Clausewitzian Cyber Strategy

Clausewitzian Cyber Strategy

Clausewitzian Cyber Strategy Michael Ecke Tufts University [email protected] December 13, 2018 Abstract The strategies used in traditional warfare have been defined and expanded upon for centuries. These methods pertain exclusively to traditional warfare, by traditional means. The strategies discussed beginning with Clausewitz writing in the 18th century, have thus far been able to adapt to new technologies in warfare, as each step forward in technological advancement was not a difference in kind but a difference in degree. However with the development of cyber systems and a means to attack and defend those systems, cyber warfare has created a realm in which there is truly a difference in kind. In light of this fact a new strategy needs to be developed and expanded upon for how such technologies should be used and applied in the service to a nation state. This paper seeks to define the role that cyber warfare should and it most likely to take place in war between nations, and then secondly to define a strategy for cyber warfare built on the principles of past military theory. We will then apply this strategy to the newly defined cyber strategy as defined in a 2018 document signed by President Trump. I. Introduction tirely new strategy to account for the changing defensive landscape. odern nations must be prepared for This paper will primarily be concerned with conflict in the traditional sense but how modern nations can best defend them- Mnow increasingly, must also be pre- selves from attack, but as we will see attack pared for conflict in the digital or cyber realm. and defense go hand in hand. We will set They therefore must answer the difficult ques- forth the argument that what is a new strat- tion of what cyber methods should be used egy in which proactive and preemptive mea- and when, in an effort to best serve their nation. sures are taken in order to prevent potential Here they face a conundrum, as the strategic attacks. This argument stems from several ba- resources available to them do not immediately sic premises, the first being that our systems apply to the new realm of cyber warfare. There as currently constructed are indefensible, sec- therefore exists a need for the definition of a ondly that there exists a fundamental asymme- new strategy that will allow nations to best try in cyber warfare that favors the attacker in secure their interests. almost all circumstances, and that the rate of The Cyber strategy of today is not too dis- cyber conflicts is certain to increase without similar from that of feudal lords throughout the presence of a capable defense. The strategy medieval Europe. The more advanced the at- will be primarily derived from an application tacks became, the higher and more structurally of the classic strategic work ”On War” by Carl complex castle walls were built. This strategy Von Clausewitz. was effective until cannons used in the siege of Constantinople in 1453 rendered them useless1. Similarly in the cyber realm we have reached a II. Defining Terms point where higher walls will not be sufficient to defend a nation, what is needed is an en- We first must begin with a definition of both war and cyber war. According to Clausewitz 1Crowley war is the extension of politics carried out by 1 Clauzewitzian Cyber Strategy • December 2018 other means. This entails forcing the opponent rector of the National Security Agency was to do your will, despite them refusing to com- recently quoted as saying ”We know where ply 2. It follows logically that such a pursuit we are today is indefensible”4. The reason for requires the use of force, at first to compel the this is that our network systems are incredi- opponent to do your will and then on the part bly large and complex, and within that size of the defender to prevent you from doing so. and complexity hackers are able to take ad- Cyber warfare can be defined as the inten- vantage of every error that exists within the tion to harm an oppositionâA˘ Zs´ software with system. For instance consider Windows XP, the ultimate aim of compelling them to do which contains an estimated 50 million lines of your will. This can include viruses or worms code. An operating system of that size cannot with the intent of destroying software, denial be secure, by virtue of the statistical proba- of service attacks, or hacking to obtain criti- bility that there exists some exploitable error cal data from an institution. Immediately we within the code. Now extrapolating this idea see that the definition of war is not congruent to millions of devices from computers, to in- with what cyber war is or can be. The cyber dustrial control systems, to cell phones we can realm does not onto itself have the ability to begin to see the scope of the problem. There exert force on an opposition. Meaning that are too many devices, running too many sys- no person has ever been murdered or can be tems, for a nation to adequately defend them murdered by a computer virus directly. There- all5. This means that attempting to defend fore whatever force cyber means exert can only an entire system from attack is a futile effort come indirectly from a secondary source. For that when taken in isolation will only allow for example, causing a Russian pipeline to explode more breaches to take place. as was rumored to have happened in 19823. The supposed software used to stage the attack ii. Asymmetric Attack and Defense did not itself explode, but caused the pipeline to explode. This fact necessarily means that the In traditional battle Clausewitz believed that role that cyber can play in war is a limited one, the defense had the advantage stating âAIJDe-˘ and one that must be focused mainly on sabo- fense is the stronger form of warâA˘ I˙6. He tage, subversion and intelligence gathering. characterized the defensive position as one of Subversion and intelligence gathering are âAIJAwaiting˘ the blowâA˘ I˙ and believed that inherently non violent, and while sabotage can the purpose of defense was preservation. In be violent the violence most often focused on cyber war defense occupies the same role, that physical equipment, not on people. Despite of preservation, but it cannot be said that it is their lack of violence cyber means can still be the stronger position. In fact we will demon- incredibly useful when trying to bring harm to strate that it is by far the weaker position. Not the opposition. For this reason cyber security only are the costs associated with a lost cyber and a strategy for that security should be of the attack close to zero, the attacker has the added utmost importance to modern nation states. advantage of only needing to strike a broad target effectively only once. III. Premises Clausewitz believed that defense was the stronger position in large part because of the i. Indefensible defenses that could be built, to inflict harm on the oncoming attackers. The defenders then The network systems of nation states, as cur- had an opportunity to inflict damage on the rently constructed, are by their very nature attackers. There does not exist any analogous unable to be defended. General Alexander di- 4Schactman 2Clausewitz pg. 83 5Assante 3Rid 6Clausewitz pg. 427 2 Clauzewitzian Cyber Strategy • December 2018 action in the cyber realm. The defending party to disclose to the opposition. However re- does not have any opportunity to equivalently verse engineering code that advanced can be harm the attackers, they are forced entirely into a lengthy and difficult process. More impor- acting for their own preservation. tantly though, such advanced attacks are in- The attacker in the cyber realm also has the credibly narrow in scope and may not be of benefit of having their attacks cause dispropor- any practical use to the opposition. For exam- tionate damage to the defender. That is one ple consider the Stuxnet attack of 2010. It is es- small alteration in code, can create potentially timated that it took a team of ten programmers gigantic consequences to a nation. This is not 2-3 years to construct the virus. The virus was the case in traditional warfare where a large primarily looking for âAIJeight˘ or ten arrays attack is required to achieve a large result. of 168 frequency converters eachâA˘ I,˙ clearly it There are several minimal consequences that was incredibly narrow in scope aimed at obfus- the attacker should be concerned with should cating the Iranian nuclear program9. Therefore their attack fail. One of which, the possibil- while the Iranians were undoubtedly able to ity of exposing more advanced technology to gain some technical information by examining your opponent is somewhat unique to the cy- the program, that information must be in a lim- ber realm, the other being the possibility of ited context. Just as importantly the launcher retribution is not. We will examine both of of the attack has forewarning that the informa- these in greater detail. tion will be obtained by the opposition, and The possibility of the opposition obtaining consequently has the opportunity to limit their more advanced technology is not one that own exposure to such an attack. should be quickly discounted. By examining If the attacker responds with a cyber attack past attacks between nation we can understand of their own, it is unlikely that the failed at- that in practice, this is not as large of a concern tack increased their ability to strike the attacker. as was previously thought.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us