Strategic Implications of Offense and Defense in Cyberwar

2016 49th Hawaii International Conference on System Sciences
Strategic Implications of Offense and Defense in Cyberwar
Wade L. Huntley
U.S. Naval Postgraduate School
[email protected]
grounded in concerns over military agenda-setting
rather than conceptual rigor [31] [4] [17].
The paper focuses its consideration of the
offense-defense
balance
in cyberspace
by
systematically bringing to bear the concepts, findings
and operational variables of “offense-defense theory”
as applied in other areas of international relations.
Assessing the particular qualities of cyber capabilities
through this theoretical framework can advance
thinking about the strategic roles of offensive and
defensive capabilities in cyberspace.
Abstract
This paper examines the relative balance of
offense and defense in international cyberspace
conflict. Unlike previous partial assessments, this
paper systematically applies “offense-defense
theory” as previously developed by international
relations theorists and historians. The preliminary
analysis of this brief paper identifies several key
distinct features of cyberspace relevant to the
judgment. While concluding that most current
factors point to offensive advantage in cyberspace,
the analysis also indicates the limitations of
evaluating only cyberspace factors. Within specified
conditions, the state of the offense-defense balance
can be critical to tactical and operational policymaking. But at the strategic level, the extensive
interactions of cyber capabilities and other coercive
means available to states necessitates evaluating how
the advent of cyber technologies may be shifting
balances of advantage between offense and defense
in the military postures of states holistically.
Note: The views expressed in this document are
those of the author and do not reflect the official
policy or position of the U.S. Department of Defense
or the U.S. Government.
2. Offense-Defense Theory
Offense-defense theory traces back to the
seminal postulates of Robert Jervis [13]. Jervis’ core
concern – the security dilemma – is simply stated: in
an anarchic world, actions states take to secure
themselves may be innately threatening to other
states, and so mutual fear and insecurity are endemic
even when no state manifests malicious intentions.
Jervis’ offense-defense theory begins with the
premise that the intensity of the security dilemma
states experience can vary, depending on the state of
development of military technology and certain
situational factors (such as geography).
When
military offense has the upper hand, cooperation is
hard and wars are more likely; when defense
predominates, wars are more easily avoided and
cooperative opportunities can be realized [42]. Two
variables shape this balance: “whether defensive
weapons and policies can be distinguished from
offensive ones, and whether the defense or the
offense has the advantage” in preparations and
outcomes [13].
Concerning distinguishability, Jervis asserts that
if “weapons and policies that protect the state” do not
“also provide the capability for attack,” then “it is
possible for a state to make itself more secure without
making others less secure.” Status quo powers can
reliably identify aggressors and recognize one
another.
A world consisting only of status quo
powers can be peaceful. Moreover, when weapons
are easily distinguished and procurement takes time,
“states will obtain advance warning when others plan
1. Introduction
The absence of good strategic thinking about the
implications of cyber technologies for international
security is often lamented [11] [38] [14] [33] [22].
This paper aims to contribute to the development of a
strategy of cyberspace by addressing the question of
whether the “offense” or the “defense” has the upper
hand in cyberspace.
The viewpoint that in
cyberspace offense dominates has for some time been
predominant; in some analyses the need for
significant emphasis on offensive cyber operations
has functioned as an asserted fact rather than an
operating assumption [35] [14] [39] [40]. More
recently, the question has become more contended, in
the context of skepticism that cyber threats in general
are being “over-hyped,” although some skepticism is
1530-1605 2016
U.S. Government Work Not Protected by U.S. Copyright
DOI 10.1109/HICSS.2016.691
5587
5588
aggression,” because acquisition of offensive
capabilities is unnecessary for defense and therefore
an early indicator of aggressive intentions. Under
such conditions, “the basic postulate of the security
dilemma no longer applies.” [13]
How feasible is it to differentiate offensive and
defensive capabilities? Debate over this question is
central to offense-defense theory. Many weapons
can be used either offensively or defensively, with
the distinction between these uses made only in the
circumstances of their application or, even more
obscurely, in the intentions of the possessor. The
interaction of weapons with one another creates
another layer of ambiguity. States may seek offensive
weapons to enable defense through deterrence – the
reason some observers consider the nuclear age to be
defense-dominant despite the indefensibility of
targets under circumstances of “mutually assured
destruction” (MAD) [26] [27] [13] [24]. Conversely,
defensive capabilities can be “enablers” of offensive
capabilities: the support of ballistic missile defense
to offensive conventional and nuclear forces is a
prominent recent example [13] [24].
