Military Review English Edition May-June 2014 | Page 30

Advantages of Wielding Cyberpower With these definitions being sufficient for this discussion, consider the advantages of operations through cyberspace. Cyberspace provides worldwide reach. The number of people, places, and systems interconnecting through cyberspace is growing rapidly.10 Those connections enhance the military’s ability to reach people, places, and systems around the world. Operating in cyberspace provides access to areas denied in other domains. Early airpower advocates claimed airplanes offered an alternative to boots on the ground that could fly past enemy defenses to attack power centers directly.11 Sophisticated air defenses developed quickly, increasing the risk to aerial attacks and decreasing their advantage. Despite the current cyberdefenses that exist, cyberspace now offers the advantage of access to contested areas without putting operators in harm’s way. One example of directly reaching enemy decision makers through cyberspace comes from an event in 2003, before the U.S. invasion of Iraq. U.S. Central Command reportedly emailed Iraqi military officers a message on their secret network advising them to abandon their posts.12 No other domain had so much reach with so little risk. Cyberspace enables quick action and concentration. Not only does cyberspace allow worldwide reach, but its speed is unmatched. With aerial refueling, air forces can reach virtually any point on the earth; however, getting there can take hours. Forward basing may reduce response times to minutes, but information through fiber optic cables moves literally at the speed of light. Initiators of cyberattacks can achieve concentration by enlisting the help of other computers. By discretely distributing a virus trained to respond on command, thousands of co-opted botnet computers can instantly initiate a distributed denial-of-service attack. Actors can entice additional users to join their cause voluntarily, as did Russian “patriotic hackers” who joined attacks on Estonia in 2007.13 With these techniques, large interconnected populations could mobilize on an unprecedented scale in mass, time, and concentration.14 Cyberspace allows anonymity. The Internet’s designers placed a high priority on decentralization and built the structure based on the mutual trust of its few users.15 In the decades since, the number of 28 Internet users and uses has grown exponentially beyond its original conception.16 The resulting system makes it very difficult to follow an evidentiary trail back to any user.17 Anonymity allows freedom of action with limited attribution. Cyberspace favors offense. In Clausewitz’ day, defense was stronger, but cyberspace, due to the advantages listed above, currently favors the attack.18 Historically, advantages from technological leaps erode over time.19 However, the current circumstance pits defenders against quick, concentrated attacks, aided by structural security vulnerabilities inherent in the architecture of cyberspace. Cyberspace expands the spectrum of nonlethal weapons. Joseph Nye described a trend, especially among democracies, of antimilitarism, which makes using force “a politically risky choice.”20 The desire to limit collateral damage often has taken center stage in NATO operations in Afghanistan, but this desire is not limited to counterinsurgencies.21 Precisionguided munitions and small-diameter bombs are products of efforts to enhance attack capabilities with less risk of collateral damage. Cyberattacks offer nonlethal means of direct action against an adversary.22 The advantages of cyberpower may be seductive to policymakers, but understanding its limitations should temper such enthusiasm. The most obvious limitation is that your adversary may use all the same advantages against you. Another obvious limitation is its minimal influence on nonnetworked adversaries. Conversely, the more any organization relies on cyberspace, the more vulnerable it is to cyberattack. Three additional limitations require further attention. Cyberspace attacks rely heavily on second order effects. In Thomas Schelling’s terms, there are no brute force options through cyberspace, so cyberoperations rely on coercion.23 Continental armies can occupy land and take objectives by brute force, but success in operations through cyberspace often hinges on how adversaries react to provided, altered, or withheld information. Cyberattacks creating kinetic effects, such as destructive commands to industrial control systems, are possible. However, the unusual incidents of malicious code causing a Russian pipeline to explode and the Stuxnet worm shutting down Iranian nuclear facility processes were not ends.24 In the latter case, only Iranian leaders’ decisions could realize abandonment of May-June 2014 MILITARY REVIEW