Cover Page

Rewired

Cybersecurity Governance


Edited by



Ryan Ellis
Vivek Mohan







No alt text required.

Notes on Contributors

Samantha A. Adams was a political scientist with additional background in gender studies and STS. She was Associate Professor of eHealth Governance and Regulation at the Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University. She worked on medical informatics, medical sociology, qualitative research methods, and external cyberattacks on health systems.

Jason Blackstock is Associate Professor of Science and Global Affairs at University College London (UCL) and cofounder of UCL Department of Science, Technology, Engineering and Public Policy (STEaPP) which he led as Head of Department from 2013 to 2018. He has a unique background spanning quantum physics research, Silicon Valley technology development, international public policy, and higher education innovation and leadership.

Irina Brass is Lecturer in Regulation, Innovation and Public Policy and Deputy Lead of the MPA Programme in Digital Technologies and Public Policy at University College London (UCL) Department of Science, Technology, Engineering and Public Policy (STEaPP). Her research focuses on the regulation of disruptive technologies, especially digital technologies. She is working closely with policymakers and standards development communities.

Madeline Carr is Associate Professor of International Relations and Cyber Security at University College London (UCL) Department of Science, Technology, Engineering and Public Policy (STEaPP) and Director of its Digital Policy Lab. She has a strong interest in the international policy challenges posed by cybersecurity and is coinvestigator for Standards, Policy and Governance Stream of the PETRAS IoT Research Hub.

Jim Dempsey is Executive Director of the Berkeley Center for Law & Technology. From 1997 to 2014, he was at the Center for Democracy & Technology, including as Executive Director. He served as a Senate‐confirmed Member of the Privacy and Civil Liberties Oversight Board from 2012 to January 2017. He is coauthor (with David Cole) of Terrorism & the Constitution (New Press 2006) and coeditor (with Fred Cate) of Bulk Collection: Systematic Government Access to Private‐Sector Data (Oxford 2017).

Karine e Silva LL.M. is PhD candidate at TILT, Tilburg University on the NWO‐funded BotLeg project. Her research interest is in botnets since the launch of the EU Advanced Cyber Defense Centre (ACDC) in early 2013. Her research involves legal issues surrounding botnet mitigation and the role of public and private sectors.

Jacqueline Eggenschwiler is a doctoral researcher at the University of Oxford. Her research interests include cybersecurity governance and norm‐construction. She holds degrees in International Affairs and Governance, International Management, and Human Rights from the University of St Gallen and the London School of Economics and Political Science.

Amit Elazari Bar On is a Doctoral Law Candidate at UC Berkeley School of Law and a Berkeley Center for Long‐Term Cybersecurity Grantee, as well as a Lecturer at Berkeley's School of Information Master in Cybersecurity Program. She graduated Summa Cum Laude three prior degrees in law and business (B.A., LL.B., LL.M.). Her research in the field of technology law and policy has been published and featured in leading journals and conferences, as well as popular press.

Ryan Ellis is an Assistant Professor of Communication Studies at Northeastern University. His research and teaching focuses on topics related to communication law and policy, infrastructure politics, and cybersecurity. He is the author of the upcoming Letters, Power Lines, and Other Dangerous Things: The Politics of Infrastructure Security (MIT Press).

Miles Elsden spent his early academic career in Europe and the next 10 years providing advice to the UK government most recently as Chief Scientist in Transport. He now works as a consultant at the boundary between policy, technology, and strategy.

Trey Herr is a visiting fellow with the Hoover Institution at Stanford University working on international cybersecurity and risk. His research focuses on the role of nonstate actors in cybersecurity governance, the proliferation of malware, and the evolving character of risk in cyber insurance. He is also a senior security strategist with Microsoft where he handles cloud‐computing security and supply‐chain risk for the Global Security Strategy and Diplomacy team.

Jonah Force Hill is Senior Cyber Policy Advisor at the U.S. Secret Service, where he advises on a range of cybercrime policy and strategy matters. He is also a (non‐resident) Cybersecurity Fellow at New America and a Term Member at the Council on Foreign Relations. He came to the Secret Service after several years at the U.S. Commerce Department, where he focused on global digital economy policy. He holds an MTS and MPP from Harvard University and a BA from UCLA.