These considerations suggest that differentiation
of offensive and defensive capabilities is multifaceted and variable, taking on changing
characteristics over time. Accordingly, offensedefense theory’s outcome expectations based on
differentiation will vary across specific case
conditions as well as over time, and may seldom
evoke a clear judgment.
The second key variable shaping the severity of
the security dilemma for states across varying
technological,
circumstantial
and
perceptual
conditions is the balance of advantage between
offensive and defensive capabilities. Jervis’ basic
definition of this balance is intuitive: offense has the
advantage when “it is easier to destroy the other’s
army and take its territory than it is to defend one’s
own;” defense has the advantage when “it is easier to
protect and to hold than it is to move forward, destroy
and take.” When offense has the advantage, even
status quo powers must behave aggressively.
Conversely, when defense has the advantage,
aggression is difficult and status quo states can feel
secure from one another. If the defensive advantage
is great enough, “aggression will be next to
impossible,” obviating the security dilemma [13].
Jervis specifies two “aspects” or measures of the
offense-defense balance. The first aspect is costs:
whether procuring a defensive capability costs more
or less than the offensive capability it is offsetting. If
offensive capabilities are relatively cheaper than
defensive, arms races ensue.
Conversely, if
defensive capabilities are relatively cheaper, security
equilibria at stable arms levels can emerge [13] [24].
The second aspect of the offense-defense balance
concerns operations and outcomes: whether it is
better in a conflict to be attacking or defending, and
in particular whether the advantage accrues to the
state that strikes the first damaging blow or the state
that allows the adversary to expend the first effort.
When offense dominates in this sense, fear of
surprise attack is palpable, periods of crisis
encourage states to act precipitously, and short-run
instability reigns [13]. Two common applications of
this reasoning are explanations of the onset of World
War I and analyses of the de-stabilizing function of
strategic nuclear forces that cannot survive first
strikes [34]. Conversely, when defense dominates,
these pressures evaporate. Confidence in defensive
capabilities allows states not to fear surprise attacks,
incentives for first strikes are greatly reduced, and
situations tend toward self-stabilization.
In anticipation of application of offense-defense
theory to cyberspace, the roles of two other elements
of the approach merit particular attention: geography
and perception.
Geography is important to offense-defense
theory for two reasons: it is the object of conflict, and
it influences how some weapons technologies offer
advantages over others. Most renditions of the
offense-defense balance hinge on the outcome of
territorial conquest, insofar as the theory derived
from efforts to explain fundamental features of major
wars that historically focused on territorial conquest.
Geography also can shape the nature of the offensedefense balance of weapons technologies.
Historically, geographic factors have offered both
natural defenses and natural vulnerabilities, and the
military technologies of a given period have
functioned to either enhance or obviate these features
[13] [42]. Both aspects of this role of geography in
offense-defense theory add a wrinkle to its
application to the cyber realm.
In offense-defense theory, how state decisionmakers perceive the offense-defense balance plays an
important role in determining state behavior, and a
contributing role in outcomes. At the level of state
behavior, perceptions at a given time of the
prevailing offense-defense balance better explain
how states behave than the actual conditions of the
balance at that time [24]. The reasons for this
disjuncture are straightforward: decision-makers act
on what they believe to be accurate, but are
sometimes wrong.
One specific source of misjudgment of the
offense-defense balance is the difficulty of intuiting
the implications of technological evolution before
5589
5588
conflict involving that technology has provided
sufficient experience. Hence, “understanding of the
implications of weapons technologies for the offensedefense balance may lag behind the pace of
technological innovation.” [24] The distorting role of
this factor will be larger in areas, such as cyber
security, where technological innovation is
proceeding rapidly.
The disjuncture between perceptions and reality
of offense-defense balance complicates the
explanatory function of offense-defense theory [7]
[10] [41]. Although the role of perceptions is
important in shaping state behavior, offense-defense
theory posits that the nature of extant military
technologies themselves principally drives the
outcomes of interstate conflicts. The advantages of
offense or defense will determine battles regardless
of what decision-makers believed about those
advantages before the battles began. World War I is
widely considered to classically exemplify both how
misperception of the offense-defense balance can
decisively influence state behavior and how the
material realities of the offense-defense balance can
decisively shape the outcomes of war despite
contrary beliefs [13] [21] [36] [20].
