Introduction
Today, news of cyber attacks and various security risks related to information and communication technologies (ICT) are part of the media staple diet.Footnote 1 Within Critical Security Studies, attention has lately turned towards how cyber security mould spatialFootnote 2, temporal,Footnote 3 and functionalFootnote 4 aspects of security. This article draws on Annemarie Mol's notion of ontological politicsFootnote 5 to develop an analytical sensitivity that can help us to examine and question these many faces of cyber security and their transformative political effects. We emphasise how studies on cyber security need to take into account the proliferation and entanglement of human and non-human agency and the multiplication of political actors, sites, and spaces of security outside those of traditional state actors and institutions. Attention to the enactment of new security agencies, actors, sites, and spaces are paramount, since the proliferation of ICT fosters diffusion and decentring of security practices.Footnote 6 Studying the politics of technologised security ‘suggests a powerful need for new conceptual and analytical resources’Footnote 7 as well as cyber security research aimed ‘at the intersection between the technical and social’.Footnote 8 Consequently, we argue, a reliance on state-centrism, human agency, and discourse is not entirely satisfactory for the study of security that have automatic and robotic characteristics, as the subsequent study of the Mirai botnet will show.Footnote 9
The article hence advances Critical Security Studies scholarship on cyber security by arguing that a starting point for engaging with the enactment of cyber security is its ontologically instable socio-material entanglements as well as the opening of security politics that stems from this analytical move. Ontological politics enables us to explore how diverse actors shape contemporary technological security across different sites and spaces. In addition, it enables an empirically driven engagement with how the transformative dynamics of ICT co-constitute cyber security politics by propelling into the limelight the agential qualities of ICT. Rather than politics being eclipsed or erased by the technologisation of security,Footnote 10 ontological politics helps us to examine how dynamic socio-material entanglements condition different understandings of what cyber security is and the kind of politics needed to accommodate it. By scrutinising the agencies, actors, sites, and spaces that emerged with the Mirai botnet, it becomes possible to understand how these ‘security arrangements’Footnote 11 transform cyber security politics by conditioning different kinds of political interferences, controversies, and imaginations.Footnote 12 The ontological political sensitivity thereby supports a continuous questioning that can help to spur engagement with otherwise often elusive technological developments and practices of (in)security.
Tangential observations have been made in recent advances of the critical cyber security studies literature.Footnote 13 Scholars have introduced the vocabulary of Actor-Network-Theory,Footnote 14 STS,Footnote 15 and assemblage theoryFootnote 16 to analyse the socio-material creation of cyber security. Thierry Balzacq and Myriam Dunn CaveltyFootnote 17 are among the most prominent of these thinkers. They examine the links between cyber-security incidents and politics, via concepts and methodologies borrowed from ANT, and demonstrate how malware (malicious software) and cyber-security incidents unfold in and actively contribute to the enactment of ‘three kinds of space (regions, networks and fluids), each activating different types of political interventions’.Footnote 18 We expand on their suggested way of researching cyber security by showing how an ontological political approach enables us to study and question how multiple agencies, actors, sites, and space become entangled in ‘securitizing process that creates insecurities mainly through dispersing, through continuously associating, reassociating, tweaking and experimenting with materials, procedures, regulations’.Footnote 19 The introduction of an ontological political sensitivity should hence be understood as a particular methodological and analytical move that aims at bringing out the political significance of otherwise often scattered and insignificant practices, devices and relations,Footnote 20 as the emergence of insecurities is not taken to happen as an individualised and discursive act, but in collective, performative, and relational processes.Footnote 21 We thus take ontological politics to be a sensitising termFootnote 22 – rather than a consistent and coherent theory – which enables us to approach the relation between the security political and the ontological as one of questioning and thus remaining true to the idea of events and situations as always emerging and constituting in multiple ways.Footnote 23 In doing so, we respond to the recent calls for closer engagement between STS and cyber security studies moving forward.Footnote 24
To demonstrate the merits of an engagement with the ontological politics of cyber security, we first discuss the limitations of the current literature on cyber security in Critical Security Studies. Second, we introduce Mol's notion of ontological politics as a way of paying greater attention to the enactment of cyber security in ontologically instable socio-material entanglements as well as the opening of security politics conditioned by this move. Third, by investigating the case of the Mirai botnetFootnote 25 we zoom in on how the ontological politics of cyber security sensitises us to the proliferation and entanglement of security agency and the multiplication of actors, sites, and spaces of cyber security. Fourth, and finally, we discuss the wider theoretical and normative-democratic implications of an engagement with the ontological politics of security by laying out three avenues for future conversation between ontological politics and Critical Security Studies.
Extending cyber security beyond national security discourse
Despite its prominence in policy and media discourse, the Critical Security Studies literature on cyber security is still nascent.Footnote 26 With a few noticeable exceptions touched upon above, Critical Security Studies scholars have predominantly approached cyber security through the prism of securitisation theory.Footnote 27 They have turned away from a focus on how best to manage cyber threats and risksFootnote 28 to examine instead the discursive framing of cyber security and the use of metaphors and analogies in such discourses.Footnote 29 Thereby they have importantly contributed to a critical engagement with the link between cyber security and national security, as well as the political effects of the particular threat representations.
