{"id":50356,"date":"2019-09-05T06:00:25","date_gmt":"2019-09-04T20:00:25","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=50356"},"modified":"2019-09-04T17:12:20","modified_gmt":"2019-09-04T07:12:20","slug":"why-the-fifth-domain-is-different","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/","title":{"rendered":"Why the fifth domain is different"},"content":{"rendered":"
<\/figure>\n

Domains of warfare seem to be proliferating rapidly these days. In Thucydides\u2019 time, battles were fought on land and at sea\u2014two domains. The combination of the two multiplied the complexity and confusion: at Syracuse (415\u2013413\u00a0BC), for example, it led to the defeat of the foremost sea power of the day.<\/p>\n

The use of airspace was apparent in its nascent form during the American Civil War (1861\u20131865), when balloons were used for overhead reconnaissance. But it was with the Wright brothers and the aeroplane that the atmosphere became something humanity could really use for transport, logistics and warfare. Air came into its own during World War I as a contestable operational domain.<\/p>\n

And so there were three. More complexity and confusion.<\/p>\n

Then, pushing boundaries, the Soviet Union launched Sputnik on 4 October 1957, and space became the new environment of human conquest. But while competition was high, space is a hard domain for humans to operate in. It remains an environment better suited to machines, and even those can prove fragile, susceptible to the growing density of space junk and the ravages of radiation. Still, the importance of space for military and civilian applications\u2014the use of satellites for imagery and communications, for example\u2014and not only for national prestige or scientific purposes, has led to its being acknowledged as a fourth domain.<\/p>\n

In 2010, The Economist<\/em><\/a> declared that \u2018warfare has entered the fifth domain: cyberspace\u2019. In 2011, the US Defense Department officially incorporated<\/a> the new domain into its planning, doctrine, resourcing and operations; NATO acknowledged cyberspace as an operational domain in 2016. And perhaps because funding is seen to follow domain recognition, there has been some talk in the years since of a sixth domain, whether the electromagnetic spectrum<\/a> itself or, more scarily, the human mind<\/a>.<\/p>\n

But of the five domains now generally accepted as arenas of military operations, one is not like the others.<\/p>\n

Each of the first four domains lies in the natural world. They are material and outside our control\u2014we adapt to them\u2014in a way that\u2019s not true of cyberspace.<\/p>\n

Fundamentally, cyberspace is a human-built domain. It has tenuous links back to the physical world: cables, data centres, the hardware of transistors and physical interfaces. But those, too, have been designed and built by humans. Its complexity differs.<\/p>\n

And it means that rather than continuing to talk about simply operating in<\/em> the fifth domain, we should be thinking about shaping it, and shaping it to our interests.<\/p>\n

So far, articulating the nature of and doctrine for operations in the cyber domain has been hard. That\u2019s not least because much of the underlying physical\u2014and logical\u2014elements are currently, and increasingly, conceived, funded and built by technology companies, not governments, and in foreign nations, reflecting commercial, not national, interests.<\/p>\n

Despite having been drivers of the creation of the internet and facilitators of its use, Western governments have since exited this race. Now, to some degree, formulating cyberspace as an operational domain is an effort to reclaim lost ground. And not recognising the difference intrinsic to this fifth domain inherently limits our ability to understand and manage cyber issues, including in terms of strategic contests.<\/p>\n

So let\u2019s think through what a human-created domain means. We\u2014humans\u2014don\u2019t simply operate in it; we shape it. That has immense implications for how we\u2014the West\u2014think about it in strategic terms. What shape bests suits our interests, and why? Conversely, what shape least suits our interests? And what does war look like in a human-constructed domain?<\/p>\n

In the West, empowering individuals is intrinsic to our culture, politics and economics. We believe that, in the long run, the arc of history moves towards the light. (In the short run, even empowered individuals may need a helping hand.) So Australia broadly favours<\/a> an internet that is open, inclusive and centred on individuals and rejects one that is closed, exclusive and centred on the state.<\/p>\n

Notwithstanding what President Donald Trump is seeking to do on the US southern border, Western societies don\u2019t believe in \u2018walls\u2019.<\/p>\n

Other cultures do. For example, in cyberspace, China has built its Great Firewall as a means of keeping external influence out and of controlling its own population. Just as the Great Wall of China proved irrelevant to modern technology, the Maginot Line was circumvented, and the Berlin Wall fell, so the Great Firewall has also weaknesses and will eventually fail. It is, like other walls, an artefact of human construction. But unlike other walls, it exists in a domain that is itself \u2018constructed\u2019.<\/p>\n

Analogies from \u2018real world\u2019 domains immediately leap to mind. Remember, for example, the Dam Busters in World War II, which applied a carefully devised and targeted strategy for destroying walls. Or the leaky dykes in the Netherlands, where walls are weakened at multiple stress points and so increasingly susceptible to internal pressures.<\/p>\n

In a number of respects, those are the sort of failures that concern us in the West, and quite rightly so. But we do not present the same target set: we haven\u2019t constructed walls around our own societies to suppress and control our own populations. Our weaknesses may lie in treating foreign technology companies as being like foreign coalminers, though the government\u2019s 5G decision suggests it\u2019s not being drawn fully down that line.<\/p>\n

Since the fifth domain is a human construction, we should work to redefine (and redesign) it in terms that we are most comfortable with. To borrow from the film Inception<\/em><\/a>, we should aim to be like Dom Cobb (Leonardo DiCaprio) and his team\u2014who are creators, architects, builders and shapers as well as operators in cyberspace\u2014rather than accepting a reality imposed by others.<\/p>\n","protected":false},"excerpt":{"rendered":"

