10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

somewhat with globalization, it is far from obsolete as governments continueto apply physical coercion to have some measure <strong>of</strong> control. 23 Still, <strong>the</strong>re is noanalogue in <strong>the</strong> physical world <strong>for</strong> <strong>the</strong> ease <strong>of</strong> movement in cyberspace and<strong>the</strong> ability to induce effects across national borders. Moreover, when <strong>the</strong>actors are beyond <strong>the</strong> reach <strong>of</strong> government coercion, ei<strong>the</strong>r because <strong>of</strong> size oranonymity, cyberspace is witnessed in its most borderless manifestation.<strong>On</strong>tology <strong>for</strong> <strong>Cyber</strong> Policy MakingThe following definitions begin at <strong>the</strong> macro level and narrow in focus.This project centers on cyber operations affecting systems not owned or operatedby <strong>the</strong> actor, and we developed this ontology accordingly. Specifically, weidentify, but do not establish in depth, a conceptual category <strong>for</strong> normal orroutine cyber activities. We have focused on fleshing out <strong>the</strong> nuances <strong>of</strong> externalcyber operations, <strong>the</strong> characteristics that separate <strong>the</strong>m from o<strong>the</strong>r activities incyberspace, and <strong>the</strong> relevant attributes that should drive policy analysis. In doingso we introduce a number <strong>of</strong> terms, identify key attributes <strong>for</strong> analysis, andillustrate conceptual inter-relationships.<strong>Cyber</strong> activity is all activity conducted through cyberspace. We definecyberspace similarly to JP 1-2 as “a global domain consisting <strong>of</strong> <strong>the</strong>interdependent network <strong>of</strong> in<strong>for</strong>mation technology infrastructures, including <strong>the</strong>Internet, telecommunications networks, computer systems, and embeddedprocessors and controllers.” 24 What is possible in cyberspace is determined by<strong>the</strong> “laws <strong>of</strong> code,” 25 as described by Lawrence Lessig, and is continuallyevolving and changing.23 (Goldsmith & Wu, 2007)24 (U.S. Joint Chiefs <strong>of</strong> Staff, 2012)25 (Lessig, 1999)17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!