However, as we show in this section, the focus on securitisation has two important consequences: first, it largely confines cyber security to national security and, second, it subsumes the political role of technology to security discourse. In other words, the critical literature predominantly frames cyber security in terms of continuation of the existing securitisation literature rather than as something that may profoundly challenge and transform our understanding of security politics. While it is generally a good idea to refrain from readily accepting the hype of radical transformation,Footnote 30 a narrow confinement of the critical study of cyber security to securitisation theory blinds us to the many cyber security practices that challenge and evade this form of security. First, notwithstanding that it extends cyber security beyond the military domain, the critical literature tends to place cyber security within the realm of national security and give primacy to national security actors. Its basis in securitisation theory brings to the fore the discursive framing of cyber threats and risks as national security issues, which through reference to urgency and survival are placed beyond normal politics and require extraordinary measures. Moreover, it predominantly focuses on statements and practices of government elites.Footnote 31 Most of the literature hence examines the securitising moves by changing US administrations; whereas some also include the only partially successful securitisation by the Estonian government of the alleged Russian attack in 2007Footnote 32 and even the securitisation of IT by the Swedish ‘military-bureaucratic establishment’.Footnote 33
Cavelty challenges the focus on national security elites and calls for ‘a broad understanding of cyber-security as discursive practice by a multitude of actors inside and outside of government’.Footnote 34 She points to heterogeneous political manifestations of various actors linked to different threat representations. In the end she, nevertheless, returns to the realm of national security and argues that her engagement with such threat representations ‘allows for a more nuanced understanding of how cyber-security is presented as a national security issue’.Footnote 35 Likewise, Lene Hansen and Helen Nissenbaum emphasise the significance of everyday security practices in their grammar of cyber security to highlight how securitising actors may mobilise the experiences of regular people, ‘connecting everyday security practices with hyper cascading scenarios’.Footnote 36 Yet, the argument is still that this is central to ‘move cyber security out of the realm of “corporate security” or “consumer trust” and into the modality of “proper” national ⁄ societal security’.Footnote 37 In sum, cyber security is primarily embedded within state and national security representations. This entails a focus on exceptional security politics as well as the involvement of state agencies and bureaucracies in the production of security.
Second, in the securitisation literature on cyber security the role of ICT and its material properties is largely subsumed to discourse. To be sure, acknowledgments of the importance of both technology and its materiality in shaping the politics of cyber security can be found in the literature. For example, Cavelty stresses that cyber security is ‘a type of security that unfolds in and through cyberspace; the making and practice of cyber-security is both constrained and enabled by this environment’.Footnote 38 In a similar vein, Ralf Bendrath, Johan Eriksson, and Giampiero Giacomello argue that ‘cyberspace is a landscape where every action is only possible because the technical systems provide an artificial environment that is built to allow it. The means of an attack therefore change from system to system, from network to network.’Footnote 39 Still this literature predominantly focuses on the discursive constitution or framing of cyber security as an issue of national security. The political status of technology and its materiality is left rather unclear, as primacy is given to the linguistic dimension of cyber security.
This ambiguity in relation to technology and its materiality is also present in Hansen and Nissenbaum's argument that cyber security involves not just the speech act of securitisation, but also that of ‘technification’:
[Technifications] construct an issue as reliant upon technical, expert knowledge, but … also simultaneously presuppose a politically and normatively neutral agenda that technology serves … Cyber security discourse's simultaneous securitization and technification work to prevent it from being politicized in that is precisely through rational technical discourse that securitization may ‘hide’ its own political roots.Footnote 40
They point to the importance of not just expertise – which plays a central role in most security practices – but of a particular kind of technical expertise. Nevertheless, Hansen and Nissenbaum remain at the level of discourse and thereby subsume the role played by ICT and its material properties to its constitution in discursive practices.Footnote 41 By giving the social (discourse) primacy to the technological, they hence, ironically, contribute to downplaying the political role of ICT.
If we make do with the prism of securitisation theory alone, we critically limit what cyber security can be. Indeed, as Balzacq and Cavelty have similarly argued, ‘cyber-security is both less and more’Footnote 42 than the securitising moves of national security elites. Owing to the dispersed and dynamic nature of digital technologies, much of the politics of cyber security play out among actors and in sites and spaces of security politics that evade traditional forms of national security.Footnote 43 These ‘multifaceted relationships cannot be captured by static and often state-centric theories’.Footnote 44 Therefore, we need to enable analytical and political purchase to critically engage with these other actors, agencies, sites, and spaces of security politics as well. To emphasise the contingent and relational enactment of insecurities and the transformative role of technology, we ought to attune our analysis to what we, following Annemarie Mol, call the ontological politics of cyber security.Footnote 45
This is also a normative, democratic argument. Knowledge production – academic and otherwise – is as much an intervention in the politics of cyber security as the production of knowledge about it.Footnote 46 To contest cyber-security actors and practices and hold them to account, we ought to (also) attend to those that defy the exceptional politics of national security actors and perhaps even fall outside the formal political system as such. Our emphasis on the ontological politics of cyber security, to which we will now turn, opens up our engagement with cyber security by sensitising our analyses to the heterogeneous relations through which insecurities are enacted, as well as their political implications. Following these assumptions, cyber security is taken to be a form of ontological politics, in which the ontological status of phenomena such as botnets or malware – as well as ways of knowing and researching them – is the product of dynamic socio-technical relations unfolding over time – be they in contestation, controversy, or concurrence.
