’ (Nietzsche, 2001) to the Foucauldian ‘death of man’
(Han-Pile, 2010) and the ‘end of history’ (Fukuyama, 1992), modernity has provided multiple
3 This is a common discussion on trans- and posthumanist web forums and blogs. This issue is also raised with
respect to cyber war: ‘what if we were at war and didn’t know it?’ (Brenner, 2009: 100).
11
apocalyptic (and often misunderstood) pronouncements which announce the end of the order of
modernity and the birth of a ‘postmodernity’ itself.
In 1902, the English writer and social commentator, H.G. Wells, addressing the Royal Institution,
advocated the application of the scientific imagination to the problems of futurity. Specifically, he
wished to dispel an impression of the future as ‘a perpetual source of convulsive surprises, as an
impenetrable blankness’ (Wells, 1913: 21), into which we project our dark fantasies and cultural
forebodings. As a science fiction author, Wells might be impressed at the role the genre now plays in
thinking imaginatively about futurity and security: imagination has become a formal resource,
mobilised to generate security knowledge and to ‘dispel secrecy and ignorance, compute risk and
uncertainty, and prepare for surprise and novelty’ (Aradau and van Munster, 2011: 69-70). Wells
might be less sanguine about the scenarios conjured up by this process, however. Whilst
acknowledging that science fiction can provide planners with useful creative frameworks for thinking
about cyber security (Jagoda, 2012: 25), it also frequently casts technology ‘in a bad light’ (Silomon
and Overill, 2012: 15). Formally and informally, cyber war scenarios are, as a result of an historical
paucity of comparable events, necessarily imagined, and they ‘remain fiction, not to say science
fiction’ (Rid, 2013a: 4). In common with the science-fictional leanings of contemporary security
futurism generally, these predictions are distinctly dystopian and ‘often very grim indeed’ (Carr,
2010: 18).
What happened to the positive social futurism conjured up by the science-fictional imagination at
the beginning of the last century? According to Richard Overy, British intellectual culture was deeply
affected by the cataclysm of World War I, which leached Victorian optimism and faith in social
progress from the bones of a tired nation (Overy, 2009). Furthermore, this ‘domestic malaise’ was
deepened by uncertainties about species survival, economic security and the fear of political
extremism in a time of civilisational crisis, a dystopian atmosphere which so sensitised the British
12
public that the ‘escape into war’ in 1939 was an apocalyptic release (Overy, 2009: 384). After
Operation Barbarossa and, in the public imagination, El Alamein (Weinberg, 1994: 489), Western
citizens began to look forward to a world free of tyranny, an outlook that gradually soured as
superpower enmity ossified in the Cold War, a metaphor which ‘[packed] together anxieties so
intense that it had the power to represent and to create a whole world’ (Gregory, 1989: 12). In a
world of superpower chest-beating and one-upmanship, the spectre of nuclear apocalypse
understandably altered people’s expectations of the future. Subsequent knowledge of our
precarious ecological condition has served to consolidate and accentuate feelings of impending
catastrophe, mobilised through apocalyptic imaginaries in discourses of climate change and
environmental degradation (Swyngedouw, 2010). Existential uncertainty mediated through the
cultural construct of ‘apocalypse’ foments the revelation that breaks open the illusion of social
progress and the Enlightenment telos.