In sum, offense-defense theory presents a set of
expected outcomes depending on the interaction of
two key variables: offense-defense differentiation and
offense-defense balance. Figure 1 (below) presents
Jervis’ own tabular summary of these expectations.
Offense has the
advantage
Offensive
posture is not
distinguishable
from defensive
one
Doubly
dangerous.
Offensive
posture is distinguishable from
defensive one
No security
dilemma, but
aggression
possible.
Status quo states
can follow
different policy
than aggressors.
Warning given.
assertions. Systematic attention to this question, in
the framework of pre-existing offense-defense
theory, is wanting.
Among those addressing the question, most
strategists and decision-makers take the position that
offense is dominant [23] [12] [37] [25]. Sheldon, for
example, presents five reasons that offense dominates
in cyberspace: the vulnerability of network defenses;
the speed of cyber attacks; the absence of distance as
an inhibiting factor; the difficulty of attributing the
sources of attacks; and the “target-rich” environment
produced by society-wide reliance on cyberspace
[35].
Kello and Krepinevich, notably focusing on the
issue of costs, similarly find cyber offense
significantly advantaged. For Kello, multiple factors
produce “immense disadvantages of defense against
cyberattack.”[14] Similarly, Krepinevich concludes
that “if both the attacker and defender are given equal
resources, the attacker will prevail.” [15]
A smaller number of analysts are more
equivocal. Aucsmith focuses on the importance of
offensive novelty, defined for cyber weapons as the
use of “tactics, techniques, or procedures unknown to
the defender.” Unlike other domains of warfare,
successful attack depends on the nature of the
capability being a surprise to the defender. This
factor, then, levels the playing field: “The cost to
search for such unknown vulnerabilities is the same
whether done by the offense or the defense.” [2]
Gray goes further than Aucsmith in challenging
the view that offense dominates in cyberspace,
observing that offense faces certain unique costs. For
example: “Detailed up-to-date intelligence literally is
essential for successful cyber offense.” [11] [8] Gray
also finds defensive benefit of the unique nature of
cyberspace. He observes that, unlike land, sea, air
and space domains, cyberspace is humanly created.
The medium itself, not merely the tools to project
force within it, can be humanly modified. This
provides defense with a built-in meta-advantage: in
addition to means of defending specific targets, those
in possession of the networks and systems wanting
defense could if they so choose reconstitute the entire
domain to increase the advantage of defensive
capabilities. An example applying this observation
would be overhaul of basic computer design to entail
physically distinct memory locations for data and for
software instructions, which would eliminate forms
of malware attacks (such as “buffer overflows”) that
depend upon computers storing instructions and data
in the same memory locations.
Additionally, Gray points to the importance of
resilience as a defensive advantage. Comparing
prospects of cyber attack to the limited effectiveness
Defense has the
advantage
Security
dilemma, but
security
requirements
may be
compatible.
Doubly stable.
Figure 1. Expected outcomes of offense-defense theory [13]
3. Offense and Defense in Cyberspace
Does offense or defense have the advantage in
cyberspace? [18] [3] This question has been engaged
within broader analyses of the national security and
strategic implications of emerging cyber capabilities.
Most of these discussions, however, have made
claims based on reasoned but largely unsubstantiated
5590
5589
of strategic bombing of Britain in World War II, he
remarks: “Britain prepared to be able to accept
damage but to fight on. This is the approach that
appears most suitable to the challenge of damage
from cyberspace.” [11]
This present debate over the offense-defense
balance in cyberspace raises important perspectives
and offers intuitive insights. But these efforts do not
systematically draw on the frameworks and variables
of offense-defense theory as it has been developed
from much broader considerations of military history.
The following discussion sketches such an
application of offense-defense theory to cyberspace,
highlighting particularly relevant elements of the
approach.
capabilities for essentially defensive purposes include
use of software to deactivate the client computers of
an attacking botnet or to detect the parameters of a
potentially threatening malware in order to improve
network protections [8] [3]. Examples in which
defensive cyber capabilities can support offensive
postures are also numerous.
