INTL647 American Military Differences between CNA CND and CNE Paper

User Generated

CrgreCvcre1969

Computer Science

INTL647

American Military University

Marian Leerburger

Description

In a minimum of 600 words, address the the differences between Cyber Network Defense, Cyber Network Exploitation and Cyber Network Attack. Additionally, address how the history of the cyber effort and cyber war impact U.S. security and national intelligence.

References:

Demchak, Chris C. Studies in Security and International Affairs: Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security. Athens, GA; The University of Georgia Press, 2011. (Chapter 1).

Intelligence and National Security Alliance (INSA), “Cyber Intelligence: Setting the Landscape For An Emerging Discipline,” INSA (2011).

Masters, Jonathan, “Confronting the Cyber Threat,” Council on Foreign Relations. Accessed at: http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577.

Reveron, Derek S. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, Edited by Derek S. Reverson. Washington, DC: Georgetown University Press, 2012. (Chapter 1).

U.S. Government. Government Accountability Office (GAO). A Briefing for the Subcommittee on Emerging Threats and Capabilities, Committee on Armed Services, House of Representatives (July 29, 2011).

U.S. Government. Government Accountability Office (GAO). High Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation, GAO-18-645T. Washington, DC: U.S. Government Printing Office, July 25, 2018.

Warner, Michael. "Cybersecurity: A Pre-History," Intelligence and National Security 27, No.5 (2012): 781-789.

Zegart, Amy B. “September 11 and the Adaptation Failure of U.S. Intelligence Agencies,” International Security 29, No. 4 (Spring 2005), pp. 78–111.