Eschatological discourses of cyber war are perhaps symptomatic of this apocalyptic aesthetic but
they also derive from a long-standing antipathy or ambivalence to the sociopolitical effects of
technology. As scholars of the social construction of cyber security threats have observed, concerns
about information technology are older than we sometimes recognise (Cavelty, 2008; Lawson, 2012,
2013), even if they have taken on an urgency hitherto unprecedented in its global intensity. Disquiet
about the ‘information revolution’ and its supposed benefits has, even before the last two decades
of massive Internet growth, raised critical questions about the political basis of such claims (Webster
and Robins, 1986) and identified the constraining logics instantiated by the ideology of the
information revolution itself (Slack, 1984). More radically still, enthusiasts for information
technology by their own admission sit cheek-by-jowl (Kelly, 2010) with neo-Luddites (Kaczynski,
1995) as proponents of neo-vitalist interpretations of technology as possessive of its own auto-
generative ‘life force’. Under these conditions, in which technology is self-perpetuating, autonomous
and somehow ‘out-of-control’ (Winner, 1977), and in which technology is implicated in a wide range
13
of social problems, it is a small step to concluding it is ‘a frequent circumstance of history that a
culture or civilization develops the device that will later be used for its destruction’ (Woodcock,
1977: 133).
The weaponisation and attempted civilian control of nuclear energy brought with it the concept of
the nuclear ‘accident’, the unavoidable catastrophe ‘normal’ to any given technology (Perrow, 1999).
To ‘invent the train is to invent derailment; to invent the ship is to invent the shipwreck’ (Virilio and
Der Derian, 1998: 20), and to invent the nuclear power station is to invent Three Mile Island,
Chernobyl and Fukushima: the accident is the ontology of technologised society. The nuclear
meltdown is qualitatively different, however, from the information accident, which substitutes
interactivity for radioactivity (Virilio, 1997: 70). In the global information-technological assemblage
the accident becomes not ‘local’, like the reactor or the bomb, but ‘general’ in its effects, which are
‘integral’ to large-scale sociotechnical systems (Virilio, 2007). The ‘global financial crisis’ exemplifies
this integral accident, which Virilio ascribes to the highly-interconnected and automated trading
systems of global financial networks (Crosthwaite, 2011). The immanence of the accident to
postmodernity is, in Virilio’s hands, an explicitly eschatological dimension of the apocalypse of
technology itself (Virilio, 2007: 24).
Viewed in the light of the accident, strategic cyber war appears immanent to our contemporary
‘wired’ world. All cyber war discourses stress that the vulnerability of modern societies increases as
their dependency on information technologies intensifies. This dependence is not only practical, in
terms of delivering services and goods, but psychological and political. The hypothetical ‘cascading
failures’ catalysed by infrastructural subversion and destruction (Little, 2002) begin by revealing the
materiality and functionality of ‘invisible’ yet physical information infrastructures (Dodge and
Kitchin, 2004). This is followed by secondary failures of contingent sociotechnical networks like
water, energy, transport and emergency response, which continue to cascade through the affective
14
realm of corporeal and psychological stress, before undermining completely the collective imaginary
that is society. As in the global financial crisis, the accident/apocalypse is characterised by the
‘instant and simultaneous globalisation of affects and fears’ (Virilio et al, 2008).
There is little evidence that cascading failures are likely to happen, or that cyber war will reach the
level of a global accident. There is no firm indication that a cyber attack of any kind has caused
physical damage on this scale, let alone human deaths (Rid, 2013a). This may, of course, change in
time. One might object that the version of cyber war presented here is constructed between human
adversaries rather than between humankind and its technologies but this would be to forget the
interconnectedness and interdependence of the sociotechnical infrastructures of postmodernity. So
unpredictable are they, we cannot know if the effects of cyber war would be restricted to the target
systems alone, or would spread beyond them and potentially back across one’s own borders. This
‘blowback’ effect would diminish the strategic utility of these operations to high-tech societies,
including most of those with the capacity to launch an attack in the first place (Feaver, 1998;
Rathmell, 2003). There is no guarantee an act of cyber war would not cause a global accident and
this thought leads once again to imagining cyber war as potential apocalypse. What, however, are
the political implications of these apocalyptic visions: what political ‘work’ does the framing of cyber
war as apocalypse perform in the present?