The second complication in distinguishing
offensive and defensive cyber capabilities, relatively
unique to cyberspace, stems from the ease with which
cyber capabilities can be kept hidden – and the
necessity of doing so [16]. In Jervis’ original
formulation of offense-defense theory, as noted
earlier, the length of time and transparency of the
development of offensive capabilities is a crucial
assumption. The development and deployment of
offensive cyber software, however, is virtually
invisible. Absent espionage or leaks, a state’s
acquisition of such capabilities can be completely
concealed. As a result, the benefits flowing from
offense-defense differentiation that Jervis identified
are undercut. If one state can conceal offensive cyber
acquisition, other states will have no advance
warning of such efforts. Concealment also prevents
status quo states from identifying other status quo
states on the basis of non-acquisition of offensive
capabilities. Aggressive states can conceal their
intentions.
The implications of these circumstances are
straightforward.
Regardless of whether or not
distinctions between offensive and defensive cyber
capabilities are apparent in principle, differentiation
may in practice be invisible to other states. The
result, in terms of offense-defense theory, is a
condition like that in which offensive and defensive
capabilities cannot be distinguished at all.
3.1. Offense-defense differentiation
Differentiating “offensive” and “defensive”
cyber weapons requires firstly associating key
concepts of cyberspace weapon, use of force and
power to broader usage in international relations
scholarship.
Joseph Nye provides an effective
framework. Nye defines cyber power as “the ability
to obtain preferred outcomes through use of the
electronically interconnected information resources
of the cyber domain.” Preferred outcomes may be
either within or beyond cyberspace [28]. As noted
earlier, offense-defense theory distinguishes preferred
outcomes in terms of either “taking” another’s
resources (territory) or “holding” one’s own. These
definitions yield a straightforward distinction
between offensive and defensive cyber capabilities:
x Offensive cyber capabilities enable one to
penetrate and affect (e.g. “take”) another’s
cyber and/or non-cyber resources.
x Defensive cyber capabilities enable one to
preserve and protect (e.g. “hold”) one’s own
cyber and/or non-cyber resources.
At first cut, many specific cyber capabilities
seem easily distinguishable as defensive.
For
example, installation of malware detection or
requirements of robust user passwords have little if
any offensive cyber applicability. Software designed
to infiltrate a target system and exfiltrate information
back out to a concealed recipient is scarcely
defensive. Digging deeper, though, two complications emerge. One is recognized in offense-defense
theory. The other is original to the application of this
framework in cyberspace.
The first complication is the general potential for
offensive capabilities to serve defensive functions,
and for defensive capabilities to serve offensive
functions. Within cyberspace, this issue emerges in a
number of areas. Examples of use of offensive
3.2. Offense-defense balance
The second foundational variable of offensedefense theory is the offense-defense balance – that
is, whether offense or defense has the advantage in
conflict, defined in terms of military costs and
operational effectiveness.
A number of analysts point to cost variations in
concluding that offense is advantaged in cyberspace.
In a particularly extensive 2009 snapshot, Libicki
cites U.S. government expenditures on military
network security as one reason for offensive
advantage at that time [19]. Although the metrics of
calculating costs for offensive and defensive
capabilities relevant to cyber conflict are complex
and debatable, Libicki’s general conclusions have
broad support.
On this basis, two further
observations based on this assessment are notable.
5591
5590
First, Libicki notes that future developments may
unfold nonlinearly from current experience. The
offense-defense balance of costs experienced thus far
may offer little indication of how the balance may
shift if/when costs at higher levels of intensity of
cyber conflict become more significant.
Second, the absence of global experience with
higher intensity cyber conflict that Libicki discusses
highlights the empirical absence of the kind of
operational experience constituting Jervis’ other key
measure of offense-defense balance. Warnings of a
“Cyber Pearl Harbor” suggest that the use of cyber
capabilities in international politics to date pales in
comparison to future prospects [29] [1] [6]. If so,
past experience may be an especially poor indicator
of potential outcomes of conflict featuring
significantly more intense and far-reaching use of
cyber weaponry, and faith in operational judgments
of the offense-defense balance should be limited.
becomes even more challenged. If cyberspace is
constituted by interaction networks, then boundaries
are spontaneously emerging and disintegrating at the
speed of human thought. Attaching meaning to the
notion of “taking” or “holding” such cyberspace
stretches the metaphorical imagination.