Ontological politics: Towards multiple cyber securities
In calling attention to the ontological politics of cyber security, we draw on insights from Science and Technology Studies (STS). In doing so, we also seek to further strengthen the conversation between the study of cyber security and current debates in other parts of IR and Critical Security Studies that draw on similar insights from STS to include the relational, technological, and material aspects of contemporary security politics.Footnote 47 STS has in recent years experienced what has been called an ‘ontological turn’. This ‘turn’ to ontology in STS has been promoted, exactly to describe and understand how science and technology partake in changing the world materially, socially, technologically, politically, and morally.Footnote 48 Indeed, it entails an emphasis on alterity and on interfering with assumptions about the stability of reality. It follows that the purpose of doing research this way is not, as Steve Woolgar and Javier Lezaun note,
to arrive at a better formulation of the reality of the world, or of the ways in which the world is real, but to interfere with the assumption of a singular, ordered world, and to do so by re-specifying hefty meta-physical questions in mundane settings and in relation to apparently stabilized objects.Footnote 49
This is why we, following Marisol de la Cadena and Marianne Elisabeth Lien, find it more accurate to speak of an ‘ontological opening’ rather than an ‘ontological turn’, to signal an openness towards matters that are usually taken for granted rather than a radical turn away from something else.Footnote 50
Hence, attention to the ontological politics of cyber security does not necessarily replace or preclude the analytical utility of, for example, securitisation theory – or, as Balzacq and Cavelty suggest, ANT. Rather, ontological politics should serve as a guiding assumption in analytical strategies for a more experimental engagement with cyber security. That is, we should engage with cyber security as if there are multiple ‘cyber securities’, so to speak. This move does not involve substantive claims about what the theory or politics cyber security is made up of. Rather, in line with the recent debate on the role of methods in Critical Security Studies, getting at the ‘stuff’ of the ontological politics of cyber security requires an experimental engagement with empirical practices.Footnote 51 This critical analytical sensibility to the dynamic, heterogeneous, and transient assembling of cyber securityFootnote 52 draws attention to the need for situated and contextual analyses.
Mol's notion of ontological politics draws attention to the ontological open-endedness of cyber security. It thereby enables an engagement with cyber security that, rather than a priori definition of its ontology, focuses on how security itself it at stake when it is brought into being in socio-material entanglements.Footnote 53 In linking ontology with politics, Mol suggests that ‘ontology is not given in the order of things, but that, instead, ontologies are brought into being, sustained, or allowed to wither away in common day-to-day, sociomaterial practices’.Footnote 54 Consequently, ontologies of cyber securities emerge in process of linking together heterogeneous elements. Cyber securities are always in the making and hence precarious and, potentially, unstable.Footnote 55 Hence, cyber security ontologies are mattering through their ‘continued enactment and re-enactment in situated practices’.Footnote 56
In other words, rather than a ‘matter of fact’, cyber security is a ‘matter of concern’.Footnote 57 When cyber security realities are enacted in socio-material arrangements ‘it becomes important to explore the politics of the prevailing realities, the differences and patterns of interference that they make, and which realities we want to live with. This is the salience of ‘ontological multiplicity’.Footnote 58 That is to say that the ontological status of cyber security is open to contestation; in short, it is political.Footnote 59 This focus of analysis points towards examinations pertaining to how cyber security arrangements are assembled and become entangled with politics over time. Concretely, our analysis of the Mirai botnet looks into how relations between human and non-human actors are made, remade, and stabilised over time, as well as how they make a difference to the enactment of security and the conditions of politics.Footnote 60
This has two important implications. First, the reality of security politics is relational; ‘to be is to be related’.Footnote 61 Importantly, Mol extends these relations beyond the social to include technologies and other material artefacts and non-human entities by emphasising the socio-material nature of practices. This fits well with the study of cyber security in that cyber security does not emerge as a strictly human activity but rather compositions of people and technological and material artefacts.Footnote 62 Hence, to paraphrase Langdon Winner, artefacts have politics too.Footnote 63 Yet the political role of technologies vary. The relationship between human and non-human elements is not a straightforward one but one of complex and dynamic co-constitution. How the affordances of the various technologies shape and co-produce security politics depends on the devices, practices and relations in question.Footnote 64 This is why we need to study specific, empirical instances of how the interplay between various human and non-human elements enact diffuse insecurities and threat images to get at the ontological politics of cyber security.