Chronopolitics of Cyber War
Due to the lack of precedents, appeals are often made to catastrophic historical events to analogise
the possible effects of future cyber war—Pearl Harbor, 9/11, Katrina, and so on. These historical
analogies serve as proxies for foundational events in other fields of security, as does Hiroshima in
the nuclear case, for example (Hansen and Nissenbaum, 2009: 1164). In this context, nuclear and
‘cyber’ are occasionally explicitly linked: ‘Stuxnet is the Hiroshima of cyber-war’ (Gross, 2011).
Commentators often draw attention to the inaccuracies of these historical analogies but pay rather
less attention to their political implications. The principal outcome of Pearl Harbor, for instance, was
15
to jolt the United States into a global war: ‘a threat that had been sketchy, abstract, and distant
became personal and immediate’ and its principal effects were in ‘policy, law, and national
commitment to respond to a recognizable threat’ (Cebrowski, 1998). This dynamic is transferred to
the field of cyber security, in which a catastrophic event—an act of cyber war—is required to spur
government into appropriate action (Bliss, 2010; Goldsmith and Hathaway, 2010). Critical scholars
also invest in the catastrophic event the power to shock the private sector into accepting a greater
role for government in cyber security (Bendrath, 2001). The maintenance of a low level of fear and
concern may also desensitise audiences to the trauma of the catastrophe when and if it finally
arrives (Grusin, 2010), although this does not detract from the construction of cyber war as a
catalyst for political action.
Cyber war is therefore both necessary and in some sense desired. Whether transformative cyber war
can be brought about by apocalyptic discourses alone is unknown but the potentially self-fulfilling
aspect of cyber war discourse is summarised by Ron Deibert: ‘As ominous as the dark side of
cyberspace may be, our collective reactions to it are just as ominous—and can easily become the
darkest driving force of all’ (Deibert, 2012: 261). ‘Like the monsters in your imagination’, writes
former White House cyber security advisor Howard Schmidt, ‘these phantoms can take on a persona
of an unrelenting danger that easily surpasses their true capabilities’ (Schmidt, 2006: 174). In
contrast to apocalyptic environmental discourses, however, in which there is quite literally no long-
term future and therefore no hope (Swyngedouw, 2010, 2013), cyber war apocalypses are not
characterised by pure negativity and still offer redemption through cyber security measures in line
with the desires of capital and the national security state. Of course, it is precisely those who nurture
fear of apocalypse that promise salvation the most and will, ultimately, they hope, be in a position to
deliver it (Swyngedouw, 2013).
16
Cyber war may be immanent to postmodernity but immanence does not tell us when cyber war will
occur, for which we require a more active intimation of tense than such vague futurity provides.
Cyber war discourses, however, do not do this. Cyber war may be immanent but it is also perpetually
in abeyance. The existential aspects of cyber war are comparable in some respects to environmental
discourses, particularly in their emphasis on catastrophe rather than crisis (Aradau and van Munster,
2011) and in their irreversibility (Hansen and Nissenbaum, 2009). They differ in that cyber threats
gain their potency from cascading failures developing rapidly from originary stimuli, in contrast to
the gradual accumulation of environmental security issues to a threshold beyond which the
frequency of significant events accelerates markedly. This difference ‘establishes different modalities
of urgency and hence different spaces for political intervention’ (Hansen and Nissenbaum, 2009:
1164). Cyber security presents a strong sense of temporality in ‘cyber-doom’ scenarios ‘constructed
as inevitable and imminent but perpetually postponed’, thus ignoring increasingly extensive and
visible cyber security measures (Barnard-Wills and Ashenden, 2012: 9). As strategic cyber war is
currently a speculative concept only, so narratives of cyber war fulfil precisely this political function,
particularly in furthering the allocation of resources to companies and institutions charged with
cyber security and the prevention and prosecution of cyber war (e.g. BBC News, 2013), whilst also
stressing the need for more security to postpone the inevitable.
