I joined the first Royal Holloway CDT cohort in September 2013 - Dr Steve Hersee

I joined the first Royal Holloway CDT cohort in September 2013 following careers in the RAF, police and private sector. Having spent 10 years working in security and intelligence I was attracted to a move into academia by the increasing relevance of cyberspace to the field of security, a desire to expose myself to a different perspective and a growing thirst to learn. Traditional PhDs were available but the Cyber Security PhD at Royal Holloway offered something different; a truly multidisciplinary approach, with a close connection between Geopolitics and Information Security; the chance to take classes as well as conduct research; a close connection to the real world through industrial placements; and a cohort environment where we had others around us to learn from, help us out and reassure us that we weren’t as far behind as we thought we were.

I began with no clear idea of my research area but soon realised that there was one topic which both interested me and animated the InfoSec community. In June 2013 Edward Snowden caused uproar by leaking top secret information from the National Security Agency and GCHQ. Within my previous world of security and intelligence Snowden had committed a cardinal sin, compromising our capabilities and assets and handing a massive advantage to our enemies. But to much of academia Snowden had exposed the reckless activities of the security agencies, who had run roughshod over individual privacy and left the Internet more insecure. Whilst the InfoSec community was working to improve network security, the security agencies were apparently undermining it.

Early within the CDT we held a debate amongst CDT students, geopolitics students and staff members about whether Snowden was a hero or a traitor. I led the argument against Snowden but was surprised by the passion and anger expressed by the other side and I sensed some hostility at my deviation from the academic status quo. The debate was great fun and was followed by further discussion in common rooms and pubs over the coming weeks, but this only succeeded in entrenching our pre-existing views. Mirroring the Crypto Wars, we were stuck in the same seemingly intractable problems of privacy versus security and state versus individual.

During this time, I attended Geopolitics classes with MSC students from the Department of Geography and I was exposed to a whole new way of thinking about security. Instead of focussing on how to create security we focussed on security practices and queried whose security we were trying to defend. One concept which caught my interest was that of securitisation; a constructivist approach which describes the process by which an issue becomes a matter of security due to the existence of an existential threat. Once an issue has become securitised in this way extraordinary activity (usually by a government) can be justified to counter this threat.

Within this framework I saw an interesting opportunity to study the crypto wars from a different perspective. To avoid becoming entangled in the debate I could use the securitisation framework to study how each side constructed their own versions of security. In doing so I hoped to bypass questions of who was right and expose ways by which better outcomes could be delivered for everyone.

Some limited literature covered the securitisation of cyberspace but focussed almost entirely on how the British and American governments justified mass surveillance through the securitisation of terrorism, cyber attacks and hostile states. The literature was interesting but often seemed highly partisan and designed to fuel the debate rather than help solve it.

I began to realise that whilst these acts of securitisation formed the building blocks of the crypto wars, they were also fuelling each other. Fearing threats to national security the state banned encryption but fearing a totalitarian state digital rights activists overturned the ban; the state enforced key escrow but activists resisted it; the state siphoned data from technology companies but those companies implemented end-to end encryption. As actions by one side lead to reactions by the other we descend into a spiral of increasing fear and insecurity.

Whilst looking for a way to describe this decent into insecurity I discovered the international relations concept of the spiral model, more commonly known as the security dilemma. This describes the process by which two parties can end up at war despite their peaceful nature. Initial distrust leads one side to take security measures which spook the other causing them to respond in kind. To the first party this action looks hostile they increase their own security further leading to a spiral of insecurity and fear ends in open conflict.

I realised that I could use this model and the vast volume of research surrounding it to study the crypto wars. My focus became not the actions of each side but the feelings of fear and insecurity which drove these actions. This required me to focus on personal experiences, which I was lucky enough to collect through interviews with staff at GCHQ and directors within the Open Rights Group. And through a random and serendipitous event I was able to use my industrial placement to participate in a show called ‘Hunted’, which investigated experiences of the surveillance state.

Through the unique opportunities presented by the CDT and the support of my supervisors I hope I have produced a unique thesis which adds a different perspective to the literature. I’m proud of what I achieved at Royal Holloway and left not only more qualified but more capable of embracing new ideas and viewing the world from different perspectives. I also left with a wife and 3 children but that’s a different story; a PhD really is a long old process.


Comments

Popular posts from this blog

Remote working and Cyber Security: Georgia Crossland and Amy Ertan

New Publication: Remote Working and (In)Security?: Amy Ertan

The Artificial Intelligence Monster: Nicola Bates