Thus, the concept of geography in cyberspace is
highly suggestive but ultimately indeterminate.
Constructed through analogy and metaphor, multiple
applications of the concept of “borders” in
cyberspace are plausible [8] [9].
Given this
indeterminacy, is there then any viable meaning to
the ideas of “taking” or “holding” territory in
cyberspace? The answer is affirmative in at least one
sense: the impossibility of perfect defense, a rampant
concern among cyber security strategists, is far from
uncommon in other forms of conflict.
Jervis
observes that, in any given conflict, defense may hold
the significant advantage even if boundaries are
permeable. Gray’s recollection of British resilience
against German bombing in World War II is one
example. Russia’s absorption and ultimate defeat of
Napoleon’s 1812 invasion offers a second. In the
cyber domain, if penetration is easy, it may yet matter
more how quickly such penetrations can be detected
and contained, and how effectively broader force
postures are sustained [8].
The basic point is simple. In cyberspace, as in
many other forms of conflict, the penetrability of
boundaries is not by itself an indication that offense
has the advantage. Offense-defense theory points to
the importance of grasping strategic consequences
holistically and looking to longer-term outcomes as
the primary indicators of success and failure in
conflict. This holds as a reasonable standard of
offensive and defensive efficacy in cyberspace.
3.3. The geography of cyberspace
What is the geography of cyberspace? Nye’s
definition of cyberspace as a “unique hybrid regime
of physical and virtual properties” makes this a
challenging question. Considering only cyberspace’s
physical attributes – computers, linkage equipment,
even people – presents some analogic geographic
mappings – national networks are home terrain,
military networks are perhaps “critical terrain,” and
malware intrusion is equivalent to invasion. But
considering the virtual attributes of cyberspace – such
as interaction networks, identity personas, and
information – makes clear that the concept of
geography can be applied only metaphorically. Like
any metaphor, the concept of geography in
cyberspace can be both illuminating and misleading.
For example, cyberspace is sometimes referred
to as a “borderless” realm. This image evokes the
ease and speed with which information can travel
from anywhere to anywhere on the globe, with
infinite pathways available to thwart gate-keeping.
In this sense the “geography” of cyberspace is almost
infinitely malleable; networks of association can
emerge or disintegrate in spans of minutes [28] [22]
[30].
An alternative image is cyberspace as a borderrich realm. In this perspective, the threshold between
the cyber capabilities one “owns” (either as an
individual, an organization or a nation-state) and
those capabilities one does not own defines the
boundaries. Even if only focusing on the physical
attributes of cyberspace, boundaries are everywhere.
Extending the border-rich conception to the virtual
aspect of cyberspace, the notion of geography
3.4. Perishability and obsolescence
Cyber weapons entail two closely related traits
that distinguish them from weapons in other domains.
Perishability refers to a weapon becoming ineffective
after a single use. Obsolescence refers to a weapon
becoming ineffective without being used at all. The
perishability and obsolescence of many cyber
weapons stem from their reliance on computer
system vulnerabilities that can be discovered and
fixed, blocking a weapon’s exploitation of those
vulnerabilities and thereby rendering it useless.
Cyber weapons are perishable whenever the
attack by the weapon is likely to reveal the existence
of the vulnerability to the attacked party. Use of a
particular cyber weapon that exposes its exploit may
render that particular weapon unusable in the future.
5592
5591
Due to the imperative of concealment, such
arsenal development would not be publicly evident.
Lack of publicity could help mute the kind of public
alarm that fuels arms races, but could also mute the
kind of public scrutiny that sometimes reins in
military spending.
Opacity is also likely to
exacerbate the kind of “worst case” thinking that also
fuels arms races. The result is likely to be a “silent
arms race” in which all states invest in both defensive
and offensive cyber capabilities as much in fear of
what they don’t know as in response to what they do
know about what other states are doing. This
condition captures the essence of the security
dilemma and approaches the “doubly dangerous”
outcome Jervis identified in a world of offensedefense indistinguishability and offensive advantage.
The perishability of cyber weapons has strategic
consequences.
Most importantly, perishability
induces conservation: a “one-and-done” weapon will
be saved for particularly needy moments.
