Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
US Needs New National Strategy In Era Of Cyberaggression
by Staff Writers
Cincinnati OH (SPX) Apr 21, 2010


File image.

Deterrence won't work as a posture for protecting the United States from those who use cyberaggression to damage the country. So says a new paper from UC, which suggests that to remain safe in cyberspace, the U.S. must be more prepared to go on the offensive.

The nominee to head the Pentagon's new CyberCommand testified in front of Congress late last week that employing Cold War strategies to cyberwarfare challenges may not work for the United States.. A newly published research paper by a University of Cincinnati professor and colleagues goes a step further and concludes more directly that deterrence can not serve as the primary national cybersecurity strategy.

In testimony on April 15th before the U.S. Congress, Lt. General Keith A. Alexander offered his view that a Cold War approach of nuclear deterrence as a strategy for securing the United States might not translate effectively into the new realm of cyberwarfare, an area where the U.S. is just beginning to think about broader strategic approaches.

That same subject area is addressed in a new article in the "Journal of Homeland Security and Emergency Management" by UC Professor of Political Science Richard Harknett and co-authors John Callaghan and Rudi Kauffman. They say that to deal with cyberaggression, a more traditional model of warfighting will have to become the focus if cyberspace is to become more secure and safe.

In their article, "Leaving Deterrence Behind: War-Fighting and National Cybersecurity," Harknett and his co-authors argue that "the inherent characteristics of cyberspace require adoption of a full war-fighting posture that moves out of the fifty-plus year comfort zone of deterrence as the dominant strategic anchor... We must organize thinking about managing cyber-leveraged war so that damage is contained and reduced. Counter-intuitively, these futuristic threats require us to adopt the historical posture of traditional warfare."

By traditional warfare, the authors mean the traditional offense-defense framework that has defined war strategy throughout much of history. While a deterrence posture works in a nuclear context when the alternative for both sides is mutually-assured destruction, several factors unique to cyberwarfare make applying the deterrence model an awkward fit.

For one thing, cyberwarfare is an offense-dominated enterprise. Attacks can be carried out cheaply and in ways that make determining responsibility a slow process and difficult to establish. Deterrence is also undercut by the possibility of attackers using previously unknown approaches that greatly diminish their susceptibility to responses.

Harknett and his co-authors suggest the establishment of a three-tiered "continuum of cyberaggression" to help guide U.S. strategy in responding to attacks. They write: "Implicit in this categorization is that not every cyber threat reaches the level of national security concern, but given the unique, ubiquitous and dual-use nature of digital and computer technology, a national cybersecurity strategy must comprehensively consider the interconnectivity across the continuum of cyberaggression."

The three proposed tiers, in order of severity, are cybercrime, cyberespionage and reconnaissance, and the most serious level, cyber-leveraged war. The highest level would cover not just purely digital attacks, but also those that lead to disruption or destruction of physical infrastructure as well, such as a broad attack against the electric grid.

It is at this highest level that the United States needs to adopt policy that is oriented toward containing damage as well as for fighting in an offensive posture against those who would seek to engage in cyber-leveraged war. Being well-prepared, both offensively and defensively, will produce caution in the minds of others about attacking, and, thus, the strategy can produce a residual deterrent effect. But, the authors believe, this is likely to be temporary and under constant pressure.

"Importantly, as the ubiquity of cyber grows societally across the globe, effective norms against cyberaggression will become increasingly important in reigning in unacceptable forms of behavior in this new realm of human interaction," Harknett and colleagues write. This line of argument seems to parallel thoughts by Lt. General Alexander, who called on Congress to consider new legal and policy contexts for cyberspace.

In the end, however, Harknett and his co-authors conclude that "in facing down threats to national security, the United States must organize itself around the reality of war preparation and fighting, rather than the hope of avoidance, as the principle upon which cybersecurity will be advanced."

.


Related Links
University of Cincinnati
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Data Security In The Cloud Is A Big Concern
Gaithersburg MD (SPX) Apr 21, 2010
Lockheed Martin and its Cyber Security Alliance partners has announced the results of a collaborative cloud computing and cyber security survey in a new white paper titled "Awareness, Trust, and Security to Shape Cloud Adoption." The survey found that 70% of government technology decision makers in federal, defense/military and intelligence agencies were most concerned about data security, ... read more


CYBER WARS
Seed Bank For The Moon

Craters Around Lunar Poles Could Be Electrified

NASA Announces Winners Of 17th Annual Great Moonbuggy Race

Autarky In Space

CYBER WARS
Clues About Mars Evolution Revealed

Obama sets new course to conquer the final frontier

Spirit Awaits Winter At Troy

Picking Up Pace To Endeavour Crater

CYBER WARS
Commercial paradigm brings inventors down to earth

Japan eyes 'mind-reading' devices, robots by 2020: report

Megatrends And Megashocks The Future Awaits

418th FLTS Breaks Record With Heaviest Airdrop

CYBER WARS
China To Launch Second Lunar Probe This Year

China, Bolivia to build communications satellite

China To Complete Wenchang Space Center By 2015

China To Conduct Maiden Space Docking In 2011

CYBER WARS
Russian Space Freighter Undocks From ISS

Japan astronaut solves bubble puzzle

Celebrating The ISS And Preparing For The Future

Faulty ISS cooling system could force new space walk: NASA

CYBER WARS
Russia launches US satellite into space

Mexico To Create Its First Space Center On Yucatan Peninsula

Russia Confirms Plans Of Rocket Launch From French Guiana In 2010

Task Force To Conduct Quality Audit On Ariance Launch Campaign Process

CYBER WARS
Planet discovered lacking methane

'This Planet Tastes Funny,' According To Spitzer

Small, Ground-Based Telescope Images Three Exoplanets

Wet Rocky Planets A Dime A Dozen In The Milky Way

CYBER WARS
Materials Research Advances Reliability Of Faster Smart Sensors

Online conferencing takes off as volcano grounds planes

IBM raises earnings outlook as technology spending improves

NGC Completes System Development Of B-2 Radar Modernization Program




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement