ArticlePDF Available

A preliminary engagement with the spatiality of power in cyberwar

Authors:

Abstract and Figures

The growing prevalence of cyberwar highlights rapidly shifting conceptions of geopo-litical space in global politics. However, critical geographical engagement with the topic remains limited, leaving the geopolitical spaces of cyberwar critically unexamined. To facilitate greater geographical engagement with cyberwar, this paper proposes a spatiality of power model to examine how political space and power might manifest in cyberwar. The model proposes four ways in which political space and power manifest offline and how the model can be applied towards cyberwar. The utility of the model is then applied as a framework for examining three well-known cyberwar case studies: the Estonia-Rus-sia 2007 cyberwar, the Georgia-Russia cyber and kinetic war in 2008, and the U.S.-Iran cyberwar from 2010 to 2013 with a focus on the Stuxnet malware.
This content is subject to copyright. Terms and conditions apply.
Vol.: (0123456789)
1 3
GeoJournal (2023) 88:5555–5573
https://doi.org/10.1007/s10708-023-10929-z
A preliminary engagement withthespatiality ofpower
incyberwar
CameranAshraf
Accepted: 4 August 2023 / Published online: 22 August 2023
© The Author(s) 2023
Abstract The growing prevalence of cyberwar
highlights rapidly shifting conceptions of geopo-
litical space in global politics. However, critical geo-
graphical engagement with the topic remains limited,
leaving the geopolitical spaces of cyberwar criti-
cally unexamined. To facilitate greater geographical
engagement with cyberwar, this paper proposes a
spatiality of power model to examine how political
space and power might manifest in cyberwar. The
model proposes four ways in which political space
and power manifest offline and how the model can be
applied towards cyberwar. The utility of the model
is then applied as a framework for examining three
well-known cyberwar case studies: the Estonia–Rus-
sia 2007 cyberwar, the Georgia–Russia cyber and
kinetic war in 2008, and the U.S.-Iran cyberwar from
2010 to 2013 with a focus on the Stuxnet malware.
Keywords Internet· Cyberspace· Geopolitics·
Cyberwar· Stuxnet
Introduction
Geographical research has engaged with the Inter-
net through studies on economics (Zook, 2000,
2008), the geoweb (Crampton et al., 2013), neoge-
ography (Haklay et al., 2008), crowdsourced infor-
mation (Zook et al., 2010), digital labor (Graham
etal., 2017), the digital divide (Warf, 2013), Internet
infrastructure (Malecki, 2002), virtuality (Kinsley,
2013), and more. However, research related to space
and power in cyberwar is lacking (Barnard-Wills &
Ashenden, 2012; Crampton, 2018; Kaiser, 2015;
Warf & Fekete, 2016; Warf, 2015a). Despite a cyber-
war budget of over $17 billion (Ratnam, 2019) in the
United States, and factoring heavily in the strategic
outlooks of the European Union (Ilves etal., 2016),
China (Zhang, 2012), India (Baig, 2019), Russia
(Connell & Vogler, 2017), and elsewhere, cyberwar
remains on geography’s periphery. Given cyberwar’s
importance, limited critical geographical perspectives
on the issue deprives academic scholarship important
spatial insights.
Thus, the purpose of this paper is to offer a pre-
liminary geopolitical engagement between states,
space, and power in cyberwar. It does so by taking a
spatiality of power model developed by Durand etal.
(1993), Lévy (2007), and expanded by Agnew (1999,
2003) and utilizing it as a conceptual lens through
which to view cyberwar geographically through three
famous cyberwar case studies.
C.Ashraf(*)
Department ofPublic Policy, Central European University,
Quellenstraße 51, 1100Vienna, Austria
e-mail: AshrafC@ceu.edu
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5556
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
Framing space andpower ontheinternet
Early Internet scholarship focused on its emancipa-
tory potential to create a separate distinct cyberspace
(Graham, 2013). This vision was famously articulated
by John Perry Barlow in his ‘Declaration of the Inde-
pendence of Cyberspace’ which stated that cyber-
space was independent and ‘the new home of Mind’
(Barlow, 1996). Nation-states, Barlow’s ‘weary giants
of flesh and steel’ were antiquated and the Internet
would give people a new and democratic voice (Dia-
mond, 2010).
This early cyber-utopianism would not last. As a
result of the 1998 Moonlight Maze cyberattack where
Russia exfiltrated classified data, the United States
moved towards securitizing cyberspace (Haizler,
2017). This attack resulted in Presidential Decision
Directive 63, which defined critical infrastructure to
be protected in cyberspace and created the Joint Task
Force Computer Network Defense to defend cyber-
space (Haizler, 2017). Soon, other countries incorpo-
rated cyberwar into their armed services and passed
laws to defend their domestic Internet (Flournoy &
Sulmeyer, 2018). These efforts have continued, with
the current U.S. cybersecurity budget exceeding $17
billion (Ratnam, 2019). But defending the ‘cyber
homeland’ is not new: in the 1980s, the former Soviet
Union pioneered the creation of ‘national cyber-
space’, including cyberwar operations in official mili-
tary doctrine (FitzGerald, 1997).
Efforts to territorialize cyberspace extend beyond
cyberwar to the development of ‘Internet borders’
with online censorship and Internet shutdowns. This
idea of Internet ‘balkanization’ along national borders
first appeared in scholarship in the year 2000 (Kesan
& Hayes, 2011). The trend continues with 2020 mark-
ing the ninth year of increases in global Internet cen-
sorship (Shahbaz & Funk, 2020). Currently, 2.1 bil-
lion people live under a censored Internet—more than
at any period in the Internet’s history (Shahbaz &
Funk, 2020). Additionally, 2019 saw the highest num-
ber of national Internet shutdowns: 213 shutdowns in
33 different countries, up from 196 shutdowns in 25
countries in 2018 (Taye, 2020). These states argue
that they have full sovereignty over their cyberspace
(Mueller, 2019).
Beyond states, corporations and private users exer-
cise powers to create and re-create spaces online.
For Lambach (2019), corporations create private
territories through sign-up requirements and the lack
of interoperability between their platforms while
users create ‘virtual territories’ through private
encrypted chats and curated content. Other geogra-
phers have explored related avenues of digital crea-
tions of digiplace, geographies of information and
information geographies, neogeographies, and private
and public spatialities (Adams, 1998; Graham, 2015;
Kitchin & Dodge, 2011; Zook & Graham, 2007;
Zook etal., 2004).
The idea of Westphalian sovereignty in cyberspace
has been contested, most notably by Milton Mueller
who argues that states do not seek territory but ‘align-
ment’ of their Internet with national interests (Muel-
ler, 2017). In security studies, however, scholars have
reinforced the idea of territory in cyberspace, lead-
ing to contested engagement with the relationship
between states, space, and power online (Hughes &
Colarik, 2017; Libicki, 2007). Indeed, a multiplicity
of perspectives exist on the future of space and power
on the Internet –framing it as a choice between lib-
eration and control (Deibert & Rohozinski, 2010),
increasing democracy (Diamond, 2010), or surveil-
lance and capitalism (Dobson & Fisher, 2007).
Geographers have also wrestled with the Internet,
space, and power. Adams argued that ‘the integra-
tion of society through computers facilitates control
and territoriality’ (Adams, 1997, 168) while Gregory
(2011) articulated key spatialities in cyberwar, ques-
tioning where borders begin and end in cyberspace.
Warf has examined cyberspace from multiple per-
spectives, including Arab and North Korean internets,
Internet censorship, cyberterrorism, and arguing for
cyberwar to be a focus of geographical work (Fekete
& Warf, 2013; Warf & Fekete, 2016; Warf, 2007,
2011, 2015a, 2015b). Geographers have also seen
cyberspace as disguising a multiplicity of interactions
in a spatial metaphor (Graham, 1998), as a distinct
geographical domain (Holloway, 2018), multiscalar
(Kellerman, 2016), inscribed with power (Sassen,
1997), as an interdependency between the physical
and digital (Zook & Graham, 2007). Others, such as
Kitchin and Dodge (Kitchin & Dodge, 2005, 2011),
have emphasized space and code, moving from cyber-
space as disembodied metaphor and towards a space
of continual becoming.
Although territory and territoriality have a long
history of contestation (Elden, 2010, 2013b; Gott-
mann, 1973; Sack, 1986), the tendency in cyberwar
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5557
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
studies has been to eschew definitional complexity
and compartmentalize cyberwar within the Westphal-
ian system (Gartzke, 2013; Hughes & Colarik, 2017;
Nye Jr, 2011; Robinson etal., 2015). Non-state actors
are framed as ensconced within state cyber-territory
regardless of their allegiance (Clarke & Knake, 2012;
Healey, 2011; Sanger, 2019). The few engagements
in geography have also framed cyberwar within the
Westphalian model and ‘territorial trap’ of fixed sov-
ereign space, domestic/foreign polarity, and the state
as societal container (Elden, 2013a; Gregory, 2011;
Kaiser, 2015).
Understanding thespatiality ofpower
The relationship between state, space, and cyberwar
remains largely unexamined in geographical litera-
ture. Indeed, the engagement has situated spatialities
of power in cyberwar as operating in opposition to,
or contrasted with, the territorial state. This has main-
tained the territorial state as the sole unit of spatial
analysis on the Internet around which other forms of
space and power revolve.
In his influential Terror and Territory, Elden
(2009) argues that the U.S. War on Terror and terror-
ism call into question the relationship between states,
sovereignty, and territory. Elden argues that the terri-
torial trap of the ‘sovereignty-territory bind’ requires
a re-thinking of the two concepts. He cites contin-
gent sovereignty in the War on Terror or humanitar-
ian intervention that belies the idea that states have
a territorial monopoly on violence. Cyberwar, with
its fuzzy battlefronts, uncertain distinction between
combatant and non-combatant, ease of embedding
resources in a country to attack that country, rapid
dissemination of disinformation, attributional ambi-
guity challenge this territorial trap.