Bert‐Jaap Koops is Professor of Regulation & Technology at the Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University. His main research interests are cybercrime, cyber‐investigation, privacy, and data protection. He is also interested in DNA forensics, identity, digital constitutional rights, techno‐regulation, and regulation of human enhancement, genetics, robotics, and neuroscience.

Andreas Kuehn is a Senior Program Associate within the EastWest Institute's Global Cooperation in Cyberspace program. As a Cybersecurity Fellow, Dr. Kuehn conducted research on cybersecurity policy, vulnerability markets and disclosure arrangements at Stanford University's Center for International Security and Cooperation and was an adjunct researcher at the RAND Corporation, where he worked on cyber risk and the cyber insurance industry.

Aaron Martin is a Postdoctoral Research Fellow at the Tilburg Law School in the Netherlands. He was previously a Vice President of Cyber Policy at JPMorgan Chase in New York (2015–2018). He is also an Oxford Martin Associate at the University of Oxford's Global Cyber Security Capacity Centre.

Vivek Mohan is an attorney in private practice based in Northern California. Vivek entered private practice from the Privacy, Data Security, and Information Law group at Sidley Austin LLP, where he counseled clients in the technology, telecommunications, healthcare, and financial services sectors. Vivek is the coeditor and author of the PLI treatise “Cybersecurity: A Practical Guide to the Law of Cyber Risk” (3d. 2018). Vivek has worked as an attorney at Microsoft, at the Internet Bureau of the New York State Attorney General (under a special appointment), and at General Electric's corporate headquarters (on secondment). For five years, Vivek was a resident fellow and later a nonresident associate with the Cybersecurity Project at the Harvard Kennedy School. Vivek holds a JD from Columbia Law School and a BA from the University of California, Berkeley.

Matthew Noyes is the cyber policy & strategy director for the U.S. Secret Service and a Major in the U.S. Army assigned to the Office of Secretary of Defense for Cyber Policy. His work focuses on law enforcement efforts to counter transnational cyber crime and related policy topics. Matt holds a Mater in Public Policy from the Harvard Kennedy School and a BS in Computer Science and Applied Computational Mathematics from the University of Washington.

[Emilian Papadopoulos is president of Good Harbor, a boutique consultancy advising Boards, CEOs, and government leaders on cyber security. He is an adjunct lecturer at Georgetown University and previously worked for the Government of Canada in Ottawa and Washington. He is a graduate of the University of Toronto and of Harvard University’s Kennedy School, where he also serves as the elected chair of the global Alumni Board.

Valeria San Juan is an Analyst at Fundbox in San Francisco, CA. She was previously a Cyber Policy Analyst at JPMorgan Chase in New York (2017).

Elaine Sedenberg is a PhD Candidate at the UC Berkeley School of Information and Affiliate at the Harvard Berkman Klein Center. She previously served as the codirector of the Center for Technology, Society & Policy (CTSP). Her research examines information‐sharing arrangements for public good uses including security, public health, and research activities.

James Shires is a Research Fellow with the Cybersecurity Project at the Belfer Center for Science and International Affairs, Harvard Kennedy School. His research focuses on cybersecurity issues in the Middle East.

Evan Sills is a Director with Good Harbor, where he advises corporate executives on governance, risk management, cybersecurity incident response, and legislative and regulatory activities. He was a Global Governance Futures 2027 Fellow and is a graduate of The George Washington University Law School and Elliott School of International Affairs.

Leonie Maria Tanczer is Lecturer in International Security and Emerging Technologies at UCL’s Department of Science, Technology, Engineering and Public Policy (STEaPP). She is member of the Advisory Council of the Open Rights Group, affiliated with UCL’s Academic Centre of Excellence in Cyber Security Research, and former Fellow at the Alexander von Humboldt Institute for Internet and Society in Berlin. She is interested in the intersection points of technology, security, and gender.