Conservation has two specific caution-inducing
strategic effects. The first is to provide a measure of
crisis stability, because attackers will be inclined to
hold the weapon in reserve until the stakes have
climbed high enough to merit its use. The second
strategic effect of conservation is enlargement of the
prospect of strategic surprise for both sides. For two
states both possessing sufficiently sophisticated cyber
weapons, leaderships must reckon with two types of
potential strategic surprise: “theirs work” and “ours
don’t work.” Intelligence gathering can reduce but
not eliminate this prospect [11].
Cyber weapons can become obsolescent because,
even in the absence of their use, the vulnerability the
weapons are designed to exploit may be removed.
Given the efforts of software designers and system
managers to find and fix vulnerabilities, and also the
simple rapid evolution of information technologies,
all vulnerabilities have a life span.
At least two strategic effects flow from potential
cyber weapon obsolescence.
First, a state
discovering the impending elimination of a
vulnerability on which a cyber weapon depends will
have increased incentives to utilize that weapon
before it is rendered useless. When these conditions
emerge, this “use-it-or-lose-it” awareness will
undercut the strategic reticence induced by cyber
weapon perishability, because conservation premises
an extended time horizon that has now been cut short.
Secondly, states face the prospect that they will not
discover the impending elimination of adversaries’
vulnerabilities on which their own cyber weapons
depend. This effect broadens the sources of potential
strategic surprise associated with cyber weapon
perishability. Taking these two effects together, the
lurking prospect of cyber weapon obsolescence
undercuts perishability’s stabilizing tendencies.
Cyber weapon perishability and obsolescence
have several net effects on the offense-defense
balance in cyberspace. First, by increasing the
importance of secrecy, perishability and obsolescence
reinforce the difficulty of distinguishing the offensive
or defensive character of any state’s cyber force
structure, as discussed earlier. Second, perishability
and obsolescence strongly increase incentives for
states to discover new vulnerabilities and stockpile a
wide range of cyber weapons. Coupled with the
anticipation that potential adversaries face these same
incentives, the net effect is propulsion of the kind of
arms race dynamic also expected when offensive
technologies have cost advantages.
4. Conclusion: Cyber War and Real War
To this point, application of the basic framework
of offense-defense theory to cyberspace yields
indications that trend toward offensive advantage.
As discussed above, state incentives to cloak cyber
capabilities and the interactivity of different cyber
capabilities makes distinguishing offensive and
defensive cyber weapons difficult. Cost considerations – the first of the two measures of the offensedefense balance – may also favor the offense, and in
any event the principal impact of offensive cost
advantage – arms races – also emerges from the
unique perishability and obsolescence of cyber
weaponry. As to the second measure of the offensedefense balance – operational effectiveness in
shaping the outcomes of conflicts – the absence of
higher-intensity cyber conflict to date leaves a weak
empirical basis, widening the purview of “worst
case” anticipation that typically favors offenseoriented planning [32].
But judgment of the cyber offense-defense
balance on the basis of cyber conditions alone is
insufficient. Offense-defense theory treats military
force posture cumulatively and focuses on the overall
results of conflict. In this sense, the simple question
of whether offense or defense dominates in
cyberspace is secondary, because cyber capabilities
are more likely to be integrated components of wider
physical conflicts than the featured weapons of
dramatic “cyber wars.” If cyber weapons do not have
the same kind of war-deciding quality that nuclear
weapons and many forms of conventional weapons
do, then cyber capabilities have not bestowed upon
strategy the next “absolute weapon” [5] [17] [11].
Rather, tracing the potential impacts of the use of
cyber weapons on overall conflict outcomes is the
5593
5592
key factor in judging the cyber impact on the offensedefense balance in warfare today.
Thus, the simple question of whether offense or
defense dominates in cyberspace is misleading.
Under certain bounded conditions, the state of the
offense-defense balance in cyberspace itself may be
critical to tactical and operational policy-making.
But at the strategic level, the more useful and
analytically answerable question is whether and how
the advent of cyber capabilities has shifted the
offense-defense balance between states more broadly.
Appraisals of this question in turn depend complexly
on the extent and configuration of states’ other
military capabilities, and on the physical and
diplomatic circumstances of their interactions with
one another. This observation bounds much of the
preceding discussion of the implications of cyber
weapons and cyber defenses.
In this larger context, the initial indications of
offense dominance in cyberspace should be
interpreted carefully.