The most recent U.S. Department of Defense
Cyber Strategy (United States Department of
Defense, 2023) articulates this contingent sover-
eignty by stating that the United States will actively
‘defend forward’ by pre-emptively infiltrating the
computer networks of foreign countries (Sanger,
2019). In the same report, the United States
declares cyberspace a ‘warfighting domain’ with
cyber-assets considered part of the homeland’s crit-
ical national infrastructure. Sovereignty is stressed
as inviolable for the U.S. and held as contingent
for its opponents. This collapses what Elden calls
‘the sovereign fiction that states have a monopoly
of legitimate violence within their territory’ (Elden,
2009, 177). This fiction rests on three geographical
assumptions, known as the territorial trap: (1) that
all states have exclusive power over their territory;
(2) that the domestic and foreign are separate spaces
governed by different rules; (3) that the boundary of
the state is the boundary of society (Agnew, 2015,
43). However, the territorial trap as a state-centered
conceptual framework cannot adequately frame the
complexities of cyberwar. What is needed are theo-
retical interventions to go beyond it.
To accomplish this, the paper uses a spatiality of
power model originally developed by Durand et al.
(1993) and Lévy (2007) as a geographical lens to
examine cyberwar. This model is a way to think about
the globalizing world in four different spatialities,
extended by Agnew (1999, 2003) as seeing ‘beyond
geopolitics’.
The model corresponds loosely with the spatial-
ity of power in historical epochs of human political,
social, and technological development. As originally
presented, it emphasized how actors, space, and
power relate when power is not tied to a territorial
state. These four spatialities are: ensemble of worlds,
field of forces, hierarchical network, and world
society.
Ensemble of worlds
This model echoes early pre-Columbian world cul-
tural regions. Here, cultures and societies are isolated
except for sporadic trade interactions. In Fig. 1 this
is represented by black dots of varying sizes sepa-
rated by white space. Power is directed towards the
maintenance and sustenance of the culture within its
Fig. 1 Ensemble of worlds (Agnew, 1999, 505)
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5558
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
‘natural’ boundaries. Space is perceived as an obsta-
cle to overcome or manage, and regions have a sense
of significant difference beyond their boundaries with
little idea of other regions.
Field of forces
This model maps existing states with rigidly
defined territories in a geographical zero-sum game
in which territorial gains come at the expense of
others. The dominant approach to space is through
states which contains the society’s political, eco-
nomic, and social actions with clearly articulated
rights and responsibilities within demarcated
boundaries. These boundaries are created, modi-
fied, and reified through technological interventions
(Elden, 2007; Rose-Redwood, 2012). In Fig.2 poli-
ties have expanded through geographical space and
have encountered other polities, with this expansion
represented by arrows.
Hierarchical network
The hierarchical network moves from rigid state
spaces towards cores, peripheries, and semi-periph-
eries connected by flows. These nodes exist in a
global network where the dominant connections are
trade, information, labor, and finance. Figure3 rep-
resents this through arrows representing flows and
larger dots representing cores, smaller dots repre-
senting semi-peripheries, and the smallest dots being
peripheries. This is a pattern consistent with contem-
porary globalization where power is based on relative
location to global centers. This model’s spatiality is
networked, focused on nodes, areas, and a global flow
hierarchy of people, information, capital, and trade
goods (Agnew, 1999).
World society
The world society model is focused on globally-
integrated and structured communities, identity,
and economics. Problems, such as climate change
or inequality, become increasingly framed and dis-
cussed globally and transcend rigid state borders.
Communications are unhierarchical amongst net-
works whose spread and growth is ‘rhizomatic’.
The centers of power revolve around social groups
rather than bounded entities or location. Space and
time are reciprocal, and time-based activities can
be framed in terms of space, and vice-versa. Real
and virtual spaces also operate reciprocally and are
in many ways indistinguishable. Figure4 represents
this through polities of different sizes connected
via lines representing multidirectional connections
between the entities.
Fig. 2 Field of forces (Agnew, 1999, 505)
Fig. 3 Hierarchical network (Agnew, 1999, 505)
Fig. 4 World society (Agnew, 1999, 505)
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5559
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
The spatiality ofpower inaction: case studies
To illustrate how the spatiality of power model can be
used as an analytical tool for cyberwar, this paper will
examine three well-known case studies.
The first case, the 2007 cyberwar between Rus-
sia and Estonia, was the first international event to
be broadly described as cyberwar. It precipitated a
state of national emergency in Estonia with calls for
a potential armed response by NATO. The second
example, the Russian invasion of Georgia in 2008,
was the first-time cyberwar was used in a direct coor-
dination with kinetic ground conflict. The third case,
a series of cyberconflict incidents between Iran and
the United States, features the world’s first and most
sophisticated cyberweapon.
Russia and Estonia cyberwar: 2007
The Russia/Estonia cyberwar began in 2007 after
a parliamentary proposal to relocate a statue (com-
monly known as the “Bronze Statue) commemorat-
ing Soviet soldiers who died liberating Estonia from
Nazi Germany to a military cemetery. Ethnic Rus-
sians, comprising nearly a quarter of the population
(Greene, 2010), viewed the monument as a symbol
through which their minority rights were respected
while many ethnic Estonians saw it as a symbol of
totalitarianism (Ehala, 2009).
Tensions reached a critical point in April 2007
during a series of violent protests and riots called the
‘Bronze Night’ (Kaiser, 2015). Over a thousand eth-
nic Russians rioted for more than two days, burning
cars and buildings, resulting in one death, hundreds
of arrests, and over 100 injuries (BBC, 2007). At the
same time, protesters in Moscow besieged the Esto-
nian embassy, attacking anyone who attempted to
leave or enter the building, including the Estonian
ambassador. The siege prompted diplomatic interven-
tion by the European Union (Finn, 2007).
On the first night of the protests, April 27, Rus-
sian discussion forums, chat rooms, blogs, and social
media were filled with calls to action against Estonian
Internet targets (Schmidt, 2013). These websites pro-
vided easy-to-use tools and a list of targets for Rus-
sians to attack. The posts and tools became popular,
allowing non-technical citizens to participate. The
initial list of targets included the Estonian parlia-
ment, presidency, and various government ministries
(Traynor, 2007). This began a Distributed Denial of
Service (DDoS) attack, flooding websites with traf-
fic, rendering them inaccessible. The success of the
attacks encouraged more users to participate, sending
over 4 million data packets per second to the country
in contrast to Estonia’s usual traffic of 20,000 packets
per second (Davis, 2007).
More advanced hackers defaced government web-
sites and replaced images of elected officials with
images of famous Nazis (Herzog, 2011). The sophis-
tication of the attacks grew with the use of networks
of hijacked computers (‘botnets’) to augment the
cyberattacks. At the peak, Estonia was attacked by
over 1 million computers—nearly matching the coun-
try’s population (Thilek, 2009). There were over 125
separate DDoS attacks, and mass-emailing systems
were used to overwhelm and shut down government
email servers (Thilek, 2009). These attacks were
severe enough to cause physical damage to routers
and email servers (Thilek, 2009).
The initial target list of political websites expanded
to include businesses, banks, Internet service provid-
ers, and email addresses of all members of the Esto-
nian parliament and government agencies (Lesk,
2007). The attacks rendered inaccessible the websites
of the Estonian presidency, parliament, most govern-
ment ministries, many political parties, the three larg-
est news agencies in the country, most of the coun-
try’s banks, the national Internet service provider,
and most private Internet service providers (Thilek,
2009).
Citizens were unable to withdraw money from cash
machines, government systems were unable to be
updated, and email communications between citizens,
government, and business was shut down (Thilek,
2009). Despite the scale of the attacks, Estonia took
steps to defend itself but was quickly overwhelmed.
As a result, Estonian Internet service providers were
forced to disconnect users from the Internet, and at
the national level Estonia resorted to blocking all traf-
fic originating from outside its borders, isolating itself
from the rest of the world. Automated financial trans-
actions, regulatory filings, and criminal justice pro-
ceedings, were also disrupted (Schmidt, 2013).
Through digital forensics, researchers determined
that the initial attacks started on Russian language
forums (Schmidt, 2013). The second wave, utiliz-
ing global botnets was more difficult to locate. Given
the parallels between targets and attacks, security
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5560
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
researchers assumed that the source behind the bot-
nets was Russia. This was supported by discoveries
implicating IP addresses used by Russian criminal
organizations in previous attacks, admissions of guilt
by the state-sponsored Russian Nashi youth move-
ment, and the refusal of Russian authorities to coop-
erate with Estonian and EU investigations (Clarke &
Knake, 2012; Schmidt, 2013).
The severity of the attacks prompted the Esto-
nian Minister of Defense, Jaak Aaviksoo, to consider
invoking NATO’s Article 5 requirement that the alli-
ance aid members under attack (Davis, 2007). He
stated that:
All major commercial banks, telcos, media
outlets, and name servers—the phone books of
the Internet—felt the impact, and this affected
the majority of the Estonian population. This
was the first time that a botnet threatened the
national security of an entire nation. (Davis,
2007).
NATO declined to intervene, citing lack of prec-
edent and believing that the attack was insufficiently
dangerous (Kaiser, 2015; Wolff, 2014). Eventually,
the attacks slowed, allowing Estonia to regain control
over its cyberspace. As a result of these attacks being
‘the birth of cyberwar’, NATO established its Coop-
erative Cyber Defence Centre of Excellence (CCD-
CoE) in the Estonian capital Tallinn in 2008 (Kaiser,
2015).
Russian invasion of Georgia: 2008
Russian and Georgian claims over the regions of
Abkhazia and South Ossetia had caused conflict
between the two states since the fall of the Soviet
Union (Hollis, 2011). Under the Soviet Union, the
region of South Ossetia was autonomous, and Rus-
sia had encouraged South Ossetian separatism since
1990 (Cohen & Hamilton, 2011). At the same time,
Abkhazian separatists received military support from
Russia while Georgia fought two wars to regain con-
trol of these breakaway regions in the years following
Soviet collapse (Cohen & Hamilton, 2011). In both
instances Georgian troops were defeated by a mixture
of local secessionists and Russian irregular troops
(King, 2008). As a result, the regions enjoyed de facto
independence and were recipients of Russian foreign
aid (Kolossov & O’Loughlin, 2011).
In 2008, Georgia accused Russia of shoot-
ing down an unmanned drone operating in or near
Abkhazia (BBC, 2008). Days later, Russian troops
moved into Abkhazia under the pretext of defend-
ing Abkhazia from Georgian aggression. Almost
simultaneously in South Ossetia, separatists broke
a cease-fire and began attacking Georgian troops.