Michael Thornton is a PhD candidate in History and Philosophy of Science at the University of Cambridge. He uses the philosophy of public health to reframe how we think about digital networks and information. Before Cambridge, Michael was a Director of Product Management at Truaxis, a MasterCard company.

Bart van der Sloot specializes in questions revolving around privacy and Big Data. He works as a senior researcher at TILT, Tilburg University, is General Editor of the European Data Protection Law Review, coordinator of the Amsterdam Platform for Privacy Research, and scientific director of the Privacy and Identity Lab.

Acknowledgments

The idea for this book started when we sat at adjoining desks inside the same office at the Harvard Kennedy School; the book was finished many years later while we sit over three thousand miles apart. Along the way a number of individuals and institutions helped make this book possible. First and foremost, Venkatesh (Venky) Narayanamurti served as our academic mentor during our time at the Harvard Kennedy School's Belfer Center for Science and International Affairs. Venky provided unfailing support and encouragement to us when we were new fellows at the Belfer Center and has remained a generous supporter in the succeeding years. Simply put, without Venky this book would not exist. We owe him a significant debt. A number of other faculty members and colleagues at Harvard were instrumental in shaping our thinking about the topics covered in the pages that follow. Joe Nye warmly welcomed us into his cyber seminar series and offered us both the opportunity to hear from a number of policy and academic heavyweights and, perhaps most importantly, catch his sharp and probing questions. Jim Waldo provided an invaluable perspective – what a technologist thinks about policy – and offered enough wisdom to fill at least another book. Michael Sulmeyer encouraged this project and kindly kept us engaged with the Center as its interest in cyber policy continues to grow and thrive. Colleagues associated with the joint MIT and Harvard project, “Explorations in Cyber International Relations,” including Nazli Choucri and Michael Siegel, provided important insight. Early‐stage preparatory work on this volume was funded, in part, by the Office of Naval Research under award number N00014‐09‐1‐0597. Any opinions, findings, and conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of the Office of Naval Research.

Emily Silk Marie provided expert editorial assistance in preparing the draft manuscript. At Wiley, Beryl Mesiadhas, Michael Leventhal, and Bob Esposito offered patience and care in assembling the volume.

Ryan would also like to thank his current colleagues at Northeastern University's Department of Communication Studies, the Global Resilience Institute, and the School for Public Policy and Urban Affairs. Northeastern has provided a creative and supportive intellectual environment. Previous colleagues at the Naval Postgraduate School and Stanford's Center for International Security and Affairs also helped lay the seeds for this project. Additionally, staff support at the Belfer Center and Northeastern's Communication Department was vital. Karin Vander Schaaf, Patricia McLaughlin, Sarah Donahue, and Angela Chin assisted with issues both big and small during the preparation of the book. Their efforts were instrumental in making this book a reality. Ryan thanks his family for their love and encouragement.

Vivek would like to thank Jack Goldsmith of Harvard Law School, whose encouragement and mentorship over the years provided needed focus; and spurred the curiosity and passion to explore both the practice and the learning of the law. Alan Raul and Ed McNicholas of Sidley Austin LLP, and through their introduction, Peter Lefkowitz and Jane Horvath, for teaching Vivek the law, and how to practice it; and to all of the above for their continued friendship. Of course, Vivek would like to thank his infinitely patient wife Ariana, who has provided loving support and has acted as a sounding board for many of editorial comments and perspectives contained herein.

Finally, we would like to dedicate this book to one of the contributing authors – Samantha Adams. Samantha tragically passed away during the production of this book. The chapter included here is one of her last pieces of finished work.

Introduction

I.1 Making Sense of Cybersecurity Governance

On 23 September 1982, Representative Don Edwards, a longtime member of the United States House of Representatives, presided over a congressional hearing to consider a new type of crime – “computer‐related crime.” Edwards set the scene:

As the use of computers expands in our society, the opportunity to use computers to engage in or assist in criminal activities also expands. In response to this perceived problem, a number of States has enacted legislation specifically aimed at computer fraud. The Federal Bureau of Investigation offers its agents specialized training in computer fraud. Private industry is attempting to enhance the security of its computer facilities.1

Edwards' statement would, with slight tweaking here and there, more or less be repeated like boilerplate for the better part of the next three‐and‐a‐half decades. Repeatedly, various policymakers sitting in subcommittee meetings, policy forums, and other public venues would note that computers were increasingly ubiquitous and that their diffusion was, among other things, leading to new types of harm that call for new types of solutions. At times, the claimed harms were speculative or theoretical; equally often, the calls for solutions followed publicized incidents that increasingly resonated in the public consciousness.