Michael Dillon identifies the centrality of eschatology to the politics of security more generally. This
is ‘politics thought in the light of last things’, which articulate both a sense of ending and of ‘ends’—
as in aims and desires—but also the beginning of a new politics (Dillon, 1996: 31). Cyber war read as
apocalypse marks the birth of a new cyber security future in which political order is transformed into
one that takes full account of the exigencies of cyber security. But this future is not post-
apocalypse—the ‘catastrophic threat-event of the dissolution of the temporal order of things’
(Dillon, 2011: 782)—but pre-apocalypse. Indeed, the central task of the politics of security is to
constantly defer the apocalypse so that the future becomes not the infinity of Christian heaven (on
17
earth, or otherwise) but a circumscribed—finite—future of infinite possibilities for the workings of
politics and security (Dillon, 2011). The temporal distance between now and the apocalypse—
situated at the secular ‘limit’ of time, rather than the religious ‘end’ of time—must be maintained, a
project for which energy and resources are required. The constant deferral of apocalyptic cyber war
may be a product of this project and in the gap between present and apocalypse the cyber security
project can be reworked in perpetuity. Although the future constantly threatens to irrupt into the
present, the future never arrives.
Conclusion
This article has not attempted to determine whether or not strategic ‘cyber war’ will happen, or
within what timescale. ‘Is it possible for one of these events to happen? Sure. Is it likely? Absolutely
not’ (Schmidt 2006: 172). If the odds of such an event occurring are so small, it is arguably more
important that resources are focused on less spectacular cyber security issues—crime, espionage,
sabotage—from which cyber war is an unwelcome distraction (Lewis, 2005; Lawson, 2012, 2013;
Guitton, 2013). Given that strategic cyber war may even be a theoretical impossibility, the odds that
cyber war qua war will take place vanish to zero. This does not exclude the possibility that large-
scale disruptive and destructive events may occur which look very similar to the phenomena
currently described as cyber war but such scenarios presently reside in the minds of the prophets of
‘cyber-doom’ and those who believe them. Apocalypse is a discursive means to frame cyber war that
mobilises deep cultural resources but apocalyptic cyber war is also an unconscious expression of
apocalyptic postmodernity.4 Clearly, apocalyptic thinking can be discerned in non-war cyber security
contexts too, although we must imagine that if an adversarial action is raised to the hypothetical
level of apocalypse it will probably also be of sufficient magnitude to qualify as an act of war.
4 It is argued elsewhere that ‘an apocalyptic necro-realism is the dominant mode of representation of our
times’ (Dawson, 2013).
18
We might alternatively enquire if the prophets of cyber war will be ‘on the right side of history’ (Rid,
2013a: xiv). We do not know, but we might consider the response of Primo Levi, when asked why we
should not peer too far into the future: ‘Because it is almost impossible to distinguish a true prophet
from a false one. They sound exactly the same’ (Levi and Di Caro, 2001: 174). We should not
necessarily turn deaf ears to all prophets of cyber war but this does remind us, as in the case of
climate change, in which apocalyptic thinking is perhaps easier to sustain and identify, that
apocalyptic logic is characterised by an ‘anti-epistemology—the impossibility of knowing’ and a state
of ‘systematic ignorance’ (Methmann and Rothe, 2012: 330). In this light, all cyber war prophecies
begin to sound hysterical when they portend cataclysms with a tenuous claim on the existential. We
might accuse speculative futurism of hype or exaggeration—in marketing jargon, the promotion of
fear, uncertainty and doubt (FUD)—but we should also accept that ignoring these warnings is
fraught with its own risks (Hansen and Nissenbaum, 2009: 1164). If cyber war does have the
undesirable qualities attributed to it, we should perhaps hope it ‘remains science fiction for a while
longer’ (Cavelty, 2010: 139). However, the final, destructive event that wakes the state from its
somnambular inattention to reality is constantly deferred: it is inevitable but always imminent. To
play, as so many others have done before, upon the title of Arquilla and Ronfeldt’s original article:
cyber war is always coming!
References
Aho JA (1997) The apocalypse of modernity. In Robbins T and Palmer SJ (eds) Millennium, Messiahs,
and Mayhem: Contemporary Apocalyptic Movements. New York: Routledge, 61-72.
