Skip to content
Geography · 12th Grade

Active learning ideas

The Geopolitics of Cyberspace

Active learning works for this topic because cyberspace’s geopolitical realities are invisible without concrete mapping and role-play. Students need to see fiber optics, simulate attacks, and debate governance to grasp how geography shapes digital sovereignty. These strategies turn abstract concepts into tangible, memorable experiences.

Common Core State StandardsC3: D2.Geo.5.9-12C3: D4.7.9-12
20–50 minPairs → Whole Class4 activities

Activity 01

Socratic Seminar35 min · Small Groups

Map Analysis: The Undersea Cable Network

Students examine a publicly available map of submarine fiber optic cables and identify geographic chokepoints, countries with high cable concentration, and states that depend on a single landing point. Groups discuss what these vulnerabilities mean for national security and what options states have.

Explain how physical infrastructure underpins the global internet.

Facilitation TipDuring the Map Analysis activity, have students trace a single cable’s route and highlight countries that share its path to visualize dependency and vulnerability.

What to look forProvide students with a world map showing major undersea cable landing points. Ask them to identify two countries that are heavily reliant on a single cable route and explain one potential geopolitical risk associated with this dependency.

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
Generate Complete Lesson

Activity 02

Socratic Seminar50 min · Small Groups

Tabletop Simulation: Cyber Incident Response

Teams are assigned roles , a hospital, a power grid operator, a federal agency, and a foreign state actor , and work through a fictional ransomware attack on critical infrastructure. Each team must decide whether to publicly attribute the attack, notify partners, or quietly patch, then justify their decision geographically and legally.

Analyze the challenges of applying traditional notions of sovereignty to cyberspace.

Facilitation TipIn the Tabletop Simulation, assign roles with conflicting national interests so students experience how attribution and proportionality complicate response decisions.

What to look forPose the question: 'If a country experiences a major cyberattack that cripples its power grid, how should international law address accountability, considering cyberspace has no physical borders?' Facilitate a debate on the challenges of applying traditional legal frameworks to cyber incidents.

AnalyzeEvaluateCreateSocial AwarenessRelationship Skills
Generate Complete Lesson

Activity 03

Formal Debate40 min · Whole Class

Formal Debate: Should Cyberspace Be Governed Like Airspace?

Students prepare positions for and against applying existing international sovereignty norms , airspace, territorial waters , to cyberspace. The debate surfaces the difference between geographic and digital jurisdictions and forces students to define where the analogy holds and where it breaks down.

Evaluate the implications of cyber warfare for international security and state relations.

Facilitation TipFor the Debate, provide each side with the Tallinn Manual’s key principles to ground abstract legal arguments in specific text.

What to look forPresent students with brief descriptions of different national internet policies (e.g., strict content filtering, data localization laws, open internet principles). Ask them to classify each policy according to its underlying approach to digital sovereignty and identify one potential economic or social consequence.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 04

Think-Pair-Share20 min · Pairs

Think-Pair-Share: The Splinternet

Students read a short overview of growing divergence between US, Chinese, and European internet ecosystems. Pairs discuss whether a fragmented global internet is inevitable and what that means for international commerce, diplomacy, and information freedom.

Explain how physical infrastructure underpins the global internet.

Facilitation TipUse the Think-Pair-Share on the Splinternet to ensure every student contributes an example before synthesizing shared patterns.

What to look forProvide students with a world map showing major undersea cable landing points. Ask them to identify two countries that are heavily reliant on a single cable route and explain one potential geopolitical risk associated with this dependency.

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills
Generate Complete Lesson

Templates

Templates that pair with these Geography activities

Drop them into your lesson, edit them, and print or share.

A few notes on teaching this unit

Teachers should anchor lessons in primary sources like undersea cable maps and legal manuals to build credibility. Avoid framing cyberspace as purely technical; instead, connect it to history, law, and economics. Research shows that role-play and mapping activities deepen understanding of complex systems by making invisible infrastructures visible and actionable.

Successful learning looks like students connecting physical infrastructure to real-world conflicts, applying legal and ethical reasoning to cyber incidents, and recognizing cyberspace as a contested geographic space. They should articulate how undersea cables, policies, and power dynamics shape digital interactions.


Watch Out for These Misconceptions

  • During Map Analysis: The Undersea Cable Network, watch for students describing the internet as ‘in the cloud’ when they label cables.

    Redirect students by asking them to trace a cable from New York to London, then ask, ‘Where is the cloud in this route?’ Use the map’s physical landing points to replace ‘cloud’ with ‘cable landing station.’

  • During Tabletop Simulation: Cyber Incident Response, watch for students assuming cyberattacks are always acts of war.

    After the simulation, revisit the Tallinn Manual’s Article 51 threshold. Ask students to compare their simulation’s attack to historical cases like NotPetya, highlighting why proportionality is hard to assess.


Methods used in this brief