A little over 15 years after Edwards introduced the hearing on computer‐related crime, US Senator Fred Thompson introduced a similar hearing to examine the public risks presented by weak computer security. Thompson could have been reading from Edwards' prepared remarks. He noted that, “[c]omputers are changing our lives faster than any other invention in our history. Our society is becoming increasingly dependent on information technologies that which are changing at an amazing rate.”2 Thompson would go on to note that these trends create new vulnerabilities that we must now confront.

In time, the lexicon slid into the expansive and ill‐defined catch‐all of “cybersecurity,” a term initially loathed by technical experts but embraced with such vigor within policy‐circles that it appears to be here to stay. “Cybersecurity” issues are repeatedly framed as an eternally new problem – something that is just peaking over the horizon that must be confronted now. This framing is attractive: it captures the sense that new technologies create new problems and dilemmas; and it freights the problem with a sense of urgency – we must act now before it is too late. This frenetic energy – which has escalated to a fever pitch over the last decade and shows no sign of abating – imbues discussants with cause and reason to reject incrementalism. At times, this provides the necessary fora to be receptive to novel or transformative ideas.

But this presentation obscures as much as it illuminates. Presenting cybersecurity as a fundamentally new and unaddressed problem elides the long history of security interventions. It shoves to the side the lattice of institutions – laws, organizational practices, and formal and informal rules – that have been built over time to address the myriad challenges associated with the rise of networked computers. Some of these practices have been useful, others have been hopeless dead‐ends. But, ignoring them and assuming that we are confronting a new problem and need to invent a new set of tools and approaches ignores the stubborn reality: we have been confronting these challenges in various forms for decades.

Cyberspace is not an ungoverned space outside of laws, institutions, and power. As Joe Nye, Laura DeNardis, Jack Goldsmith, Tim Wu, and others have usefully pointed out, there is a rich thicket of organizations and institutions that provide structure, shape, and limits in cyberspace.3 There are vital and enduring analogs between the cyber and physical domains.4 The world of digital devices and networks is dotted with points of control.5 This insight is equally useful when it comes to examining the narrower question of cybersecurity governance. The security space is not a free‐for‐all. Far from it. It is a space defined by competing organizations and institutions that seek to impose some form of control in the name of security. What exactly is meant by security is always an open and contested question. In some settings it might mean the protection of devices, data, or networks; in others, security might be translated into control of forms of speech or expression that are seen as politically unpalatable; in still other arenas, security might mean protection from non‐state actors, but say little about governmental efforts to subvert technical protections over personal data. Questions about cybersecurity – just like questions about security in a broader sense – are always open to multiple interpretations. Two questions always hang in the air either explicitly or implicitly: Security of what? And security from whom?

This collection looks to make sense of the governance of cybersecurity. It explores through various case studies some of the competing organizational efforts and institutions that are attempting to secure cyberspace. The book looks not to the future – to hypothetical new possibilities to confront a new set of previously unknown problems – but to the recent past and the present. It examines some of the in‐place and unfolding institutional and organizational efforts to confront the challenges of cybersecurity. Rather than examining these efforts through a purely narrow normative lens – does it work? – it considers the broader implications of these efforts. It traces how different notions of cybersecurity are deployed and built into stable routines and practices, what can be termed the “bureaucratization of risk.” In doing so, the chapters collected here share a set of common interest: how are fears over cyber‐insecurity being distilled into organizational efforts and institutional frameworks? Importantly, what are the larger implications – for workers, firms, the public, and competing sets of values – of these organizational practices and frameworks? Security is, and has long been, a key axis upon which decisions about communications technologies and networks sit. Looking closely at these efforts as forms of governance – efforts to control and manage something seen as unruly – helps draw into clear relief what is at stake: Cybersecurity efforts are (and have been for quite some time) remaking the digital technologies that are the foundations of contemporary life. Examining more closely the various efforts documented in the chapters that follow offers a partial portrait at some of the ways that these efforts are unfolding and what we are gaining and losing in the process.