Aradau C and van Munster R (2011) Politics of Catastrophe: Genealogies of the Unknown. London:
Routledge.
Arquilla J (2011) The computer mouse that roared: Cyberwar in the twenty-first century. Brown
Journal of World Affairs 18(1): 39-48.
Arquilla J and Ronfeldt D (1993) Cyberwar is coming! Comparative Strategy 12(2): 141-165.
19
Bakhtin M (1981) Forms of time and of the chronotope in the novel: Notes towards an historical
poetics. In: Holquist M (ed) The Dialogic Imagination: Four Essays by MM Bakhtin. Austin, TX:
University of Texas Press, 84-258.
Barnard-Wills D and Ashenden D (2012) Securing virtual space: cyber war, cyber terror, and risk.
Space and Culture 15(2): 110-123.
BBC News (2013) US Cyber Command in ‘fivefold’ staff expansion, 28 January,
http://www.bbc.co.uk/news/world-us-canada-21235256.
Beissinger MR (2002) Nationalist Mobilization and the Collapse of the Soviet State. Cambridge:
Cambridge University Press.
Bendrath R (2001) The cyberwar debate: Perception and politics in US critical infrastructure
protection. Information and Security 7: 80-103.
Betz DJ (2012) Cyberpower in strategic affairs: Neither unthinkable nor blessed. Journal of Strategic
Studies 35(5): 689-711.
Betz DJ and Stevens T (2011) Cyberspace and the State: Toward a Strategy for Cyber-Power. London:
Routledge for the International Institute for Strategic Studies.
Bharara P (2012) Asleep at the laptop. The New York Times, 4 June.
Bliss J (2010) US unprepared for ‘cyber war’, former top spy official says. Bloomberg Businessweek,
23 February.
Bobbitt P (2008) Terror and Consent: The Wars for the Twenty-First Century. London: Penguin.
Bousquet A (2006) Time Zero: Hiroshima, September 11 and apocalyptic revelations in historical
consciousness. Millennium: Journal of International Studies 34(3): 739-764.
Bozeman JM (1997) Technological millennialism in the United States. In: Robbins T and Palmer SJ
(eds) Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic Movements. New York:
Routledge, 139-158.
Brenner SW (2009) Cyberthreats: The Emerging Fault Lines of the Nation State. New York: Oxford
University Press.
20
Bromley DG (1997) Constructing apocalypticism: Social and cultural elements of radical organization.
In: Robbins T and Palmer SJ (eds) Millennium, Messiahs, and Mayhem: Contemporary
Apocalyptic Movements. New York: Routledge, 32-45.
Buzan B and Hansen L (2009) The Evolution of International Security Studies. Cambridge: Cambridge
University Press.
Carr M (2010) Slouching towards dystopia: The new military futurism. Race and Class 51(3): 13-32.
Cavelty MD (2008) Cyber-Security and Threat Politics: US Efforts to Secure the Information Age.
London: Routledge.
Cavelty MD (2010) Cyberwar. In: Kassimeris G and Buckley J (eds) The Ashgate Research Companion
to Modern Warfare. Farnham: Ashgate, 123-144.
Cavelty MD (2013) From cyber-bombs to political fallout: Threat representations with an impact in
the cyber-security discourse. International Studies Review 15(1): 105-122.
Cebrowski AK (1998) Forum. Issues in Science and Technology 15(2): n.p.
Ceruzzi PE (2003) A History of Modern Computing. Cambridge, MA: The MIT Press.
Chernus I (1982) Mythologies of nuclear war. Journal of the American Academy of Religion 50(2):
255-273.
Clarke RA and Knake RK (2010) Cyber War: The Next Threat to National Security and What to Do
About It. New York: Ecco.
Cohen T and Lubell M (2012) Nations must talk to halt ‘cyber terrorism’—Kaspersky. Reuters, 6 June.
