Cyberspace and the Era of Persistent Confrontation
()
About this ebook
This non-fiction book examines cyberspace as a military domain and as a means for the great powers to contest politically, short of actual violence. It is a collection of essays by the author, James Van de Velde, Ph.D., an Associate Professor at the National Intelligence University, where he teaches courses on Cyber Warfare, WMD-Terrorism, and Intelligence Collection and Analysis. He is also Adjunct Professor at the Georgetown Security Studies Program, School of Foreign Service, and Adjunct Faculty in the Global Security Studies Program at Johns Hopkins University. Dr. Van de Velde is a Lead Associate for the consulting firm, Booz Allen Hamilton, where he currently consults to the J5 (Strategy) Division of US Cyber Command. The chapters include:
MAKE CYBERSPACE GREAT AGAIN TOO!
WHAT IF WARFARE TODAY OCCURS ONLY IN PEACETIME?
WARFARE AND DETERRENCE IN THE ERA OF CYBERSPACE
CYBERSPACE'S FUTURE IS CLOUDY WITH A CHANCE OF PERSISTENT AUTHORITARIANISM
WHY ‘CYBER NORMS’ ARE DUMB
TOP TEN STATEMENTS REGARDING JIHADIST USE OF THE INTERNET DESIGNED SPECIFICALLY TO UPSET MILLENNIALS!
THE MEDIA’S RESPONSIBILITY TO COMBAT TERRORISM VIA CYBERSPACE
HIGH TECH POSEURS
APPLYING CLASSICAL NOTIONS OF STRATEGY TO CYBERSPACE
WHAT COMES AFTER ‘PERSISTENT ENGAGEMENT?’ ‘3G:’ GATES, GUARDS, AND GUNS
James Van de Velde
James Van de Velde, Ph.D., is an Associate Professor at the National Intelligence University, where he teaches courses on Cyber Warfare, WMD-Terrorism, and Intelligence Collection and Analysis. He is also Adjunct Professor at the Georgetown Security Studies Program, School of Foreign Service, and Adjunct Faculty in the Global Security Studies Program at Johns Hopkins University. Dr. Van de Velde is a Lead Associate for the consulting firm, Booz Allen Hamilton, where he currently consults to the J5 (Strategy) Division of US Cyber Command. He is a former White House Appointee under President George H.W. Bush Sr., for nuclear weapons arms control; a former Lecturer of Political Science and Residential College Dean at Yale University; State Department Foreign Service Officer; and naval intelligence reserve officer. Dr. Van de Velde is an Associate Member of the International Institute of Strategic Studies and has held fellowships at the Center for International Security and Arms Control at Stanford University and the US-Japan Program at Harvard University. Dr. Van de Velde received his B.A. from Yale University in 1982 and his Ph.D. from the Fletcher School of Law and Diplomacy in 1988.
Related to Cyberspace and the Era of Persistent Confrontation
Related ebooks
Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5iWar: War and Peace in the Information Age Rating: 0 out of 5 stars0 ratingsThe Perfect Weapon: war, sabotage, and fear in the cyber age Rating: 4 out of 5 stars4/5Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex Rating: 5 out of 5 stars5/5Understanding Cyber Warfare and Its Implications for Indian Armed Forces Rating: 0 out of 5 stars0 ratingsCyberwars in the Middle East Rating: 0 out of 5 stars0 ratingsZero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5Is There a Common Understanding of What Constitutes Cyber Warfare? Rating: 5 out of 5 stars5/5The Wires of War: Technology and the Global Struggle for Power Rating: 5 out of 5 stars5/5Tempting Fate: Why Nonnuclear States Confront Nuclear Opponents Rating: 0 out of 5 stars0 ratingsNSA Secrets: Government Spying in the Internet Age Rating: 4 out of 5 stars4/5Machinery of War: A Comprehensive Study of the Post-9/11 Global Arms Trade Rating: 5 out of 5 stars5/5Information Technology and Military Power Rating: 0 out of 5 stars0 ratingsCyber Warfare: Its Implications on National Security Rating: 0 out of 5 stars0 ratingsCyber Threats and Nuclear Weapons Rating: 0 out of 5 stars0 ratingsThe Drone Memos: Targeted