Skip to content

The Geopolitics of CyberspaceActivities & Teaching Strategies

Active learning works for this topic because cyberspace’s geopolitical realities are invisible without concrete mapping and role-play. Students need to see fiber optics, simulate attacks, and debate governance to grasp how geography shapes digital sovereignty. These strategies turn abstract concepts into tangible, memorable experiences.

12th GradeGeography4 activities20 min50 min

Learning Objectives

  1. 1Analyze the physical infrastructure that supports global internet connectivity, identifying key components like undersea cables and data centers.
  2. 2Compare and contrast different national approaches to digital sovereignty, such as China's Great Firewall and the EU's GDPR.
  3. 3Evaluate the potential impacts of cyber warfare on international relations and national security.
  4. 4Synthesize information to explain how geographic factors influence internet governance and digital policy.

Want a complete lesson plan with these objectives? Generate a Mission

35 min·Small Groups

Map Analysis: The Undersea Cable Network

Students examine a publicly available map of submarine fiber optic cables and identify geographic chokepoints, countries with high cable concentration, and states that depend on a single landing point. Groups discuss what these vulnerabilities mean for national security and what options states have.

Prepare & details

Explain how physical infrastructure underpins the global internet.

Facilitation Tip: During the Map Analysis activity, have students trace a single cable’s route and highlight countries that share its path to visualize dependency and vulnerability.

Setup: Chairs arranged in two concentric circles

Materials: Discussion question/prompt (projected), Observation rubric for outer circle

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
50 min·Small Groups

Tabletop Simulation: Cyber Incident Response

Teams are assigned roles , a hospital, a power grid operator, a federal agency, and a foreign state actor , and work through a fictional ransomware attack on critical infrastructure. Each team must decide whether to publicly attribute the attack, notify partners, or quietly patch, then justify their decision geographically and legally.

Prepare & details

Analyze the challenges of applying traditional notions of sovereignty to cyberspace.

Facilitation Tip: In the Tabletop Simulation, assign roles with conflicting national interests so students experience how attribution and proportionality complicate response decisions.

Setup: Chairs arranged in two concentric circles

Materials: Discussion question/prompt (projected), Observation rubric for outer circle

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
40 min·Whole Class

Formal Debate: Should Cyberspace Be Governed Like Airspace?

Students prepare positions for and against applying existing international sovereignty norms , airspace, territorial waters , to cyberspace. The debate surfaces the difference between geographic and digital jurisdictions and forces students to define where the analogy holds and where it breaks down.

Prepare & details

Evaluate the implications of cyber warfare for international security and state relations.

Facilitation Tip: For the Debate, provide each side with the Tallinn Manual’s key principles to ground abstract legal arguments in specific text.

Setup: Two teams facing each other, audience seating for the rest

Materials: Debate proposition card, Research brief for each side, Judging rubric for audience, Timer

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
20 min·Pairs

Think-Pair-Share: The Splinternet

Students read a short overview of growing divergence between US, Chinese, and European internet ecosystems. Pairs discuss whether a fragmented global internet is inevitable and what that means for international commerce, diplomacy, and information freedom.

Prepare & details

Explain how physical infrastructure underpins the global internet.

Facilitation Tip: Use the Think-Pair-Share on the Splinternet to ensure every student contributes an example before synthesizing shared patterns.

Setup: Standard classroom seating; students turn to a neighbor

Materials: Discussion prompt (projected or printed), Optional: recording sheet for pairs

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills

Teaching This Topic

Teachers should anchor lessons in primary sources like undersea cable maps and legal manuals to build credibility. Avoid framing cyberspace as purely technical; instead, connect it to history, law, and economics. Research shows that role-play and mapping activities deepen understanding of complex systems by making invisible infrastructures visible and actionable.

What to Expect

Successful learning looks like students connecting physical infrastructure to real-world conflicts, applying legal and ethical reasoning to cyber incidents, and recognizing cyberspace as a contested geographic space. They should articulate how undersea cables, policies, and power dynamics shape digital interactions.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Map Analysis: The Undersea Cable Network, watch for students describing the internet as ‘in the cloud’ when they label cables.

What to Teach Instead

Redirect students by asking them to trace a cable from New York to London, then ask, ‘Where is the cloud in this route?’ Use the map’s physical landing points to replace ‘cloud’ with ‘cable landing station.’

Common MisconceptionDuring Tabletop Simulation: Cyber Incident Response, watch for students assuming cyberattacks are always acts of war.

What to Teach Instead

After the simulation, revisit the Tallinn Manual’s Article 51 threshold. Ask students to compare their simulation’s attack to historical cases like NotPetya, highlighting why proportionality is hard to assess.

Assessment Ideas

Exit Ticket

After Map Analysis: The Undersea Cable Network, provide students with a world map showing major undersea cable landing points. Ask them to identify two countries that are heavily reliant on a single cable route and explain one potential geopolitical risk associated with this dependency.

Discussion Prompt

After Debate: Should Cyberspace Be Governed Like Airspace?, pose the question: ‘If a country experiences a major cyberattack that cripples its power grid, how should international law address accountability, considering cyberspace has no physical borders?’ Facilitate a debate on the challenges of applying traditional legal frameworks to cyber incidents.

Quick Check

During Think-Pair-Share: The Splinternet, present students with brief descriptions of different national internet policies. Ask them to classify each policy according to its underlying approach to digital sovereignty and identify one potential economic or social consequence.

Extensions & Scaffolding

  • Challenge early finishers to design a policy brief proposing how the UN could update Article 51 for cyber incidents.
  • For struggling students, provide a partially completed cable route map with key terms missing to reduce cognitive load while reinforcing geography.
  • Offer extra time for students to research a real-world cyber incident and present its geopolitical implications using the simulation’s framework.

Key Vocabulary

Undersea CablesThe physical fiber optic cables laid on the ocean floor that transmit vast amounts of internet data between continents.
Data CentersLarge facilities that house computer systems and associated components, such as telecommunications and storage systems, often located near reliable power sources.
Digital SovereigntyA nation's claim to control its own data, digital infrastructure, and online activities within its borders, often leading to data localization policies.
Internet ChokepointsSpecific geographic locations or network nodes where internet traffic can be easily monitored, controlled, or disrupted.
Cyber WarfareThe use of cyber attacks by a state or organization against another state or organization, often targeting critical infrastructure or government systems.

Ready to teach The Geopolitics of Cyberspace?

Generate a full mission with everything you need

Generate a Mission