Cook ML (2004) Christian apocalypticism and weapons of mass destruction. In: Hashmi SH and Lee
SP (eds) Ethics and Weapons of Mass Destruction: Religious and Secular Perspectives.
Cambridge: Cambridge University Press, 200-210.
Crosthwaite P (2011) The accident of finance. In: Armitage J (ed) Virilio Now: Current Perspectives in
Virilio Studies. Cambridge: Polity, 177-199.
Dawson A (2013) Apocalypse now. American Book Review 34(2): 3.
21
Deibert RJ (2012) The growing dark side of cyberspace (…and what to do about it). Penn State
Journal of Law and International Affairs 1(2): 260-274.
Deibert RJ, Rohozinski R and Crete-Nishihata M (2012) Cyclones in cyberspace: Information shaping
and denial in the 2008 Russia-Georgia war. Security Dialogue 43(1): 3-24.
DeLashmutt MW (2006) A better life through information technology? The techno-theological
eschatology of posthuman speculative science. Zygon: Journal of Religion and Science 41(2): 267-
288.
Der Derian J (2009) Cyberwar, video games, and the Gulf War syndrome. In: Der Derian J, Critical
Practices in International Theory: Selected Essays. London: Routledge, 120-136.
Dillon M (1996) Politics of Security: Towards a Political Philosophy of Continental Thought. London:
Routledge.
Dillon M (2011) Specters of Biopolitics: Finitude, eschaton, and katechon. South Atlantic Quarterly
110(3): 780-792.
Doctorow C and Stross C (2012) The Rapture of the Nerds. New York: Tor Books.
Dodge M and Kitchin R (2004) Charting movement: Mapping internet infrastructure. In: Hanley RE
(ed) Moving People, Goods, and Information in the 21st Century: The Cutting-Edge
Infrastructures of Networked Cities. New York: Routledge, 159-185.
Feaver PD (1998) Blowback: Information warfare and the dynamics of coercion. Security Studies 7(4):
88-120.
Fukuyama F (1992) The End of History and the Last Man. New York: The Free Press.
Gable KA (2010) Cyber-apocalypse now: Securing the internet against cyberterrorism and using
universal jurisdiction as a deterrent. Vanderbilt Journal of Transnational Law 43(1): 57-118.
Geers K (2009) The cyber threat to national critical infrastructures: Beyond theory. Information
Security Journal: A Global Perspective 18(1): 1-7.
Glenny M (2010) The countdown to cybergeddon. Financial Times, 24 May,
Glenny M (2011) Virtual warfare in race to avoid ‘doomsday’. The Guardian, 17 May.
22
Goldsmith J and Hathaway M (2010) The cybersecurity changes we need. The Washington Post, 29
May.
Goodman SE, Kirk JC and Kirk MH (2007) Cyberspace as a medium for terrorists. Technological
Forecasting and Social Change 74(2): 193-210.
Gray J (2007) Black Mass: Apocalyptic Religion and the Death of Utopia. London: Allen Lane.
Gregory DU (1989) The dictator’s furnace. Peace Review: A Journal of Social Justice 1(1): 12-16.
Gross MJ (2011) A declaration of cyber-war. Vanity Fair, April.
Grusin R (2010) Premediation: Affect and Mediality after 9/11. Basingstoke: Palgrave Macmillan.
Guitton C (2013) Cyber insecurity as a national threat: Overreaction from Germany, France and the
UK? European Security 22(1): 21-35.
Han-Pile B (2010) The ‘death of man’: Foucault and anti-humanism. In: O’Leary T and Falzon C (eds)
Foucault and Philosophy. Chichester: Wiley-Blackwell, 118-142.
Hansen L and Nissenbaum H (2009) Digital disaster, cyber security, and the Copenhagen School.
International Studies Quarterly 53(4): 1155-1175.
