Professional Documents
Culture Documents
39 Innovation and The Proper Context of Cyber Operations
39 Innovation and The Proper Context of Cyber Operations
M
isunderstanding Inno-
vation and the Future >Dr. Valeriano serves as a member of the Bren Chair of Military Innovation, Krulak
Battlefield Center, Marine Corps University.
Most stories of innovation
and invention for the military are filled >>Mr. Jensen serves as a Professor, School of Advanced Warfighting, Marine
with messianic projections about the Corps University.
evolving future of warfare. The slap of
reality destroys these projections with
the dirigible and drone as twin examples
of the failure of new innovations to alter
how coercion occurs on the battlefield.
Instead these options are/were better
served for reconnaissance and espionage
than war. The dreams of the future pro-
vided few hints for what was to come.
The idea of a coming Cyber Pearl
Harbor is more than just a warning,
it has become trope built on an intel-
lectual fallacy.1 The Cyberspace So-
larium Commission (which we served
on) understood that many of its critical
recommendations on cyber security re-
form would only be implemented after
a cyber disaster, a break glass in case of
emergency scenario that would change
everything.2
The grand cyber wars everyone fears
never materialize because the military,
strategic, and policy community fail to Why have we not experienced the “Cyber Armageddon” envisioned and predicted since the
understand the utility of cyber weapons. early 1980s? (Photo by SSgt Jacob Osborne.)
In this article, we will examine the util-
ity of cyber operations in the context of technology quite some time ago. Reach- where we began, waiting for Cyber
crisis bargaining and warfare outlining ing popular consciousness with the 1982 Armageddon to unleash doom on the
the limited coercive potential of cyber movie Wargames, Ronald Regan began international system.
weapons. Instead, cyber operations can outlining the origins of a cyber strat- Why have we failed to witness cyber
provide pathways to de-escalate con- egy.3 The dangers of cyber catastrophe doom?5 Rather than being used as a tool
flicts minimizing the possibility of war. were illustrated quite vividly with the to disseminate the opposition, cyber
fear associated with Y2K at the turn of capabilities instead do more mundane
Cyber Doom the millennium.4 Fast forward through things like leveraging left of launch op-
The United States acquired cyber the War on Terror, and we are back erations in the hopes of disrupting the
math of our adversaries.6 Some have ends? What is the goal exactly? It is not offensive operations and focuses more
begun to argue that cyber operations clear what the goal is with the vision of on the ability of cyber options to enable
just represent an intelligence contest persistent engagement; there is no end defensive bulwarks and to manipulate
or operate mainly in the domain of es- state identified by the strategy.13 This information asymmetries between dis-
pionage.7 is likely because cyber operations have puting powers.22 By making it near im-
The reality of cyber operations is a limited ability to impact the outcome possible to attack, the aggressor is forced
much different than the prognosticators of battles. Cyber options can change to resort to other traditional options to
of the new might lead one to believe. things around the edges, help shape destabilize the target.23
The mythical cyber war everyone fears a battle, deceive decision makers, but Enabling defense by denial is but
will never come to fruition because ana- rarely will these sort of modern forms of one of the few strategic advances on
lysts have continually misunderstood political warfare be decisive for victory. offer from cyber tools. Rather than ex-
the nature of innovation and fail to ap- Cyber operations fail to trigger es- panding attack surfaces, cyber options
ply critical analysis required to evalu- calation dynamics, and instead offer a instead can make it more likely that
ate perceived offset technologies. Cyber pathway away from war during crisis an attack will never happen in the first
operations act as substitutes or comple- interactions.14 Escalation is simply an place if the target is hardened. Chris
ments for other options in the foreign
policy toolkit.8 When substituted for
military operations, cyber options can
provide pathways to peace and enable Too often we conceive of strategy as a means to an
de-escalation of an emerging crisis. end without considering how that end is achieved. If
The Failure of the Offense in Cyber cyber operations are the means, what are the ends?