Unformatted Attachment Preview

CH AP TER O N E Globalization and Spread of Cybered Conflict Copyright © 2011. University of Georgia Press. All rights reserved. C yberspace enables cooperation and conflict in nearly equal measure. In today’s open, near-free, digitally enabled globalization, new and old enemies from unempowered individuals to national-level leaders can use easy access to international systems to engage in conflict, or economics, or both. Barriers to entry have particularly fallen for bad actors seeking to exploit distant populations using cyberspace connections. Each set of actors today at their own chosen scale of organization can reach far, deep, and wide into other nations at little near-term physical cost or physical risk to themselves. At their whim, distant or hidden bad actors can also use cyberspace to add to others’ attacks for whatever reason or impulse. They may choose to opportunistically worsen natural disasters, expanding or redirecting disruptive cascading outcomes that disable key functions of whole societies, communities, or opposing military forces. In this world of global digital access, without great wealth, land, authority, or comrades in arms, opponents can easily attempt to harm in one big attack or many smaller attacks that can cumulate over time to even more destruction in tightly coupled modern systems. The intended victims may not even know their attackers, who can emerge from seemingly nowhere, whether inside or outside national borders. This new international reality creates the complexity of national security today and the need for a book reframing security strategy for modern democracies enmeshed in globally enabled cybered conflicts. The power of a modern state to reduce the harm of obscure unknown attackers lies in its ability to recognize emerging sources of surprise and to disrupt or accommodate them. Conflict between human societies has always been about successfully disrupting the opponent, whether that opponent was a raiding party, an army, a city, or a whole nation, to get some desired out- Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [2] chapter one come. As structured social groups began to desire outcomes that could not be achieved without disrupting other similarly sized opponents, organized conflict emerged as a way to be successful in proportion to the need for disruption. War emerged as a violent conflict between armed organizations, the outcome of which was significant for the successful functioning of opposing societies (O’Connell 1989). Since people get up and get well after being hit and may not stop what they are doing if the object of contest is critical enough, the most readily chosen form of disruption became killing, especially of those who could get up to fight again. Today conflict is more likely to occur in its older, more basic sense: disrupting an opponent to achieve an outcome while ensuring that the opponent cannot succeed in disrupting one’s home social group. The difference between most of human history and today is that open global cyberspace has enabled would-be hidden, distant, or smallscale opponents to attempt societal disruption that historically only close neighbors or superpowers could consider. Harnessed to traditional notions of national security, modern democracies struggle to understand the complex critical systems they constructed for economic prosperity. These now enable nonstate as well as state actors to impose harm across the globe seemingly at will. As currently constructed, cyberspace offers malevolent actors anywhere with internet access three extraordinary advantages in conflict: such actors can easily choose the scale of their organization, the proximity of their targets, and the precision of their attack plans. In other words, initially unknown, distant, or hidden actors in, say, Ghana can use the global web to organize from five to five hundred compatriots, to attack from five to five thousand kilometers away, and to target from five to five million people in one or many democratic nations simultaneously.1 When globally enabled by open, near-free cyberspace, conflict becomes vastly more complex and surprising. Today what has been seen as the power of nations to defend themselves is in transition. The historically and conceptually easiest response to attackers was destruction, but as a strategy, such destruction is difficult, if not impossible, for organized modern democratic nations to exert effectively when those who might get up to fight again hide among 1. If one were to put these attributes in more concrete military operational terms, cyberspace offers an attacking force five characteristics: reach, free fire at will, mass targets, easy stealth, and near instantaneous high-capacity payload. Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [3] innocent civilians across the world under another nation’s rule of law. The modern international system is consensually characterized by an assumption that borders are immutable and that complete annihilation of an entire social group, let alone a country, is not acceptable. Today modern democracies act more like the democratic city-states: even if one wins a destructive war, the winning forces withdraw to let the defeated state recover as an independent country. Destruction does not produce many tangible gains. Furthermore, the first cyberspace-enabled attack may be so successful that even if one could physically destroy the perpetrators after the fact, the violent ripples across key systems in the defending social systems could take years to mitigate, recover, and innovate beyond. Destruction in response may be attempted, but the returns would not in any way compensate for the initial disruptive losses. Under such circumstances, the ability of the defending social group to march armies to the border to stop a neighbor or face down a superpower would be a simply inadequate and tardy strategic response. Today a nation’s “power” rests on its capacities to meet the wide range of cybered conflicts, both disrupting in advance and being resilient to systemic surprise imposed by hidden, distant, and difficult to identify enemies, whether they are state or nonstate actors. This strategic combination of disruption and resilience capacities constitutes the cyber power of a modern democratic state. At its most elemental construction, the modern digitized nation-state must be able to disrupt attackers in advance or during the attack in progress before key systems in the home society are disabled in any significant way. Both capacities—reaching out to disrupt and reaching in to ensure resilience—are critical to national power in a world of cybered conflict. Modern nations can no longer sit behind their borders, treaties, alliances, or militaries. The cybered age taking shape in front of us requires a new framework for national security, one of security resilience.2 Based on a syncretic approach to international theories and to theories of complexity and surprise, such a strategy aims to balance appropriately the national institutional capacities for 2. As of this writing, I can find no other scholarly use of the term security resilience. I note, however, that a document published in advance of the spring election in the United Kingdom comes very close. See “A Resilient Nation: National Security Green Paper,” 2009, http://www.conservatives.com/~/media/Files/Green%20Papers/National_Security_Green_ Paper.ashx?dl=true. Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [4] chapter one disruption of would-be attackers while simultaneously ensuring societal resilience to potentially cascading and disabling surprises in critical national systems. For the modern digitized democracies viewed as today’s large city-states, the global, nearly free, deeply intruding access of cyberspace extends the number, scale, reach, and abilities of potential enemies far beyond history’s usual set of suspects comprising neighbors, roving bandits, and the occasional expanding empire. The nature of “war” moves from societally threatening one-off clashes of violence between close neighbors to a global version of long-term, episodically and catastrophically dangerous, chronic insecurities that involve the whole society. In cybered conflict across a digitally open international system, traditional strategic buffers of distance or declared borders do not stop societally critical attacks. The modern equivalents of ancient city-states face the dilemmas of their predecessors: how to disrupt an attacker that one usually cannot destroy as well as ensure the attack itself does not disrupt the city’s systems critically. Now, as then, society’s security depends on how well the community institutionalizes its security strategy with knowledge, consensus, skills, and design. In the post–Cold War era, national security depends on the dynamic and responsive weighting of disruption and resilience integrated into a strategy for the inevitably long term in a chronic war against each emerging surprise attacker or attack from anywhere in the cybered world. At the end of the day, the central normative concern is with averting violent harm as a consequence of conflict that is critically enabled by cybered tools. Because cyberspace is global, nearly free, and easy to use, the Cold War notions of reaching out to destroy an attacker are too narrow, and resilience needs to be an essential part of disruption. The tools of harm will come from surprising sources, including those previously considered only domestic concerns such as cyber stealing from wealthier westerners. As an occupation, cyber stealing seems not much of a national-level threat, but the global community engaged in this kind of anonymous activity also develops the tools for other bad actors much more focused on violent harm. While democratic nations may seek only to disrupt attackers or their attacks, violent harm is the primus inter pares goal of those hostile to westernized nations. With sufficiently stoked grievances among the surging youth populations of dysfunctional regions, attacks to achieve this violence will inevitably impose surprise in cybered ways for the next generation at least. Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Globalization and Cybered Conflict [5] Copyright © 2011. University of Georgia Press. All rights reserved. E M ERG I N G U N CIVIL C YBERED I N TER N ATI O N A L SYS TE M Before the complexities of globalization began to change the international environment, the strategic borders of rivers, mountains, seas, walls, or armed guards clarified friend from foe. With the emergence of the modern state, nationally threatening enemies did not emanate from both outside and inside the society simultaneously (Tilly 1992). National security missions could be clearly allocated to either domestic or international arenas, specialized and constrained accordingly. In the bipolar Cold War era, that clarity solidified and routinized with only two significant superpower players in global conflicts. Nations singly or allied in blocs were focused on the threats from one or the other major player. Security communities across the westernized world focused on narrow questions such as launch times and counterattack nuclear payload, geographic distances to move through and occupy in rebuffing a military challenge, and peculiarities of a relatively small number of personalities in security-related international or domestic politics (Sagan and Waltz 1995; E. A. Cohen 2004). In many respects due to the clarity of the enemies, the Cold War era’s major security dilemmas were defined more like the set-piece division of threats of western Europe in the 1700s. Institutions grew up focused on either national security threats or domestic concerns regarding social well-being, order, organized criminality, or societal service functions (Strachan 1983). Technologies and the security of the social order of societies are deeply intertwined and interactive. During the 1800s, across Europe’s borders, that era’s modernization waves roiled societies burdened with the excess farm population. By the late 1840s, Europe saw violent uprisings in most of its capitals (Sperber 2005). Similarly, the Cold War’s technological advances and prosperity inconspicuously developed the elements of today’s declining ability to secure borders. Its legacies in globally linked dependencies and small lethal packages of lethal weapons continue to arm enemies or friends, to open or close vulnerabilities, and to stimulate or dampen concerns about security (O’Connell 1989). Individuals, groups, or communities recognizing threats inevitably find ways to use new technologies in their security strategy, even if the solution is a new type of boat by which to run away or a long hunting bow redirected to attack other humans. The cybered world has challenged the broad but neat internal and external distinctions of security cemented in the bipolar era. Modern actors have Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [6] chapter