{"id":27007,"date":"2016-06-08T06:00:52","date_gmt":"2016-06-07T20:00:52","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=27007"},"modified":"2016-06-07T05:59:19","modified_gmt":"2016-06-06T19:59:19","slug":"rationale-offensive-cyber-capabilities","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/","title":{"rendered":"The rationale for offensive cyber capabilities"},"content":{"rendered":"

\"Image<\/p>\n

An early scene in the 1962 film <\/span>Lawrence of Arabia<\/span><\/i> shows German planes swooping back and forth to bomb the rebel camp and Prince Feisal, who\u2019s heroically mounted on a white charger, chasing the planes with his sword in hand. Horses against aeroplanes aptly describes the circumstance for any nation that wants to defend itself if it lacks military cyber capabilities. You can\u2019t reasonably expect to have a modern, effective military if you can\u2019t carry out cyber operations. This isn\u2019t a like-for-like match of cyber versus cyber\u2014an astute opponent will use cyber techniques to paralyse command and control, interfere with the operation of weapons, and generally attempt to fatally expand the confusion that accompanies any armed conflict. <\/span><\/p>\n

This isn\u2019t a call for expanded cyber defence. Cyber defence usually means a bigger Computer Emergency Response Team, more technicians, essentially a Maginot line approach. We don\u2019t talk about defensive tanks or defensive fighters. The best weapons can be used for either offence or defence. How they\u2019re used depends on national intent and the risk of using them depends on how closely a nation adheres to international law and the laws of armed conflict\u2014a peaceful nation that adheres to international law has nothing to fear from acquiring \u2018offensive\u2019 cyber capabilities. A purely defensive approach cedes the initiative to the opponent and leaves the defender in a reactive posture. No military would choose that.<\/span><\/p>\n

Nor do we need to moan about the horrors of cyber war. People have let their imaginations run away with the consequences of cyber-attack. It\u2019s not a weapon of mass destruction. It can have strategic effect, but that comes from its ability to precisely target crucial systems. Unlike nuclear weapons, cyber-attacks can have strategic effect without mass consequences. <\/span><\/p>\n

Nations are experimenting with how to incorporate cyber capabilities into their military operations as they develop strategy and doctrine. The most advanced militaries are creating specific military cyber warfare entities. The growing military dimension makes cybersecurity an essential subject for discussion and for national strategy development.<\/span><\/p>\n

It may be tempting to select from a menu of clich\u00e9s\u2014genies out of bottles or Pandoran boxes opened, but all are meaningless and result from the overestimation of the effect of cyber-attacks. Perhaps 30 nations are acquiring offensive cyber capabilities; some would say many more, and some of those are in Australia\u2019s neighbourhood\u2014it\u2019s not just China. Eventually, all modern militaries will have offensive cyber capabilities, just as they have acquired jets, helicopters, missiles and, increasingly, UAVs. Nobody likes warfare, but declining to modernise, sticking to the cyber equivalent of horses and swords against airplanes, is a gift to opponents who will be quick to seize upon a careless attitude towards national defence.<\/span><\/p>\n

Such developments have implications for both the public discussion and regional stability. On the first matter, the US position is slowly changing. The US first used offensive cyber operations (albeit primitive) in the second half of the 1990s. For more than a decade, there was no public recognition of this capability. Discussion is still limited, but in the last year or two the US has decided to be<\/span> more open<\/span><\/a> about offensive cyber capabilities. That may seem a bit odd given that PPD-20, the Top-Secret Presidential Directive for military cyber operations, including offensive operations, was<\/span> leaked a few years ago<\/span><\/a> and lives on <\/span>The Guardian<\/span><\/i> website. But the US has made strides in beginning a halting discussion of both capabilities and operations, albeit at a very general level.<\/span><\/p>\n

Such secrecy is unhelpful. A question that outside experts have posed for a decade i<\/span>s<\/span>, if we could have a robust discussion of nuclear strategy and capabilities, <\/span>why<\/span> can\u2019t <\/span>we <\/span>have the same discussion of cyber capabilities? That\u2019s slowly beginning to change but the absence of much information outside of classified channels means that much of the media and academic discussion is simply wrong. One possible reason the Obama administration has begun to slowly peel back secrecy is that it has been reminded of a scene in the film, <\/span>Dr Strangelove,<\/span><\/i> where the American President cautions the Russian ambassador that having a secret weapons capability does little to provide a deterrent or stabilising effect. <\/span><\/p>\n