Herrera-Flanigan J (2013) As cyber events pile up, so do the stakes. Cybersecurity Report, 20
February, http://www.nextgov.com/cybersecurity/cybersecurity-report/2013/02/cyber-events-
pile-so-do-stakes/61411/.
Hopkins N (2011) UK developing cyber-weapons programme to counter cyber war threat. The
Guardian, 31 May.
Hoskins A and O’Loughlin B (2010) War and Media: The Emergence of Diffused War. Cambridge:
Polity Press.
Hughes JJ (2012) The politics of transhumanism and the techno-millennial imagination, 1626-2030.
Zygon: Journal of Religion and Science 47(4): 757-776.
Hutchings K (2008) Time in World Politics: Thinking the Present. Manchester: Manchester University
Press.
23
Jackson R (2005) Writing the War on Terrorism: Language, Politics and Counter-Terrorism.
Manchester: Manchester University Press.
Jagoda P (2012) Speculative security. In: Reveron DS (ed) Cyberspace and National Security: Threats,
Opportunities, and Power in a Virtual World. Washington, DC: Georgetown University Press, 21-
35.
Kaczynski T (1995) Industrial Society and Its Future. Self-published.
Karatzogianni A (ed) (2009) Cyber Conflict and Global Politics. London: Routledge.
Kelly K (2010) What Technology Wants. New York: Viking.
Klinke I (2013) Chronopolitics: A conceptual matrix. Progress in Human Geography (forthcoming).
Lawson S (2012) Putting the ‘war’ in cyberwar: Metaphor, analogy, and cybersecurity discourse in
the United States. First Monday 17(7),
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3848/3270.
Lawson S (2013) Beyond cyber-doom: Assessing the limits of hypothetical scenarios in the framing of
cyber-threats. Journal of Information Technology and Politics 10(1): 86-103.
Levi P and Di Caro R (2001) The essential and the superfluous. In: Belpoliti M and Gordon R (eds) The
Voice of Memory—Primo Levi: Interviews, 1961-1987. New York: The New Press, 167-175.
Lewis J (2012) Global Media Apocalypse: Pleasure, Violence and the Cultural Imaginings of Doom.
Basingstoke: Palgrave Macmillan.
Lewis JA (2005) Aux armes, Citoyens: Cyber security and regulation in the United States.
Telecommunications Policy 29(11): 821-830.
Little RG (2002) Controlling cascading failure: Understanding the vulnerabilities of interconnected
infrastructures. Journal of Urban Technology 9(1): 109-123.
McConnell JM (2010) To win the cyber-war, look to the Cold War. The Washington Post, 28 February.
McLaren P (2002) George Bush, apocalypse sometime soon, and the American imperium. Cultural
Studies—Critical Methodologies 2(3): 327-333.
24
Maier CS (1987) The politics of time: Changing paradigms of collective time and private time in the
modern era. In: Maier CS (ed) Changing Boundaries of the Political: Essays on the Evolving
Balance between the State and Society, Public and Private in Europe. Cambridge: Cambridge
University Press, 151-175.
Methmann C and Rothe D (2012) Politics for the day after tomorrow: The logic of apocalypse in
global climate politics. Security Dialogue 43(4): 323-344.
Neumann PR and Smith MLR (2005) Strategic terrorism: The framework and its fallacies. Journal of
Strategic Studies 28(4): 571-595.
Nietzsche F (2001) The Gay Science. Cambridge: Cambridge University Press.
Nowotny H (1994) Time: The Modern and Postmodern Experience. Cambridge: Polity Press.
Overy R (2009) The Morbid Age: Britain Between the Wars. London: Allen Lane.
Perrow C (1999) Normal Accidents: Living with High-Risk Technologies. Princeton, NJ: Princeton
University Press.
Plotnick R (2012) Predicting push-button warfare: US print media and conflict from a distance, 1945-
2010. Media, Culture and Society 34(6): 655-672.
Rathmell A (2003) Controlling computer network operations. Studies in Conflict and Terrorism 26(3):
215-232.
