Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Innovation and

the Proper Context


of Cyber Operations
The path to avoid cyber war
by Brandon Valeriano & Benjamin Jensen

M
isunderstanding Inno-
vation and the Future >Dr. Valeriano serves as a member of the Bren Chair of Military Innovation, Krulak
Battlefield Center, Marine Corps University.
Most stories of innovation
and invention for the military are filled >>Mr. Jensen serves as a Professor, School of Advanced Warfighting, Marine
with messianic projections about the Corps University.
evolving future of warfare. The slap of
reality destroys these projections with
the dirigible and drone as twin examples
of the failure of new innovations to alter
how coercion occurs on the battlefield.
Instead these options are/were better
served for reconnaissance and espionage
than war. The dreams of the future pro-
vided few hints for what was to come.
The idea of a coming Cyber Pearl
Harbor is more than just a warning,
it has become trope built on an intel-
lectual fallacy.1 The Cyberspace So-
larium Commission (which we served
on) understood that many of its critical
recommendations on cyber security re-
form would only be implemented after
a cyber disaster, a break glass in case of
emergency scenario that would change
everything.2
The grand cyber wars everyone fears
never materialize because the military,
strategic, and policy community fail to Why have we not experienced the “Cyber Armageddon” envisioned and predicted since the
understand the utility of cyber weapons. early 1980s? (Photo by SSgt Jacob Osborne.)
In this article, we will examine the util-
ity of cyber operations in the context of technology quite some time ago. Reach- where we began, waiting for Cyber
crisis bargaining and warfare outlining ing popular consciousness with the 1982 Armageddon to unleash doom on the
the limited coercive potential of cyber movie Wargames, Ronald Regan began international system.
weapons. Instead, cyber operations can outlining the origins of a cyber strat- Why have we failed to witness cyber
provide pathways to de-escalate con- egy.3 The dangers of cyber catastrophe doom?5 Rather than being used as a tool
flicts minimizing the possibility of war. were illustrated quite vividly with the to disseminate the opposition, cyber
fear associated with Y2K at the turn of capabilities instead do more mundane
Cyber Doom the millennium.4 Fast forward through things like leveraging left of launch op-
The United States acquired cyber the War on Terror, and we are back erations in the hopes of disrupting the

Marine Corps Gazette • February 2021 www.mca-marines.org/gazette 39


Ideas & Issues (InnovatIon /Future Force desIgn)

math of our adversaries.6 Some have ends? What is the goal exactly? It is not offensive operations and focuses more
begun to argue that cyber operations clear what the goal is with the vision of on the ability of cyber options to enable
just represent an intelligence contest persistent engagement; there is no end defensive bulwarks and to manipulate
or operate mainly in the domain of es- state identified by the strategy.13 This information asymmetries between dis-
pionage.7 is likely because cyber operations have puting powers.22 By making it near im-
The reality of cyber operations is a limited ability to impact the outcome possible to attack, the aggressor is forced
much different than the prognosticators of battles. Cyber options can change to resort to other traditional options to
of the new might lead one to believe. things around the edges, help shape destabilize the target.23
The mythical cyber war everyone fears a battle, deceive decision makers, but Enabling defense by denial is but
will never come to fruition because ana- rarely will these sort of modern forms of one of the few strategic advances on
lysts have continually misunderstood political warfare be decisive for victory. offer from cyber tools. Rather than ex-
the nature of innovation and fail to ap- Cyber operations fail to trigger es- panding attack surfaces, cyber options
ply critical analysis required to evalu- calation dynamics, and instead offer a instead can make it more likely that
ate perceived offset technologies. Cyber pathway away from war during crisis an attack will never happen in the first
operations act as substitutes or comple- interactions.14 Escalation is simply an place if the target is hardened. Chris
ments for other options in the foreign
policy toolkit.8 When substituted for
military operations, cyber options can
provide pathways to peace and enable Too often we conceive of strategy as a means to an
de-escalation of an emerging crisis. end without considering how that end is achieved. If
The Failure of the Offense in Cyber cyber operations are the means, what are the ends?
Security
The real world comes for us all at
some point, and it must come for the
strategic community as it confronts the increase of intensity or the tempo of a Krebs, former head of the Cyberspace
reality and purpose of cyber operations.9 conflict suggesting rising hostility over and Infrastructure Security Agency,
We are not “under siege” on all sides time.15 Generally, cyber operations do noted that the core strategy of pro-
in cyber security.10 Cyber operations not even provoke responses, let alone tecting the United States during the
instead flow with the course of inter- escalatory responses in or out of domain election of 2020 was not hunt forward
national politics, ebbing and rising limiting the potential for escalation.16 operations but deterrence by denial.24
with the strategic currents of the in- Overall, there is a limited utility of Even in discussing recent US-
ternational system.11 Discard an agree- offensive cyber operations in the cyber CYBERCOM hunt forward operations
ment with an adversary and that same domain.17 Cyber options failed to make in Estonia during the 2020 election, the
adversary will respond with increased much of a dent on the operations of main point seems to be to discover and
cyber actions. End negotiations on trade terrorists because actors like ISIS do splash out Russian malware tools into
and the target responds by increasing not depend on digital methods of com- the public domain to prevent these op-
their attacks globally to demonstrate munication or power projection.18 A tions from being used on the attack.25
strategic will and credibility. It is not nibble and low-tech adversary is not a Signaling knowledge of the opposition
complicated. suitable test case for cyber operations. actors capability sometimes is enough
Cyber operations are not tools of What has been cited as the great to prevent further violation. Cyber
coercion or power projection, rather testing ground for cyber operations in operations paradoxically provide for
cyber operations are forms of decep- modern warfare, the ongoing conflict methods of de-escalation in an ongo-
tion and espionage that seek to attack between Ukraine and Russia has rather ing conflict.
information, command and control, resulted in stalemate.19 Instead, Russia
and manipulate perceptions.12 To un- attacks power plants for a few hours or Cyber Operations as Off-Ramps from
derstand the nature of cyber conflict, devastates the tax software of Ukraine War
we have to understand the purpose of causing global confusion but not ad- Cyber operations are not prone to
cyber operations. If cyber options are vancing an inch on the battlefield.20 escalation, in fact, cyber operations are
useless in changing the behavior of an There is no great strategic advance en- likely off-ramps from the road to war.26
adversary, then they are not especially abled by cyber operations in an active The role of cyber operations during a
useful as tools of coercion central to the combat zone.21 crises or conflict event is either as a
conduct of warfare. substitute for more traditional options
Too often we conceive of strategy as Cyber for the Defense that might be escalatory, such strategic
a means to an end without consider- The real innovation in cyber strategy bombing, or as a complement to ongo-
ing how that end is achieved. If cyber will come when the community moves ing operations, like ammunition or fuel.
operations are the means, what are the away from grand projections of cyber Cyber options either add or subtract,