Secrecy damages stability. It\u2019s better to have an open discussion of military doctrine and strategy\u2014this openness was the intent of the April 2015<\/span> DOD Cyber Strategy<\/span><\/a>(PDF)\u2014than letting others make assumptions about policy and intentions. Transparency builds stability and confidence\u2014that\u2019s the reason confidence-building measures (CBMs) are valuable, and more progress on such measures in the ASEAN region would be helpful. \u00a0Australia\u2019s done a good job of working with other ASEAN nations on CBMs, but the only region with adequate CBMs is Europe. That\u2019s thanks to the work of the Organization for Security and Co-operation in Europe, which includes an exchange of military doctrines among members.<\/span><\/p>\n

Having an offensive capability is nothing to be embarrassed about or keep secret, but it needs to be accompanied by diplomatic initiatives and transparency with voters. We want to normalise cyber capabilities and should treat them like any other military system, rather than as dark secrets from the world of SIGINT.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

An early scene in the 1962 film Lawrence of Arabia shows German planes swooping back and forth to bomb the rebel camp and Prince Feisal, who\u2019s heroically mounted on a white charger, chasing the planes …<\/p>\n","protected":false},"author":521,"featured_media":27008,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,1707],"class_list":["post-27007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-capability"],"acf":[],"yoast_head":"\nThe rationale for offensive cyber capabilities | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The rationale for offensive cyber capabilities | The Strategist\" \/>\n<meta property=\"og:description\" content=\"An early scene in the 1962 film Lawrence of Arabia shows German planes swooping back and forth to bomb the rebel camp and Prince Feisal, who\u2019s heroically mounted on a white charger, chasing the planes ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-07T20:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-06T19:59:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/21382575392_223304551e_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"359\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"James Lewis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"James Lewis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/21382575392_223304551e_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/21382575392_223304551e_z.jpg\",\"width\":640,\"height\":359,\"caption\":\"Image courtesy of Flickr user Christiaan Colen\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/\",\"name\":\"The rationale for offensive cyber capabilities | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/#primaryimage\"},\"datePublished\":\"2016-06-07T20:00:52+00:00\",\"dateModified\":\"2016-06-06T19:59:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0fead7264fff72959b4fb60ee97360af\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The rationale for offensive cyber capabilities\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0fead7264fff72959b4fb60ee97360af\",\"name\":\"James Lewis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/db9538bfc8a8b6262836356228394984?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/db9538bfc8a8b6262836356228394984?s=96&d=mm&r=g\",\"caption\":\"James Lewis\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/james-lewis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The rationale for offensive cyber capabilities | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/","og_locale":"en_US","og_type":"article","og_title":"The rationale for offensive cyber capabilities | The Strategist","og_description":"An early scene in the 1962 film Lawrence of Arabia shows German planes swooping back and forth to bomb the rebel camp and Prince Feisal, who\u2019s heroically mounted on a white charger, chasing the planes ...","og_url":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-06-07T20:00:52+00:00","article_modified_time":"2016-06-06T19:59:19+00:00","og_image":[{"width":640,"height":359,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/21382575392_223304551e_z.jpg","type":"image\/jpeg"}],"author":"James Lewis","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"James Lewis","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/21382575392_223304551e_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/21382575392_223304551e_z.jpg","width":640,"height":359,"caption":"Image courtesy of Flickr user Christiaan Colen"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/","url":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/","name":"The rationale for offensive cyber capabilities | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/#primaryimage"},"datePublished":"2016-06-07T20:00:52+00:00","dateModified":"2016-06-06T19:59:19+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0fead7264fff72959b4fb60ee97360af"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/rationale-offensive-cyber-capabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"The rationale for offensive cyber capabilities"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0fead7264fff72959b4fb60ee97360af","name":"James Lewis","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/db9538bfc8a8b6262836356228394984?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db9538bfc8a8b6262836356228394984?s=96&d=mm&r=g","caption":"James Lewis"},"url":"https:\/\/www.aspistrategist.ru\/author\/james-lewis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27007"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=27007"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27007\/revisions"}],"predecessor-version":[{"id":27009,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27007\/revisions\/27009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/27008"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=27007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=27007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=27007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}