Second, an emphasis on ontological politics is also an emphasis on the multiplicity of cyber security. When relations are situated in specific, local practices and new relations are continuously forged, it follows that the ontologies of cyber security potentially multiply. Cyber security is hence, ontologically speaking, ‘more than one – but less than many’.Footnote 65 However, this is not to say that the different realities of cyber security are mutually exclusive; again, we may, for example, very well encounter both cyber-security practices that defy traditional national security and exceptional politics and practices that take the form of securitisation. Nor is it, however, to say that such realities co-exist side by side as discrete and coherent entities. In fact, we need to accept ‘the possibility that heterogeneous elements can hold together without actually forming a coherent whole’.Footnote 66 Consequently, the different realities may both overlap and interfere with one another in various complex ways. This opens up the space for studying security political controversies.Footnote 67 In other words, the ontological politics of cyber security does not imply a competition of different perspectives on cyber security but competing realities of cyber security.Footnote 68
In sum, attention to the ontological politics of cyber security points us to the relational, socio-material, and heterogeneous nature of competing realities of cyber security, including the power to perform these realties in given ways and to certain consequences. However, to say that cyber security is multiple is only a first step. It does not, in and of itself, tell us something about the content of the ontological politics of cyber security. Rather, the purpose of turning to the ontological politics is, as argued above, to enable an ‘ontological opening” for the engagement with socio-material entanglements by interfering with the assumption of a singular kind of security. This paves the way for different kinds of analyses. It enables us to highlight and juxtapose things that, to paraphrase Mol and Law, ‘relate but don't add up’.Footnote 69 It reminds us that ‘there is no obvious context out there waiting to be revealed, no theory providing the obvious analytical anchor for the material at hand, but instead, endless opportunities for association and juxtaposition, each with the potential for taking the analysis in a new direction’.Footnote 70 As we will demonstrate in the following section through an engagement with the case of the Mirai botnet, letting this insight guide our analysis allows for a sensibility towards how cyber security emerge in dynamic socio-technical relations distributed among various agencies, actors, sites and spaces, including the security politics it conditions.
Mirai, Mirai on the wall, who's the least secure of them all?
‘We are living in a new era of computing, information, and communication technology, that, as many are saying, pushes forward seamless interaction between humans, nature, and physical objects and is captured within the ecosystems of Internet of Things (IoT).’Footnote 71 As a result, we face an increasingly interconnected, interdependent, and interoperable networked world. With the ongoing implementation of 5G network infrastructure and the expansion of the IoT domain into our cars, healthcare devices, (smart) cities and more, the insecurity of smart Internet-connected devices has thus become more concerning than ever.Footnote 72 However, the existence of botnets exploiting vulnerable, often poorly secured and configured, Internet-facing devices has been known and exploited for many years.
Yet, the Mirai botnet ‘took the Internet by storm in 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks’.Footnote 73 The attack caused millions of Internet users to be unable to connect to numerous websites. The attack hereby ‘served as an indication of the potential devastating impact that these vulnerable [IoT] devices represent’.Footnote 74 More specifically, the Mirai botnet is almost exclusively comprised of thousands (approximately 2,500,000 by the end of October 2016)Footnote 75 of insecure IoT devices – that is, ICT-enabled devices such as surveillance cameras, webcams, digital video recorders, routers, and other Internet-embedded devices. In the fall of 2016, the Mirai botnet targeted the prominent cyber security blog Krebs on SecurityFootnote 76 and the French cloud service provider OVHFootnote 77 with massive DDoS-attacks. On 12 October 2016, another immense DDoS-attack – targeting the American Internet service provider Dyn. The attack, which authorities firstly feared was the work of a hostile state, turned out to be the work of the Mirai botnet. A number of additional high profile attacks later followed.Footnote 78
The Mirai botnet presents a crucial case to study because the attacks set new precedents for the magnitude and impact of IoT-based DDoS attacks. Considering this, Mirai is not just a sea-changing case; it also seems aptly named, as it translates to ‘the future’ from Japanese. Moreover, it is a significant case to analyse since its operation and activity informs us about the particular challenges to cyber security studies brought about by the development of 5G infrastructure, IoT and IoT-enabled botnets. However, the Mirai botnet sits unease between the conventional focus on either extraordinary and exceptional politics or everyday bureaucratic expertise practices. The still active Mirai malware, the botnets it has helped create and the attacks these botnets exercise demonstrate a diffusion of cyber-security practices that disperse multiple insecurities. The socio-material assembling of the Mirai botnet creates insecurities both through a series of remarkable events and as a continuing, mundane vulnerability.Footnote 79
Analysing the Mirai botnet, we draw from a diverse set of vantage points including academic analysis, cyber security company reports, media coverage, and statements from public authorities all concerning the composition, evolution, and effect of the Mirai botnet. We take as a starting point that a botnet can be seen ‘as a hybrid sociotechnical assemblage of human and nonhuman actors’.Footnote 80 In other words, botnets ‘are neither fully human nor completely machine driven’.Footnote 81 In doing so, we look at the creation and composition of the infrastructure of the Mirai botnet including its connective and collective political effects.Footnote 82 In accordance with Mol's notion of ontological politics, this emphasises the need to take into account the complex human-technological dynamics and consider how the agencies and affordances of technological artefacts help insecurities to emerge and shape the conditions of possibility for cyber security politics.Footnote 83 Indeed, we look into the ways in which agential and security political institutional repertoires are simultaneously challenged and reaffirmed by the socio-material assembling of the Mirai botnet. Alongside the broadening of cyber-security agency our analysis, first, shows how the Mirai botnet speaks to the historical position of the nation-state – and with it the international system of states – as the spatio-political fulcrum of security politics.Footnote 84 Second, it moves on to explore how this opens up an important discussion on responsibility and accountability across multiple actors and sites of cyber security.