Domains of warfare seem to be proliferating rapidly these days. In Thucydides\u2019 time, battles were fought on land and at sea\u2014two domains. The combination of the two multiplied the complexity and confusion: at Syracuse (415\u2013413\u00a0BC), …<\/p>\n","protected":false},"author":861,"featured_media":50361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1263,1166,239],"class_list":["post-50356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyberspace","tag-future-of-warfare","tag-warfare"],"acf":[],"yoast_head":"\nWhy the fifth domain is different | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why the fifth domain is different | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Domains of warfare seem to be proliferating rapidly these days. In Thucydides\u2019 time, battles were fought on land and at sea\u2014two domains. The combination of the two multiplied the complexity and confusion: at Syracuse (415\u2013413\u00a0BC), ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-04T20:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-04T07:12:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/20170803raaf8185068_0012-e1567578663447.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"601\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lesley Seebeck\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lesley Seebeck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/20170803raaf8185068_0012-e1567578663447.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/20170803raaf8185068_0012-e1567578663447.jpg\",\"width\":900,\"height\":601,\"caption\":\"Communications Information Specialist, Petty Officer Talei Stoll (left) and Intelligence Officer, Flying Officer Phillip Johnson, discuss Information Assurance procedures within No 462 Squadron located in the Edinburgh Defence Precinct, South Australia. *** Local Caption *** The mission of 462SQN is to protect and defend Air Force's mission critical communications and information systems through Information Assurance (IA) and Defensive Cyber Capabilities. From the strategic to the tactical level, accurate and timely information is a crucial resource for the decision maker. The ADF is committing to an ever-increasing reliance on information communication technology (ICT), where computer and digital communications networks form the core of most military systems. However, the ADF's reliance on ICT produces a new domain of opportunities and vulnerabilities that an adversary can exploit to perform intelligence gathering, reconnaissance, or even disrupt and destroy our mission. Information Assurance encompasses a broad range of measures designed to ensure the Integrity, Availability and Confidentiality of our progressively more critical communication and information systems.\u00a0\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/\",\"name\":\"Why the fifth domain is different | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/#primaryimage\"},\"datePublished\":\"2019-09-04T20:00:25+00:00\",\"dateModified\":\"2019-09-04T07:12:20+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/234257d47cdae20040ac334973efd4d4\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why the fifth domain is different\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/234257d47cdae20040ac334973efd4d4\",\"name\":\"Lesley Seebeck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f091ef55cb0dfe06e4e0cb2511a3fb7b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f091ef55cb0dfe06e4e0cb2511a3fb7b?s=96&d=mm&r=g\",\"caption\":\"Lesley Seebeck\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/lesley-seebeck\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why the fifth domain is different | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/","og_locale":"en_US","og_type":"article","og_title":"Why the fifth domain is different | The Strategist","og_description":"Domains of warfare seem to be proliferating rapidly these days. In Thucydides\u2019 time, battles were fought on land and at sea\u2014two domains. The combination of the two multiplied the complexity and confusion: at Syracuse (415\u2013413\u00a0BC), ...","og_url":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2019-09-04T20:00:25+00:00","article_modified_time":"2019-09-04T07:12:20+00:00","og_image":[{"width":900,"height":601,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/20170803raaf8185068_0012-e1567578663447.jpg","type":"image\/jpeg"}],"author":"Lesley Seebeck","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Lesley Seebeck","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/20170803raaf8185068_0012-e1567578663447.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2019\/09\/20170803raaf8185068_0012-e1567578663447.jpg","width":900,"height":601,"caption":"Communications Information Specialist, Petty Officer Talei Stoll (left) and Intelligence Officer, Flying Officer Phillip Johnson, discuss Information Assurance procedures within No 462 Squadron located in the Edinburgh Defence Precinct, South Australia. *** Local Caption *** The mission of 462SQN is to protect and defend Air Force's mission critical communications and information systems through Information Assurance (IA) and Defensive Cyber Capabilities. From the strategic to the tactical level, accurate and timely information is a crucial resource for the decision maker. The ADF is committing to an ever-increasing reliance on information communication technology (ICT), where computer and digital communications networks form the core of most military systems. However, the ADF's reliance on ICT produces a new domain of opportunities and vulnerabilities that an adversary can exploit to perform intelligence gathering, reconnaissance, or even disrupt and destroy our mission. Information Assurance encompasses a broad range of measures designed to ensure the Integrity, Availability and Confidentiality of our progressively more critical communication and information systems.\u00a0"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/","url":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/","name":"Why the fifth domain is different | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/#primaryimage"},"datePublished":"2019-09-04T20:00:25+00:00","dateModified":"2019-09-04T07:12:20+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/234257d47cdae20040ac334973efd4d4"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/why-the-fifth-domain-is-different\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Why the fifth domain is different"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/234257d47cdae20040ac334973efd4d4","name":"Lesley Seebeck","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f091ef55cb0dfe06e4e0cb2511a3fb7b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f091ef55cb0dfe06e4e0cb2511a3fb7b?s=96&d=mm&r=g","caption":"Lesley Seebeck"},"url":"https:\/\/www.aspistrategist.ru\/author\/lesley-seebeck\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50356"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/861"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=50356"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50356\/revisions"}],"predecessor-version":[{"id":50358,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/50356\/revisions\/50358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/50361"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=50356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=50356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=50356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}