one discovered how to integrate the exceptionally fast and readily available global communications networks in their plans for conflict. Widely connected, unconstrained, and easily accessed global systems routinely undermine three historically critical dampeners on hostilities—long geographical distances, difficulties in organizing and controlling large enough groups of people, and poor knowledge of the target—in order to be sure to attack effectively. Attacks in history, by contrast, were more likely to be local or littoral, where at least knowledge of the target was easier to obtain. Attack organizations were likely to be small and local or very large and controlled by a state-level equivalent leader or oligarchy. Operations were either raids or campaigns big enough to survive the multitude of surprises from what was unknown, unorganized, or too far to reach (O’Connell 1989). These obstacles historically constrained conflict to being local or between state-level entities. When globalized communications relax the three dampeners on scale, proximity, and precision, offense at a distance is made easier for those with more-limited resources. A digitized community like a modern nation-state is especially more vulnerable to new attackers from distant poorer and semigoverned rogue states, failing cities, or turbulent hinterlands. The advanced civil societies are deeply embedded in global nets. In contrast, the homelands of the potential new attackers may be internally violent, corrupt, or exploitative, but they are also markedly less digitized. The societies of the dysfunctional regions of the world are less easy or productive cyber targets. The result is a marked divide in security concerns now emerging between two broad communities of the globally cybered world that do not share the same expectations in acceptable individual and collective behaviors, civil governance, normal societal security, and mechanisms of resource allocations. Including not only the westernized nations but also rapidly developing democracies such as India, the first group acts collectively and individually more like history’s city-states. While competing strongly economically, they do not engage in violent existential conflict with each other.3 They share a roughly convergent collective notion of security, which includes stability, rule of law, honesty, transparency, and importantly, a strong dislike for violent behavior, whether by individuals or states. In contrast, the other group of semigovernable 3. It is possible that the U.S.-China relationship could emerge more violently as the conflict between two large city-states contesting regional dominance. The likelihood is low, but higher than any chance of such conflict between other westernized nations. Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [7] regions, societies, or darker areas of cyberspace are frequently demographically unstable, politically barely coherent, and poorly productive economically. Collectively termed the “badlands” merely as a shorthand in this book, these areas tend to be internally corrupt, secretive, brutal, and accepting of higher levels of violent behavior as normal though regrettable. This group acts often as a spoiler both in its own internal operations and in the wider international system, becoming a source of global turbulence and of a large volume of mobile bad actors sharing few of the social constraints of the more-digitized nations. Between the two groups, huge digitally enabled flows of information, people, goods, and resources transfer enormous economic benefits but also misperceptions, weapons, targeting data, and reasons for hostility and resentment. There are large demographic and wealth imbalances between the two groups, and not yet fully understood are possibilities for waves of social turbulence likely to come in the not far future. The 2011 upheavals in Egypt and Tunisia are likely to be foretastes of future instabilities from these more-dysfunctional areas. Too many young males in unstable, semigoverned developing societies perceive little hope for a better life. Global transport systems and cyberspace give these likely aggrieved young populations unprecedented access physically or digitally to the more organized, open, wealthy, civil centers of the world. For example, key experts on global radical Islam have argued its newest expression, the leaderless cell jihad often led by career jihadists in and out of prison and orchestrated by cybered methods, will be around at a minimum for the next twenty years (Pluchinsky 2008). The widespread availability of cyberspace makes it all too possible in densely populated poorer areas to “farm” deprivation or cultural aversion grievances, whether led by a local group, a national leader, or the cadre of an international cult or movement. Because of the low costs of reaching large numbers of people online, appeals that would have died out in prior generations today survive and sometimes even revive. Through the graphics and availability of the global communications networks, an organizer can deliberately stoke hate or misperceptions and educate across a wider audience about how to perpetrate attacks in, through, or merely enabled by cyberspace. Small, otherwise forgettable data can be retained for access and endless reuse and distortion globally. For example, the worldwide neo-Nazi movement was small and isolated when communication could only travel to would-be recruits through mailed pamphlets or wandering promoters. The spread of global networks even in the 1990s allowed promoters located in places like Canada to reach easily and of- Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [8] chapter one ten into the rooms of unhappy, lower-class teenagers in former East Germany or other Eastern European states, producing a boom in supporters by the end of the 1990s (Rochlin 1997). In the unfettered netted world, global communities of hate acting malevolently are as likely as those of free will and tolerance expanding civility (Rochlin 1997). In 2010 a talk by an American agricultural official was recorded, and several sentences selectively edited were widely replayed and discussed to show that the speaker, an African American, was against Caucasian people. In fact, she had helped the Caucasian farmer she was discussing, but that portion was not included in the widespread distribution of the misleading quotes. The result for the official was not only losing her job, at least temporarily, but also being the target of death threats left on her home phone and sent by email. The difference from even twenty years prior is that all this happened within thirty-six hours of the initial malicious online blog posting (cnn staff 2010). The evolving surprises from digitally enabled global exchanges challenge the deeply buried assumptions of security in the modern civil societies. Until recently, many nations did not have laws against malicious hackers as the attacks did not seem at first to obviously clash with the social presumptions, legal entitlements, economic distributions, and strategic outlook of the digitized nations. Cyber criminals, however, now routinely develop tools that delve deeply and covertly into public, commercial, and private networks. Not only are these tools for sale to anyone, including other bad actors, but also in many nations buying and using the tools that operated thousands of infected computer networks still remains legal. For example, when the operators of the largest networks of infected computers worldwide were finally caught in Spain, prosecution by law was not possible. That form of attack was not illegal in Spain (Krebs 2010). With the perfect storm of coalescing events and credulous actors, today inchoate panicky feelings fed by imagery and catalyzing symbolic language on trusted websites or phone text messages can in any society rapidly migrate to physical threats and ultimately to organized attacks (Calhoun 1989). In the tumult, the topology and conflict pathways of the international system are changing as well. Domesticating International System Led by Modern “City-States” Today the international system is rapidly “domesticating” in major regions. Among the modern, digitized, democratic nations, the world system is increas- Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [9] ingly in large part cooperatively transnational in its internal coupling, dependencies, and conflicts. Policies and players accommodate each other across borders of modern democratic nations and share increasingly similar expectations about life, education, income stability, health, government services, and safety. As networked offices and homes pull individuals and groups in the westernized world recognizably closer to each other, the large populations exist in distinct legal systems, but economic, military, and cognitive distances between them are shortening dramatically. The otherwise sovereign modern westernized and democratic nations in particular are exceptionally unlikely to engage in threatening postures and preparations to fight each other. Despite the history of the twentieth century, one cannot today imagine a Germany attacking any westernized nation for any reason. Equally hard is to conceive of the circumstance under which any part of the former Western Europe erupts in violent conflict with any part of North America. For these nations, violence across a national border is more likely to come from outside their communities, from the interpenetrating dysfunctional areas. While the emergent dysfunctional areas of the world express a “new medievalism” suggested by several international relations scholars, among the modernized, more-digitized nations of the world, the old world of state-against-state war as the only dominant and critical form of conflict no longer exists (Booth 1991).4 The topology of the international system is evolving in response to these ideologically and economically similar nations acting like city-states within a larger confederation. They create international regimes, norms, and standards and largely observe their own collectively determined rules. Their economic, political, and cognitive world increasingly involves densely integrated, consensually controlled, and cooperative regional structures and similarly managed large transnational institutions. In particular, these modern city-states manifest a near universal dislike for conquest or externally imposed violence threatening a nation’s internationally recognized borders. In the post–World War II decades, states recognized by the United Nations, no matter how dysfunctional, may face subversion, long-range missiles, and economic tragedies, but generally not conquerors. This injunction against cross-border land grabs has been strongly defended 4. “The Middle Ages were characterized by a highly fragmented and decentralized network of sociopolitical relationships, held together by the competing universalistic claims of the Empire and the Church” (Friedrichs 2001, 475). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [10] chapter one by developed city-states and underdeveloped nations alike. In a truly anarchic world of states, the nations with the largest nuclear missile inventories would be considered potential territorial security threats. Yet neither France nor the United Kingdom is so considered by the United States. Even fig-leaf, internally imposed coups in Eastern Europe orchestrated at the onset of the Cold War by the former Soviet Union preserved the illusion of national independent sovereignty. Rigged elections enabling Soviet-controlled local communists to take over a satellite nation were the only way the former Soviet Union could expand its imperial reach and yet claim modern legitimacy as a state in the international community. Even when city-states seem to have empires, they differ markedly in control, scale, and purpose from the empires based on territorial gain. As typified by the Italian Renaissance commercial city-states, territorial domination by a city was for the purpose of obtaining raw materials, usually from the surrounding agricultural region or fishing areas (Holmes 1988). Generally such cities attempted to exert physical control only over the surrounding region to ensure a supply of raw materials and often foodstuffs. Even a city-state-based “empire” was rarely considered a major violent threat. The ancient Athenian “empire” was more of a loose network of scattered cities. Many of these cities were established purely for the purposes of sustaining the flow of raw goods into Athens and to provide an outlet for poorer citizens to leave the overcrowded capital city (Freeman 2000). Even in the ancient world, a war that led accidentally to conquest would also see the subsequent devolution of the new property to proxy owners, or sometimes later the original owners, as the Spartans did for Athens in 404 bce (Martin 1996, 160). City-states historically do not challenge territorial