<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Second Rough Draft: Tech Policy]]></title><description><![CDATA[Public policy and foreign affairs in the digital age]]></description><link>https://www.secondroughdraft.com/s/tech-policy</link><image><url>https://www.secondroughdraft.com/img/substack.png</url><title>Second Rough Draft: Tech Policy</title><link>https://www.secondroughdraft.com/s/tech-policy</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 10:52:05 GMT</lastBuildDate><atom:link href="https://www.secondroughdraft.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Peter Woolverton]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[secondroughdraft@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[secondroughdraft@substack.com]]></itunes:email><itunes:name><![CDATA[Peter Woolverton]]></itunes:name></itunes:owner><itunes:author><![CDATA[Peter Woolverton]]></itunes:author><googleplay:owner><![CDATA[secondroughdraft@substack.com]]></googleplay:owner><googleplay:email><![CDATA[secondroughdraft@substack.com]]></googleplay:email><googleplay:author><![CDATA[Peter Woolverton]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Cyber Diplomacy]]></title><description><![CDATA[A timeless balancing act]]></description><link>https://www.secondroughdraft.com/p/cyber-diplomacy</link><guid isPermaLink="false">https://www.secondroughdraft.com/p/cyber-diplomacy</guid><dc:creator><![CDATA[Peter Woolverton]]></dc:creator><pubDate>Wed, 20 Jul 2022 23:11:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JZKt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JZKt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JZKt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JZKt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JZKt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JZKt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JZKt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg" width="600" height="465" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:465,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:73675,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JZKt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JZKt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JZKt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JZKt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F65729c40-09c4-427c-9107-e26418ee4010_600x465.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><em>Response to &#8220;<a href="https://www.lawfareblog.com/responsible-cyber-offense">Responsible Cyber Offense</a>&#8221; by Peri Adams et. al. in Lawfare</em></p><p>In 1972, when a Republican US President flew halfway around the world to establish relations with a Communist, both leaders openly recognized the irony of the moment. In the subsequent <a href="https://history.state.gov/historicaldocuments/frus1969-76v17/d203">Shanghai Communique</a>, President Nixon and Chairman Mao began by honestly outlining areas of inflexible disagreement between the two nations. The Communique then focused intently on opportunities for mutual cooperation, an approach that led to a more contained Soviet Union and a predictable relationship with China for nearly half a century. Finding opportunities for diplomatic agreement in cyberspace will require a similarly self-aware commitment to the art of the possible.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.secondroughdraft.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Second Rough Draft! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In their <em>Lawfare</em> article &#8220;<a href="https://www.lawfareblog.com/responsible-cyber-offense">Responsible Cyber Offense</a>,&#8221; Peri Adams et. al. recognize that, given the ubiquity of state-sponsored cyber espionage, cyber diplomacy will require &#8220;a certain hardheadedness and even cynicism.&#8221; Akin to the Shanghai Communique, the article recommends recognizing the hypocrisy of an effort to limit cyber conflict and then focusing on areas of mutual interest. Specifically, the article proposes &#8220;drawing lines between responsible and irresponsible operations in cyberspace.&#8221; It will be difficult to foster this level of honest dialogue among cyber-capable nations for whom deniability is a default setting. However, history demonstrates that diplomacy, when transparent and mutually beneficial, can penetrate such barriers. Therefore, as a theoretical exercise in the practice of cyber diplomacy as realpolitik, the article&#8217;s strategy is reasonable, as it approaches the topic honestly and provides a logical foundation for a discussion of mutually beneficial norms.</p><p>The article&#8217;s overarching diplomatic framework is sound. However, the authors&#8217; specific recommendations may not be implementable as they are currently written. The article details six opportunities for multilateral agreement that, if agreed to, would certainly lead to more stable and predictable operations in cyberspace, even while accepting the reality of ongoing cyber espionage. The article&#8217;s six proposals are:</p><ul><li><p>Test Tools Before Use</p></li><li><p>Avoid Indiscriminate Targeting</p></li><li><p>Prohibit Targets Throughout the Operational Life Cycle</p></li><li><p>Constrain Automation</p></li><li><p>Prevent Criminal and Third-Party Access to Backdoors</p></li><li><p>Responsible Operational Design, Engineering and Oversight</p></li></ul><p>When seeking opportunities for broad international cyber agreement, it helps to be specific. The authors recognize that if norms are too broad, they can be &#8220;technically ambiguous and impossible to enforce.&#8221; The article&#8217;s recommendations are appropriately specific. Therefore, the authors&#8217; vision, if implemented, would significantly improve the global stability of cyberspace. However, most of the article&#8217;s recommendations are likely not achievable.</p><p>An agreement to &#8220;test tools before use&#8221; is the most realistic recommendation. Testing is already a critical step in the design and implementation of malware. Even among nations with vastly different geopolitical goals, an agreement to test malware for security and stability before deployment is reasonable. Similarly, agreement regarding &#8220;responsible operational design, engineering, and oversight&#8221; may also be achievable, with the caveat that countries, such as Russia, that <a href="https://stratcomcoe.org/cuploads/pfiles/Nato-Cyber-Report_15-06-2021.pdf">operate cyber capabilities in a decentralized manner</a> will struggle to implement strong oversight. These two opportunities for cooperation exist because rigorous testing and responsible design deliver benefits without constraining the cyber capabilities of nations. However, the remaining recommendations do not meet this standard and fail to account for the priorities of relevant nation-state cyber actors.</p><p>The key shortcoming of the article&#8217;s recommendations is the western perspective from which they are crafted. The authors assert that nation-states have &#8220;no good reason to resist&#8221; their proposed rules of the road. From the perspective of the US and its allies, nations that rely on offensive cyber operations primarily as a precision tool for espionage and clandestine influence, there is indeed no reason to resist. But some cyber capable adversaries have reasons to resist. For example, when Russia launched the <a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/">NotPetya cyberattack</a> in 2017, the malware employed both &#8220;automation&#8221; and &#8220;indiscriminate targeting,&#8221; two practices that the article recommends banning. It is likely that the Kremlin views NotPetya as a highly successful operation. Therefore, it would be difficult to convince Moscow to forgo the use of such tools in the future. In addition, the article recognizes that Russia may be unwilling to &#8220;prevent criminal and third-party access to backdoors&#8221; due to its support of <a href="https://www.bbc.com/news/technology-60378009">private domestic hacking groups</a>. North Korea offers an even more striking example of this effect, given the government&#8217;s <a href="https://asia.nikkei.com/Politics/International-relations/North-Korea-ramps-up-ransomware-attacks-in-hunt-for-cash">direct perpetration of ransomware attacks</a> to help keep the lights on in Pyongyang. It is unlikely that these governments would commit to eliminating irresponsible cyber activities as defined in the Lawfare article, and any international cyber agreement that does not include Russia or North Korea would be largely symbolic.</p><p>To address the obvious diplomatic impasse, the article suggests that, even in the absence of an agreement, the US should publicly articulate what it &#8220;considers to be an irresponsible activity&#8230; [in order to] gain international political leverage.&#8221; This recommendation is out of step with the authors&#8217; goals. Although clarifying its singular position publicly may carry some domestic political benefits, a soapbox declaration from the US would do little to sway the views of adversaries overseas, and may even harden opposition. If the goal of the article&#8217;s strategy is meaningful multilateral agreement on responsible cyber activities, the US would be wise to focus on the negotiating table rather than the bully pulpit.</p><p>The &#8220;Responsible Cyber Offense&#8221; Lawfare article provides a helpful starting point with several recommendations that are worthy of further exploration. By drawing a dividing line between responsible and irresponsible cyber activities, the authors offer a reasonable diplomatic approach. However, in their specific recommendations, the authors do not adequately account for the starkly different geopolitical priorities that exist in the capitals of key nation-state cyber actors. Although it is unlikely that the article can stimulate international agreement as written, the authors articulate a valid framework that can help build towards a more predictable long-term operating rhythm in cyberspace.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.secondroughdraft.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Second Rough Draft! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>