Security
The real world comes for us all at
some point, and it must come for the
strategic community as it confronts the increase of intensity or the tempo of a Krebs, former head of the Cyberspace
reality and purpose of cyber operations.9 conflict suggesting rising hostility over and Infrastructure Security Agency,
We are not “under siege” on all sides time.15 Generally, cyber operations do noted that the core strategy of pro-
in cyber security.10 Cyber operations not even provoke responses, let alone tecting the United States during the
instead flow with the course of inter- escalatory responses in or out of domain election of 2020 was not hunt forward
national politics, ebbing and rising limiting the potential for escalation.16 operations but deterrence by denial.24
with the strategic currents of the in- Overall, there is a limited utility of Even in discussing recent US-
ternational system.11 Discard an agree- offensive cyber operations in the cyber CYBERCOM hunt forward operations
ment with an adversary and that same domain.17 Cyber options failed to make in Estonia during the 2020 election, the
adversary will respond with increased much of a dent on the operations of main point seems to be to discover and
cyber actions. End negotiations on trade terrorists because actors like ISIS do splash out Russian malware tools into
and the target responds by increasing not depend on digital methods of com- the public domain to prevent these op-
their attacks globally to demonstrate munication or power projection.18 A tions from being used on the attack.25
strategic will and credibility. It is not nibble and low-tech adversary is not a Signaling knowledge of the opposition
complicated. suitable test case for cyber operations. actors capability sometimes is enough
Cyber operations are not tools of What has been cited as the great to prevent further violation. Cyber
coercion or power projection, rather testing ground for cyber operations in operations paradoxically provide for
cyber operations are forms of decep- modern warfare, the ongoing conflict methods of de-escalation in an ongo-
tion and espionage that seek to attack between Ukraine and Russia has rather ing conflict.
information, command and control, resulted in stalemate.19 Instead, Russia
and manipulate perceptions.12 To un- attacks power plants for a few hours or Cyber Operations as Off-Ramps from
derstand the nature of cyber conflict, devastates the tax software of Ukraine War
we have to understand the purpose of causing global confusion but not ad- Cyber operations are not prone to
cyber operations. If cyber options are vancing an inch on the battlefield.20 escalation, in fact, cyber operations are
useless in changing the behavior of an There is no great strategic advance en- likely off-ramps from the road to war.26
adversary, then they are not especially abled by cyber operations in an active The role of cyber operations during a
useful as tools of coercion central to the combat zone.21 crises or conflict event is either as a
conduct of warfare. substitute for more traditional options
Too often we conceive of strategy as Cyber for the Defense that might be escalatory, such strategic
a means to an end without consider- The real innovation in cyber strategy bombing, or as a complement to ongo-
ing how that end is achieved. If cyber will come when the community moves ing operations, like ammunition or fuel.
operations are the means, what are the away from grand projections of cyber Cyber options either add or subtract,
expectations and shaping the future of modern reconnaissance that can be used the Fast and the Furious (2001–) series.
the battlefield. to understand adversary intentions. But actualizing these transformations
Properly understood as an adjunct ca- on the battlefield is difficult when the
pability that can substitute for more es- Technology and Innovation innovation of cyber technologies is bro-
calatory options, cyber operations have There is a difference between a tech- ken down to its bare bones.
a clear role to play in modern conflict. nology being innovative for society and We must ask how the means can
Maintaining and enhancing capability a technology becoming a transforma- achieve an end, answering this question
is critical because falling behind to a tive for military conflict. Digital com- through the framework of cyber opera-
more advanced technological adversary munication and the internet surely are tions leads to intellectual dead-ends.
promotes weakness and overreaction to transforming society, reshaping how we Properly understood, the innovation of
unknown threats. Losing a digital edge connect, work, and view the world. Yet, cyber operations is to limit and forestall
can lead to a state acting like a cornered just how important has cyber technolo- escalation leading to stability. Not at all
animal with few strategic options. gies been for transforming war? There what we expected when we started this
The force needs to enhance its cyber is little evidence much has changed at research and likely not the final word
capabilities to remain relevant and com- all so far, 30–40 years into the use of on the subject.
plement convention operations. More the technology. Even if we consider cy-
importantly, a modern military force ber immature and start our new era in
needs to maintain cyber capabilities to 2001 or 2010, there is little evidence Notes
deny digital attack paths to the adversary. in a change in the methods of coercion 1. Sean Lawson and Michael Middleton, “Cyber
The disasters envisioned through the loss enabled through cyber pathways. Pearl Harbor: Analogy, Fear, and the Framing
of command and control due to digital The joy in innovation often comes of Cyber Security Threats in the United States,
intervention will be a consequence of through the unexpected developments. 1991–2016,” First Monday, (March 2019), avail-
inadequate defense, not the ingenuity We all can envision a fantasy world able at https://firstmonday.org.
of the attacker. Cyber operations pro- where cyber technologies reshape con-
2. U.S. Cyberspace Solarium Commission,
vide a method of defensive control over flict, this is typical in our popular fiction
available at https://www.solarium.gov.
lines of communication and method of from Battlestar Galactica (2004) to even
If you have already included MCAF in your will or estate plan, please let us know.
We want to thank you for your commitment to our Marines.