Killing, Secrecy and the Law Rating: 4 out of 5 stars4/5My Journey at the Nuclear Brink Rating: 3 out of 5 stars3/5Deadly Arsenals: Nuclear, Biological, and Chemical Threats, Second Edition, Revised and Expanded Rating: 3 out of 5 stars3/5The role of terrorism in twenty-first-century warfare Rating: 0 out of 5 stars0 ratingsDark Commerce: How a New Illicit Economy Is Threatening Our Future Rating: 0 out of 5 stars0 ratingsRaven Rock: The Story of the U.S. Government's Secret Plan to Save Itself--While the Rest of Us Die Rating: 4 out of 5 stars4/5Senseless Secrets: The Failures of U.S. Military Intelligence from the Revolution to Afghanistan Rating: 0 out of 5 stars0 ratingsThe Terrorist Trap: America's Experience with Terrorism Rating: 3 out of 5 stars3/5Predator: The Secret Origins of the Drone Revolution Rating: 4 out of 5 stars4/5Drone Warfare: The Development of Unmanned Aerial Conflict Rating: 0 out of 5 stars0 ratingsThe Whistleblower's Dilemma: Snowden, Silkwood and Their Quest for the Truth Rating: 5 out of 5 stars5/5Underground: Hacking, madness and obsession on the electronic frontier Rating: 0 out of 5 stars0 ratingsLeaders at War: How Presidents Shape Military Interventions Rating: 4 out of 5 stars4/5A Global Security System: An Alternative to War Rating: 0 out of 5 stars0 ratingsShadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World Rating: 4 out of 5 stars4/5
Politics For You
The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health Rating: 4 out of 5 stars4/5The January 6th Report Rating: 4 out of 5 stars4/5The Madness of Crowds: Gender, Race and Identity Rating: 4 out of 5 stars4/5The Republic by Plato Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5Fear: Trump in the White House Rating: 4 out of 5 stars4/5The End of the Myth: From the Frontier to the Border Wall in the Mind of America Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5On Palestine Rating: 4 out of 5 stars4/5Gaza in Crisis: Reflections on the U.S.-Israeli War on the Palestinians Rating: 4 out of 5 stars4/5The Humanity Archive: Recovering the Soul of Black History from a Whitewashed American Myth Rating: 4 out of 5 stars4/5The Parasitic Mind: How Infectious Ideas Are Killing Common Sense Rating: 4 out of 5 stars4/5Daily Stoic: A Daily Journal On Meditation, Stoicism, Wisdom and Philosophy to Improve Your Life Rating: 5 out of 5 stars5/5The Great Reset: And the War for the World Rating: 4 out of 5 stars4/5The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5Ever Wonder Why?: and Other Controversial Essays Rating: 5 out of 5 stars5/5Freedom Is a Constant Struggle: Ferguson, Palestine, and the Foundations of a Movement Rating: 4 out of 5 stars4/5A Letter to Liberals: Censorship and COVID: An Attack on Science and American Ideals Rating: 3 out of 5 stars3/5This Is How They Tell Me the World Ends: The Cyberweapons Arms Race Rating: 4 out of 5 stars4/5The Essential Chomsky Rating: 4 out of 5 stars4/5The Strange Death of Europe: Immigration, Identity, Islam Rating: 4 out of 5 stars4/5Speechless: Controlling Words, Controlling Minds Rating: 4 out of 5 stars4/5Son of Hamas: A Gripping Account of Terror, Betrayal, Political Intrigue, and Unthinkable Choices Rating: 4 out of 5 stars4/5Sex Trafficking: Inside the Business of Modern Slavery Rating: 4 out of 5 stars4/5The Gulag Archipelago: The Authorized Abridgement Rating: 4 out of 5 stars4/5The Anarchist Cookbook Rating: 2 out of 5 stars2/5
Reviews for Cyberspace and the Era of Persistent Confrontation
0 ratings0 reviews
Book preview
Cyberspace and the Era of Persistent Confrontation - James Van de Velde
Cyberspace and the Era of Persistent Confrontation
A collection of essays on cyber warfare and great power competition via cyberspace,
by the author
JAMES R. VAN DE VELDE, Ph.D., LCDR, USNR
Copyright © 2019 James Van de Velde
ISBN-13: 978-0-578-58751-6
jamesvandevelde@gmail.com
All rights reserved.
Distributed by Smashwords
This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this ebook with another person, please purchase an additional copy for each person you share it with. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then you should return to Smashwords.com and purchase your own copy. Thank you for respecting the hard work of this author.
Ebook formatting by ebooklaunch.com
James R. Van de Velde, Ph.D., is an Associate Professor at the National Intelligence University, where he teaches courses on Cyber Warfare, WMD-Terrorism, and Intelligence Collection and Analysis. He is also Adjunct Professor at the Georgetown Security Studies Program, School of Foreign Service, and Adjunct Faculty in the Global Security Studies Program at Johns Hopkins University. Dr. Van de Velde is a Lead Associate for the consulting firm, Booz Allen Hamilton, where he currently consults to the J5 (Strategy) Division of US Cyber Command. He is a former White House Appointee under President George H.W. Bush Sr., for nuclear weapons arms control; a former Lecturer of Political Science and Residential College Dean at Yale University; State Department Foreign Service Officer; and naval intelligence reserve officer. Dr. Van de Velde is an Associate Member of the International Institute of Strategic Studies and has held fellowships at the Center for International Security and Arms Control at Stanford University and the US-Japan Program at Harvard University. Dr. Van de Velde received his B.A. from Yale University in 1982 and his Ph.D. from the Fletcher School of Law and Diplomacy in 1988.
The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.
TABLE OF CONTENTS
MAKE CYBERSPACE GREAT AGAIN TOO!
WHAT IF WARFARE TODAY OCCURS ONLY IN PEACETIME?
How Our Adversaries ‘Fight’ In Peacetime
Russia’s Hybrid Warfare Strategy
China’s Salami Slicing Strategy
The Islamic State’s iTerrorism Strategy
How To Fight During Peacetime
Counter Russia
Counter China
Counter Islamic State
WARFARE AND DETERRENCE IN THE ERA OF CYBERSPACE
Is the Cyber Domain Different?
The Fundamentals of Deterrence Do Indeed Apply to Cyberspace
The Danger in Not Inflicting Punishment
Deterring Kinetic Conflict via Cyberspace
CYBERSPACE'S FUTURE IS CLOUDY WITH A CHANCE OF PERSISTENT AUTHORITARIANISM
WHY ‘CYBER NORMS’ ARE DUMB
‘CRASH THEIR COMMS:’ CONTEST AND DEFEAT THE ISLAMIC STATE’S CUTTING-EDGE USE OF SOCIAL MEDIA
The Islamic State is Online and is OPSEC Savvy
Jihadi Cool
Command and Control Via App
Twitter-storm
A Modern Technology That Serves the Retrograde Islamic State Well
Success at Cyber Jihad 2.0 Suggests Things Are Only Going to Get Worse
What to Do
The Fifth Domain of Warfare Is Here, Whether We Like it or Not
TOP TEN STATEMENTS REGARDING JIHADIST USE OF THE INTERNET DESIGNED SPECIFICALLY TO UPSET MILLENNIALS!
THE MEDIA’S RESPONSIBILITY TO COMBAT TERRORISM VIA CYBERSPACE
HIGH TECH POSEURS
APPLYING CLASSICAL NOTIONS OF STRATEGY TO CYBERSPACE
WHAT COMES AFTER ‘PERSISTENT ENGAGEMENT?’ ‘3G:’ Gates, Guards, and Guns
MAKE CYBERSPACE GREAT AGAIN TOO![1]
President Obama’s reluctance to punish malicious cyberspace actors gave us the cyber world we most wanted to avoid. Malicious governments now see cyberspace as a largely unconstrained space for political maneuver, disinformation, information operations, and occasional destruction; a few governments actively support cyber criminals who advance state interests (mostly against the United States).
Our most dangerous opponents in cyberspace are states, three of which – Russia, China, and North Korea – also use cybercrime as a tool of state power. Nation-states use cyberspace for espionage, industrial theft, coercion, and crime to advance their aims – most importantly, the dismantling of the liberal-democratic world order to replace it with something more favorable to their own interests.
