Public Cyberinstitutions: Signaling State Cybercapacity by Nadiya Kostyuk
Total Page:16
File Type:pdf, Size:1020Kb
Public Cyberinstitutions: Signaling State Cybercapacity by Nadiya Kostyuk A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Political Science) in the University of Michigan 2020 Doctoral Committee: Professor James D. Morrow, Co-chair Assistant Professor Yuri M. Zhukov, Co-chair Professor John Ciorciari Professor Susan Landau Assistant Professor Tamar Mitts Professor Nicholas Valentino Nadiya Kostyuk [email protected] ORCID iD: 0000-0003-0596-5752 ©2020 Nadiya Kostyuk For Anastasia, Valentyna, Joan & Amanda. ii Acknowledgments Over a decade ago I left my family in Ukraine in search of a better education. Many people supported me on this journey and, in particular, during my doctoral studies at the University of Michigan (UoM). The members of my dissertation committee provided their support, guidance, patience, understanding, and encouragement throughout this process and were flexible in working with me remotely during the dissertation writing process. Most importantly, I thank them for agreeing to supervise a cybersecurity-centered dissertation—a rather novel topic in political science in which none of the committee members specialized. My dissertation tremendously benefited from close supervision of my dissertation chairs, James D. Morrow and Yuri M. Zhukov. I thank Jim for always being available to discuss how my ideas on cybersecurity fit into the larger international relations picture. I thank Yuri for seeing potential in my cybersecurity research during my first year of graduate school when very few considered this an issue worth studying. John Ciorciari, both as my committee member and as a Director of the International Policy Center at the Ford School, was instrumental in advising me how to advance my ideas within the international policy context. Nick Valentino’s positive and welcoming attitude helped me build confidence in my own work. Susan Landau was the best mentor I could have asked for during my pre-doctoral fellowship at the the Fletcher School. From her, I learned iii how to write about policy and technology. Tamar Mitts was an invaluable member of my committee when I was moving away from Ann Arbor even though she was going throughout many life transitions of her own. Besides my committee, I am grateful to many other UoM faculty members whose insight shaped and sharpened my intellectual thinking: Christian Davenport, Lisa Disch, Chris Fariss, Pauline Jones, Nachomi Ichino, Arthur Lupia, Walter Mebane, Robert Mickey, Ragnhild Nordås, and Iain Osgood. My scholarship has tremendously benefited from rigorous discussions at the Conflict & Peace, Research & Development and the Political Economy Workshop. My fellow graduate students at the department—Kiela Crabtree, Yiland Feng, Deanna Kolberg, Bomi Lee, Jieun Lee, Todd Lehmann, Anil Menon, Blake Miller, Steven Moore, Marzia Oceno, Thomas O’Mealia, Anita Ravishankar, Sine´ad Redmond, Corina Simonelli, James Stickland, Jessica Sun, Roya Talibova, Michael Thompson-Brusstar, Sasha de Vogel, Carly Wayne, Princess Williams, Alton Worthington, Nicole Wu, Nicole Yadon, and Kirill Zhirkov—also left their intellectual mark on my formation as a scholar and made my time in graduate school very memorable. Lastly, the close friendships that I formed outside of the department with Koustav, Laura, Poonam, Renato, Sampurna, and Thembie were my support systems and kept me intact during difficult times. My research has also benefited from the support of the Belfer Center for Science and International Technology at Harvard’s Kennedy School, the Department of Computer Science and the Fletcher School of Law and Diplomacy at Tufts University, and the Cybersecurity, Internet Governance, Digital Economy, and Civic Tech Initiative at Columbia University’s School of International and Public Affairs. Intellectual conversations with Michael Sulmeyer, Ben Buchanan, Trey Herr, Russell Stuart and Ivan Arregu´in-Toft helped me better connect my academic research to ongoing policy conversations. Fiona Cunningham and Greg Falco became my life-long friends and made my time in Cambridge unforgettable. Cybersecurity lunches at Tufts University with Jared Chandler, Amanda Current, Kathleen Fisher, Jeff iv Foster, Carolyn Gideon, Jeff Taliaferro, and Josephine Wolff sharpened my understanding of the technical side of cybersecurity and taught me how to explain my research to an interdisciplinary crowd. I must thank my McNair family who I met when participating in the Ronald E. McNair Post-Baccalaureate Achievement Program during my undergraduate studies at John College of Criminal Justice at the City University of New York. Its Associate Director, S. Ernest Lee, introduced me to the American system of education and provided guidance