10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Operational ConsiderationsStrategicAny military operation must support <strong>the</strong> overall strategic vision. Whilethis statement may seem banal in <strong>the</strong> context <strong>of</strong> modern hostilities, it assumes adifferent significance in <strong>the</strong> realm <strong>of</strong> cyber activity. Most <strong>of</strong> <strong>the</strong> external cyberactivity occurring today that concerns <strong>the</strong> United States does not occur inconjunction with physical warfare. Ra<strong>the</strong>r it is between rival nations who enjoynormalized, relatively peaceful relations. 47 For this reason, <strong>the</strong>re are two differentstrategic dimensions to external cyber activity.First, consider national strategy. The Obama Administration’s 2010National Security Strategy emphasizes four “enduring national interests”:security, prosperity, values and international order. 48 Policy <strong>for</strong> external cyberactivity needs to support <strong>the</strong>se principles without undermining any one <strong>of</strong> <strong>the</strong>m.For instance, employing a cyber counterattack that seeks to promote our securityand prosperity, but which destabilizes <strong>the</strong> international order, would be astrategic miscalculation. This is a significant consideration <strong>for</strong> U.S. cyber policytoward advanced persistent threats (APT). With regard to <strong>the</strong> Libyan exampleabove, <strong>the</strong> New York Times reported that NATO’s decision to refrain from usingcyber weaponry was partially a function <strong>of</strong> <strong>the</strong> danger <strong>of</strong> setting a precedent.This decision demonstrates <strong>the</strong> importance <strong>of</strong> supporting national strategy inelecting to use external cyber operations. 4947 For example, See (McConnell, Chert<strong>of</strong>f, & Lynn, China's <strong>Cyber</strong> Theivery is National Policy -And Must Be Challenged, 2012)48 (The White House, 2010)49 It is also a fitting example <strong>of</strong> <strong>the</strong> interaction between strategy and economics. Though economicconsiderations may end up justifying <strong>the</strong> acceptance <strong>of</strong> strategic risk, policy makers evidentlydecided to bias toward supporting strategic imperatives.33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!