Georgian President Mikhail Saakashvili, who had
promised to regain the breakaway regions, sent
troops into South Ossetia (King, 2004). This inter-
vention prompted thousands of Russian troops to
advance into South Ossetia and Georgia, with Rus-
sian airstrikes hitting Georgian targets (Deibert
etal., 2012). Ultimately, Russia and Georgia signed
a cease-fire which saw Abkhazia and South Ossetia
gain de facto independence.
In the weeks before the ground invasion, Geor-
gian Internet infrastructure was attacked by exter-
nal agents, assumed to be Russian (Hollis, 2011). In
July 2008, Russian hacker forums, blogs, and online
communities contained many posts about methods
and tactics for attacking Georgian targets, emphasiz-
ing the DDoS and website defacements used against
Estonia. Arbor Networks, a prominent global security
firm, noticed a heightened amount of ‘noise’ in July
2008 coming from Russia’s hacker and cybercriminal
underground, indicating a high level of premeditation
and strategic oversight behind the attacks (Markoff,
2008).
The first wave of attacks occurred hours after the
ground invasion and consisted of DDoS against over
50 websites, government servers, and national com-
munications infrastructure (Bumgarner & Borg,
2009; Hollis, 2011). The attacks came from botnets
whose IP addresses were affiliated with Russian
organized crime and the unofficially state-sanctioned
‘Russian Business Network’ which was connected to
the attacks against Estonia in 2007 (Korns & Kasten-
berg, 2008; Markoff, 2008; Stapleton-Gray & Wood-
cock, 2011) (Fig.5).
A second wave of attacks utilized participatory
DDoS by providing an easy-to-use tool for Russian
citizens to attack Georgian websites. This wave tar-
geted financial institutions, business associations,
and educational websites (Bumgarner & Borg, 2009).
The attacks disrupted the ability of Georgia to make
financial transactions as the Internet was essential for
commerce and trade. The attacks were so successful
that the National Bank of Georgia severed all Internet
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5561
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
connections for ten days, leaving it unable to operate
(Bumgarner & Borg, 2009).
Despite the low-level of Internet penetration in
Georgia, Russian hackers modified their attack plans
to deprive the Georgian government of the ability
to communicate or disseminate information. These
attacks rendered the majority of governmental web-
sites inoperative, forcing the Georgian government
to relocate its official business to Google’s Blogspot
service in the United States and to other U.S. based
hosts (Kastenberg, 2009; Korns & Kastenberg, 2008).
The Georgian IT community also reached out to Esto-
nian officials who connected them to EU and NATO
experts to bolster Georgia’s defenses by altering the
European Internet infrastructure upon which Georgia
relied (Bumgarner & Borg, 2009) (Fig.6).
What distinguishes these attacks is the linkage
between online attacks and offline military action.
Once Russian commanders had established a foothold
in Georgian territory, cyberattacks were intensified
and designed to sow confusion amongst the general
populace, government functionaries, and financial
and political elites (Bumgarner & Borg, 2009; Hollis,
2011). This was demonstrated by directing cyberat-
tacks towards local news and government communi-
cations services in the city of Gori at the same time as
the Russian ground and air offensive against the city.
The attacks were specific enough that intelligence
analysts were able to use DDoS attacks to anticipate
where Russian ground attacks were focused or immi-
nent (Hollis, 2011).
The United States and Iran: 2010–2016
The third case examines a series of attacks between
the United States and Iran from 2010 through 2013,
with emphasis on the well-known Stuxnet case.
Although it is argued this cyberwar is still ongoing,
this paper will focus on the most well-known and
foundational attacks (Greenberg, 2019; Nakashima,
2019; Perlroth & Krauss, 2018).
The US/Iran cyberwar begins with Stuxnet, mali-
cious software designed to destroy industrial com-
ponents in Iran’s nuclear enrichment facilities, erase
evidence of its presence, and deceive computer
administrators into believing that systems were
Fig. 5 Defaced Georgian parliament website (Markoff, 2008)
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5562
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
normal (Gross, 2011; Markoff, 2011). The discovery
of Stuxnet sent ripples through cybersecurity commu-
nities because it was the first ‘cyberweapon’ designed
to destroy physical infrastructure and was sophisti-
cated enough to have accomplished its objective vir-
tually undetected (Gross, 2011; Sanger, 2019).
Stuxnet was designed to alter speeds on nuclear
centrifuges to cause them to malfunction and explode
(Gross, 2011; Zetter, 2014). It did this by targeting
software developed by the German company Siemens
used to power centrifuges, specifically model S7-300
(Falliere et al., 2011; Gross, 2011; Zetter, 2014). If
the Siemens software was not found, Stuxnet would
delete itself from the computer. It would, however,
spread to other computers and continue scanning for
S7-300 (Falliere etal., 2011).
If the Siemens software was found, Stuxnet would
scan the system for disk drives used on the S7-300
system from two vendors: Vacon from Finland and
Fararo Paya from Iran. The existence of these drives
would confirm to Stuxnet that this system was a valid
target, and Stuxnet would examine the centrifuges for
those spinning at certain frequencies (Falliere et al.,
2011; Shakarian, 2011). If these elements were pre-
sent, Stuxnet would cause the centrifuges to rapidly
increase and decrease in rotational speed, stressing
the centrifuge and forcing it into collision with its
housing, destroying it (Stark, 2011). While these cen-
trifuges were spinning, Stuxnet would feed informa-
tion to centrifuge operators indicating that systems
were normal (Gross, 2011; Markoff, 2011) (Fig.7).
Stuxnet faced a significant problem reaching
Natanz because the facility was air-gapped (discon-
nected from the Internet) as a security precaution. To
address this, Stuxnet developers ensured that it could
spread through infected USB drives. Stuxnet’s devel-
opers also targeted the internal systems of five com-
panies that intelligence sources believed were work-
ing with Iran’s nuclear program (Zetter, 2014). The
hope was that someone from these companies would
unwittingly take an infected drive into Natanz and
allow the malware to infect the facility (Sanger, 2019;
Zetter, 2014, 2015). This was successful, as employ-
ees of those companies posted questions to anti-virus
forums asking for help with unusual problems associ-
ated with Siemens software (Zetter, 2014). According
to Zetter (2014):
But by August that year, only 4,592 centri-
fuges were enriching at the plant, a decrease
of 328 centrifuges since June. By November,
that number had dropped even further to 3,936,
Fig. 6 Georgian Ministry of Foreign Affairs on Google Blogspot (Screenshot by author)
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5563
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
a difference of 984 in five months. What’s
more, although new machines were still being
installed, none of them were being fed gas.
(Zetter, 2014)
Stuxnet was discovered in July 2010 by Belarusian
security firm VirusBlokAda (Gross, 2011). Secu-
rity analysis pointed towards state sponsorship of its
development by the United States and Israel (Sanger,
2012), as the sophistication of the code indicated
access to resources beyond those available to non-
state actors.
The discovery and dissection of Stuxnet did not
slow the cyberwar against Iran. Shortly after discov-
ering Stuxnet, security researchers discovered another
malware, codenamed Duqu in two countries: Sudan
and Iran. Duqu exfiltrated information on industrial
command and control systems by recording key-
strokes and screenshots and sending them back to
servers located in ‘Vietnam, India, Germany, Sin-
gapore, Switzerland, the UK, the Netherlands, Bel-
gium, South Korea’ (Kamluk, 2011). The malicious
intent of the software and geographic specificity led
researchers to conclude that Duqu was a follow-up
to Stuxnet designed to survey the post-Stuxnet land-
scape in preparation for future attacks (Symantec
Security Response, 2011). Other attacks included
‘Mahdi’ designed to exfiltrate industrial control infor-
mation out of Iran and ‘Gauss’ exfiltrating data from
Iran’s proxies in Lebanon (Gross, 2013).
The scale of U.S. activities against Iran, dubbed
‘Operation Olympic Games’ and the unambigu-
ous source and targets did not go unnoticed by the
Iranian government (Sanger, 2012). Iran declared
Fig. 7 Map of Stuxnet infections (Finin, 2010)
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5564
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
that it would be increasing its cyberwar potential
and expanding its cyber-army to identify threats and
project power abroad (Gross, 2013). In March 2012
Iran’s Supreme Leader Ayatollah Ali Khamenei
established the High Council of Cyberspace with $1
billion in funding (Berman, 2012).
After Stuxnet, Iran counterattacked U.S. interests.
The first attack, in July 2011, targeted DigiNotar, a
Dutch firm which issues encryption certificates used
to encrypt communications for banking, social media,
or email (Galperin et al., 2011; Gross, 2013). Iran
was able to issue compromised certificates and inter-
cept the emails of over 300,000 Gmail users while the
breach threatened global encrypted communications
(Arnbak & Van Eijk, 2012; Galperin et al., 2011;
Gross, 2013).
Iran’s success with DigiNotar prompted the
world’s Internet browsers to immediately stop accept-
ing their certificates, an unprecedented move which
demonstrated Iran’s technical sophistication in cyber-
war (Zetter, 2011b). The security risk was significant
enough for the Dutch government to take ownership
of the firm, prompting a major restructuring of Dutch
encryption certificate-issuing authorities (Arnbak
& Van Eijk, 2012; van der Meulen, 2013; Zetter,
2011b).
Iran’s next target was Saudi Aramco. At the time,
it was the largest cyberattack against a corpora-
tion and the first whose purpose was destruction of
data rather than exfiltration or surveillance (Gross,
2013). Codenamed Shamoon, it occurred on August
15, 2012, infecting and erasing data on over 30,000
computers and replacing screens with an image of a
burning American flag (Gross, 2013). Saudi Aramco
was forced to replace these compromised drives, tem-
porarily driving up global prices on computer disk
drives (Rashid, 2015). Digital forensics indicated
that an insider with physical access to the machines
used an infected USB drive to plant the virus. The
malware then automatically replicated and spread
through 75% of Saudi Aramco’s communications net-
work. It erased essential data related to refining and
exploration, eventually infecting company computers
around the world, including in the Netherlands and
the United States (Bronk & Tikk-Ringas, 2013).
Iran’s retaliation continued after Shamoon. In
September 2012, U.S. banks and financial firms
encountered the most sophisticated DDoS attacks
ever detected. The attacks came from global datacent-
ers and targeted ‘Bank of America, Citigroup, Wells
Fargo, U.S. Bancorp, PNC, Capital One, Fifth Third
Bank, BB&T and HSBC’ (Perlroth & Hardy, 2013;
Peterson, 2013). The attack’s traffic was significantly
larger than the total of traffic used in the Russian
cyberwar against Estonia, with researchers claiming
that the attacks were more than 10 times larger than
any known DDoS attack (Gross, 2013; Perlroth &
Hardy, 2013) (Fig.8).
In the previous case studies, states leveraged
globally dispersed networks of malware infec-
tions controlled by centralized ‘command and con-
trol’ servers. These Iranian DDoS attacks, dubbed
Operation Ababil, eschewed that cyber-geographic
orthodoxy and infected concentrated cloud stor-
age servers in datacenters with a malware known as
‘itsoknoproblembro’.
Fig. 8 Spike in traffic
during an Operation Ababil
attack (Goh, 2013)
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5565
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
This malware evaded detection and spread rapidly
through thousands of servers. Security researchers
stated that the attacks exceeded 70 gigabits (Perlroth
& Hardy, 2013). By comparison, at that time, mid-
size businesses routinely had less than 1 gigabit of
traffic and a large international bank would barely
reach 40 gigabits of traffic during peak usage (Perl-
roth & Hardy, 2013). The banks incurred large costs,
with some paying more than $10 million for emer-
gency DDoS defense (Gross, 2013).
The spatiality ofcyberwar: discussion ofthecase
studies
The complexities of space and power in these case
studies highlight the need for thinking beyond terri-
tory. The spatiality of power model offers one poten-
tial avenue of moving beyond territory in cyberwar.
Ensemble of worlds
In the ensemble of worlds, power is articulated
through separation of human groupings, with limited
connectivity, and power concentrated and directed
internally rather than externally. The spatial focus is
on separation.
While the idea of separation may be at odds with
connectivity in a digital age, it remains relevant in the
modern state’s co-production of space and secrecy
(Paglen, 2010). The secretive Dimona labs where
Stuxnet was developed and Iran’s Natanz facility
are located in remote deserts, which are air-gapped
with multiple levels of security and military defense
(Broad etal., 2011; Zero Days, 2016; Zetter, 2011a).
The disconnection of these secretive spaces made
them more powerful—requiring substantial more
effort and work to infiltrate and attack (Sanger, 2019).
Indeed, efforts to infect Natanz relied upon cross-
ing the air-gap, utilizing both undercover physical
infiltration, targeted infections, and global malware
spread to increase the odds of crossing the air-gap
(Zero Days, 2016).
Beyond physical separation, firewalls and anti-
virus software create digital spaces of separation.
Computers located behind secured networks are
connected to the broader Internet but disconnected
from the world of malware infection. However, ‘zero
days’ which are exploits with no defense, were used
by Stuxnet and can overcome these defenses to infil-
trate separated spaces (Huskaj & Wilson, 2020).
Due to this ability, zero day exploits are expensive
and difficult to procure, with RAND estimating that
one exploit costs an average of US $30,000, making
them mostly used by states (Ablon & Bogart, 2017).
The lack of separation through effective anti-virus
software creates spaces of vulnerability from con-
nectivity, forming the backbone of the global DDoS
networks which utilize thousands of poorly-defended
computers to orchestrate DDoS attacks.
Disconnection also becomes power with the abil-
ity to disconnect from the Internet forcibly or defen-
sively. The DDoS attacks in the cases of Russia and
Estonia/Georgia were efforts to separate these states
from the global Internet. Given the disparity of avail-
able resources between Russia and Estonia/Georgia,
a powerful state is one which can resist separation or
can easily separate others. At the same time, Estonia
disconnected itself from the Internet to retain domes-
tic communicative power. Thus, space and power in
cyberwar can manifest simultaneously with and in
separation.
Field of forces
The field of forces model sees power within ter-
ritorial states where the state has total control over
its territory and where border expansion comes at
the expense of others. The focus in this model is on
power within boundaries.
The DDoS-focused case studies demonstrated how
power can be distributed globally by infecting mil-
lions of computers and using them to attack a territo-
rial state. In the face of overwhelming attacks directed
towards its national cyberspace, Estonia leveraged
territorialized power by disconnecting from the Inter-
net. In this way Estonia maintained some domes-
tic connectivity to allow critical national services to
continue to operate and simultaneously stopped the
attack. While Russian DDoS power was globally dis-
persed and not bound by its territory, Estonia’s power
manifested in its territorial power to disconnect.
Territorial boundaries in cyberwar also manifested
in the case of Georgia. The Russian attacks focused
on targets within Georgia’s territory in coordination
with a kinetic ground invasion. In response, rather
than disconnect, Georgia relocated key government
services to the territory of the United States. Georgia
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5566
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
used TSHost and Google’s US-based infrastructure
which offered robust protections and were located in
a neutral country (Kastenberg, 2009).
By determining the structure of Iran’s Natanz facil-
ity through traditional intelligence work, Stuxnet’s
developers crafted a cyberweapon targeting a specific
industrial control system. They did so by embedding
the details of Iran’s technical systems within the mal-
ware itself. This was to deliberately limit the potential
for outside discovery, minimize damage or disruption
to non-targeted systems, and to ensure that the cor-
rect targets were destroyed. Indeed, while much of the
Internet operates on similar hardware and software
worldwide, how these systems are used and deployed
varies by geography and is influenced by the state’s
technical and social structures (Golumbia, 2009;
Takhteyev, 2012). Here, territory in cyberwar mani-
fests in the development and deployment of cyber-
weapons which embed territorial particularities in
code.
Hierarchical network
The hierarchical network emphasizes cores, semi-
peripheries, peripheries as nodes in a global network
of flows. The focus is on networks connecting global
hierarchies of nodes.
Global computing power is arranged in a core/
periphery model centered around datacenters. These
datacenters are host to tens of thousands of computers
and power most of the Internet (Jaeger etal., 2009).
Indeed, 1/3 of all websites are powered by Amazon’s
AWS datacenters (Desjardins, 2019). The central-
ity of datacenters to the Internet landscape contin-
ues apace, with Cisco Systems estimating datacenter
Internet traffic will reach 19.4 zettabytes in 2021
(Cisco Systems, 2018). A zettabyte is one billion tera-
bytes, with one terabyte being the common size for
an entire PC hard drive. In contrast, the computers of
individual users form a dispersed periphery of global
computing power.
These spatial disparities are malleable in cyberwar.
As demonstrated in both the Estonian and Georgian
cases, by infecting tens of thousands of ‘periphery’
computers, a state can form them into a core of com-
puting powerful enough to disconnect states from
the Internet. The ‘topography’ of global computing
power, therefore, is shaped by geographies of mal-
ware vulnerability. The distinction between core and
periphery is less rigid and more flexible, with periph-
ery becoming core through the scale of hijacked com-
puters. This is the logic behind DDoS attacks which
emphasize hierarchical networks by negating ter-
ritorial boundaries and gathering computing power
through infected nodes.
The fluidity in the hierarchical network does not
only benefit the attacker. In the case of Georgia,
the state’s collapsing computing defenses demon-
strated that it was on the periphery of global defen-
sive resources. Recognizing this, Georgia relocated
its online services to a core: Google’s servers in the
United States. The assumption was that Google’s
scale and resources could withstand the DDoS attacks
(Kastenberg, 2009). While novel at the time, relocat-
ing key assets to DDoS-defensible nodes has become
a norm, with industry leader Cloudflare defending
27 million websites from attack in 2020 (Cloudflare,
2020; Zuckerman etal., 2010).
The core/periphery model of datacenters was a
critical factor in Iran’s retaliatory DDoS attacks.
Instead of hijacking computers on the global comput-
ing periphery, Iran infected computers at core data-
centers, marking the start of a new era in datacenter-
focused attacks. Due to their relative homogeneity,
datacenters became nodes of heightened risk, filled
with tens of thousands of identical computers with
similar vulnerabilities which were easily infected by
the ‘itsoknoproblembro’ malware (Gilder, 2006; Jae-
ger etal., 2009). Datacenters are growing as attrac-
tive, centralized target for states, with malware
which exploits their vulnerabilities (Cimpanu, 2019;
Korolov, 2017, 2020).
Power and space in hierarchical networks is fluid,
aggregating and disaggregating peripheries and
cores. With global DDoS attacks estimated to reach
15.4 million in 2023 and global malware detections
exceeding 750 million, hierarchical networks will
continue to play a prominent role in both cyber-attack
and defense (Cisco MalwareBytes, 2019; Systems,
2020).
World society
The world society model postulates synchronous
interconnectedness of real and virtual spaces, the
emergence of a global public opinion and awareness,
‘flat’ unhierarchical networks, as well as reciprocal
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5567
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
time and space in global human affairs (Agnew,
2003).
Early geographic literature about the Internet artic-
ulated a distinct ‘online/offline’ dichotomy (Brunn,
1998). While such a distinction may have existed with
dialup modems and desktop computers, the contem-
porary reality of near-ubiquitous mobile computing
and connectivity has made the dichotomy a false one.
This interconnectedness of the real and the virtual
has resulted in cyberwar becoming a security prior-
ity for states, as industrial control systems in national
electricity grids, dams, water treatment plants, rail-
roads, and other key infrastructure become connected
to the global Internet (Baram & Lim, 2020; Clarke
& Knake, 2012; Sanger, 2019; Zetter, 2016). World
militaries have organized around this, notably the
U.S. budgeting $610 million for Cyber Command to
integrate cyberwar offense and defense into kinetic
conflict (Williams, 2019).
The Estonian case study demonstrated the reci-
procity between online and offline protest movements.
The effort to relocate the Bronze Soldier resulted
in riots and simultaneous online calls for digital
action. The resulting online attacks interrupted bank
transfers, telephone calls, and more (Thilek, 2009).
The attacks themselves were launched from a glob-
ally infected DDoS network which ignored national
boundaries and operated across multiple time zones
simultaneously with the protests.
The Georgian case likewise demonstrates this con-
fluence: globally controlled DDoS networks attacking
specific targets in conjunction with kinetic ground
assaults. While forensics research has concluded that
Russia was responsible for the attacks, the global dis-
tribution of attack sources meant there was no single
state responsible (Blank, 2008; Grant, 2007). Rus-
sia could claim that even if it shut down or restricted
access within its own borders, it was powerless to
stop attackers in other jurisdictions—which is pre-
cisely what it did (Clarke & Knake, 2012).
Of the case studies, the future of synchronous
online and offline interconnectedness was most
clearly demonstrated in Stuxnet. The malware was
developed to exploit the reality that even air-gapped
spaces cannot be disconnected. The Natanz facility,
although disconnected from the Internet, required
regular software patches provided by vendors whose
computers would be connected to the Internet. This
allowed Stuxnet to be updated and destroy additional
centrifuges by unwitting vendors bringing Sutxnet-
infected USB drives to (Zero Days, 2016). Even dis-
connected spaces can be connected in the world soci-
ety model (Table1).
The confluence of online and offline means that the
spatiality of power in cyberspace is not restricted to
cyberspace, but manifests in the interconnectedness
between the digital and the physical. Power is spatial-
ized globally to the extent the Internet is spatialized
globally. This is evidenced in the dramatic increase of
‘Internet of Things’ devices like Internet-connected
thermostats, copy machines, and webcameras. Their
widespread usage, with over 34 billion devices, has
resulted in an enormous new geography of cyber
insecurity (Burhan etal., 2018). The result is further
blurring of the cyber-battlefront and the boundaries
between civilians and combatants. Indeed, one of the
largest DDoS attacks occurred in 2016 from nearly
50,000 webcameras in 164 countries infected by the
Mirai malware (Herzberg etal., 2016).
Conclusion
Despite nearly 8 million DDoS attacks annually, a
U.S. budget of $17 billion for cyberwar, and broad
public awareness, geographers have rarely engaged
with the spatiality of cyberwar. The purpose of this
paper was to address this gap by offering a prelimi-
nary theoretical geographical lens on space and
power in cyberwar.
How does applying this theoretical framework
advance cyberwar in geography? Given the case stud-
ies and discussion of the multiple spatialities in these
conflicts, spatializing power in cyberspace through a
strictly territorial lens is insufficient. The spatiality
of power model offered is one lens through which the
paper sought to demonstrate how space and power can
exist in cyberwar apart from the Westphalian model.
And although there is broad agreement that the West-
phalian system is challenged by various supranational
forces, without engagement by geographers, cyberwar
scholarship is likely to remain in the territorial trap
which recent research has demonstrated (Hughes &
Colarik, 2017).
What the case studies and analysis also demon-
strate is that there are multiple spatialities at play in
cyberwar: disconnection, hierarchy, spatiotemporal
connectedness, and more. And as this paper’s analysis
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5568
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
Table 1 Case studies and the spatiality of power
Explanation Russia/Estonia Russia/Georgia U.S./lran Differences Similarities
Ensemble of Worlds Power is articulated
through structural
separation
N/A N/A Stuxnet developed in
and deployed against
separate air-gapped
spaces
DDoS—based cyber-
war relies upon con-
nectivity rather than
isolation
Utilizing the digital to
penetrate separate
spaces to achieve
political goals
Field of Forces Power located in ter-
ritorial entities
Russia: N/A Estonia:
Leveraged inter-
national technical
alliances to stop
cyberattacks
Russia: Attacks
explicitly territorial
Georgian cyberpower
Georgia: International
technical alliances to
stop attacks; relocates
cyber-assets to other
territorial states based
on alliances
Olympic Games
malware (including
StuxNet) deliberately
targets Iran’s terri-
tory; Iran’s power
conceived of in ter-
ritorial terms
Attacks must be territo-
rially defined; defense
seeks to leverage
the state monopoly
over international
geographical con-
nectivity
Cyberpower’s structure
is on territorial lines:
alliances, targets, and
infrastructure. Cyber-
power must be located
somewhere. Territory
as "framing principle"
for attack and defense
Hierarchical Network Emphasis on cities,
nodes of power, and
hinterlands
Russia: Embraces
model, seeks out
nodes with high con-
nectivity to power
botnet used in attacks
Estonia: N/A
Russia: Envisioned
cyberpower as hier-
archical nodes within
Georgia. Georgia:
Relocated cyber-
assets to other territo-
rial states located near
nodes associated with
state cyberpower
Iran’s counterattacks
targeted hierarchi-
cal nodes of oil
and finance using
hierarchical nodes
of computing power
(data centers)
Physical nodes of
power harder to
relocate than nodes
associated with
cyberpower
Nodes of power become
nodes of vulnerability
for both attack (via
botnets) and defense
World Society Power in social group-
ings, confluence
of real and virtual
spaces, global public
opinion, as well as
spontaneous and
reciprocal time and
space
Synchronized protests
and cyberattacks;
global attacks oper-
ated at a global spa-
tiotemporality rather
than a local Estonian
spatiotemporality;
equal and unhierarchi-
cal global actors
Physical/virtual spaces
conflated due to
simultaneous cyber
and kinetic attack on
specific locations;
using global botnets
to attack specific
cities prior to kinetic
ground offensives;
Georgian state relo-
cates vital state cyber-
assets to other states
and nodes globally
Iran’s DigiNotar coun-
terattack targeted and
compromised global
Internet security
and connectivity;
conceived of and pro-
jected power globally
through networks
Purely digital and
hybrid conceive of
global battlespace to
different ends: one
for disruption/attack,
the other as pool of
potential resources
Envisioning global
cyberspace as pool of
resources or vulnerabil-
ity -a global battles-
pace; understanding
that connectivity is
vulnerability; leverag-
ing physical and virtual
convergence
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5569
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
was not exhaustive, there are undoubtedly more layers
of analysis which could be applied. However, given
the dearth of geographical engagement, these valua-
ble analyses are lacking. Geography has much to offer
this field both theoretically and empirically, and it is
hoped that this paper can contribute to the beginnings
of that conversation on space and power in cyberwar.
Funding Open access funding provided by Central European
University Private University. The author did not receive sup-
port from any organization for the submitted work.
Declarations
Conflict of interest The author has no relevant financial or
non-financial interests to disclose.
Human participants or animals This research did not
involve human participants or animals.
Open Access This article is licensed under a Creative Com-
mons Attribution 4.0 International License, which permits
use, sharing, adaptation, distribution and reproduction in any
medium or format, as long as you give appropriate credit to the
original author(s) and the source, provide a link to the Crea-
tive Commons licence, and indicate if changes were made. The
images or other third party material in this article are included
in the article’s Creative Commons licence, unless indicated
otherwise in a credit line to the material. If material is not
included in the article’s Creative Commons licence and your
intended use is not permitted by statutory regulation or exceeds
the permitted use, you will need to obtain permission directly
from the copyright holder. To view a copy of this licence, visit
http://creativecommons.org/licenses/by/4.0/.
References
Ablon, L., & Bogart, A. (2017). Zero days, thousands of
nights: the life and times of zero-day vulnerabilities and
their exploits. Rand Corporation.
Adams, P. (1997). Cyberspace and virtual places. Geographi-
cal Review, 87(2), 155–171. https:// doi. org/ 10. 1111/j.
1931- 0846. 1997. tb000 69.x
Adams, P. (1998). Network topologies and virtual place.
Annals of the Association of American Geographers,
88(1), 88–106.
Agnew, J. (1999). Mapping political power beyond state
boundaries: Territory, identity, and movement in world
politics. Millennium-Journal of International Studies,
28(3), 499–521.
Agnew, J. (2003). Geopolitics: Re-visioning world politics (2nd
ed.). Routledge.
Agnew, J. (2015). Revisiting the territorial trap. Nordia Geo-
graphical Publications, 44(4), 43–48.
Arnbak, A., & Van Eijk, N. (2012). Certificate authority col-
lapse: Regulating systemic vulnerabilities in the HTTPS
value chain.
Baig, R. (2019). Could offensive cyber capabilities tip India
and Pakistan to War? Retrieved June 11, 2020, from
https:// thedi plomat. com/ 2019/ 03/ could- offen sive- cyber-
capab iliti es- tip- india- and- pakis tan- to- war/
Baram, G., & Lim, K. (2020). Israel and Iran just showed us
the future of cyberwar with their unusual attacks. In:
Foreign policy. Retrieved June 8, 2020, from https:// forei
gnpol icy. com/ 2020/ 06/ 05/ israel- and- iran- just- showed-
us- the- future- of- cyber war- with- their- unusu al- attac ks/
Barlow, J. P. (1996). A declaration of the independence of
cyberspace. Retrieved February 10, 2020, from https://
homes. eff. org/ ~barlow/ Decla ration- Final. html
Barnard-Wills, D., & Ashenden, D. (2012). Securing virtual
space: Cyber war, cyber terror, and risk. Space and Cul-
ture, 15(2), 110–123.
BBC. (2007). Tallinn tense after deadly riots. BBC, 28 April.
Retrieved March 20, 2015, from http:// news. bbc. co. uk/2/
hi/ europe/ 66021 71. stm
BBC. (2008). Russia ‘shot down Georgia drone’. BBC, 21
April. Retrieved March 23, 2015, from: http:// news. bbc.
co. uk/2/ hi/ 73587 61. stm
Berman, I. (2012). The Iranian cyber threat to the US Home-
land. Statement before the US House of representatives
committee on homeland security subcommittee on cyber-
security, infrastructure protection, and security tech-
nologies and subcommittee on counterterrorism and
intelligence.
Blank, S. (2008). Web war I: Is Europe’s first information war a
new kind of war? Comparative Strategy, 27(3), 227–247.
https:// doi. org/ 10. 1080/ 01495 93080 21853 12
Broad, W., Markoff, J., & Sanger, D. (2011). Stuxnet worm
used against Iran was tested in Israel. The New York
Times, 15 January. Retrieved March 24, 2015, from:
http:// www. nytim es. com/ 2011/ 01/ 16/ world/ middl eeast/
16stu xnet. html
Bronk, C., & Tikk-Ringas, E. (2013). Hack or attack? Shamoon
and the evolution of cyber conflict.
Brunn, S. (1998). The Internet as’ the new world’ of and for
geography: speed, structures, volumes, humility and
civility. GeoJournal, 45(1/2), 5–15.
Bumgarner, J., & Borg, S. (2009). Overview by the US-CCU of
the Cyber campaign against Georgia in August of 2008.
US-CCU Special Report.
Burhan, M., Rehman, R. A., Khan, B., etal. (2018). IoT ele-
ments, layered architectures and security issues: a com-
prehensive survey. Sensors, 18(9), 2796.