Rid T (2012) Cyber war will not take place. Journal of Strategic Studies 35(1): 5-32.
Rid T (2013a) Cyber War Will Not Take Place. London: Hurst.
Rid T (2013b) More attacks, less violence. Journal of Strategic Studies 36(1): 139-142.
Rittel HWJ and Webber MM (1973) Dilemmas in a general theory of planning. Policy Sciences 4(2):
155-169.
Robbins T and Palmer SJ (1997) Patterns of contemporary apocalypticism in North America. In:
Robbins T and Palmer SJ (eds) Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic
Movements. New York: Routledge, 1-27.
Rudd K (2011) Just a mouse click away from war. The Daily Telegraph (Australia), 19 September.
25
Schell B and Martin C (2006) Webster’s New World Hacker Dictionary. Indianapolis, IN: Wiley
Publishing, Inc.
Schmidt HA (2006) Patrolling Cyberspace: Lessons Learned from a Lifetime in Data Security. North
Potomac, MD: Larstan Publishing, Inc.
Silomon JAM and Overill RE (2012) Cybersecurity’s can of worms. Journal of Information Warfare
11(1): 12-21.
Slack JD (1984) The information revolution as ideology. Media, Culture and Society 6(3): 247-256.
Stone J (2012) Cyber war will take place! Journal of Strategic Studies 36(1): 101-108.
Strong RA (2005) Decisions and Dilemmas: Case Studies in Presidential Foreign Policy Making Since
1945. Armonk, NY: ME Sharpe, Inc.
Swyngedouw E (2010) Apocalypse forever? Post-political populism and the spectre of climate
change. Theory, Culture and Society 27(2-3): 213-232.
Swyngedouw E (2013) Apocalypse now! Fear and doomsday pleasures. Capitalism Nature Socialism
24(1): 9-18.
Tapia AH (2003) Technomillennialism: A subcultural response to the technological threat of Y2K.
Science, Technology, and Human Values 28(4): 483-512.
The Economist (2012) Hype and fear. 8 December.
Virilio P (1997) Open Sky. London: Verso.
Virilio P (2000) Strategy of Deception. London: Verso.
Virilio P (2005) Desert Screen. London: Continuum.
Virilio P (2007) The Original Accident. Cambridge: Polity.
Virilio P and Der Derian J (1998) ‘Is the author dead?’—An interview with Paul Virilio. In: Der Derian J
(ed) The Virilio Reader. Malden, MA: Blackwell Publishers, 16-21.
Virilio P, Courtois G and Guerrin M (2008) Le krach actuel représente l’accident integral par
excellence. Le Monde, 18 October.
26
Walker RBJ (1997) The subject of security. In: Krause K and Williams MC (eds) Critical Security
Studies: Concepts and Cases. London: Routledge, 61-81.
Waller D (1995) Onward cyber soldiers. Time, 21 August, 39-46.
Warner M (2012) Cybersecurity: A pre-history. Intelligence and National Security 27(5): 781-799.
Webster F and Robins K (1986) Information Technology: A Luddite Analysis. Norwood, NJ: Ablex
Publishing Corporation.
Weinberg GL (1994) A World at Arms: A Global History of World War II. Cambridge: Cambridge
University Press.
Wells HG (1913) The Discovery of the Future. New York: BW Huebsch.
Wessinger C (1997) Millennialism with and without the mayhem. In: Robbins T and Palmer SJ (eds)
Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic Movements. New York:
Routledge, 47-59.
Winner L (1977) Autonomous Technology: Technics-Out-of-Control as a Theme in Political Thought.
Cambridge, MA: MIT Press.
Wojcik D (1997) The End of the World as We Know It: Faith, Fatalism, and Apocalypse in America.
New York: New York University Press.
Woodcock G (1977) The tyranny of the clock. In: Woodcock G (ed) The Anarchist Reader. Hassocks:
Harvester Press, 132-136.