borders, and the international community of modern states today often does not act even when faced with horrifically and brutally failing states, piously honoring de jure borders that are de facto not functioning. One could reasonably argue that this presumed “fixity” of borders acts to the detriment of the communities involved, and yet the norm of inviolability is widely observed (Krasner 1999). City-states tend to have limited horizons, with stability in their environment as a very high priority. Today it is reasonable to argue that Rwanda controls much of eastern Congo. Yet there is exceptionally limited academic and nearly no international political support for redrawing the outdated and useless borders drawn during Africa’s colonial period (Krasner 2004). Furthermore, while states may maintain clear borders on maps, and occa- Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [11] sionally close them completely, city-states strongly support sieved boundaries intentionally kept open to ensure the flow of commerce. If walls are too strong, they inhibit economically sustaining trade. Today’s westernized states are not self-sufficient for the level of economic prosperity they enjoy, and their borders are increasingly porous, electronically and physically. Globalization’s historically unprecedented international flows of critical goods, capital, information, and people have sweetened the gains to be made by widespread porosity in state borders, along with obscuring the rise in threats from bad actors entering with the normal flows. Just how intertwined and interdependent major states have become was recently reflected in the lead paint and tainted toothpaste scandals associated with imports from China. Although it seemed objectively clear that Chinese imports were not being scrutinized either on their way out of China or on their way into the United States, no effort was made on the part of the harmed state, the United States, to punish China. Rather, Chinese leverage over major U.S. corporations forced corporate leaders to ascribe poor Chinese workmanship to themselves in order to maintain the lucrative trading arrangements. An exceptional culturally distinct public apology on the part of the American corporate leaders was demanded and given for the shame China felt at the revelations of these flawed goods (Story 2007). Most Western observers found the practice simply curious and even farcical. That American corporate leaders would, in effect, debase themselves and lie publicly for a contract is an indication of the new relationships among globally interdependent trading entities. States in anarchic and largely autarkic systems do not have to put up with such insults, but city-states are largely too dependent on the surrounding system and trade flows to engage in insults or hostilities in response.5 In an emerging world of city-states and interpenetrating dysfunctional areas, the civil commerce-oriented societies fall into the categories of friendly, neutral, or merely unreliable trading partners, rather than enemies. Even when a state qua city-state actually has the capability of harming another state’s homeland, seldom will the situation be addressed as realists would predict—as a fight to obliterate a potential enemy with threatening capacities. Historically 5. It is worth noting that after being traumatized by the excesses of the Vietnam War abroad and at home, the philosopher Bertrand Russell said that his view of the coming centuries was of squabbling city-states with implications for governance, war, and peace (Russell and Russell 1996). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [12] chapter one city-state conflicts reflected this disinterest in decisively physical competition. In the two periods best known for their independent city-states with rudimentary democratic participation, ancient Greece and fifteenth-century Italy, cities did “war” with each other in complex and shifting alliances (Lebow and Kelly 2001). But in both eras, without the intervention of external powers (Persia in Greece and the pope in Italy), the city-states over time and through productive trade became simply too evenly matched in wealth, luck, or cultural aversion to carry through a conquest (Manicas 1982; Holmes 1988). Wars among the city-states, such as they were, dragged on at a low level, creating not just war weariness in the respective citizens but also disinterest and acceptance of low-level warfare as a chronic fact of life (Connor 1988). Sparta’s attempt to dominate Greece, especially Athens, went on for forty years in an almost random pattern of sudden Spartan probing attacks on one city or another. Usually the attack was heralded by spies. Next, neighboring cities banded together with Athens to repulse the Spartan marauders, and then the alliance would dissolve (Robinson 2001). In the later era in Italy, many of the wars between the city-states were really long-term feuds between merchant houses. The “war” would fizzle out once one of the central figures died or a cross-merchant house marriage with attendant inheritances would bring the warring sides together (Holmes 1988). Today, similar feuds result in massive hostile takeovers and strategic divorces across continents, but not war. The competition for resources and access among these westernized nations qua massive city-states is ruthless, opportunistic, and even sometimes insulting, but not likely to be violent. Indeed, under the right circumstances, quite sensitive internal data such as financial records will be shared among neighboring states as if all the nations involved belonged to the same overarching confederation (EurActive Network 2010). This “domestication” of the international political system and the subsequent change in violent threat patterns contributes to confusion in lessons drawn from the literature on the phenomenon of democratic peace (Starr 1992). Democracy is much more a product, than a producer, of civility. An evolution into large entities with city-state features means the pursuit of civil competitive behaviors due more to recognition of the loss of autarky than the rudimentary practices of a democracy (Ember, Ember, and Russett 1992; Russett and Antholis 1992). Rational state-level decision makers cannot afford to be at odds with sister city-states providing essential goods and services. Furthermore the data is murky on which state is or is not really a democracy. Of- Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [13] ten, especially recently, the label is applied simply when suffrage is universal, and ostensibly free elections are routinely held. Many new, and some older, democracies are hardly sterling representatives of the other civility-inducing aspects often found in thriving trading cities—a rule of law (even if privately enforced) and reliable stability in monetarized means of exchange.6 Rather, the slow transformation of the international community into city-like entities does not require democracy pur to make interstate relations more civil. For example, Singapore’s adept rise in economic status and stability was certainly not due to democratic principles; however, the societal stability and civility have at the end produced democracy (Chua 1997). In the anarchic system, autarkic states may not have to explicitly recognize their sustaining dependencies, but to survive, city-states must. Their national security policies and institutions ignore this recognition only at their peril (Ember, Ember, and Russett 1992; Held 1992).7 Not recognizing the rise of the city-state community and, importantly, its critical underlying financial linkages has already proven costly in recent years. To the stated astonishment of financial experts across the westernized modern world, the 2008 U.S. domestic mortgage industry meltdown rippled destructively through otherwise unnoticed tightly coupled connections critically enabling the wealth of the international financial system. In a domesticating international system, citystate political leaders should never have been surprised to find their individual societal control of policy outcomes migrate out of previously recognized and expected future paths. 6. Elections do not make a democracy. Educated citizens, tolerance for differences in opinion, lifestyle, and economic advantage, and reasonable expectations of mutuality in respect, civil rights, and access to resources embedded in functioning social systems make a democracy. Unfortunately modern American politicians and many good-hearted internationalists do not understand that distinction between the resulting democracy and this list of prerequisites. The framers of the American Constitution did. See the Federalist Papers by Madison for a good example of this clear insight. These documents are widely available online, e.g., http://www.foundingfathers.info/federalistpapers. Many in westernized democracies take for granted that evidence of a functioning democracy is simply having some electoral choice, but many dictators make sure they are elected, at least once. Hitler and Mussolini were both dictators, and both were elected originally in putatively democratic elections. 7. It is worth mentioning that massive, failed cities such as Lagos, Nigeria, can by their scale and dysfunction put their nation in the group of the world’s dysfunctional states rather than in the community of city-states (Gandy 2006). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. [14] chapter one Copyright © 2011. University of Georgia Press. All rights reserved. Deeper Security Surprises Surprise is a hallmark of the emerging globally connected world, especially in its security challenges to modern digitized democracies. With a globally networked world, physical proximity no longer constrains the dysfunctional behaviors of a geographically distant “badlands” as it once did, making modern notions of the highly restricted, externally focused roles of militaries or security forces difficult to apply. Enemies of concern for national security are rapidly changing their frequency, reach, and even form of threat. With exceptionally fewer state-level possible enemies, the bulk of rising national security threats are often diffuse, opportunistic, chronic, semicovert (“gray”), and globally surprising organizations hiding in nations whose leaders may or may not have the ability to control undesirable activities. Unlike the traditional threats of peer states for which most national security forces today have been designed and socialized, the bad actors emerging in droves in dysfunctional areas do not have—nor need—established weaponsystem inventories and ambitions to create a nation with a border. With a cybered world, transnational organizations are emerging as the normal form of a nonstate actor that could pose harm to distant enemies. These organizations do not stay solely in one nation; they also have less need to concentrate resources in any given place. They are in an open cybered world “ungrounded” and much less trackable by anyone’s security services. These organizational threats do not need to sustain ties to a home society for resource and psychological support as Italian Mafia historically needed. Rather, they need to learn how or to hire those who know how to use a mass array of high-volume, usually privately owned, long-distance undersea cables linking continents in order to challenge traditional geographical notions of national power and interests (Wriston 1992). Unlike most social and technical systems known to human history, the global cyberspace cannot be easily observed from the outside, and therefore it cannot be easily monitored for threats as it expands. Unless one “enters” cyberspace, one cannot “see” into it physically. Connecting to the global networks means both opening a door out into the rest of the connected world and a window into one’s own part of it. For security services, the world’s interconnected networks present a two-edged sword that is particularly challenging. Like trading city-states, one cannot close the borders and still receive any of its benefits. Hence, cyberspace is both freeing and threatening for the structures of society. Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [15] This dual-use nature of the increasingly ubiquitous digital connectivity is what makes this topic so difficult to sort out. To make a violent attack beyond mere cyber vandalism against websites, attackers can use online access to coordinate a more traditional attack of, say, suicide bombers on airlines. They can also operate through the myriad of international networks to transmit an attack on something at a node, say denying the services of a critical system, ideally simultaneously in multiple locations such as water control systems. Or they could attack the World Wide Web directly, disconnecting key areas of the digital infrastructure of society itself. Of the three options, the second is likely to be the most successful and violent. The first involves the movement of humans or goods that use cyberspace as a coordinating mechanism. But it is hampered by logistics. Humans are more inconvenient, traceable, and slower to move around than internet commands. Traditional and newly developed defensive mechanisms are more attuned to stopping human-borne threats. The third option—destroying the international networks in key places—is hampered deliberately by the design of the multiple nodes and packets of cyberspace’s underlying networks. The system was set up in the 1960s. Even the loss of a major internet cable, as happened to Iran in 2008, only slows internet communication to a crawl, rather than shutting it off completely (Hafner 1999; Forte and Power 2008). To pursue the second option, using cyberspace itself as a weapon for major violent effects, generally involves making “internetted” systems critical to the society act badly or stop functioning completely. In this case, the attacker or group steals access to and then takes control of critical applications in the targeted facility or on the central command server of a wider network. An example would be bypassing the physically difficult direct hijacking of airliners and going for covertly hacking into air traffic controls. One might deceive the controllers’ computers into reporting false airliner locations and then insert fixes that cause mass collisions simultaneously across an array of airports.8 While the air traffic control scenario is already being made extraordinarily difficult today in the Western world, the same cannot be said for many other critical digitally connected societal services around the world. The Stuxnet worm that successfully attacked the nuclear reactors of Iran in 2010 would be an example of this second kind of attack. The malicious software successfully 8. For the nervous reader, I use this example because of how hard this would be to do (Lemos 2002). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [16] chapter one disabled huge centrifuges and stalled the significant nuclear projects of a nation (Sanger 2010). Attackers can always rely on human inattentiveness as well as faulty, buggy, or older technology. They spend days and months searching for obscure entrance tunnels often overlooked by users and designers amid the vast array of electronically interconnected computers and applications. When attackers finally find the hole and enter the system, the options for violence expand greatly. A malicious actor can order the local server, computer, or even single application to vandalize itself or others connected to it. This bad actor can also order the violated local computer to spy on the host human, group, or other computers and gather information useful later for violent attacks. Or the local computer can be ordered to hide a program and wait for a signal to do something to destroy itself or others connected to it (O’Brien 2003). The national security threat for society is that these exploited backdoors lead to one’s home computer and also to the computers managing massive regional or national electrical systems running elevators, street lights, water plants, and air traffic systems, sometimes at the same time (Knapp and Boulton 2007). No service or firm or home that is more efficiently and effectively run with networked systems is immune. The infrastructure pathways include the electronic brains of packed subway systems and hurtling commuter trains, not to mention the isolation of hazardous material in oil-to-gasoline production plants and the control of toxic chlorine in municipal water filtration and cleaning systems. The sudden dysfunction of any of these major underlying systems in a wide enough simultaneous attack and the difficulty of immediately replacing them would be akin to the destruction of infrastructure witnessed in the devastation of New Orleans in 2006 after a hurricane or northern Japan in 2011 after the tsunami. The difference is that an attack conducted via cyberspace could involve ten major cities at once and the attackers could adapt and return again and again. If enough cities are hit at once, the limited emergency resources designed for single major failures are likely to be spread too thin or simply be inadequate. For example, a massive unexpected and unusual windstorm in Western Europe during the winter of 2007–8 affected electricity users from Germany to the Ukraine. The effects included the nearly complete stoppage of both trains in Germany and trans-Europe oil-pumping stations (Associated Press 2007). An attack on the central hubs of Europe’s disparate electricity transmission network could achieve the same effect, and even worse than very obvious Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [17] windstorms, malicious code could be sent from thousands of computers held by unwitting owners, making it hard to stop the attack in its tracks. The rub is that city-states need openness for commerce and wealth, and this need is readily exploited by semicovert or “gray” organizations operating through, around, and in spite of recognized governments.9 From behind staunchly internationally maintained state borders, these actors can impose violence at great distance and unpredictably because of the easy access to democratic city-state systems afforded to all other states as a matter of international state-state reciprocity. As the international mafia organizations have demonstrated for decades, it is useful for badland threats to maintain dual identities. Not only are these gray organizations emerging on a scale historically never possible, but they pose a particularly pernicious form of threat equally unprecedented for the national security of these city-states. Not only can anyone open up a website today for the entire world to see, but that site can be laden with hidden tools, messages, instructions, and bad intentions for anyone who visits the site and whose computer may then become a tool for an attack. The modern city-state attackers, whether state or nonstate or a combination, easily hide in the volume and complexity of the open access routes offered to all overtly legal transnational organizations and exchanges. Furthermore, the city-state defenders must deal with the rise of a different kind of threat beyond that posed by transborder subnational groups: the “false front state.” Much of the theory of international conflict assumes the survival of the state is recognized as necessary by its political leaders whose gains cannot be realized elsewhere. While early postcolonial authoritarians could, and did, create Swiss bank accounts for themselves, they generally tried to keep 9. The use of the term gray to mean “semi-covert” has both intelligence and information sciences provenances. The common understanding is of a class of phenomena neither white (friendly) or black (enemy) in the intelligence field, or neither explicit (published, tagged, and searchable) or implicit/tacit (unpublished, uncatalogued, and untraceable with normal means) in the information sciences field (Correia and de Castro Neto 2002; Jeffery 2000). Gray is a more useful term than the recent use of dark, as in the “dark web” (Chen, Wang, and Zeng 2004) or “dark networks” (Milward and Raab 2002), because of the colloquial connotation with gray as “something in-between.” One might even think of gray organizations as “dual use” in much the same way as technologies are suspected of being usable for both good and ill purposes. In a globalizing world with much greater reach from ill uses, dual-use technologies have caused no end of trouble and confusion in arms negotiations (Stowsky 2004). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [18] chapter one some measure of state integrity and health in order to keep reaping wealth and personal reputation. Today, leaders of a low-capacity near failing “state” with digital links to the resources of the westernized city-states can more easily act against their citizens’ and their neighbors’ security in ways difficult to challenge from a state accepted into the international system as a normal state. In the freewheeling finances of a cybered world, corruption in semigoverned states rises in importance internationally. In a financially and operationally linked cybered world, the corrupt actors no longer merely enrich themselves in the home nation, but they can operate through the otherwise legal mechanisms of state functions to globally hide their bad behaviors in the legal financial systems of other nations. It has been a long while since any serious scholar believed corruption in developing nations in a cybered world naturally greased the nascent mechanisms of fledgling market economies.10 However, today corruption can have national security implications far from the failing state. Criminals, states acting by proxy, and transnational bad actors of all flavors can bribe, fool, and coerce national-level officials in a failing state into creating the necessary legal covers for the bad actors to gain entry into critical systems, financial or otherwise, of the westernized nations. City-states’ security can be undermined by these corrupted states of convenience whose rights to free passage across the cybered world are unquestioned internationally. These false front states now more easily act in ways inimical to the security of the state and their citizens, as well as to the stability across the wider international community of states. They can vote in the un, act militarily, change markets, and deceive on a global scale with rippling consequences elsewhere (Thachuk 2005). The tiny Pacific island of Tuvalu, for example, has been a major contributor to spam and cybercrime internationally due to its easily acquired and ungoverned sale of the .tv domain name (Kenny 2007). While essential for city-state prosperity, the globe’s digital capital-flow virtual highways easily enable false front states. Developing nations especially with large, ungovernable, territorial swathes easily contribute to the ranks of the world’s badlands. For example, a drug lord in ungoverned Thai jungles can more easily establish and monitor a Swiss bank account, laundering funds as well as purchasing digitally the weapons he needs to control and murder. To 10. Nye (1967) argues that corruption as private vice can be positive under some conditions and has probably helped both the U.S. and Russian economies in the past. Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [19] the varying likelihoods, these semigoverned nation-states are more likely to host the bad actors seeking to impose a new deleterious surprise on a democracy. Such gray organizations are all the more perplexing to decipher because the visible perpetrators—the state-level leaders—appear to be committing an entirely modern form of long-term economic starvation. The capital flows are so massive and rapid that state coffers can be irreparably emptied to obscured foreign banks without much record in minutes, while the whole transaction is protected by the originating or receiving state’s laws on privacy. National economic suicide would have been irrational in previous eras where the corrupt leaders normally had to keep their corruption winnings in the home society to buy off compatriots and keep the flow coming. Certainly the role of the emerging cybered world in encouraging such distortions is difficult for Western states to reconcile and question. There is limited international interest in directly challenging the presumption of statehood expressed in the un charter, irrespective of the cost to the lives and prosperity of the citizens in one of these corrupted states. In the cybered international environment of democratic modern city-states and the highly varied turbulent regions, security challenges from a cybered world inevitably involve large amounts of surprise, whether from states, nonstate actors, or some new form of attack. Historically successful city-states had an instinctively developed two-part strategy. First, if they recognized a threat, they tried to disrupt the attackers in the surrounding land or sea narrows before the offensive forces could get to the city gates. But they also knew by experience that their city needed to be able to withstand a siege if the external disruption plan did not succeed. Not only was uncertainty recognized; for those market city-states that survived, surprise clearly needed to be accommodated in advance. Furthermore, the strategy had to recognize the cognitive disabling effects of surprise as well as the concrete disruption possibilities. Pericles, for example, recognized that puzzlement and shock often allow a cascade of negative effects to avalanche into a catastrophe (La Porte 1996). Having patterns that repeat reliably in a complex system matters to human daily functioning because humans have a cognitive need for stability in expectations. They will accept extraordinarily negative circumstances only if the events are predictable in form or frequency. Pericles practiced the evacuation to the