on how I, a new immigrant, could survive in the Big Apple. My mentors, Dr. Peter Romaniuk and Dr. Gail Garfield, introduced me to scientific research and helped me understand that pursuing intellectual curiosity was my calling. Lastly, I must thank my family—Anna, Adam, and Valentyna—who left their comfortable lives in Ukraine and crossed the ocean to join me in the United States to fulfill our American dream. I am also grateful to my new family that I met in the United States—Michael, Yani, Carol, Dennis, Sean, Kayla, Ryan, Jamie, Richard, Suzanne, Sylvia, Michael, Steven, and Giovanni—who opened the doors of their houses to a complete stranger and made me feel at home. There are no words to describe how grateful I am to my life partner, Jon, who taught me how to appreciate and enjoy my life in the Big Apple, be a true New Yorker, and who has been my rock throughout all these years. I devote this dissertation to my grandmothers—Anastasia, Valentyna, Joan, and Amanda—who remain puzzled as to why it took me so long to obtain a degree, studying something that they cannot completely understand, but whose wisdom and unconditional love have been guiding me in life. v Contents Dedication ii Acknowledgments iii List of Figures viii List of Tables ix Abstract xi Chapter 1 Introduction 1 1.1 Public Cyberinstitutions . 1 1.2 Organization of the Dissertation . 5 1.3 Policy Implications . 9 Chapter 2 Debates over Cybersovereignty as a Driver of Global Cybersecurity Strategy Diffusion 11 2.1 Diffusion of Cybersecurity Strategy . 13 2.2 Additional Alternative Explanations . 17 2.3 Data . 21 2.4 Empirical Strategy . 29 2.5 Findings . 31 2.6 Discussion and Implications . 40 2.7 Appendix . 44 Chapter 3 Diffusion of State Military Cybercapacity: The Theory of Complementarity In Alliances 62 3.1 Signaling State Military Cybercapacity . 65 3.2 Theory of Complementarity of Military Cybercapacity . 70 3.3 Alternative Explanations . 73 3.4 Data . 77 3.5 Empirical Strategy . 82 vi 3.6 Findings . 85 3.7 Discussion and Implications . 93 3.8 Appendix . 96 Chapter 4 Deterrence in the Cyber Realm: Public versus private cybercapacity 126 4.1 Public Cyberinstitutions . 132 4.2 The Theory of Cyber Deterrence . 134 4.3 Comparative Statics . 146 4.4 Evidence . 151 4.5 Discussion and Implications . 160 4.6 Appendix . 164 Chapter 5 Limitations and Future Research 196 5.1 Public Cyberinstitutions: Causes and Effects . 196 5.2 Limitations and Next Steps . 198 Works Cited 205 vii List of Figures 1.1 Targets of Major Cybercampaigns (1999-2016) ................... 2 1.2 Distribution of State Cybercapacity (1999-2016) .................. 4 2.1 Adoption of National Cybersecurity Strategies over Time . 12 2.2 Diffusion of Cybersecurity Strategies (2000-2018) . 24 2.3 Summary of the Interviews .............................. 44 2.4 Correlation Plot: Yearly Data ............................ 55 3.1 New Cybersecurity Responsibility versus New Cybersecurity Military Agency over Time .......................................... 63 3.2 Initiation of Military Cyberapparatuses by NATO countries . 64 3.3 Diffusion of Military Cybercapacity (1999-2018) . 78 3.4 Competing Risks Scheme ............................... 83 3.5 Summary of the Interviews .............................. 96 3.6 Correlation Plot: Yearly Data ............................ 109 3.7 Robustness Checks: Alternative Dependent Variable . 125 4.1 Relationship between Defender’s Type and Overall Cybercapacity as a Function of Iθ ............................................ 139 4.2 Equilibria and Challenger’s Types . 141 4.3 Defender’s Pure Strategy Actions when Facing an Opportunistic Challenger . 144 4.4 Number of Interviews per Country (February-December 2018) . 152 4.5 Extensive Form Game Tree of Deterrence by Public Cyberinstitutions . 168 5.1 Diffusion of State Cybersecurity Organizations (1987-2018) . 203 viii List of Tables 2.1 Variables and their Sources Included in the Analysis . 28 2.2 Influence of strategies of cybersovereignty opponents and threat environment on national strategy adoption (hazard ratios) ...................... 32 2.3 Robustness of diffusion via strategies of cybersovereignty opponents: Alternative network measures (hazard ratios) .......................... 33 2.3 Robustness of diffusion via strategies of cybersovereignty opponents: Alternative network measures (hazard ratios) .......................... 35 2.4 Robustness of diffusion via strategies of cybersovereignty opponents: Cumulative influence of alternative network measures (hazard ratios) . 36 2.5 Robustness of diffusion via strategies of cybersovereignty opponents: Alternative measure of the adopted strategies (hazard ratios) . 37 2.6 Robustness of diffusion via strategies of cybersovereignty opponents: Alternative Model Specification (odds-ratios) ..........................