Cimpanu, C. (2019). Ransomware attack hits major US data
center provider. Retrieved June 9, 2020, from https://
www. zdnet. com/ artic le/ ranso mware- attack- hits- major-
us- data- center- provi der/
Cisco Systems. (2018). Global cloud index projects cloud traf-
fic to represent 95 percent of total data center traffic by
2021. Retrieved June 9, 2020, from https:// newsr oom.
cisco. com/ press- relea se- conte nt? type= webco ntent & artic
leId= 19088 58
Cisco Systems. (2020). Cisco annual internet report—Cisco
annual internet report (2018–2023) White Paper.
Retrieved June 9, 2020, from https:// www. cisco. com/c/
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5570
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
en/ us/ solut ions/ colla teral/ execu tive- persp ectiv es/ annual-
inter net- report/ white- paper- c11- 741490. html
Clarke, R. A., & Knake, R. (2012). Cyber war: The next threat
to national security and what to do about it (Reprint).
Ecco.
Cloudflare. (2020). Cloudflare DDoS protection|intelligent
DDoS mitigation. Retrieved June 9, 2020, from https://
www. cloud flare. com/ ddos/
Cohen, A., & Hamilton, R. E. (2011). The Russian military
and the Georgia war: Lessons and implications. Army
War College, Strategic Studies Institute. Retrieved June
8, 2020, from https:// apps. dtic. mil/ docs/ citat ions/ ADA54
5578
Connell, M., & Vogler, S. (2017). Russia’s approach to cyber
warfare. Center for Naval Analyses.
Crampton, J. (2018). Geopolitics. In J. Ash, R. Kitchin, & A.
Leszczynski (Eds.), Digital geographies. SAGE Publica-
tions Limited.
Crampton, J. W., Graham, M., Poorthuis, A., et al. (2013).
Beyond the geotag: Situating ‘big data’and leveraging
the potential of the geoweb. Cartography and Geo-
graphic Information Science, 40(2), 130–139.
Davis, J. (2007). Hackers take down the most wired coun-
try in Europe. Retrieved January 22, 2015, from http://
archi ve. wired. com/ polit ics/ secur ity/ magaz ine/ 15- 09/ ff_
eston ia? curre ntPage= all
Deibert, R., & Rohozinski, R. (2010). Liberation vs. con-
trol: The future of cyberspace. Journal of Democracy,
21(4), 43–57.
Deibert, R., Rohozinski, R., & Crete-Nishihata, M. (2012).
Cyclones in cyberspace: Information shaping and
denial in the 2008 Russia-Georgia war. Security Dia-
logue, 43(1), 3–24. https:// doi. org/ 10. 1177/ 09670
10611 431079
Desjardins, J. (2019). The impressive stats behind Amazon’s
dominance of the cloud. Retrieved June 9, 2020, from
https:// www. visua lcapi talist. com/ stats- amazon- domin
ance- cloud/
Diamond, L. (2010). Liberation technology. Journal of Democ-
racy, 21(3), 69–83.
Dobson, J. E., & Fisher, P. F. (2007). The Panopticon’s chang-
ing geography. Geographical Review, 97(3), 307–323.
Durand, M.-F., Lévy, J., & Retaillé, D. (1993). Le monde.
Espaces et systèmes.
Ehala, M. (2009). The bronze soldier: Identity threat and main-
tenance in Estonia. Journal of Baltic Studies, 40(1),
139–158.
Elden, S. (2007). Governmentality, calculation, territory. Envi-
ronment and Planning D, 25(3), 562.
Elden, S. (2009). Terror and territory: The spatial extent of
sovereignty. University Of Minnesota Press.
Elden, S. (2010). Land, terrain, territory. Progress in Human
Geography, 34(6), 799–817.
Elden, S. (2013a). Secure the volume: Vertical geopolitics and
the depth of power. Political Geography, 34, 35–51.
Elden, S. (2013b). The birth of territory. University Of Chi-
cago Press.
Falliere, N., Murchu, L. O., & Chien, E. (2011). W32. stuxnet
dossier. White paper, Symantec Corp., Security Response 5.
Fekete, E., & Warf, B. (2013). Information technology and
the “Arab Spring.The Arab World Geographer, 16(2),
210–227. https:// doi. org/ 10. 5555/ arwg. 16.2. u2q04 27u48
83l635
Finn, P. (2007). Protesters in Moscow harass Estonian envoy
over statue. The Washington Post. Retrieved January 24,
2015, from http:// www. washi ngton post. com/ wp- dyn/
conte nt/ artic le/ 2007/ 05/ 02/ AR200 70502 02547. html
Finin, T. (2010). Is Stuxnet a cyber weapon aimed at an Iranian
nuclear site? Retrieved April 7, 2015, from http:// ebiqu
ity. umbc. edu/ blogg er/ 2010/ 09/ 23/ is- stuxn et-a- cyber-
weapon- aimed- at- an- irani an- nucle ar- site/
FitzGerald, M. C. (1997) Russian views on electronic and
information warfare. In: Proceedings of the third inter-
national command and control research and technol-
ogy symposium: partners for the 21st Century, National
Defense University, 1997.
Flournoy, M., & Sulmeyer, M. (2018). Battlefield Internet. For-
eign Affairs
Galperin, E., Schoen, S., & Eckersley, P. (2011). A post
mortem on the Iranian DigiNotar attack. Electronic
Frontier Foundation. Retrieved March 23, 2015, from
https:// www. eff. org/ deepl inks/ 2011/ 09/ post- mortem-
irani an- digin otar- attack
Gartzke, E. (2013). The myth of cyberwar: Bringing war in
cyberspace back down to earth. International Security,
38(2), 41–73.
Gilder, G. (2006). The Information Factories. Wired Maga-
zine, 14(10), 1–5.
Goh G (2013) DNS hijacking: Government needs to step
in. Retrieved April 7, 2015, from https:// www.
digit alnew sasia. com/ secur ity/ dns- hijac king- gover
nment- needs- to- step- in
Golumbia, D. (2009). The cultural logic of computation.
Harvard University Press.
Gottmann J (1973) The significance of territory. Univ of Vir-
ginia Pr.
Graham, S. (1998). The end of geography or the explosion
of place? Conceptualizing space, place and informa-
tion technology. Progress in Human Geography, 22(2),
165–185.
Graham, M. (2013). Geography/internet: Ethereal alternate
dimensions of cyberspace or grounded augmented
realities? The Geographical Journal, 179(2), 177–182.
https:// doi. org/ 10. 1111/ geoj. 12009
Graham, M. (2015). Information geographies and geogra-
phies of information. Harvard University Press.
Graham, M., Hjorth, I., & Lehdonvirta, V. (2017). Digi-
tal labour and development: impacts of global digital
labour platforms and the gig economy on worker live-
lihoods. Transfer: European Review of Labour and
Research, 23(2), 135–162.
Grant, R. (2007). Victory in cyberspace. Air Force
Association.
Greenberg, A. (2019). Iran’s APT33 hackers are Targeting
Industrial Control Systems. Wired. Retrieved June 8,
2020, from https:// www. wired. com/ story/ iran- apt33-
indus trial- contr ol- syste ms/
Greene, D. (2010). Russian minority struggles in post-Soviet
Estonia. Retrieved March 20, 2015, from http:// www.
npr. org/ templ ates/ story/ story. php? story Id= 12933 3023
Gregory, D. (2011). The everywhere war. The Geographical
Journal, 177(3), 238–250.
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5571
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
Gross, M. J. (2011). A declaration of cyber-war. Vanity Fair,
April. http:// www. vanit yfair. com/ cultu re/ featu res/ 2011/
04/ stuxn et- 201104. print
Gross, M. J. (2013). Silent War. Vanity Fair, July. http://
www. vanit yfair. com/ cultu re/ 2013/ 07/ new- cyber warvi
ctims- ameri can- busin ess. print
Haizler, O. (2017). The United States’ cyber warfare history:
Implications on modern cyber operational structures
and policymaking. Cyber, Intelligence, and Security,
1(1), 31–45.
Haklay, M., Singleton, A., & Parker, C. (2008). Web map-
ping 2.0: The neogeography of the GeoWeb. Geogra-
phy Compass, 2(6), 2011–2039.
Healey, J. (2011). The spectrum of national responsibility
for cyberattacks. The Brown Journal of World Affairs,
18(1), 57–70.
Herzberg, B., Zeifman, I., & Bekerman, D. (2016). Breaking
down Mirai: An IoT DDoS botnet analysis. In: Blog.
Retrieved June 11, 2020, from https:// www. imper va.
com/ blog/ malwa re- analy sis- mirai- ddos- botnet/
Herzog, S. (2011). Revisiting the Estonian cyber attacks:
Digital threats and multinational responses. Journal of
Strategic Security, 4(2), 49–60.
Hollis, D. M. (2011). Cyberwar case study: Georgia 2008.
Small Wars Journal, 6(11), 224–240.
Holloway, J. L. (2018). Reflections on strategic military
geography 2.0. In: Australian contributions to strategic
and military geography (pp. 49–67). Springer.
Hughes, D., & Colarik, A. (2017). The hierarchy of cyber
war definitions. In: Pacific-Asia workshop on intelli-
gence and security informatics (pp. 15–33). Springer.
Huskaj, G., & Wilson, R. L. (2020). Anticipatory ethics for
vulnerability disclosure. In: 15th international confer-
ence on cyber warfare and security (ICCWS), 12–13
March, 2020, Old Dominion University, Norfolk, Vir-
ginia, USA, 2020 (pp. 254–261). Academic Confer-
ences and Publishing International Limited.
Ilves, L. K., Evans, T. J., Cilluffo, F. J., etal. (2016). Euro-
pean Union and NATO global cybersecurity chal-
lenges. Prism, 6(2), 126–141.
Jaeger, P. T., Lin, J., Grimes, J. M., etal. (2009). Where is
the cloud? Geography, economics, environment, and
jurisdiction in cloud computing. First Monday 14(5).
Kaiser, R. (2015). The birth of cyberwar. Political Geogra-
phy, 46, 11–20.
Kamluk, V. (2011). The mystery of Duqu: Part six (the Com-
mand and Control servers). In SecureList. Retrieved
January 24, 2015, from http:// secur elist. com/ blog/ incid
ents/ 31863/ the- myste ry- of- duqu- part- six- the- comma
nd- and- contr ol- serve rs- 36/
Kastenberg, J. E. (2009). Non-intervention and neutrality
in cyberspace: An emerging principle in the national
practice of international law. Air Force Law Review,
64, 43.
Kellerman, A. (2016). Geographic interpretations of the inter-
net. Springer.