In the pages that follow, readers are encouraged to consider the deep engagement of various communities working to define and respond to cybersecurity issues. At the same time, readers may consider the impact and import of the siloed verticals that define many of the case studies. As the number of cybersecurity professionals continues to grow at exponential rates, the risk of failing to learn from not only our recent past, but what is happening right beside us, becomes ever more evident. That is not to say that these silos must in each case be broken down – while enterprising readers may be able to stitch together their own “Grand Unified Field Theorem” for cybersecurity policy, the editors are hopeful (and view it as perhaps far more likely) that these deep dives present useful lenses into different policy, legal, and technical approaches to various facets of the “cybersecurity problem.” The case studies intentionally take different approaches in their commentary, but three shared thematic threads run through the book.

I.2 Connective Tissue: Common Themes

I.2.1 Cybersecurity is Contextual

Cybersecurity does not exist in a vacuum. It is always contextual. Cybersecurity efforts are rooted in the specifics of time and place. These efforts are molded by the preexisting outlines of political organizations and institutions, industrial ecosystems, and larger regional and international political rivalries and alliances. To understand how certain issues are framed as cybersecurity challenges and how certain approaches to these challenges are developed and deployed, it is important to ground these efforts within these larger contexts. Elaine Sedenberg and Jim Dempsey's “Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Trade‐offs” (Chapter 1) offers a sober account of what happens when context is ignored. In their analysis of cybersecurity information sharing efforts and the Cybersecurity Information Sharing Act of 2015 (CISA), Sedenberg and Dempsey argue that policy lacking historical memory is doomed to fail. CISA was an ambitious attempt to kick‐start new information sharing efforts. But, it ignored the institutional labyrinth and information‐sharing mechanisms that already existed. Information sharing is much more than a technical problem. As the chapter notes, the failure to account for this broader context limits the efficacy of CISA.

In “Cybersecurity Governance in the GCC” (Chapter 2), James Shires offers a detailed account of cybersecurity in the six states of the Gulf Cooperation Council (GCC). Shires illustrates how national and regional politics shape cybersecurity governance. In drawing an overview of regional incidents, key government organizations and cybersecurity firms, and relevant strategies, laws, and standards, the chapter makes the case that cybersecurity is regionally specific. The contours of cybersecurity are influenced by larger circulating cultural notions and pressures, but national and regional politics plays a decisive role in shaping how cybersecurity is both understood and confronted. Shires work serves as a call for regional and national specialization. This call is ably answered by Leonie Maria Tanczer, Irina Brass, Miles Elsden, Madeline Carr, and Jason Blackstock in “The United Kingdom's Emerging Internet of Things (IoT) Policy Landscape” (Chapter 3). Tanczer and coauthors explore how the United Kingdom is confronting the security challenges of IoT, a sea change in the deployment of sensors and connected technologies that emerged quickly and largely with little regulatory guidance. They explore how UK IoT efforts are linked to and defined by a dense institutional landscape. They offer a tantalizing note: as the United Kingdom prepares to exit the European Union, it is unclear how this political realignment will upset existing cybersecurity efforts.

Understanding the relationship between context and cybersecurity is not only a matter of mapping existing political institutions. Emilian Papadopoulos and Evan Sills' “Birds of a Feather: Strategies for Collective Cybersecurity in the Aviation Ecosystem” (Chapter 4) examines the interplay between industrial ecology and cybersecurity. Focusing on cybersecurity and aviation, they observe a complex industry that includes thousands of organizations, from global giants, such as Lufthansa and United Airlines, to smaller or more obscure players, such as regional airports, the manufacturers of In‐Flight Entertainment systems, and luggage management organizations. This knot of organizations creates shared cybersecurity risks, collective risks that cannot be adequately addressed by a single firm or organization. Papadopoulos and Sills discover that the unique nature of the aviation industry is leading to new collective approaches to risk management. Their insights offer a useful reminder: cybersecurity cannot be stripped from a larger political, economic, and organization context. For both practitioners looking to develop workable policies and scholars examining cybersecurity critically, focusing on context is vital.