Motivated biases incline
judgments toward perceiving the insecurity that
others’ offensive capabilities pose, and reacting
accordingly. Over time, military organizations tend
to persistently favor offensive doctrines [32]. The
complexity, opacity and necessary secrecy particular
to the cyberspace domain magnify this tendency.
Reflecting a broader outlook, Van Evera comments:
“History suggests that offense dominance is at the
same time dangerous, quite rare, and widely
overstated. … States are seldom as insecure as they
think they are.” [42]
This historical generalization does not, of course,
mean that today’s estimations of the present and
growing cyber threats to the United States are
exaggerated, fostering excessively aggressive U.S.
behavior, or creating risks that emerging cyber
capabilities may grease skids to physical war.
Offense-defense theory also identifies historical
misjudgments of undue complacency.
But the historical tendency should be cautionary.
The speed and secrecy with which cyber capabilities
can be deployed and launched, combined with the
ever-present possibility of unanticipated and widelyimpacting collateral effects, highlight the importance
of getting it right. Under these conditions, claims
that offense dominates in cyberspace should probably
bear more than their share of the “burden of proof” in
evaluating the offense-defense balance and its policymaking implications.
5. References
[1] Arquilla, John, “Panetta's Wrong About a Cyber 'Pearl
Harbor' - The Internet doesn't work that way,” Foreign
Policy November 19, 2012
[2] Aucsmith, David, “War in Cyberspace: A Theory of
War in the Cyber Domain,” Cyberbelli.com, MayJune 2012
[3] Belk, Robert and Matthew Noyes, “On the Use of
Offensive Cyber Capabilities: A Policy Analysis on
Offensive US Cyber Policy,” Belfer Center for
Science and International Affairs, Harvard Kennedy
School, March 2012
[4] Brito, Jerry & Tate Watkins, “Loving the Cyber
Bomb? The Dangers of Threat Inflation in
Cybersecurity Policy,” Harvard National Security
Journal Vol. 3 (2011)
[5] Brodie, Bernard, editor. The Absolute Weapon: Atomic
Power and World Order. New York: Harcourt, Brace
and Co., 1946
[6] Clarke, Richard A. and Robert K. Knake, Cyber War
(New York: Harper Collins, 2010),
[7] Davis, James W., Jr., “Correspondence: Taking
Offense at Offense-Defense Theory,” International
Security 23:3 (Winter, 1998-1999), pp. 179-82
[8] Demchak, Chris C., “Resilience, Disruption, and a
'Cyber Westphalia': Options for National Security in a
Cybered Conflict World,” in Nicholas Burns and
Jonathon Price, eds., Securing Cyberspace: A New
Domain for National Security (Washington, DC: The
Aspen Institute, 2012).
[9] Demchak, Chris C. and Peter Dombrowski, “Rise of a
Cybered Westphalian Age,” Strategic Studies
Quarterly (Spring 2011), pp.32-61.
[10] Goddard, Stacie E., “Correspondence: Taking Offense
at Offense-Defense Theory,” International Security
23:3 (Winter, 1998-1999), pp. 189-95
[11] Gray, Colin S., “Making Strategic Sense Of Cyber
Power: Why The Sky Is Not Falling,” Strategic
Studies Institute and U.S. Army War College Press,
April 2013
[12] Harknett, Richard J., John P. Callaghan, and Rudi
Kauffman, “Leaving Deterrence Behind: WarFighting and National Cybersecurity,” Journal of
Homeland Security and Emergency Management, Vol.
7, No. 1, November 11, 2010; and
[13] Jervis, Robert, "Cooperation under the Security
Dilemma," World Politics 30:2 (January 1978),
pp.167-214.
[14] Kello, Lucas, “The Meaning of the Cyber Revolution:
Perils to Theory and Statecraft,” International
Security, 38: 2 (Fall 2013), pp. 7-40
5594
5593
[30] Rattray, Gregory J., “An Environmental Approach to
Understanding Cyberpower,” in Franklin D. Kramer,
Stuart Starr, and Larry K. Wentz, eds., Cyberpower
and National Security (National Defense University
Press, 2009)., 253-274, esp. 256.
[15] Krepinevich, Andrew, “Cyber Warfare: A ‘Nuclear
Option’?” Center for Strategic and Budgetary
Assessments (2012)
[16] Libicki, Martin C., “Brandishing Cyberattack
Capabilities,” RAND National Defense Research
Institute (2013)
[31] Rid, Thomas, “Cyber War Will Not Take Place,”
Journal of Strategic Studies, Vol. 35, No. 1 (February
2012), pp. 5–32.
[17] Libicki, Martin C., “Don't Buy the Cyberhype: How to
Prevent Cyberwars From Becoming Real Ones,”
Foreign Affairs, August 14, 2013
[32] Sagan, Scott D., “The Perils of Proliferation:
Organization Theory, Deterrence Theory, and the
Spread of Nuclear Weapons,” International Security,
Vol. 18, No. 4 (Spring, 1994), pp. 66-107
[18] Libicki, Martin C., “Cyberspace Is Not a Warfighting
Domain,” I/S: A Journal of Law and Policy for the
Information Society 8:2 (Fall 2012), p. 325-340
[19] Libicki, Martin C., Cyberdeterrence and Cyberwar,
Santa Monica, CA: RAND, 2009
[33] Samaan, Jean-Loup, “Beyond the Rift in Cyber
Strategy,” Strategic Insights 10:1 (Spring 2011), pp.414.
[20] Lieber, Keir A., “Correspondence: Defensive Realism
and the ‘New’ History of World War I,” International
Security 33:1 (Summer 2008), pp. 185-194
[34] Schelling, Thomas, Arms and
University Press, 1966(
Influence (Yale
[35] Sheldon, John B., “Deciphering Cyberpower Strategic
Purpose in Peace and War,” Strategic Studies
Quarterly, Summer 2011
[21] Lieber, Keir A., “The New History of World War I
and What It Means for International Relations
Theory,” International Security 32:2 (Fall 2007), pp.
155-191
[36] Snyder, Jack, “Correspondence: Defensive Realism
and the ‘New’ History of World War I,” International
Security 33:1 (Summer 2008), pp. 174-185
[22] Lonsdale, David J., “The Impact of Cyberspace on
Strategy,” High Frontier (2009)
[37] Sterner, Eric, “Stuxnet and the Pentagon’s Cyber
Strategy,” Arlington, Va.: George C. Marshall
Institute, October 13, 2010
[23] Lynn, William J., III, “Defending a New Domain,”
Foreign Affairs 89:5 (September 2010), pp. 97–108.
[24] Lynn-Jones, Sean M., “Offense-Defense Theory and
its Critics,” Security Studies 4:4 (Summer 1995), pp.
660-91.
[38] Stout, Mark, “5 Reasons We Don’t Have Good
Strategic Thought about Cyber,” War on the Rocks,
October
22,
2013,
http://warontherocks.com/2013/10/five-reasons-thatwe-dont-have-good-strategic-thought-about-cyber/
[25] Masters, Jonathan, “Confronting the Cyber Threat,”
New York: Council on Foreign Relations, May 23,
2011;
[39] U.S. Department of Defense, “Cyberspace Policy
Report: A Report to Congress Pursuant to the National
Defense Authorization Act for Fiscal Year 2011,
Section 934,” November 2011
[26] Morgan, Patrick M., “Applicability of Traditional
Deterrence Concepts and Theory to the Cyber Realm,”
Proceedings of a Workshop on Deterring
CyberAttacks: Informing Strategies and Developing
Options for U.S. Policy (National Research Council,
2010)
[40] U.S. Joint Chiefs of Staff, Joint Publication 3-13:
Information
Operations
(Washington,
D.C.:
Department of Defense, 2006)
[27] Morgan, Patrick M., , Deterrence Now (Cambridge
University Press, 2003)
[41] Van Evera, Stephen, “Correspondence: Taking
Offense at Offense-Defense Theory,” International
Security 23:3 (Winter, 1998-1999), pp. 195-200.
[28] Nye, Joseph S., Jr., “Cyber Power,” Belfer Center for
Science and International Affairs, May 2010
[42] Van Evera, Stephen, “Offense, Defense, and the
Causes of War,” International Security 22:4 (Spring,
1998), pp. 5-43
[29] Panetta, Leon E., Secretary of Defense, “Defending
the Nation from Cyber Attack,” Speech to Business
Executives for National Security, New York, New
York,
Thursday,
October
11,
2012,
http://www.defense.gov/Speeches/Speech.aspx?Speec
hID=1728
5595
5594