40 www.mca-marines.org/gazette Marine Corps Gazette • February 2021


they do not multiply or divide, a per- ry over territorial claims), respondents facilities—injuring many. While there
spective that has enormous ramifica- who leveraged cyber options intended was limited escalation in the Winter of
tions for cyber strategy moving forward. to respond proportionally and manage 2019, the Summer crises of 2019 was
Cyber operations expand the range escalation because they did not see the distinctly different and separated by over
of strategic options, moving beyond initial violations as worthy of escalation six months, suggesting the Winter crisis
the typical construction of DiME: towards war.30 Respondents tended to was an entirely new phase of the conflict.
diplomatic, information, military, use information warfare options, in- During the summer crisis, cyber op-
and economic. The manipulation of cluding cyber options, more often than tions substituted for military options
digital signals makes the information military options to respond to an initial allowing both sides for space to ma-
component of strategy more meaning- cyber operation because the violation neuver away from outright war. When
ful through added options, but it does was not series enough to necessitate a challenged with a continuing series of
not fundamentally revolutionize the conventional response. provocations in the region, the United
nature or character of war. The effects A simple demonstration of our theory States responded with cyber actions
tend to be fleeting or limited due to the comes from an examination of the U.S.- that limited the conflict and served as
ambiguous nature of covert operations, Iranian Summer Crisis of 2019. A long pathways toward de-escalation.
which include cyber and information simmering rivalry in the region seemed Evidence seems clear that cyber ac-
operations.27 As weak signals that can to escalate after the United States pulled tions can dampen a crisis, helping states
be denied, cyber operations preserve out of the Joint Comprehensive Plan of locked in competition avoid dangerous
flexibility in a crisis situation demon- Action in 2018. Concern about Iran’s conflict spirals. Others are discovering
strating resolve in the face of opposition. use of proxy forces in the region, par- similar patterns, noting that there is
When challenged by a provocative ticularly Yemen, and fears of a nuclear a decreased demand for retaliation in
move the by the opposition, the de- weapons program animated the animos- response to a cyber operation.36 Mutual
fender has many options to respond. ity directed at Iran. Attacks on shipping vulnerability can promote mutual sta-
If the desire is escalation to maintain in the region lead to the deployment bility over time as operations in the gray
dominance against the opposition, a thousands of troops the region includ- zone can convey information and signal
military option is obviously the choice. ing an aircraft carrier. intent to the opposition, lessening the
But this assumes a desire for war that fog of war. Cyber options can create new
few would ascribe to, given the com- risk profiles, but they can also mitigate
plexities and dangers of modern battle. Cyberspace is likely not risk by demonstrating resolve pushing
If the choice is to respond and demon- the other side to either de-escalate or
strate capability in the face of opposi- a domain of coercion respond with proportional moves that
tion so the adversary backs down, diplo- and warfare. do not escalate the competition.
matic, or economic options are limited
and demonstrate a weak commitment. The Impact on the Marine Corps and
Military options are too escalatory, but USCYBERCOM
information options are just right in the On 20 June 2019, Iran shot down a What exactly all this means for the
Goldilocks sense. By signaling to the U.S. R1-4 Global Hawk UAV.31 Presi- Marine Corps and the DOD is an open
opposition commitment and limiting dent Trump first ordered a military question. Cyberspace is likely not a do-
their ability to respond with further strike that was called off due to either main of coercion and warfare. Instead
military measures, a limited amount the threat of collateral damage or the the domain is developing up much dif-
of force can be applied to shape the fear of escalation to war, or both.32 In- ferently than the futures community
conflict away from escalation. stead of escalating, the United States thought. It is likely that the compe-
We discovered this unexpected pat- responded proportionately by using cy- tition space will be dictated more by
tern during a series wargame experi- ber tools to disable Iran’s ability to track the dynamics of political warfare than
ments while doing research for our next ships in the region.33 Another operation outright warfare, moving around the
book. With a sample of 400 individual hacked Iran’s missile defense systems edges of conflict manipulating informa-
wargame decisions bolstered by an ex- making it vulnerable to an attack.34 tion asymmetries.37
perimental treatment of 3,000 interna- The cyber operations signaled risk Marine capabilities in cyberspace
tional respondents to an experimental to the Iranians and preserve further op- need to be enhanced and developed
survey battery, we have been able to tions for the United States if the situa- through MARFORCYBER, but we
demonstrate the stabilizing influence of tion escalated. Instead, the conflict de- also need to shift position. Instead
cyber operations.28 We knew that cyber escalated over the summer until on 27 of a domain that “is under siege,” we
operations were unlikely to be escalatory December 2019 when a rocket attack on must recognize that ongoing fires con-
based on past research but were unsure a U.S. base in Iraq killed a contractor.35 tain communications and information
just how this process occurred.29 On 3 January, Gen Solemani was assas- about adversary intentions. Understood
In a scenario where there was a high sinated, which then led to Iran launch- as such, cyber becomes a domain of in-
likelihood of escalation (long-term rival- ing a conventional missile strike on U.S. formation management helping signal

Marine Corps Gazette • February 2021 www.mca-marines.org/gazette 41


IDEAS & ISSUES (INNOVATION /FUTURE FORCE DESIGN)