I.2.2 Cybersecurity is Dynamic

Cybersecurity joins together government and industry in a set of contingent relationships. The interplay between the public and private sector is not easy to pin down. At some moments, they are willing and engaged partners working hand in glove; at others, they are adversaries working at cross‐purposes. The chapters that follow chart all manner of public and private configurations. Jacqueline Eggenschwiler's “An Incidents‐Based Conceptualization of Cybersecurity Governance” (Chapter 5) describes various formal approaches to cybersecurity governance. In looking at three different cases – a 2016 cyberespionage case involving RUAG, a key Swiss defense contractor; the collaborative containment activities of the Conficker Working Group (CWG); and Symantec's cybersecurity practices – Eggenschwiler fleshes out the contours of hierarchical, multi‐stakeholder, and market‐based modes of cybersecurity governance. The chapter concludes that there is no one‐size‐fits‐all approach to cybersecurity governance.

Eggenschwiler's observation echoes across a number of chapters. Valeria San Juan and Aaron Martin's “Cyber Governance and the Financial Services Sector: The Role of Public–Private Partnerships” (Chapter 6) looks at the cooperation challenges within the financial services sector. Calling for public–private partnerships to tackle the thorny problems of cybersecurity is a familiar and evergreen recommendation: Who could possibly argue against cooperation? But, such efforts can also be something of an empty promise: a recommendation that shirks defining lines of responsibility and accountability and, in their place, leaves an ill‐defined commitment to work together without thinking through the difficult mechanics of putting these into practice. Looking at the financial services sector, San Juan and Martin provide an up‐close examination of three different public–private partnerships. They find both cause for optimism and caution in the multi‐stakeholder model of public–private cooperation. In their telling, neither industry or government can confront the challenges of cybersecurity alone. They argue that public–private efforts stumble when attempting to address systemic risk.

The challenges of confronting long‐term and systemic risk reappears in Samantha A. Adams, Karine e Silva, Bert‐Jaap Koops, Bart van der Sloot's “The Regulation of Botnets: How Does Cybersecurity Governance Theory Work When Everyone is a Stakeholder?” (Chapter 7). Adams and coauthors examine the coordination challenges that emerge when a cross‐national mix of public and private players join together to combat botnets. To work in practice, the type of polycentric governance efforts that Adams and coauthors document call for either a supranational or key nation to act as a coordinating mechanism. Transnational criminal justice efforts to date, however, have largely been reactive, focusing on immediate challenges while leaving long‐term issues unaddressed (Tanczer and coauthors also see a similar challenge in the United Kingdom's IoT strategy in Chapter 3).

Trey Herr's investigation of the cybersecurity insurance market, “Governing Risk: The Emergence of Cyber Insurance” (Chapter 8), uncovers another configuration of public and private. Herr finds a useful interplay between the insurance industry's development of cybersecurity policies and the enforcement of standards. While the federal government has largely, though not exclusively, taken a voluntary approach to developing and implementing cybersecurity standards, insurers have the power to transform these standards into binding and enforceable rules. This model of governance skirts the often politically unpalatable prospect of direct regulation, with a model that is led by the market with significant space for input from both public and private standards bodies.