city walls by farmers when his spies indicated a coming Spartan attack, as well as storing supplies for a number of months in order to make it automatic (E. E. Cohen Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [20] chapter one 1992). The citizens practicing a solution to surprise is a strategic asset that reduces the sense of extreme mystification at an event that can be paralyzing and often delays appropriate action (Casti 1994). In the security challenges posed by a world of city-states vulnerable to cyber-enabled attacks from dysfunctional regions, the more tightly coupled the critical structures are within the targeted society, the more likely are accurate mitigating responses by that society to be delayed. For example, a traditionally purely domestic structure—the marginal home-loan market—imploded in the United States in mid-2008. International onlookers were markedly transfixed in surprise. The spreading effects of a lack of confidence in banks ground the world’s credit markets to a crawl and even a halt in many states. Not only was the connectivity up to then unnoticed, but so was the potential speed at which the cascading effects forced closures of large banks across westernized digital nations. What took nine months to several years in 1929 looked well into happening within a week in the digitally interdependent cybered world of 2008 (Fortson 2007). In the cooperative city-states’ and dysfunctional badlands’ emergent topology of the global international system, most frameworks for national security response in the modern states have not appropriately adapted to the strategic imperatives of cybered conflict. Hindering this reconsideration of security is a dominant view across the westernized world’s security communities of a world of independent and well-governed nation-states with defined territories and clear distinctions between domestic and international functions. In this world, leaders face largely separated decisions across domains of foreign policy, domestic needs, and internal versus external security responsibilities. The prevalent models of international relations reinforce this neatly parsed worldview, generally making recommendations for strategy narrowly pitched at the decisions made by leaders in parameters distinguishable between peace or war, between domestic and foreign events, and between military and police missions. Much depends on the assumptions of strategic buffers such as time and distance to give policymakers the space to make decisions. Only in the nuclear era were these presumptions questioned. The solutions, however, involved mainly only two major superpowers, not any number of actors from small groups to whole regions. The traditional approaches help little in guiding responses to constant but episodic, cascading surprises emerging from the complexities of human perceptions across a globe and the vast array of underlying connections across Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [21] social systems. For example, while touting the real and theoretical economic benefits of free trade and the spread of unfettered globalization, Western economic models during the last forty years routinely left out any discussion of the social externalities now proving to be crucial to security. Searching the globe to set up widely dispersed corporate profit centers can spread ideas and infrastructure, but also resentment among displaced elites, workers, or communities. A real world example is the globalized breakdown of the international financial system in 2008. It began as a purely domestic crisis in the United States. Yet it spread in a rapid cascade to harm the economies of many nations seemingly unconnected to the United States and its mortgage-backed securities, astounding Western economists, financial advisors, and political leaders alike. The underlying global financial system had grown up under the myriad of linking and relinking decisions of thousands of profit-seeking independent actors. The complexity was used for profit margins, and the risks were not perceived. Societal turbulence and breakdown so apparent on the ground are never seen in macro or international economic theories, any more than buried deep domestic dependencies in critical global systems are discussed in traditional expressions of international relations. The legacy narrowness of such models individually inaccurately guides policymakers in today’s world of sieved borders and chronic violent threats from distant actors with cheap cybered access operating from politically dysfunctional areas. Today policymakers need to see national security more comprehensively. The well-established cognitive and institutional distinctions between national security assets and domestic police forces will give comparative advantage to cyber-enabled attackers anywhere cyberspace reaches in the world. Furthermore future integrated cybered conflicts are likely to emerge outside of war as well as during active hostilities and to involve many more actors than the main combatants. A key characteristic of global cybered conflict is the ease with which others uninvolved in the conflict can “pile on” and attack either or both sides at whim. The clearly emerging relatedness of many multilevel violent threats can no longer be bureaucratically parsed between domestic police forces with limited knowledge while cross-national computer assaults are left to specialized outward-looking national security forces focused on “wartime.” For the political or military leader in these city-states, the task of ensuring national security is made more difficult when no one theoretical approach offers sufficient guidance for the globalizing cross-domain, -scale, and Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [22] chapter one -border chronic, endemic, serious violent national threats (Hasenclever, Mayer, and Rittberger 1996). The three major schools of international relations (realism, liberal institutionalism, and constructivism) emerged as recognizable fields during the past half century within the generally accepted framework of a world system of nation-states as the main threat actors and the relations between them as the major venue for violence. Not only is each school unable to uniquely address the foreign challenges, but all three approaches are uncomfortable with the domestic side of national security save as a venue for the study of national security decision makers. With the advent of modern networked digital data, however, new threats reach across the previously acceptable international-domestic divide. It is a tall order for both scholars and political leaders (Betts 2007). If physical destruction of a potential mass casualty threat is not possible, acceptable, or effective, leaders of democracies facing a world of chronic violent gray threats need broad integrated strategic theories to give them other options. Cronin argues the national responses must be both flexible and particularly multifaceted in their exploitation of globalization in order to meet global terrorism as it emerges (Cronin 2002–3). A city-state’s national security frameworks and institutions must handle both the enemies and the effects before, during, and after an attack precisely because of bad actor access to the ever more tightly linked critical processes within and among these massive citystates, for even a relatively moderate violent attack produces rippling nasty surprises. Increasingly the formerly separate domains of international relations, economic globalization, and domestic issues are interrelated or “multicausal,” and so are the threat profiles (Legro 2005). The prescriptions of the three main approaches of international relations as they are promoted today, however, are not. Each approach—realism, liberal institutionalism, and constructivism— is individually too narrow for the kind of actionable guidance needed today for such complex interrelatedness. Chapter 2 addresses these difficulties, and chapter 3 offers the security resilience strategy in response. CH A L L EN GE TO I N TER N ATIO N A L REL ATI O NS T H EO RY Complex puzzles need collective wisdom for resolution. Security with chronic, violent, semipredictable threats requires an array of tools drawn from experience and logic of deliberate violence at all levels of human behavior. Particu- Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Globalization and Cybered Conflict [23] larly needed are ways to unify the contributions of the three existing main theories of conflict to make them, in sum, flexible as well as multifaceted. Today the collaborative need for collective knowledge is well known and acknowledged in governments and corporate executive offices. “Countering the spread of the jihadist movement will require coordinated multilateral efforts that go well beyond operations to capture or kill terrorist leaders” (National Intelligence Estimate 2006). A number of scholars of international relations (ir) have offered a synthesis across elements taken from two or more of the main ir approaches.11 Unfortunately none of these proposals seemed to have flourished and dominated across the three main schools of ir in the United States as the remaining superpower. Perhaps it is because the proposing scholars are prone to reductionism, slicing off preferred aspects of each established approach but leaving too much aside that is emergent today. All three approaches have individual limitations as theory applicable to the emerging world of cybered conflict today. Copyright © 2011. University of Georgia Press. All rights reserved. Realism, Neo- or Otherwise First, the dominant approach to international relations in the United States, realism, is closely associated with the use of force (power) to solve a state’s security dilemmas arising from an anarchic world. This notion that ultimately security is based on the state’s use of coercion against otherwise unfettered threats in an anarchic international system permeates the vast literature sustaining the school’s long rise from the 1930s onward.12 In practice, this major explanation of war and security policies reached its apogee of applicable explanatory power for strategic decisions in the bipolarity of the Cold War. Realist scholars had some success in predicting the outcomes of two superpowers competing for primacy ultimately on the basis of the ability to rain mass 11. A comprehensive list of all scholars who have tried to do this exceeds the scope of this book. In principle the pursuit of scholarly publication is intended to further precisely this outcome (Legro 2005). 12. The wide variety of extensions of realism that emerged over the Cold War era and beyond are not addressed here in large part because the scholars considered realists tend to agree on only two major assumptions: actors of importance are states, and the world is anarchic, thus the emphasis on security and power. Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [24] chapter one destruction from nuclear, ballistic-missile inventories.13 Misbehaving states, in the eyes of the dominant players of the international community, were not confused about which major state was a patron and which posed a clear physical threat. Although the product of individual actors behaving in their own self-interests and bounded by their attention and comprehension spans, states could be theoretically viewed as unitary actors. Thus, game theory and other forms of rational choice became part of the realist weltanschauung making state actions open to probabilities and mathematical prediction (Powell 1987; Achen 2005). A bipolar world was uniquely suited to realism’s strengths, and now, fiftyplus years later, even scholars of more liberal institutional or closeted cultural persuasions will still often use realist metaphors in their work. Identifying who is and is not a realist sometimes becomes more a matter of the emphasis given to force over money in alliance negotiations, engagement strategies, and strategic policy announcements. As a paradigm, realism was and remains so attractively elegant that its assumptions masking the complex realities of security on the ground took on and still retain the patina of greater objectivity and rigor. Even when realist analysis clearly missed major drivers of actual outcomes, the disconnect often was and still is simply overlooked as noise in the system from “lower” levels of systemic analysis. Thus, the looming potential for system change in the radicalization of mass social movements like terrorism and the massive explosion in technologies can be recast by senior realist scholars as either not important or mundane rational trends simply contributing to a country’s relative power. Waltz, for example, has argued that technology and its influences are subsystem variables ancillary to the higher-level realist focus on only systemic-level variables. In the not distant past, terrorists have been cast by realist scholars as rational optimizers who were unlikely to promote mass killing for fear of retribution (Sagan and Waltz 1995). Deterrence as a strategic option, for example, is particularly difficult for realist scholars to both analytically bound and practically employ in the emerging mass-cybered world because westernized notions of identifiable and negotiable “rational interests” are critical here. Some realists have remarked on the wider complexities beyond their theoretical paradigm. For example, two realist scholars do argue that reason may have little to do with the threat or 13. Seminal realist scholars include Waltz (1979), Mearsheimer (1994), and Van Evera (1994). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [25] use of armed forces in deterrence or retaliation. But this acknowledgment of a shortcoming in realism’s applicability was married with a blunt endorsement of military force as an enduring aspect of international politics in pursuit of foreign policy goals (Huth and Russett 1984). Deterrence is so critical to the realist prescription of how to ensure security that failures here have sometimes been met with a resort to assertions rather than a reevaluation of the presumed applicability of realism to state security dilemmas everywhere. Moreover, the realist community’s development of a further distinction into defensive and offensive realism heralded a deepening desire to fit the rest of the world’s declining civility into a model of human behavior profoundly tied to who has military power (Copeland 2001). In the realist perspective, military force is integral to the overt and clearly stated threats of nations in conflict, and the identity of the attack target involving force must also be clearly defined (Huth and Russett 1984). Even the slightly more social “selective engagement” as a strategy intrinsically falls back on force in all cases. Troops and force are included—as essential tools—in a discussion about persuading allies to help stem the spread of nuclear, biological, and chemical (nbc) weapons (Art 1998–99). For example, a subtle logical dissonance appears in realism when scholars consider religious terrorism. Terrorists are made to fit within the niche of rational actors even though the authors may explicitly say the religious terrorists are not. Although an author may argue that deterrence “becomes nearly impossible” against the revenge and retribution motivations of religious terrorists, nonetheless rogue states and terrorists are perceived to be similar enough to put into the same targeting group. Furthermore, a last resort to the tactical use of nuclear attacks in response to terrorism is suggested (Art 1998–99). Realists have great trouble when pressed for policies to help national leaders be good realists in a world of suicide terrorists or widely anonymous cybered attacks. In some cases, critical practical or institutionalized national security functions are treated as noise below the level of the international system. In other cases, the recommendations are a mélange of measures left unconnected by the tenets of realism itself. These include prescriptions to increase budgets in intelligence intended to uncover hidden nuclear and biological weapons developments and to disable those efforts in rogue states or terrorist organizations, all with some reference to the use of military force (Art 1998–99). For example, selective engagement is characterized as the premier grand strategy for the United States, invoking the most appropriate goals for Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. [26] chapter one the nation and best employing the nation’s military capability for support (Art 1998–99). Realist explanations cannot account for interstate cooperation, especially among historical, close-proximity adversaries, each independently armed.14 As Mastanduno indicated: Copyright © 2011. University of Georgia Press. All rights reserved. During the 1950s and 1960s, however, students of ir came to conceive of statecraft fairly narrowly, primarily as a problem involving the relationship between military instruments and military objective. Economic statecraft and the link between economic and security issues were largely ignored. By the 1970s and 1980s, specialists in ir became far more concerned with economic issues, and the study of ipe [international political economy] moved to the forefront of the discipline. However, the study of economic statecraft, and economic issues more generally, tended to be conducted separately from the study of military statecraft, and national security issues more generally. Rather than integrating these two concerns in the overall study of international politics, security studies and ipe progressed as separate scholarly activities. (Mastanduno 1998, 826) In particular, the often domestically refracted reasons for individual acceptance of suicide loosely associated with emerging headless, transnational, extremist, social movements have been deemed irrational by realists and, until the mid-2000’s, irrelevant for the security interests of major states. Similarly, the use of cybered means to undermine nations with more powerful militaries has been viewed up to recently as irrelevant unless the tools are clearly identified as having been used by major peer states and their military institutions. The focus on force is deeply engrained in the approach indeed. Yet both the inter-entity cooperation common to cities in large, loose, political systems and the individually pyrrhic bombings in massed public places are major influences on citizen and state behaviors domestically and abroad today. These behaviors do over time cumulate across an increasingly huge global population to change the international system. In short, while most major complexities were observed accurately at one point or another, the realist recommendations as a whole only superficially accommodated the con14. See Mearsheimer’s (1994) argument for the explanatory and logical poverty of other explanations. See also the elaboration of this difficulty by Wendt (1995). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [27] cerns of institutionalists or constructivists. Realist scholars have tended to stay fundamentally in their theoretical comfort zone focused on force. Indeed, Jervis argues succinctly that the initial Bush polices in Iraq were precisely an expression of raw offensive realism and also therefore of a profound inability of the proponents of this paradigm to see the limitations of the paradigm for a post–Cold War era (Jervis 2003). Even when authors using the realist approach are trying to speak more broadly to situations where force does not actually happen, the use of force is embedded in prescriptions. For example, look closely at the assumptions underlying the following action-response realist parable involving deterrence and note the embedded use of force irrespective of other tools. First officials in an attacking state plan an attack on a state closely tied to a third state that will have to defend the target state. When leaders in the third state recognize the impending attack, they state a threat to retaliate or clearly imply one by moving their military forces in a way to forestall an attack (Huth and Russett 1984). Deterrence and therefore interruption of planned violence is, by realist accounts, achieved by force or its threats, not otherwise. Mearsheimer in his prescient article on the rise of nationalism after the end of the Cold War attributes its rebirth to elements quite unfamiliar to a realism approach, namely, affiliations and socially constructed resentments, as much as he discusses any security dilemma or economic deprivation (Mearsheimer 1990). Despite these observations, Mearsheimer remains wedded to the realist paradigm. Having leveled broadsides for years at the liberal institutionalists for ineffectiveness, only a few years after his nationalism piece, Mearsheimer (1994) castigated the only other intellectual peer competitor, the emerging school of constructivism, for their utopian and impractical approach. This singular focus on the use of force as the ultimate arbiter has had consequences beyond the Cold War in persuading some leaders to act. For a particularly pressing and troubling example, the U.S. invasion of Iraq in 2003 can reasonably be characterized as a particularly fundamentalist kind of realism adopted by George W. Bush and his political advisers, most of whom were far from experienced internationalists (Jervis 2003). It proved a financial and political fiasco, with only one of three strategic paths open to the United States: simply leave a failing state, leave an intact Iraq under some kind of caretaker national government with international resources to replace the U.S. support, or leave with Iraq divided into ethnic ministates, preferably Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. [28] chapter one each with some oil wells outright owned and defended.15 None of these are realist solutions to a realism-inspired fiasco. Rather, the attack was viewed as a mistake by realists primarily because of the fear induced in other states faced with the United States exhibiting excessive interventionism. The United States thereby increased the risk of hostile alliances among states balancing against it and possibly making it more difficult to sustain U.S. security elsewhere in the world (Layne 2006). The massive U.S. operational quagmire in Iraq was not explainable as an outcome by realist analysis. Insurgencies are by their very level of analysis irrelevant to the world system of anarchic states. Stalwart realists rarely entertain the less easily defined concerns of constructivists, and they will generally ignore the benefits of institutionalism except as they relate to power alliances.16 Leaders facing a complex world of chronic violent threats from social movements and cyberspace are not given much guidance if raw force will not clearly do the job. One might say realism offers a shiny tree ornament but no tree on which to hang it that accurately represents the emerging world faced by leaders now. Copyright © 2011. University of Georgia Press. All rights reserved. Liberal Institutionalism Scholars most associated with the liberal institutionalist subfield are slightly better at incorporating elements of realism and of constructivism into their prescriptions. This broader view is due not only to the approach’s early years but also to its resurgence in the post–World War II period. The original institutionalists were focused on using international institutions as a bulwark against interstate war. The League of Nations and later the United Nations were ideals whose origins began with the tireless efforts of scholars such as Woodrow Wilson. Human social relationships and their attendant interests writ large were 15. The third option, the soft partition, is the most institutionally and culturally sensitive outcome. Some scholars and observers have argued that this was the only real option from the outset, given the distribution of ethnic groups, oil fields, and artificiality of the borders of Iraq (Demchak 2006). 16. For example, although “liberal” goals may be included in a discussion presenting selective engagement as the best and most syncretic grand strategy (among seven) for the United States, rarely mentioned are the explicit and central insights of constructivism on the power of belief and cultural deep institutions to channel what actions are considered acceptable (Art 1998–99). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [29] always fundamental to the approach, as was discomfort with, if not explicit rejection of, the international system as anarchic (Legro 2005). Today the modern institutionalist field is more closely associated with the comparative field of international political economy, redefining interests to emphasize capital flows and economic influences in security (Jönsson and Tallberg 2008). Institutionalists offer perplexed leaders facing the world of chronic violent threats a second shiny tree ornament that has no tree on which to hang it. In this case, the shiny thing is the idea of economic prosperity through internationally cooperative behaviors. The underlying presumption is that civil behavior emerges if economic prosperity is clearly on the rise collectively. Institutionalists reject the realist claims of anarchy in particular due to its lack of ground truth and its role as a fixation on sovereignty that undermines collective regional solutions to otherwise intractable problems. The post–World War II international system was clearly not a state-pursuing-its-own-security free-for-all. The norm of sovereignty and of independent state actors—essential to the realist anarchic international system—has been widely and frequently violated. The realist adherence to preserving sovereignty irrespective of the costs, or of possible alternative societally helpful institutional arrangements, amounts to “organized hypocrisy” (Krasner 1999).17 With interests recast as economic resources husbanded by organizations rather than related to power and force, institutionalist inquiries and recommendations run the gamut from mercenaries to Keynes (Avant 2005; Markwell 1995). Underlying their observations, however, is the “peasant as rational economic actor” notion by which agents with violent threats can be made to see—or made to act as if they see—the futility of further threatening behavior or the economic losses that any violence might produce. In this view, political and resource mechanisms of control are more important than power or belief motivations in producing security-relevant outcomes (Avant 2005). For the institutionalists, therefore, bad behavior is irrational if the proper incentives have been offered to move outcomes to the desired state in group and individual expected-utility curves. Bad actors are in that sense free riders for whom the proper material offers have not yet been collectively discerned, 17. Of course, to the extent that the field is focused on collective cross-cultural resolutions of conflict, this “hypocrisy” may not always be undesirable. The hypocrisy may be a useful coping mechanism often seen in domestic organizations to relieve otherwise paralyzing pressures for conflicting courses of action (Lipson 2007). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. [30] chapter one refined politically, financed in institutions, and then explicitly made clear. Institutionalists, however, have great difficulty offering political leaders effective strategic guidance if money in various institutionalized settings is not reducing threats from actors across the complex globally connected and demographically huge emerging world. Copyright © 2011. University of Georgia Press. All rights reserved. Constructivism Finally, constructivism suffers from field myopia as well, although more justifiably. The youngest of the three international relations subfields, constructivism, is still defining its focus on the otherwise missing, often ineluctable, underlying idea or “knowledge expressed as structure” aspects of human social systems (Wendt 1995; Legro 2005). Unlike scholars supporting the other approaches, these scholars can directly address the consequences for ir of the behaviors taken as “irrational” by realists and by institutionalists. From 2004 to 2009 the limited, and often transient, local cooperation of Iraqis with U.S. Allied Forces often was responding to something beyond force and money given the possible personal consequences for any Iraqi of being caught cooperating. This difficult-to-quantitatively-define motivation has been identified by cognition scholars as more “primitive and defensive,” and it has real behavior consequences (Armstrong 1999). For constructivists, it is “ideas all the way down (until you get to biology and natural resources)” (Wendt 1995). Yet, even more than realism and liberal institutionalism, this reborn scholarly sensitivity to the human culture and ideas variables in ir epitomizes the third beautiful tree ornament that has no strategic tree on which to hang. While occasionally claiming to embrace the other fields, the emerging field of constructivism itself has yet to blend its distinctive approach practically with the force and money central tenets of the other two approaches.18 Constructivism is based on presumptions that knowledge filtered by a variety of internalized or collectively socially constructed screens drives human decisions and thence behaviors. Constructivists accept that these screens could be cultural, 18. An early reflection of this desire not to be seen as orthogonally different is found in the works of one of the seminal authors of the field. While claiming distinctive insights for critical theorists and specifically the social structural approach of constructivism, Wendt then notes his constructivist commonality with Mearsheimer’s realism to include the anarchy of the international system and the primacy of states in analysis (Wendt 1995; Mearsheimer 1994). Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. Globalization and Cybered Conflict [31] organizational, circumstantial, or even emotional, and their exact form and implications are open to comparative empirical research. The field does not, however, try to make general one-size-fits-all prescriptions like realism nor to focus on one particular modality such as the institutions aimed at “peace through economic prosperity” preferred by liberal institutionalists. Furthermore, the immediate precursors to modern constructivism in ir incurred a dismal reputation in strategic circles after the U.S. war in Vietnam in the 1960s. Extensively using the guidance of sociologists and cultural anthropologists, the U.S. military adopted a “hearts and minds” policy that would, in the abstract, be familiar to modern constructivists. Yet this strategy was widely and unfairly castigated for its stunning failures to persuade villagers to support the government and to reject the overtures of the communist guerilla units spread out across the country (Sheehan 1988). The policy was initiated relatively late in the war. Its underlying “rational peasant” concept led the American military to label whole swathes of land containing thousands of Vietnamese still in their home villages as free-fire zones. This logic said that peasants were rational. Those who were offered “better” land elsewhere and yet refused the offer were demonstrating their rationality if they were already in agreement with the Vietcong. Therefore a refusal to move meant the rational peasant was already aligned with enemies. Hence any peasants who stayed in their villages after being warned of impending U.S. strikes were legitimate wartime targets for carpet bombing. Not taken into account in the Vietnam War until it was too late were the beliefs and structures that channel and reinforce individual and collective behaviors, the aspects of international relations emphasized by constructivists. The peasants who agreed to leave abandoned everything they knew, from their and their ancestors’ home to their skills in manipulating the precise conditions of their existing land for good crops. They would have been agreeing to move south to different land, conditions, social structures, and futures, all on the assurances of either corrupt local officials or very foreign U.S. military advisers. By the time the power of these cognitive factors was recognized, it was difficult to persuade peasants to risk yet more in standing up to the often equally intolerant Vietcong, especially after their village and family might have been carpet bombed (J. W. Gibson 1988; B. Palmer 1984). Despite the shortfalls in implementation, timing, political support, and military understanding demonstrated by the United States in the Vietnam War, the failure to produce solid peasant democrats was eventually blamed Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Copyright © 2011. University of Georgia Press. All rights reserved. [32] chapter one on the “hearts and minds” idea itself by the U.S. national security community dominated by realists. Culture as an analytical variable and guiding tool for foreign or any policy was profoundly damaged. Its study outside of area studies languished, devalued for twenty-five years in American political science. The loss in Vietnam was not just strategic in military terms; it was also a strategic loss in the diversity of international relations thinking of America. During the rest of the Cold War era, the reputational costs of studying culture outside of various area studies were daunting to American scholars and practitioners. Until well into the 1990s, it was common to attribute cultural phenomena to largely economic motivations, saying, for example, terrorists were likely to be open to recruitment simply because they were poor (Sageman 2004). During this time, American scholars who took culture to have independent variable characteristics often used acceptable reformulations such as organizational doctrine or socializations, emergent nationalism, or even cognitive international relations theory as legitimizing overlays to avoid the taint of the older “hearts and minds” focus seen to have failed in Vietnam.19 Until the mid-2000s, U.S. policy did not explicitly endorse a cultural perspective in any specific foreign policy. The debacle of the unexpected Iraqi insurgency beginning in 2004 forced a bottom-up reassessment by desperate military leaders. In Iraq, as in Vietnam, paying attention to the values and cultural institutions of the local populace came late in the overall theater and strategy, long after coercion and economic plans laden with ignorance and hubris were imposed.20 U.S. experiences in Iraq from 2004 to 2008 are better explained by constructivist approaches than by the others, but the corresponding solutions are not easily translated from the constructivists’ broad concerns to tools providing actionable guidance for the beleaguered leader. For example, in a 2008 document by the U.S. Congress House Armed Services Committee, the authors observed, “The first rule of war is to understand the nature of the enemy; today that would include Al Qaeda’s intent to spread fear and our tendency to exaggerate the actual danger” (U.S. Congress 2008). While that 19. Even Posen’s (1986) famous work on doctrine would not offend today’s constructivist. Fortunately, American political science had the British school to keep the lamp in the window for when we would need it in the post–Cold War period (Copeland 2003; Buzan 2001; Croft 2006). 20. These points are made in the updated preface to Nagl’s (2002) book on insurgencies and culture. Demchak, Chris C.. Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security, University of Georgia Press, 2011. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=3039013. Created from apus on 2019-07-01 09:06:22. Globalization and Cybered Conflict [33] formulation is more constructivist than it is not, the panel did not progress far in implementing these observations to fix the patently clear “U.S. institutional weaknesses in the implementation of any security policy.” SYN CRE TIC REFR A M I N G : SECU RIT Y RESILIEN CE Copyright © 2011. University of Georgia Press. All rights reserved. S TR ATEGY F O R A C YBERED WO RL D Cyber power is the national ability to disrupt this obscured bad actor somewhere in the digitized globe, whether nonstate or state, in proportion to the actor’s motivations or capabilities to attack with violent effects, and yet be resilient against imposed or enhanced nasty surprises across all critical nationally sustaining systems. This enormously complex challenge requires an approach that deliberately reaches across disciplinary boundaries and epistemologies to integrate competing theories and methods (Tremonte and Racioppi 2008). A new framework needs to grow with the new world order, whether or not it is the one envisioned by established scholars (Kolodziej 2005). When the three schools of international relations theory are adequately seen as complementary rather than competing, a path is formed by which scholars and the policy community can more consensually explain how to prepare for the surprises of the emerging interdependent world. This process of fusion rather than distinction or highlighting is the essence of a “syncretic” approach that aims to harmonize conflicting explanations.21 It is essential that this fusion emerge with the accelerating globalization, as the new surprises challenge old approaches. First, the syncretic security approach incorporates each main ir school in toto as opposed to a synthetic approach that selec...
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello there, here is the complete paper. Go through it and in case of anything, feel free to alert me.Regards

Cyber Intelligence outline
A. Cyber Network Defense
i.

Cyber network defence are measures of information assurance and a cybersecurity
form used to secure military bodies from dangerous cyber intrusions and attacks.

ii.

The primary objective of cyber network defence is ensuring that malicious,
unauthorized, or illegitimate traffic or undeserving users and applications do not
get access to the critical environment of the IT network.

B. Cyber Network Exploitation
i.

Cyber network exploitation is a system used by computer networks to help the
networks in the infiltration of networks of target computers to get and gather data
with diligence.

C. Cyber Network Attack
i.

Cyber network attack is deliberate and intentional exploitation made to
technology-dependent networks, enterprises, and computer networks.

D. How the history of the cyber effort and cyberwar impact U.S. security and national
intelligence
i.

One of the challenges faced by the security sector of the United States is
cybersecurity.

ii.

Intelligence and security systems are preparing for a digitalized cold war to curb
the growing challenge of cyber insecurity.

ii...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags