10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>the</strong>re are <strong>of</strong>fensive and defensive CNA and <strong>of</strong>fensive and defensive CND. In itsexamination <strong>of</strong> “<strong>of</strong>fensive cyber”, <strong>the</strong> National Research Council <strong>of</strong> <strong>the</strong> NationalAcademies (hereafter, NRC) recognized this distinction and <strong>of</strong>fered anillustrative example: “[U]nder this rubric, a computer network attack might beused <strong>for</strong> a defensive purpose, such as <strong>the</strong> neutralization <strong>of</strong> a cyberthreat to aDOD computer or network.” 21 If <strong>the</strong> NRC’s example accurately represents DoD’sintent in JP 3-13, <strong>the</strong>n this hypo<strong>the</strong>tical overlaps <strong>the</strong> definition <strong>of</strong> CND, because itwould be an action taken through <strong>the</strong> use <strong>of</strong> computer networks to protect DoDnetworks.NRC does not <strong>of</strong>fer an example in which a computer network defensemight be used <strong>for</strong> <strong>of</strong>fensive purposes. Ei<strong>the</strong>r such a case would look very muchlike <strong>the</strong> CNA <strong>for</strong> defensive purposes example or it would be an illogical one.Though we acknowledge that <strong>the</strong>re is a category <strong>of</strong> cyber operation that isessentially a counterattack (a defensive measure), it is only defined in part byintent. Attempting to define it o<strong>the</strong>rwise produces an illogical framework.Yet most importantly <strong>for</strong> this paper, <strong>the</strong> DoD framework does not providerelevant distinctions that address policy considerations. Specifically, is <strong>the</strong>resomething in <strong>the</strong> nature <strong>of</strong> CND that enables more permissive conditions <strong>for</strong> itsuse relative to <strong>the</strong> nature <strong>of</strong> CNA? If that were <strong>the</strong> case, <strong>the</strong>n a convenientloophole would seem to exist that would permit commanders to label all CNA asactually <strong>of</strong>fensive CND. These definitions, <strong>the</strong>re<strong>for</strong>e, do not distinguish between<strong>the</strong> different operations in cyberspace in a manner that establishes <strong>the</strong> nature <strong>of</strong><strong>the</strong>ir key differences. This prevents policy makers from having fruitfuldiscussions or establishing effective policies.21 See section 3.1 <strong>of</strong> (National Research Council, 2009)15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!