 Strategic Cybersecurity Module 7, Cyber Conflict and the Westphalian System. Once you have completed the readings, lecture, activity and assessment, you will be able to articulate how democratic and authoritarian governments generally differ in their interpretation of internet freedom. Articulate how the internet has created tensions within the Westphalian System. In this module, we will focus on cyber conflict in the Westphalian System. If you have not yet completed the readings for this module, please do so before listening to this module. Rosenzweig noted in the readings for this module that non-state actors in cyberspace have begun a challenge to the hegemony of nation states that have been the foundations for international relations since the peace of Westphalia. Though this course does not focus on international relations theory, understanding Rosenzweig's point helps to clarify how the internet affects international relations. The Treaty of Westphalia, signed in 1648, marked the end of the Thirty Years' War, which has been estimated to have killed nearly 30% of the German population. One of the chief causes of the war was the issue of religious autonomy within European principalities, and many consider this war to be the last major European war of religion. To prevent another such devastating war in Europe, the treaty's signatories agreed to a principle that whoever rules the territory determines the religion. The treaty was a turning point as it helped to create our modern system of state sovereignty. It effectively cemented the territorial integrity and legal equality of all nation states, and prohibited the interference of one state into the internal affairs of another. You may be wondering how the Treaty of Westphalia connects with the topic of this course, cybersecurity. Consider this, the internet was designed for information to be free-flowing, that is, to cross national boundaries without any consideration to ideology or political organization of a state. John Perry Barlow, a founder of the Electronic Frontier Foundation, captured this idea in the 1996 paper, A Declaration of the Independence of Cyberspace. He states in part, governments of the industrial world, you have no sovereignty where we gather. Cyberspace does not lie within your borders. As internet technology spread around the globe, authoritarian countries like China and Russia grudgingly accepted this concept, but quickly realized that the free-flow of information could have negative consequences for their government's survival. Eventually, many authoritarian governments protested the internet's open design, citing their right to sovereignty that the Treaty of Westphalia had established. They argued that they had a right to control and filter information crossing their borders. Many governments have also discovered a military domain to cyberspace and are devoting enormous resources to leverage it offensively. Catherine Maher of the Truman Project noted in an article in the magazine, Foreign Policy, cyberspace is no longer the independent space of the cyber libertarians. It is now a military domain and when a free-wheeling place like the internet militarizes, the internet's laissez-faire culture of privacy, anonymity, and free expression inevitably comes into conflict with military priorities of security and protocol. In other words, the internet has given us incredible access to information around the world, but it has also created a new domain of warfare. Returning to Rosenweig's point, in addition to potential problems posed to the sovereignty of certain authoritarian governments, the internet has given sub-state actors, such as criminal or terrorist groups, an outsized capability to affect legitimate nation-states operating within the Westphalian system of sovereignty. How should the United States respond if a group like al-Qaeda or ISIS attacks portions of the U.S. electrical grid? Rosenweig's point is that previously, the Westphalian system has treated warfare as something that takes place between two sovereign states. It is not designed to deal with sub-state actors like al-Qaeda. As sub-state groups continue to acquire offensive cyber capabilities that enable them to influence state actors, the international community must evolve and create policies and doctrines to mitigate their threats. Quiz question one, true or false? The Westphalian system of state sovereignty provides clear guidelines for which countries should operate in the information age. The answer is false. Quiz question two, true or false? Democratic and authoritarian governments essentially interpret the concept of internet freedom in the same way. The answer is false. The activity for this module asks that you consider how authoritarian governments use the digital footprints left by their own citizens to gather information about their political activities. Reflect on your own concerns of your digital footprint. How pervasive on the internet is your personal information. Use two or three search engines to search your name, phone number and past addresses. Are you surprised how much personal information you found on the internet? How did this information get there? If you are uncomfortable with the amount of information you found, check your privacy settings on your social media accounts and research ways to minimize your internet presence.