Professional Documents
Culture Documents
Cyberpower
Cyberpower
* The views expressed in this article are those of the author and do
QRWUHHFWWKHRIFLDOSROLF\RUSRVLWLRQRIWKH1DWLRQDO'HIHQVH
University, the Department of Defense or the U.S. Government.
All information and sources for this chapter were drawn from unFODVVLHGPDWHULDOV
15
ELEMENTS OF A THEORY
Categorize.
,Q DQDO\]LQJ WKH F\EHU GRPDLQ IRXU NH\ DUHDV
emerge (see Figure 2.1). These include the cyberinfrastructure (cyberspace), the levers of national
power (i.e., diplomacy, information, military, economic [DIME], or cyberpower), the degree to which
key entities are empowered by changes in cyberspace
(cyberstrategy), and the institutional factors that
affect the cyber domain (e.g., legal, governance, and
RUJDQL]DWLRQ )RU WKH SXUSRVHV RI WKLV FKDSWHU WKLV
framework will be employed to decompose the problem.
Empowerment/
Cyberstrategy
Levers of Power/
Cyberpower
Cyber-Infrastructure/
Cyberspace
16
'HQH.
$OWKRXJK WKH GHQLWLRQV RI PDQ\ RI WKHVH WHUPV
are still contentious, this chapter will use the followLQJGHQLWLRQVRINH\WHUPV)LUVWLVWKHIRUPDOGHQLWLRQ
of cyberspace that the Deputy Secretary of Defense
formulated: . . . the interdependent network of information technology infrastructures, and includes
the Internet, telecommunications networks, computer
systems, and embedded processors and controllers in
critical industries.27KLVGHQLWLRQGRHVQRWH[SOLFLWO\
deal with the information and cognitive dimensions
of the problem. To deal with those aspects explicitly,
we have introduced two complementary terms, cyEHUSRZHU DQG F\EHUVWUDWHJ\ ZKLFK ZHUH GHQHG
by Professor Dan Kuehl, National Defense University
(NDU).
The term cyberpower means the ability to use cyEHUVSDFHWRFUHDWHDGYDQWDJHVDQGLQXHQFHHYHQWVLQ
the other operational environments and across the instruments of power.3 In this context, the instruments
of power include the elements of the DIME paradigm.
For the purposes of this evolving theory, primary emphasis will be placed on the military and informational levers of power.
6LPLODUO\WKHWHUPF\EHUVWUDWHJ\LVGHQHGDVWKH
development and employment of capabilities to operate in cyberspace, integrated and coordinated with
the other operational domains, to achieve or support
the achievement of objectives across the elements of
national power.4 Thus, one of the key issues associated with cyberstrategy deals with the challenge of
devising tailored deterrence to affect the behavior
of the key entities empowered by developments in
cyberspace.
17
Explain.
Cyberspace. Over the last 15 years, a set of rules
RI WKXPE KDYH HPHUJHG WR FKDUDFWHUL]H F\EHUVSDFH
Some of the more notable of these rules of thumb include the following:
0RRUHV/DZLHWKHQXPEHURIWUDQVLVWRUVRQD
chip approximately doubles every 18 months);5
*LOGHUV/DZWRWDOEDQGZLGWKRIFRPPXQLFDtion systems triples every 12 months);6
3UROLIHUDWLRQ RI ,3 DGGUHVVHV LQ WUDQVLWLRQLQJ
from IPv4 to IPv6 (e.g., IPv6 will provide 2128
addresses; this would provide 5x1028 addresses
for each of the 6.5 billion people alive today).
In addition, recent analyses have suggested the following straw man principles for cyberspace. First, the
offensive has the advantage. This is due to the challenges of attribution of an attack and the fact that an
adversary faces a target rich environment. Consequently, if cyberspace is to be more resistant to attack,
it may require a new architecture that has designed
in security.
Cyberpower. Robert Metcalfe formulated one of the
oft-quoted laws of cyberpower.7+HFKDUDFWHUL]HGWKH
value of a network as N2, where N describes the
number of people who are part of the network. However, more recently, it has been demonstrated that the
value of a network tends to vary as N*log (N). Note
that this equation suggests that the value of a network is substantially less than Metcalfes Law.8
In addition, there have been many studies about
the contribution that net-centricity can have to
mission effectiveness. For example, studies of air-to-
18
20
Connect.
It is well understood that the various categories
of the cyber domain are strongly interconnected. To
address this problem, there is a need for a family of
Measures of Merit (MoM) to provide that linkage (see
Figure 2.2).
21
22
23
Cyberpower
M&S: LVC
Ins
tit
F utio
., L actor nal
s
CIP egal I
Too ssue
s
ls)
DAPSE,
COMPOEX
Cyberstrategy
(e.g
Legend:
Black: Satisfactory
White: Marginal
*UH\6LJQLFDQW&KDOOHQJHV
Cyberspace
M&S: OPNET
Analysis: Percolation Theory
Testbeds: NRL GIG Testbed
24
26
'HSXW\ 6HFUHWDU\ RI 'HIHQVH 0HPRUDQGXP 7KH 'HQLtion of Cyberspace, Washington, DC: Department of Defense
May 12, 2008.
3. Daniel T. Kuehl, From Cyberspace to Cyberpower: DeQLQJWKH3UREOHPLQ)UDQNOLQ'.UDPHU6WXDUW+6WDUUDQG
/DUU\.:HQW](GVCyberpower and National Security, Washington, DC: Center for Technology and National Security Policy, National Defense University, Potomac Books, Inc., 2009, p .48.
4. Ibid., p. 40.
5. Sally Adee, 37 Years of Moores Law, IEEE Spectrum, May
2008.
6. Rich Kalgaard, Ten Laws of the Modern World, April 19,
2005, available from Forbes.com.
7. George Gilder, Metcalfes Law and Legacy, Forbes ASAP,
September 13, 1993.
%RE%ULVFRH$QGUHZ2GO\]NRDQG%HQMDPLQ7LOO\0HWcalfes Law is Wrong, IEEE Spectrum, July 2006.
'DQ *RQ]DOHV et al., Network-Centric Operations Case
Study: Air-to-Air Combat With and Without Link 16, Santa
Monica, CA: RAND Corporation, National Defense Research Institute, 2005.
10. Irving Lachow, Cyber Terrorism: Menace or Myth?
Chap. 19, Cyberpower and National Security, Bethesda, MD: Potomac Press, 2009.
11. John Markoff, Vast Spy System Loots Computers in 103
Countries, New York Times, March 29, 2009.
12. Emad Aboelela, Network Simulation Experiments Manual, Amsterdam: Morgan Kaufmann Publishers, 3rd Ed., June
2003.
13. Ira Kohlberg, Percolation Theory of Coupled Infrastructures, 2007 Homeland Security Symposium entitled Cascading
27
28