Constructing the botnet: Extending cyber security agencies and spaces
The Mirai malware tells a story of the entanglement of human and non-human agency and the emergence of (un)intended consequences and (un)expected insecurities. A story that shines new light on how cyber security and political agency emerge in a world embedded with IoT devices.Footnote 85 Mirai is a malware that turns networked devices into remotely controlled bots that can be used as part of a botnet in large-scale DDoS-attack. The Mirai malware is designed to automatically scan the Internet in order to discover specific IoT devices, infect these, and conscript them into the botnet. Initially, all that the Mirai-infected IoT devices shared was a piece of insecure software. This changed, however, as the Mirai malware was released, creating new relations and networks.
The Mirai botnet self-propagates by exploiting hardcoded administrative credentials present in the relevant IoT devices. The process in which the single IoT device becomes part of the botnet is delegated to the devices themselves and the software embedded into them.Footnote 86 These features of the Mirai malware illuminate the role and consequences of (un)intended non-human agency in analysing IoT and DDoS-attacks. The insecure, mundane IoT devices enabled hackers to construct the Mirai botnet. Moreover, the infected IoT devices were transformed by the creation of a command and control function between the IoT entities and the botherder.Footnote 87 Through this relation, the botherder became able to draw on the combined force of the Mirai botnet and direct it to a target through various forms of DDoS attacks. The relation between human, device, and technology changed as new IoT entities became part of the networked and semi-automated botnet, whose performances and relationships continuously developed new shapes and effects over time. As an IBM researcher recently put it, ‘Mirai malware and its variants are evolving with their operator's intents, delivering a variety of exploits and increasingly aimed against enterprise environments’ and continued ‘as IoT devices become more common among households and large organizations, Mirai and its variants will continue to evolve to adapt to the changing environments and targets of its choice’.Footnote 88 The functionality of the Mirai botnet thus depended on the complex mutual interdependencies concerning the malware and IoT devices ability to operate in an ‘autonomous and efficient manner as well as on the efforts and skills of the botherder’,Footnote 89 which thereby transcend bounded human rationality and a means-end reasoning.
Consequently, the behaviour of the Mirai botnet cannot solely be backtracked to a human agent, that is, the hacker or botherder. This is not to deny that the botherder played a crucial role in assembling the Mirai botnet, but he/she was not the only actor initiating, building, and developing the botnet. The performance of the botnet is itself a ‘dance of agency’Footnote 90 in which decision is not that of sovereign, human intentionality, nor non-human, technological determinism. Rather, there is a ‘dialectic of resistance and accommodation’Footnote 91 in which the intentional actions of the botherder and the agency of malware and devices alter and modify each other. This spurs us to move beyond reductionist and functional technological agency in the singular. The IoT devices in the Mirai botnet express simultaneous modes of engaging with and co-constituting the world. The IoT devices were at the same time, at least, for example, a surveillance camera – partaking in networks with other surveillance cameras, guards, surveilled places, spaces, and people – and part of a malicious Mirai botnet network. As Mol puts it, drawing on Marilyn Strathern, ‘being one shapes and informs the other while they are also different … they are partially connected, more than one and less than many’.Footnote 92
In addition, the Mirai botnet is mobile. It is always moving somewhere to some effect, but it is never entirely predictable where this is. Most lately, security researches have shown that ‘Mirai is now made up of several different related botnets, which sometimes compete with each other.’Footnote 93 At the same time – compared to other botnets that target IoT devices –, Mirai and variants of Mirai were by far the most popular malware to hit enterprise networks in 2018 and the beginning of 2019.Footnote 94 This is a prime example of how the delegation of one task to a non-human artefact can enable unintended agency when the artefact enters into new networks comprised of ICT, humans, and infrastructures. The Mirai botnet(s) thus resembles what Jane Bennet has called an assemblage of never fixed blocks but open-ended wholes.Footnote 95 Hence, mundane IoT entities containing the specific software targeted by the Mirai malware carried with them a not yet actualised potential to become part of multiple botnets and thereby a potentially transnational political security issue, as the botnets wielded their damaging effects unrestricted by national borders and jurisdictions.
The IP addresses of the infected devices suggest that the geographical performance of the Mirai botnet was extremely effective as the devices were located in over 164 countries.Footnote 96 Despite the density being higher in some countries than others,Footnote 97 this demonstrates how the Mirai botnet could not be located in a particular physical place of origin. On the one hand, it is ostensibly global in scope given the presence of infected devices in countries across the globe. Yet, on the other hand, it is local if we turn to the vulnerability of the individual device. Hence, the global and the local cannot neatly by separated, but are inherently entangled in the case of Mirai. It is spatio-temporally emergent and makes numerous agencies and realities (in)compatible.
This is indicative of a broader point about cyber security. As Simon and de Goede remind us, ‘the complex interconnection of cyber-infrastructures forms a vast topological mesh where small events and disruptions can impact relations and elements near and far’.Footnote 98 This is not to say that cyber security does away with the relevance of state territories and metrical distances altogether. The Mirai-botnet consists partially of individual insecure material devices situated in particular geographical locations private houses, private companies, public authorities and sovereign territory. Likewise, the aggregation of the spread of infected devices mapped out on countries and regions can be said to ‘perform a version of the social in which space is exclusive: there are neat divisions with no overlap based on comfortable geography of well-known political entities’.Footnote 99 Political spaces are enacted that are in line with traditional Euclidian space, scale, and metrics. However, the Mirai botnet demonstrates how these traditional spaces are also challenged as the natural spatio-political foundation for our understanding of security, as complex and dynamic socio-technical assemblages, such as the Mirai botnet, enable new potential spaces – and spatialities – of security.