Michael Thornton's “Containing Conficker: A Public Health Approach” (Chapter 9) examines the limits of purely private approaches to cybersecurity governance. Thornton examines how “the cabal,” an ad hoc group of experts that would be later renamed the CWG, came together to respond to the Conficker worm. Thornton finds an argument in favor of hierarchy and government. Members of the CWG referenced the informality of the group as a key strength, but, as the chapter notes, this model can significantly diverge from or even thwart larger public goals. Popular accounts framed CWG as superheroes that swooped in to save the day – the private sector rescuing the public from nasty malware. But, as Thornton wryly remarks, “[t]he problem with the X‐Men is that sometimes they save the planet and sometimes they start a civil war.” Thornton argues that in praising or adopting these informal and ad hoc (and nongovernmental) approaches, we sacrifice accountability and larger ethical considerations. In place of purely private efforts, Thornton argues for the adoption of a public health approach to confronting cybersecurity that carves out a key space for government participation.

The public and private sector are not only willing or even tentative allies, occasionally they are adversaries. Andreas Kuehn and Ryan Ellis examine the rise of the market for software flaws in “Bug Bounty Programs: Institutional Variation and the Different Meanings of Security” (Chapter 10). As Google, Microsoft, Facebook, and hundreds of other companies rush to start purchasing flaws in their software and services, they are drawn into competition with intelligence agencies, militaries, and others that also seek to purchase flaws in order to exploit them for gain. Here, as Kuehn and Ellis show, the private sector is attempting to use the market to improve software security and, to some degree, keep flaws out of the hands of those that want to use them for surveillance, sabotage, or crime. The institutional model of bug bounty programs is still forming. As the authors note, multiple different bounty models are currently being tried and tested. In each case, within these efforts there is a tension between the desire to improve the broader software ecosystem and the desire of governments to use the holes in this ecosystem for law enforcement, intelligence, or military purposes. The public and private sectors are not simply allies: they are at times direct competitors.

I.2.3 Cybersecurity is Never Value‐Free

Cybersecurity is a way of ordering competing values. Cybersecurity efforts explicitly and implicitly arrange different and at times oppositional goals. Security efforts always bump against other important values. Jonah Force Hill and Matthew Noyes examine the tension between state sovereignty and globalized data flows in “Rethinking Data, Geography, and Jurisdiction: A Common Framework for Harmonizing Global Data Flow Controls” (Chapter 11). Modern data storing slices data into fine‐grained portions – “sharded” – and distributes it across the globe. As Hill and Noyes detail, the fragments then slosh across legal jurisdictions, moving from one geography to another, as cheaper storage become available elsewhere. Here, we see tensions that can emerge within cybersecurity. How do we reconcile globalized data with the needs of law enforcement, local or regional privacy laws, and more generally core questions of national sovereignty? Hill and Noyes argue that it is time to radically rethink the piecemeal approach to solving these sorts of questions. Developing a common framework for global data flows, as they show, requires facing head on the competing values at play.

Amit Elazari Bar On visits the world of bug bounties in “Private Ordering Shaping Cybersecurity Policy: The Case of Bug Bounties” (Chapter 12). Elazari Bar On provides the first comprehensive analysis of bug bounty legal terms. The chapters find a raw tension between software security and the security of hackers participating in these budding programs. The use of form‐contracts in bounty programs can – and does – leaves security researchers in legal jeopardy. While bounty programs prioritize fixing software and improving security, they create legal precarity or insecurity for market participants. As Elazari Bar On argues, a legal regime that hopes to foster ethical hacking must work to offer researchers better legal safeguards.

Conflict and competition among competing values and interests sit at the heart of much of cybersecurity governance. Indeed, this core theme appears repeatedly across the pages of the book. Shires (Chapter 2) sheds light onto how cybersecurity can be reinterpreted for political purposes. Security is elastic, it can be stretched to serve all manner of ends. Even when cybersecurity is not deliberately repurposed to instrumentally serve larger political ends, it cannot but help implicate other values. Tanczer and coauthors (Chapter 3) see the United Kingdom's IoT strategy as a veiled referendum on privacy. Thornton (Chapter 9) shows how security efforts raise vital questions about how we balance security with accountability. In these and many other of the cases that follow questions about security are always about something larger: They are about the values we hold dear and the difficult work of mapping and acknowledging trade‐offs between competing interest. It is our hope that the cases assembled in the book will help shed some light on the sorts of bargains we are making in the name of cybersecurity and allow interested readers to start sorting out the wise from the foolhardy.

Notes