expectations and shaping the future of modern reconnaissance that can be used the Fast and the Furious (2001–) series.
the battlefield. to understand adversary intentions. But actualizing these transformations
Properly understood as an adjunct ca- on the battlefield is difficult when the
pability that can substitute for more es- Technology and Innovation innovation of cyber technologies is bro-
calatory options, cyber operations have There is a difference between a tech- ken down to its bare bones.
a clear role to play in modern conflict. nology being innovative for society and We must ask how the means can
Maintaining and enhancing capability a technology becoming a transforma- achieve an end, answering this question
is critical because falling behind to a tive for military conflict. Digital com- through the framework of cyber opera-
more advanced technological adversary munication and the internet surely are tions leads to intellectual dead-ends.
promotes weakness and overreaction to transforming society, reshaping how we Properly understood, the innovation of
unknown threats. Losing a digital edge connect, work, and view the world. Yet, cyber operations is to limit and forestall
can lead to a state acting like a cornered just how important has cyber technolo- escalation leading to stability. Not at all
animal with few strategic options. gies been for transforming war? There what we expected when we started this
The force needs to enhance its cyber is little evidence much has changed at research and likely not the final word
capabilities to remain relevant and com- all so far, 30–40 years into the use of on the subject.
plement convention operations. More the technology. Even if we consider cy-
importantly, a modern military force ber immature and start our new era in
needs to maintain cyber capabilities to 2001 or 2010, there is little evidence Notes
deny digital attack paths to the adversary. in a change in the methods of coercion 1. Sean Lawson and Michael Middleton, “Cyber
The disasters envisioned through the loss enabled through cyber pathways. Pearl Harbor: Analogy, Fear, and the Framing
of command and control due to digital The joy in innovation often comes of Cyber Security Threats in the United States,
intervention will be a consequence of through the unexpected developments. 1991–2016,” First Monday, (March 2019), avail-
inadequate defense, not the ingenuity We all can envision a fantasy world able at https://firstmonday.org.
of the attacker. Cyber operations pro- where cyber technologies reshape con-
2. U.S. Cyberspace Solarium Commission,
vide a method of defensive control over flict, this is typical in our popular fiction
available at https://www.solarium.gov.
lines of communication and method of from Battlestar Galactica (2004) to even

The Samuel Nicholas Society


– A Lasting Gift for Marines –

By leaving a gift to the Marine Corps Association


Foundation in your will or other estate plan, you
become a part of this special group.
Your generous, lasting gift will ensure Marines
are always prepared to serve and fight, no matter
the challenges they face.

For more information, visit


mca-marines.org/legacy-gift-planning

If you have already included MCAF in your will or estate plan, please let us know.
We want to thank you for your commitment to our Marines.

42 www.mca-marines.org/gazette Marine Corps Gazette • February 2021


3. Fred Kaplan, Dark Territory: The Secret His- 15. Herman Kahn, On Escalation: Metaphors and Secret,” Security Studies 26, no. 1, (2017); and
tory of Cyber War, (New York, NY: Simon and Scenarios, (New York, NY: Routledge, 2017). A. Carson, Secret Wars: Covert Conflict in In-
Schuster, 2016). ternational Politics, (Princeton, NJ: Princeton
16. Brandon Valeriano and Benjamin Jensen, University Press, 2020).
4. Murray E. Jennex, “Emergency Response “The Myth of the Cyber Offense: The Case for
Systems: The Utility Y2K Experience,” Journal Cyber Restraint,” Cato Institute Policy Analysis, 28. Benjamin Jensen and Brandon Valeriano,
of Information Technology Theory and Applica- (Washington, DC: CATO Institute, 2019). “What Do We Know About Cyber Escalation?
tion (JITTA), (Atlanta, GA: Association for Observations from Simulations and Surveys,”
Information Systems, 2004). 17. Ibid. Atlantic Council, (22 November 2019), available
at https://www.atlanticcouncil.org; and Ben-
5. Sean T. Lawson, Cybersecurity Discourse in the 18. Ash Carter, “A Lasting Defeat: The Cam- jamin Jensen and Brandon Valeriano, “Cyber
United States: Cyber-doom Rhetoric and Beyond, paign to Destroy ISIS,” Belfer Center for Science Escalation Dynamics: Results from War Game
(New York, NY, Routledge/Taylor & Francis and International Affairs, (October 2017), avail- Experiments International Studies Association,
Group: 2020). able at https://www.belfercenter.org. Annual Meeting Panel: War Gaming and
Simulations in International Conflict March
6. Brandon Valeriano, Heather Roff, and Sean 19. Andy Greenberg, “How an Entire Nation 27, 2019,” ISA, (2019), available at http://web.
Lawson, “Dropping the Cyber Bomb? Spectacu- Became Russia’s Test Lab for Cyberwar,” Wired, isanet.org.
lar Claims and Unremarkable Effects,” Council (June 2016), available at https://www.wired.
on Foreign Relations, (New York, NY: Council com. 29. Cyber Strategy.
on Foreign Relations, 2016).
20. Kim Zetter, “Inside the Cunning, Unprec- 30. “What Do We Know About Cyber Esca-
7. Brandon Valeriano, Benjamin Jensen, and edented Hack of Ukraine’s Power Grid,” Wired, lation? Observations from Simulations and
Ryan Maness, Cyber Strategy: The Evolving (3 March 2016), available at https://www.wired. Surveys.”
Character of Power and Coercion, (New York, com; and Andy Greenburg, “The Untold Story
NY: Oxford University Press, 2018); and J. of NotPetya, the Most Devastating Cyberattack 31. Lily Newman, “The Drone Iran Shot Down
Rovner, “Cyber War as an Intelligence Contest,” in History,” Wired, (August 2018), available at Was a $220M Surveilance Monster,” Wired,
War on the Rocks, (2019), available at https:// https://www.wired.com. (June 2019), available at https://www.wired.
warontherocks.com. com.
21. Nadiya Kostyuk and Yuri M. Zhukov,
8. Brandon Valeriano and Benjamin Jensen, “Invisible Digital Front: Can Cyber Attacks 32. Toluse Olorunnipa, et al., “‘I Stopped It’:
“De-escalation Pathways and Disruptive Tech- Shape Battlefield Events?,” Journal of Conflict Inside Trump’s Last-minute Reversal on Stirking
nology: Cyber Operations as Off-Ramps to Resolution, (Washington, DC: SAGE Publica- Iran,” Washington Post, (June 2019), available
War,” in Cyber Peace, (Cambridge: Cambridge tions, 2019). at https://www.washingtonpost.com.
University Press, 2021).
22. “The Myth of the Cyber Offense: The Case 33. Julian E. Barnes, “U.S. Cyberattack Hurt
9. Brandon Valeriano and Ryan Maness, Cyber for Cyber Restraint.” Iran’s Ability to Target Oil Tankers, Officials
War versus Cyber Realities: Cyber Conflict in the Say,” The New York Times, (August 2019), avail-
International System, (Oxford: Oxford Univer- 23. Robert Morgus, et al., “Deterrence by able at https://www.nytimes.com.
sity Press, 2015). Denial: The Missing Element of U.S. Cyber
Strategy,” Lawfare, (March 2020), available at 34. Ellen Nakashima, “Trump Approved
10. Gordon Lubold and Dustin Volz, “Navy, https://www.lawfareblog.com. Cyber-strikes Against Iran’s Missile Systems,”
Industry Partners Are ‘Under Cyber Siege’ by The Washington Post, (June 2019), available at
Chinese Hackers, Review Asserts,” The Wall 24. David E. Sanger and Julian E. Barnes, “U.S. https://www.washingtonpost.com.
Street Journal, (March 2019), available at Tried a More Aggressive Cyberstrategy, and the
https://www.wsj.com. Feared Attacks Never Came,” The New York 35. Julian E. Barnes, “American Contractor
Times, (November 2020), available at https:// Killed in Rocket Attack in Iraq,” The New York
11. Cyber War versus Cyber Realities. www.nytimes.com. Times, (December 2019), available at https://
www.nytimes.com.
12. Erik Gartzke and Jon Lindsay, “Weaving 25. Julian E. Barnes, “U.S. Cyberforce Was
Tangled Webs: Offense, Defense, and Decep- Deployed to Estonia to Hunt for Russian Hack- 36. Sarah Kreps and Jacquelyn Schneider, “Es-
tion in Cyberspace,” Security Studies, (Milton ers,” The New York Times, (December 2020), calation Firebreaks in the Cyber, Conventional,
Park: Taylor & Francis, 2015); and Cyber Strat- available at https://www.nytimes.com. and Nuclear Domains: Moving Beyond Effects-
egy. based Logics,” Journal of Cybersecurity, (Oxford,
26. Much of this research originally will ap- Oxford University Press, 2019).
13. U.S Cyber Command, “Achieve and Main- pear in Brandon Valeriano and Benjamin Jen-
tain Cyberspace Superiority: Command Vision sen, “De-escalation Pathways and Disruptive 37. Benjamin Jensen, “The Cyber Character of
for U.S. Cyber Command,” (2018), available Technology: Cyber Operations as Off-Ramps to Political Warfare,” Brown J. World Aff., (n.d.),
at https://www.cybercom.mil. War,” in Cyber Peace, (Cambridge: Cambridge available at http://bjwa.brown.edu.
University Press, 2021).
14. “De-escalation Pathways and Disruptive
Technology: Cyber Operations as Off-Ramps 27. Cyber Strategy; Austin Carson and Karen
to War.” Yarhi-Milo, “Covert Communication: The
Intelligibility and Credibility of Signaling in

Marine Corps Gazette • February 2021 www.mca-marines.org/gazette 43

You might also like