In sum, thinking cyber security through the lens of ontological politics allows us to grasp the associational and operable evolution of the Mirai botnet, as it consists of IoT ‘entities with uncertain boundaries, entities that hesitate, quake, and induce perplexity’.Footnote 100 Entities, of which ‘each one harbors a simultaneous variety of virtual modes of expression and which subset will be actualized at any given moment is not predictable with confidence’.Footnote 101 The ontological political lens equips us to better understand and demonstrate how the increasing pervasiveness of IoT and 5G network means that even mundane artefacts – such as a refrigerator, a washing machine, or a child's toy – may be both agents and objects of security, which blur the boundaries between human and non-human agency and co-constitute multiple and overlapping political spaces. These spaces need not be parallel and discrete but may be overlapping, lead to controversies, and/or be folded into each other.Footnote 102 To paraphrase Mol and Law, they ‘relate but don't add up’.Footnote 103 This raises profound questions regarding the sites of cyber security politics and the location of responsibility and accountability, which we will turn to in the next section.
Placing responsibility and assigning accountability across multiple actors and sites of cyber security
A common fear of distributed approaches to agency is that they jeopardise attempts to assign responsibility to people and hold traditional political bodies accountable.Footnote 104 In this case, however, the significance of technological agency and the proliferation of security political spaces opens up an important discussion about responsibility and accountability beyond the agency proper to the assemblage of IoT devices itself, as it broadens the range of places to look for sources of harmful effect. In other words, the central role that infected IoT devices play in the Mirai botnet lead to the dispersal of security politics well beyond the traditional arena of (inter)national security and into multiple new sites. Consequently, the case of the Mirai botnet also points to the significance of human actors beyond the conventional sites and institutions related to national security actors.
The Mirai botnet demonstrates how the traditional tension between the state as either the provider of security or the threat to itFootnote 105 is simultaneously reaffirmed and challenged by the spread of ICT. The assembling of the Mirai botnet and the attacks it exercised reveal how human and non-human entanglements enact dispersed and decentred insecurities and threat images. These dispersed and decentred insecurities and threat images emerged together with controversies in multiple sites carried out over political, economic, and technological queries. To understand the political significance of these insecurities and controversies, we place them in larger societal context,Footnote 106 specifically by directing attention to how the Mirai case brings to the fore the security politics of particular associations of IoT devices, states, corporate actors, and regular citizens.
Today, most of the ICT infrastructure is privately owned and operated. By knocking down the services of the private DNS provider DYN and the cloud service provider OVH, the Mirai botnet disrupted the Internet services of people across the world for several hours. Corporate security incidents may thus have repercussions far beyond the individual company itself. This aspect of cyber security is becoming progressively more prominent alongside the implementation and development of the Internet of Things (IoT), cloud computing, and 5G-network technology, as the future backbone of our critical infrastructure, including so-called smart cities and self-driving cars. This underscores the importance of the critical issue of the responsibility or the ‘responsibilisation’Footnote 107 of private companies as partners in security practices, given their role as suppliers of vital elements of our critical information infrastructure.Footnote 108 The Mirai attacks demonstrate that deciding who does and does not deserve protection from DDoS-attacks is for private companies to decide. These decisions include considerations concerning protection of and access to societal digital infrastructures. The adequacy and decision-making of private companies is indeed central to the creation of insecurities and the continued operation of an increasing number of functions in contemporary society. If we take this to the extreme private companies may thus in some cases, in the words of Microsoft President and Chief Legal Officer Brad Smith, potentially be ‘not only the plane of battle’ but ‘the world's first responders’.Footnote 109
Another factor that spurred the assembling and spread of the Mirai botnet is the rampant use of insecure default passwords in IoT products. The various IoT manufacturers and the entire production and supply chain of these devices hence become relevant sites of security politics. As technical security research has shown, ‘Mirai's ultimate device composition was strongly influenced by the market shares and design decisions of a handful of consumer electronics manufacturers’.Footnote 110 Their devices and components were sold downstream to other companies, who then installed them in their products. However, this meant that a wide array of different IoT devices had the same factory-set default usernames and passwords – and in some cases even hard-wired into the components, making them impossible to change – and hence they were easy targets in the efforts to enlarge the Mirai botnet.Footnote 111 Private companies are hence central to the shaping of a fragile IoT ecosystem. Arguably, ‘the absence of security best practices – established in response to desktop worms and malware over the last two decades – has created an IoT substrate ripe for exploitation’.Footnote 112 Research data indicates that ‘some of the world's top manufacturers of consumer electronics lacked sufficient security practices to mitigate threats like Mirai’.Footnote 113 These manufactures will play a key part in ameliorating IoT vulnerabilities. This shows how private companies are often central actors – and not only when mobilised as partners in national security practicesFootnote 114 – when it comes to both mitigating and creating cyber vulnerabilities. However, as discussed in the previous section, the assembling of devices spanned territorial borders and legal jurisdictions, exacerbating the challenge of coordinating technical fixes and promulgating security policies. The analysis of the Mirai botnet hence shows that it is compulsory to (re)consider the distribution of security political authority, responsibility, and accountability between states, companies, and citizens.
On that note, cyber security experts, such as Bruce Schneier, have emphasised the need for new forms of government regulation of IoT devices to alleviate the security risks that they currently pose due to poor security settings. In a comment following the initial Mirai attacks Schneier argued that the universe of IoT will largely remain insecure and open to compromise unless and until government steps in and fixes the problem.
When we have market failures, government is the only solution. The government could impose security regulations on IoT manufacturers, forcing them to make their devices secure even though their customers don't care. They could impose liabilities on manufacturers, allowing people like Brian Krebs to sue them. Any of these would raise the cost of insecurity and give companies incentives to spend money making their devices secure.Footnote 115
Schneier thereby bring back in the state and reaffirm its position as a provider of security through regulating the market. However, one impediment to such regulation is people's seemingly insatiable demand for new devices to perform a constantly increasing number of tasks in everyday households. Currently, price and functionality generally seem to be prioritised at the expense of security. Yet, even if these priorities switch (and likely only among those who can afford to place security over price), there are already millions of insecure IoT devices in private homes across the globe. Hence, as suggested by both Cavelty and Hansen and Nissenbaum, we also need to take into account the behaviour of regular citizens.Footnote 116
Consumers buttress the increasing supply of so-called ‘smart’ devices by companies across the private sector. Many of us do so, however, without considering the wider implications – or indeed the necessity – of our refrigerator, our light bulbs, children's toys or even pregnancy tests being connected to the Internet.Footnote 117 We do not wish to dismantle the criticism of manufactures, politician, and political institutional structures. Nor are we advocating a decentralisation that places the entire responsibility on the individual user. Rather, we argue, the analysis of the Mirai botnet enabled by a sensitivity to ontological politics helps us to recognise that we, as societies and individuals, are challenged by having to question and govern that which is not fully visible. That which we cannot comprehend in its entirety. It is, however, paramount that we continuously aim at doing so, since – as the sensitivity to ontological politics suggests – ‘the condition of possibilities are not given’,Footnote 118 but are in the making.
This section has underlined how contestation over the placement and distribution of security political authority, responsibility, and accountability simultaneously reaffirms and moves beyond the formal political arena of the state into multiple new sites, as, for example, the boardrooms of tech companies and private homes across the globe become new potential sites of security politics. Rather than restricting our analyses to formal state-centric security politics, sensitivity to the ontological politics points to how cyber security also may entails various forms of what we with a term from Ulrich Beck may call ‘subpolitics’ in sites that were previously not considered part of security politics – or even political as such.Footnote 119 A sensitivity to ontological politics does not provide political answers or democratic change in and of itself. It does, however, enable a different kind of political and democratic questioning that can help to spur engagement with these otherwise elusive technological developments and practices of (in)security.
Conclusions: Towards ontological politics of security
In this article, we have shown how an engagement with ontological politics enables an analytical opening towards examining the emergence of (in)securities stemming from distributed and multiple socio-material entanglements of political agencies, actors, sites, and spaces. The analysis demonstrated how the construction, maintenance, and workings of the Mirai botnet was made possible by a dynamic assemblage of human actors and a myriad of devices, technologies, and their interrelation. The insistence on the importance of the agency and affordances of devices and technology is not to deny the importance of human intentionality, but rather to demonstrate how it might be less definitive of cyber security outcomes than we tend to think. Paying further attention to the human disability to fully master and control technologies, as well as distributive and multiple security realities is one way to enable a questioning that can help to spur engagement with the increasing importance of vulnerable IoT devices that is soon to be underpinned by 5G digital infrastructure.
This is crucial if we are to engage with the political and democratic difficulties related to cyber security. As the analysis showed, the proliferation and multiplication of entangled political agencies, actors, sites, and spaces makes it harder to contest and engage with security politics – including authority over and responsibility for security – if we restrict our engagement to the traditional arena of (inter)national security. Instead, we need to attend to the various new ‘territories of power’ that we may otherwise lose sight of.Footnote 120 We need to ‘find ways of knowing the slipperiness of “units that are not” as they move in and beyond old categories’.Footnote 121 This stipulates an ontological political practice that is situated here and now, rather than presenting itself as a theoretical ground fixed for the purposes of future empirical inquiries. In this sense, the sensitivity enabled by the ontological politics approach emphasises constant inquiry rather than foundational answers provided by a theoretical stance. Yet, one result of thinking in ontologically political terms is that ‘every time we make reality claims in social science we are helping to make some social reality or other more or less real’.Footnote 122 We thus perceive of our engagement as an ontological opening – a questioning of the conventional reproduction of security – waiting to be engaged with. In conclusion, we therefore suggest three ways forward as to how both cyber security studies and Critical Security Studies more broadly can unfold and question these new territories of security politics and power through further engagement with ontological politics as an analytical frame.
First, the opening towards the ontological politics of cyber security importantly could be extended to a sensitivity to the ontological politics of security as such. It would thus speak to ongoing debates among scholars drawing on different variants of securitisation. A key part of the debate unfolds around the difference between understanding securitisation as depolitisation from either above or below: By the invocation of exceptional and decisionist politics formulated by political elites in the language of existential threat and survival, on the one hand, or securitisation as a matter of incrementally institutionalising and bureaucratising certain issue as a security problem, on the other.Footnote 123
Ontological politics inherits and transforms the theoretical and analytical space opened up by these approaches to securitisation. However, to engage with security in terms of ontological politics means not a priori specifying neither the logic nor the politics of security. The analytical ways forward for security research staked out by the ontological political approach is marked by the way in which politics and (in)security is co-constitutively produced and reproduced in socio-material performances of reality. Which security realities that are enacted matters and that is what the ontological political approach help us to appreciate, analyse, and question. Moreover, it helps us to value the essential possibility of the political invested in ontological openness. The ontological political sensitivity allows us to approach the relation between the security political and the ontological as one of questioning and remaining true to the idea of events and situations as always emerging and constituting in multiple ways.Footnote 124
We do not rule out the possibility that cyber security can be constituted by securitisation or that malware driven cyber incidents perform the three spatial forms suggested by Balzacq and Cavelty.Footnote 125 Yet, we suggest to maintain an openness to this: cyber security may (also) potentially (and simultaneously) take the form of, for example, risk management, precaution, or resilience and cyber incidents may enact other topological spatialities. Moreover, the ontological political approach allows us to reconfigure the various securitisation and (de)politisation categories as performative objects of analysis and not stable backdrops of reality or fixed points of departure for analysis. As Mol writes, ‘once we start to look carefully at the variety of the objects performed in a practice, we come across complex interferences between those objects’.Footnote 126 Hence, ontological politics prompts us to carefully study – not predict – the entanglements of security as relational, processual, and multiple.Footnote 127 Thereby enabling us to discern more clearly the various empirical enactments and political functions of security – be they in controversy, contestation, or concurrence.
Second, not only does a focus on ontological politics provide analytical purchase to critical studies of security, the argument here is also a normative one. Restricting our engagement with security to securitisation is not politically nor democratically adequate. We realise that central to the delineation of security to the exception in the original formulation of securitisation theory was an argument in favour of liberal and democratic political procedures and against letting the threat-defence logic of security colonise all spheres of society.Footnote 128 Historically, this normative argument has been well taken. Nevertheless, following on from our emphasis on the multiplicity and dispersion of cyber security, it is necessary to – in a manner of speaking – turn the normative argument of securitisation theory on its head. That is to say, if we restrict our notion of security to the securitisation of state agents, we run the risk of being blindsided by those practices of security that do not, in and of themselves, amount to high politics or exceptional politics.
This is an oft-cited critique against the Copenhagen School in security studiesFootnote 129 but it holds particularly true for the critical literature on cyber security, as the critique in this regard is to be directed at most of the limited literature. Engaging with the ontological politics of cyber security critically opens up the study of cyber security and its political implications by also engaging with human and non-human agency, the cyber security practices of non-state actors and the security issues related to ICT that are not readily captured by the categories of ‘exceptional’ or even ‘normal’ or ‘bureaucratic’ politics in the political system. Enhancing conceptual sensitivity could help us move forward, allowing for further engagement with and illustrations of how security issues related to ICT are continuously enacted and contested rather than limited to either the exception or dissipating into normal politics as ‘little security nothings’.Footnote 130 Thereby, an enhanced conceptual sensitivity might also enable Critical Security scholars to demonstrate the potential of an ontological politics framework to intervene in, disrupt, and open up the political spaces of contestation relating to ICT and security. One potential outcome might be the contestation of the tendency towards technification that Hansen and Nissenbaum rightly point to.Footnote 131 An aspiration that is supported by research on the technologisation of security identifying alternative forms of contestation.Footnote 132
Finally, Nortje MarresFootnote 133 astutely poses the question if we can ‘analyse change as not necessarily coherent and still be demanding of it?’. We believe the answer is yes, and indeed, we should. Not least considering the pervasive, ubiquitous, and ambivalent digital technological development, we face as citizens and societies with the implementation and development of IoT and 5G network technology. A sensibility to the ontological politics of security does not offer intrinsic political or democratic solutions. It does, however, enable diverse ways of engaging with and questioning technological development and potential practices of (in)security. Related to Jef Huysman's ‘democratic curiosity’,Footnote 134 it draws our attention to the contingency and contextuality of these practices. Herein lies a democratic potential. Rather than engaging with these permeating and often opaque security practices wholesale, we should engage with and intervene in them in a more targeted manner. In other words, civil society – be it researchers, interest groups, think tanks, or regular citizens – should indeed be demanding of both state and corporate practices and engage in the shaping and contestation of its multiple ontologies.
Acknowledgements
Earlier versions of this article were presented at several conferences, seminars, and workshops. We wish to express our sincere gratitude to the organisers, participants, and discussants of these events for their encouraging and insightful comments. We also want to thank the anonymous reviewers and the editor.
Tobias Liebetrau is a postdoc at the Centre for Military Studies, Department of Political Science, University of Copenhagen. His research focuses on the implication of cyber security for contemporary security theory and governance, particularly in the context of the EU. Prior to his position at the university, he worked at the Danish National Centre for Cybersecurity under the Danish Defence Intelligence Service.
Kristoffer Kjærgaard Christensen gained his PhD in the Department of Political Science, University of Copenhagen. His research is on the significance of cyber security for contemporary security politics, looking at how cyber security involves new security actors and contributes to creating new political spaces and understandings of security politics and democracy. He now works with cyber security in the Danish Ministry of Health.