Kesan, J. P., & Hayes, C. M. (2011). Mitigative counterstrik-
ing: Self-defense and deterrence in cyberspace. Harvard
Journal of Law & Technology, 25, 429.
King C (2004) Tbilisi Blues. Foreign Affairs. Retrieved March
23, 2015, from http:// www. forei gnaff airs. com/ artic les/
64225/ charl es- king/ tbili si- blues
King, C. (2008). The five-day war: Managing Moscow after the
Georgia crisis. Foreign Affairs, 87, 2.
Kinsley, S. (2013). The matter of ‘virtual’ geographies. Pro-
gress in Human Geography, 38(3), 364–384. https:// doi.
org/ 10. 1177/ 03091 32513 506270
Kitchin, R., & Dodge, M. (2005). Code and the transduction
of space. Annals of the Association of American Geogra-
phers, 95(1), 162–180.
Kitchin, R., & Dodge, M. (2011). Code/space: Software and
everyday life. MIT Press.
Kolossov, V., & O’Loughlin, J. (2011). After the wars in the
south Caucasus state of Georgia: Economic insecurities
and migration in the" De Facto" states of Abkhazia and
South Ossetia. Eurasian Geography and Economics,
52(5), 631–654.
Korns, S. W., & Kastenberg, J. E. (2008). Georgia’s cyber left
hook. Parameters, 38(4), 60–76.
Korolov, M. (2017). Ransomware grows up, goes after data
centers. Retrieved June 9, 2020, from https:// www. datac
enter knowl edge. com/ manage/ ranso mware- grows- goes-
after- data- cente rs
Korolov, M. (2020). New malware makes air-gapped data
center networks less bulletproof. Retrieved June 9, 2020,
from https:// www. datac enter knowl edge. com/ secur ity/
new- malwa re- makes- air- gapped- data- center- netwo rks-
less- bulle tproof
Lambach, D. (2019). The territorialization of cyberspace.
International Studies Review. https:// doi. org/ 10. 1093/ isr/
viz022
Lesk, M. (2007). The new front line: Estonia under cyberas-
sault. Security & Privacy, IEEE, 5(4), 76–79.
Lévy, J. (2007). Globalization as a political invention: Geo-
graphical lenses. Political Geography, 26(1), 13–19.
Libicki, M. C. (2007). Conquest in cyberspace: National secu-
rity and information warfare (1st ed.). Cambridge Uni-
versity Press.
Malecki, E. J. (2002). The economic geography of the Inter-
net’s infrastructure. Economic Geography, 78(4),
399–424.
MalwareBytes. (2019). 2019 State of Malware. https:// resou
rces. malwa rebyt es. com/ files/ 2019/ 01/ Malwa rebyt es-
Labs- 2019- State- of- Malwa re- Report- 2. pdf
Markoff, J. (2008). Before the gunfire, cyberattacks. New York
times, 12, 27–28.
Markoff, J. (2011). Stuxnet software worm hit 5 industrial
facilities in Iran. The New York Times. Retrieved March
23, 2015, from http:// www. nytim es. com/ 2011/ 02/ 13/
scien ce/ 13stu xnet. html
Mueller, M. (2017). Will the internet fragment?: Sovereignty.
John Wiley & Sons.
Mueller, M. (2019). Against sovereignty in cyberspace. Inter-
national Studies Review. https:// doi. org/ 10. 1093/ isr/
viz044
Nakashima, E. (2019). Trump approved cyber-strikes against
Iranian computer database used to plan attacks on
oil tankers. Washington post. Retrieved September 3,
2019, from https:// www. washi ngton post. com/ world/
natio nal- secur ity/ with- trumps- appro val- penta gon- launc
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5572
GeoJournal (2023) 88:5555–5573
1 3
Vol:. (1234567890)
hed- cyber- strik es- again st- iran/ 2019/ 06/ 22/ 250d3 740-
950d- 11e9- b570- 6416e fdc08 03_ story. html
Nye, J. S., Jr. (2011). Nuclear lessons for cyber security. DTIC
Document.
Paglen, T. (2010). Goatsucker: Toward a spatial theory of
state secrecy. Environment and Planning d: Society and
Space, 28(5), 759–771. https:// doi. org/ 10. 1068/ d5308
Perlroth, N., & Hardy, Q. (2013). Online banking attacks were
work of Iran, U.S. Officials Say. The New York Times.
Retrieved March 24, 2015, from http:// www. nytim es.
com/ 2013/ 01/ 09/ techn ology/ online- banki ng- attac ks-
were- work- of- iran- us- offic ials- say. html
Perlroth, N., & Krauss, C. (2018). A cyberattack in Saudi Ara-
bia had a deadly goal. Experts fear another try. The New
York Times. Retrieved June 8, 2020, from https:// www.
nytim es. com/ 2018/ 03/ 15/ techn ology/ saudi- arabia- hacks-
cyber attac ks. html
Peterson, A. (2013). How Iranian hackers used the cloud to
attack major banks and why it matters. In ThinkProgress.
Retrieved March 24, 2015, from http:// think progr ess. org/
secur ity/ 2013/ 01/ 09/ 14241 71/ bank- hacki ngs- iran- botne
ts- cloud/
Rashid, F. (2015). Inside the aftermath of the Saudi Aramco
breach. Retrieved August 1, 2023, from https:// www.
darkr eading. com/ attac ks- breac hes/ inside- the- after
math- of- the- saudi- aramco- breach
Ratnam, G. (2019). Cybersecurity budget up 5 percent
in 2020, White House says. Roll Call. Retrieved
December 14, 2019, from https:// www. rollc all.
com/ news/ white house/ cyber secur ity- up-5- perce
nt- in- 2020- budget- white- house- says
Robinson, M., Jones, K., & Janicke, H. (2015). Cyber war-
fare: Issues and challenges. Computers & Security, 49,
70–94.
Rose-Redwood, R. (2012). With numbers in place: Secu-
rity, territory, and the production of calculable space.
Annals of the Association of American Geographers,
102(2), 295–319.
Sack, R. D. (1986). Human territoriality: Its theory and his-
tory. Cambridge University Press.
Sanger, D. (2012). Obama order sped up wave of cyberat-
tacks against Iran. The New York times, 1, 2012.
Sanger, D. E. (2019). The perfect weapon: War, sabotage,
and fear in the cyber age (Reprint). Broadway Books.
Sassen, S. (1997). Electronic space and power. Journal of
Urban Technology, 4(1), 1–17.
Schmidt, A. (2013). The Estonian cyberattacks. In: J. Healey,
K. Grindal (Eds.) The fierce domain–Conflicts in cyber-
space (pp. 174–193).
Shahbaz, A., & Funk, A. (2020). Freedom on the Net 2020:
The pandemic’s digital shadow. Freedom House.
https:// www. freed omont henet. org/ report/ freed om- on-
the- net/ 2019/ the- crisis- of- social- media
Shakarian, P. (2011). Stuxnet: Cyberwar revolution in mili-
tary affairs. DTIC Document.
Stapleton-Gray, R., & Woodcock, W. (2011). National inter-
net defense—Small states on the skirmish line. Com-
munications of the ACM, 54(3), 50–55.
Stark, H. (2011). Stuxnet Virus Opens New Era of Cyber
War. Der Spiegel. https:// www. spieg el. de/ inter natio nal/
world/ mossad- s- mirac le- weapon- stuxn et- virus- opens-
new- era- of- cyber- war-a- 778912. html
Symantec Security Response. (2011). W32.Duqu: The pre-
cursor to the next Stuxnet. In: Symantec Security
Response. Retrieved January 23, 2015, from http://
www. syman tec. com/ conne ct/ w32_ duqu_ precu rsor_
next_ stuxn et
Takhteyev, Y. (2012). Coding places: Software practice in a
South American City. The MIT Press.
Taye, B. (2020). Targeted, cut off, and left in the Dark: The
#KeepItOn report on internet shutdowns in 2019. Access
Now. Retrieved September 3, 2019, from https:// www.
acces snow. org/ cms/ assets/ uploa ds/ 2019/ 07/ KeepI tOn-
2018- Report. pdf
Thilek (2009) Estonia Cyber Attacks 2007. http:// meeti ng. afrin
ic. net/ afrin ic- 11/ slides/ aaf/ Eston ia_ cyber_ attac ks_ 2007_
latest. pdf
Traynor, I. (2007). Russia accused of unleashing cyberwar to
disable Estonia.
United States Department of Defense. (2023). Summary:
Department of defense cyber strategy 2023. United
States Department of Defense.
van der Meulen, N. (2013). DigiNotar: Dissecting the first
Dutch digital disaster. Journal of Strategic Security, 6(2),
4.
Warf, B. (2007). Geographies of the tropical internet: An over-
view. Singapore Journal of Tropical Geography, 28(2),
219–238.
Warf, B. (2011). Geographies of global Internet censorship.
GeoJournal, 76(1), 1–23.
Warf, B. (2013). Contemporary digital divides in the United
States. Tijdschrift Voor Economische En Sociale Geo-
grafie, 104(1), 1–17.
Warf, B. (2015a). Cyberwar: A new frontier for political geog-
raphy. Political Geography, 46, 89–90. https:// doi. org/ 10.
1016/j. polgeo. 2014. 07. 010
Warf, B. (2015b). The Hermit Kingdom in cyberspace: unveil-
ing the North Korean internet. Information, Communica-
tion & Society, 18(1), 109–120. https:// doi. org/ 10. 1080/
13691 18X. 2014. 940363
Warf, B., & Fekete, E. (2016). Relational geographies of
cyberterrorism and cyberwar. Space and Polity, 20(2),
143–157.
Williams, L. C. (2019). Cyber Command looks to expand.
Retrieved June 10, 2020, from https:// fcw. com/ artic les/
2019/ 02/ 14/ cyber com- budget- nakas one. aspx
Wolff, J. (2014). NATO’s Empty cybersecurity gesture. Slate.
Retrieved March 20, 2015, from http:// www. slate. com/
artic les/ techn ology/ future_ tense/ 2014/ 09/ nato_s_ state
ment_ on_ cyber attac ks_ misses_ some_ funda mental_
points. html
Zero Days. (2016). Documentary.
Zetter, K. (2011a) Did a U.S. Government lab help Israel
develop Stuxnet? Retrieved March 24, 2015.
Zetter, K. (2011b). DigiNotar files for bankruptcy in wake of
devastating hack. Retrieved March 23, 2015.
Zetter, K. (2014). An unprecedented look at Stuxnet, the
World’s first digital weapon. Retrieved March 23, 2015,
from http:// www. wired. com/ 2014/ 11/ count down- to- zero-
day- stuxn et/
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
5573
GeoJournal (2023) 88:5555–5573
1 3
Vol.: (0123456789)
Zetter, K. (2015). Countdown to Zero Day: Stuxnet and the
Launch of the World’s first digital weapon (Reprint).
Broadway Books.
Zetter, K. (2016). Inside the cunning, unprecedented hack of
Ukraine’s power grid. Wired.
Zhang, L. (2012). A Chinese perspective on cyber war. Inter-
national Review of the Red Cross, 94(886), 801–807.
Zook, M. (2000). The web of production: The economic geog-
raphy of commercial Internet content production in the
United States. Environment and Planning A, 32(3),
411–426.
Zook, M. (2008). The geography of the internet industry: Ven-
ture capital, dot-coms, and local knowledge. John Wiley
& Sons.
Zook, M., Dodge, M., Aoyama, Y., etal. (2004). New digital
geographies: Information, communication, and place.
In S. D. Brunn, S. L. Cutter, & J. W. Harrington (Eds.),
Geography and technology (pp. 155–176). Springer.
https:// doi. org/ 10. 1007/ 978-1- 4020- 2353-8_7
Zook, M., Graham, M., Shelton, T., etal. (2010). Volunteered
geographic information and crowdsourcing disaster
relief: A case study of the Haitian earthquake. World
Medical & Health Policy, 2(2), 7–33.
Zook, M. A., & Graham, M. (2007). The creative reconstruc-
tion of the Internet: Google and the privatization of
cyberspace and DigiPlace. Geoforum, 38(6), 1322–1343.
Zuckerman, E., Roberts, H., McGrady, R., etal. (2010). Dis-
tributed denial of service attacks against independent
media and human rights sites. The Berkman Center.
Publisher’s Note Springer Nature remains neutral with regard
to jurisdictional claims in published maps and institutional
affiliations.
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
1.
2.
3.
4.
5.
6.
Terms and Conditions
Springer Nature journal content, brought to you courtesy of Springer Nature Customer Service Center GmbH (“Springer Nature”).
Springer Nature supports a reasonable amount of sharing of research papers by authors, subscribers and authorised users (“Users”),
for small-scale personal, non-commercial use provided that all copyright, trade and service marks and other proprietary notices are
maintained. By accessing, sharing, receiving or otherwise using the Springer Nature journal content you agree to these terms of use
(“Terms”). For these purposes, Springer Nature considers academic use (by researchers and students) to be non-commercial.
These Terms are supplementary and will apply in addition to any applicable website terms and conditions, a relevant site licence or
a personal subscription. These Terms will prevail over any conflict or ambiguity with regards to the relevant terms, a site licence or
a personal subscription (to the extent of the conflict or ambiguity only). For Creative Commons-licensed articles, the terms of the
Creative Commons license used will apply.
We collect and use personal data to provide access to the Springer Nature journal content. We may also use these personal data
internally within ResearchGate and Springer Nature and as agreed share it, in an anonymised way, for purposes of tracking,
analysis and reporting. We will not otherwise disclose your personal data outside the ResearchGate or the Springer Nature group of
companies unless we have your permission as detailed in the Privacy Policy.
While Users may use the Springer Nature journal content for small scale, personal non-commercial use, it is important to note that
Users may not:
use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to
circumvent access control;
use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil
liability, or is otherwise unlawful;
falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by
Springer Nature in writing;
use bots or other automated methods to access the content or redirect messages
override any security feature or exclusionary protocol; or
share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer
Nature journal content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates
revenue, royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain.
Springer Nature journal content cannot be used for inter-library loans and librarians may not upload Springer Nature journal
content on a large scale into their, or any other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any
information or content on this website and may remove it or features or functionality at our sole discretion, at any time with or
without notice. Springer Nature may revoke this licence to you at any time and remove access to any copies of the Springer Nature
journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express
or implied with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or
warranties imposed by law, including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be
licensed from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other
manner not expressly permitted by these Terms, please contact Springer Nature at
onlineservice@springernature.com
... According to (Ogugua Chimezie Obi et al., 2024)cyber defense strategy should include cyber awareness training for all defense personnel and the use of artificial intelligence and behavioral analytics to strengthen resilience to cyber threats. The study underscores the importance of collaboration between countries in sharing threat intelligence to strengthen the global cybersecurity ecosystem (Ashraf, 2023). ...
Article
Full-text available
To optimize legal support for Indonesia's national security, there is aneed for improvements in transparency, accountability, and flexibility.This involves strengthening legal support in areas such ascybersecurity, maritime sovereignty, and defense procurement, allaligned with Indonesia's defense vision. Collaboration betweenmilitary and civilian roles within a national security framework is alsocrucial for resilience against internal and external threats. Legalreforms should focus on increasing transparency, accountability, andflexibility, while upholding democratic values and state sovereignty.According to Soerjono Soekanto's theory of law enforcement, the keyfactors for an effective legal system are laws, law enforcers, facilities,society, and culture. Challenges in the defense and security sector,including border violations, terrorism, transnational crime, and cybersecurity, highlight the urgency for adequate policy support, personnel,and facilities to achieve national goals.
Article
Full-text available
There are widespread worries about the impending fragmentation of the internet. Reviewing the IR literature on cyberspace and internet governance, this paper demonstrates that these debates rest on very traditional understandings of territory and the state, focusing on ways that hard-shelled “power containers” are recreated in cyberspace. Using a practice-oriented conceptual framework drawing on insights from critical geography, the paper highlights how state, corporate, and private actors deterritorialize and reterritorialize cyberspace. Results indicate that there are multiple ways to territorialize cyberspace beyond the reconstruction of the “national territory” and that a multitude of actors engage in territorializing practices. This allows for a more nuanced reevaluation of the “internet fragmentation” discourse.
Article
Full-text available
The use of the Internet is growing in this day and age, so another area has developed to use the Internet, called Internet of Things (IoT). It facilitates the machines and objects to communicate, compute and coordinate with each other. It is an enabler for the intelligence affixed to several essential features of the modern world, such as homes, hospitals, buildings, transports and cities. The security and privacy are some of the critical issues related to the wide application of IoT. Therefore, these issues prevent the wide adoption of the IoT. In this paper, we are presenting an overview about different layered architectures of IoT and attacks regarding security from the perspective of layers. In addition, a review of mechanisms that provide solutions to these issues is presented with their limitations. Furthermore, we have suggested a new secure layered architecture of IoT to overcome these issues.
Book
Today's global politics demands a new look at the concept of territory. From so-called deterritorialized terrorist organizations such as al-Qaeda to U.S.-led overthrows of existing regimes in the Middle East, the relationship between territory and sovereignty is under siege. Unfolding an updated understanding of the concept of territory, Stuart Elden shows how the contemporary "war on terror" is part of a widespread challenge to the connection between the state and its territory. Although the importance of territory has been disputed under globalization, territorial relations have not come to an abrupt end. Rather, Elden argues, the territory/sovereignty relation is being reconfigured. Traditional geopolitical analysis is transformed into a critical device for interrogating hegemonic geopolitics after the Cold War, and is employed in the service of reconsidering discourses of danger that include "failed states," disconnection, and terrorist networks. Looking anew at the "war on terror"; the development and application of U.S. policy; the construction and demonization of rogue states; events in Lebanon, Somalia, and Pakistan; and the wars continuing in Afghanistan and Iraq, Terror and Territory demonstrates how a critical geographical analysis, informed by political theory and history, can offer an urgently needed perspective on world events.
Article
In late April, Israeli media reported on a possible cyberattack on several water and sewage treatment facilities around the country. Israel’s national water agency initially spoke of a technical malfunction, but later acknowledged it was a cyberstrike. According to Israeli officials, the event caused no damage other than limited disruptions in local water distribution systems. At the time, the reports went all but unnoticed amid the flood of pandemic-related media coverage. Israeli media later blamed Iran for the cyberattack, which had been routed through U.S. and European servers. Iran has denied involvement.
Article
In discussing the historical origins of sovereignty, Jens Bartelson (2018, 510) wrote, “Making sense of sovereignty . . . entails making sense of its component terms—supreme authority and territory—and how these terms were forged together into a concept.” The question of sovereignty in cyberspace, however, inverts this historical “forging together,” as territoriality and authority are sundered in cyberspace. This paper argues that attempts to apply sovereignty to cyberspace governance are inappropriate to the domain. It develops a technically grounded definition of “cyberspace” and examines its characteristics as a distinct domain for action, conflict, and governance, while clarifying its relationship to territoriality. It reviews the literature on cyberspace and sovereignty since the early 1990s, showing the emergence of explicitly pro-sovereigntist ideas and practices in the last ten years. The cyber-sovereignty debate is linked to IR research on the historical emergence of sovereignty, demonstrating how technologies routinely change the basis of international order and challenging the presumption that territorial sovereignty is a stable and uniform principle of international organization that can be presumptively applied to the internet. The paper also links the conceptual debate over cyber-sovereignty to the real-world geopolitical struggle over the governance of the internet, showing how different conceptions of sovereignty serve the interests of different powers, notably the United States, Russia, and China. The paper explores the relevance of an alternative governance model for cyberspace based on the global commons concept. It refutes the arguments made against that model and then explains what difference it might make to governance if we conceive of cyberspace in that way.
Chapter
This chapter explores thinking around the strategic aspects of military geography and associated concepts and theories. Strategic Military Geography (SMG) 2.0 incorporates recent developments and links geographical theory and practice to systemic development, a holocentric orientation and triple loop learning, to enhance collaborative strategic analysis. The emphasis is on understanding the connections, interactions and influences across and between three broad geographic domains at a holistic or whole system level. This deliberative approach allows for more comprehensive understandings of the implications and consequences for Australian Defence activities of changes in biophysical, human and cyber geographies. Underpinning this analytical approach is the Hawkesbury heuristic, the key components of which are development of systemic competence, a holocentric (or evolutionary collective learning) orientation and conscious inclusion of multi-level learning. This is particularly relevant to military geography because how we think about things shapes what we do about them, and in an increasingly complex world there is a need for concomitantly complex and collective appreciations of defence and human security issues.