Our opponents adopt unconventional strategies, leveraging cyberspace to ensure that their actions stay below the level that could trigger military conflict. Our adversaries and competitors have embraced cyber warfare precisely to avoid kinetic hostilities with the United States but still achieve their political objectives.
The United States in particular is engaged in almost continuous contact with adversaries in cyberspace, with often-ambiguous legal implications that frequently hamstring our ability to respond. The media has occasionally called it virtual warfare,
but a better term for the situation may be persistent cyberspace confrontation,
or warfare during peacetime.
Russia, China, North Korea, Iran, and the Islamic State/al Qa`ida use cyberspace to pursue a variety of goals, including operations that emplace cyber weapons on our critical infrastructure (both public and private), steal intellectual property, attack US industry, and enable terrorist acts. More recently, Russia has used such methods to interfere in presidential elections (not just in the United States) — a new threshold of audacity and political danger.
The Obama Administration’s hopes that cyberspace would emerge as a peaceful domain where speech was open and free (where the internet would not be regulated or censored by states), and where proprietary and personal information was respected and safe through the acceptance of norms, were unambiguously dashed. Cyberspace is the domain where adversaries come to change the political status quo via information operations, use our infrastructure to steal our information and wealth, and plan and execute terrorism. Adversaries no longer fear competing with us in cyberspace, believing either that we are self-restrained for legal or politically naïve reasons or we are not as capable as they thought we were.
Imagine if the air domain had just emerged and Russian, Chinese, Iranian, and North Korean aircraft flew unmolested above the skies of New York, San Francisco, Washington, DC, and every city and town in the United States, mapping our infrastructure, and stealing modest amounts of US wealth and proprietary information in each pass. Would the US practice good, ‘risk-adverse’ strategy by complaining but doing nothing – not threatening the aircraft, launching our own aircraft inside adversary airspace, or even simply sanctioning such states for their malicious actions? The conventional wisdom of rank and file US Government bureaucrats on cyberspace thinks it is being risk-adverse by not responding aggressively – by not pushing back on malicious cyberspace behavior. They fear escalation. Yet passivity invites escalation, not acceptance of our idealistic goals for cyberspace. Which risks escalation more: to hit a bully back or to not hit a bully back?
During the past few years, the United States found itself reacting late, insufficient, or more often not-at-all to more nimble, authoritarian states. The United States needs to shape the cyber environment in order to affect the norms and behavior we expect: respect for sovereignty, respect for proprietary information, and the inviolability of critical infrastructure, not to mention protect the future gems of the state: intellectual property, data analytics, AI, algorithms, and cognition.
America’s attackers in cyberspace are not interested in conducting a ‘cyber 9/11.’ The Chinese focus on industrial theft to enrich their state and leap frog ahead militarily and commercially. The Russians use cyberspace to pedal false narratives on social media and with international proxies and ‘experts’ to influence elections, leverage criminal groups to steal industrial information and western money, and stealthily emplace code on our civilian infrastructure for industrial espionage and to threaten such infrastructure in a time of crisis or war. Iran and North Korea use cyber operations against American companies to punish states and industry they oppose;[2] their goal is usually political coercion and signaling, though occasionally destruction. The Islamic State/al Qa`ida use the internet to post illegal speech that calls for the murder of innocents and for recruitment, weapons information sharing, inspiration, and crude command and control. Cyberspace is the one military domain where clear boundaries and red lines have not been established or defended by the United States.
China’s Cybersecurity Law requires multinational companies to make data accessible to the Chinese Government and strengthens the Communist regime’s control over web content it considers inappropriate. Internet ‘sovereignty’ to China is freedom from western influence via the internet. Chinese law requires tech companies operating in China to retain consumer data and provide the state access, while also filtering content deemed illegal. China will soon use such data to monitor all Chinese citizens. The tool the West may have thought would open totalitarian regimes has served such regimes very well in maintaining totalitarian control.
China’s cyber law includes now a ban on foreign internet firms unwilling to comply with the country’s policies on content removal — most notably Google, Facebook, and Twitter. This has led to domestic firms essentially imitating western business models, such as Google’s Chinese counterpart, Baidu, or Renren, the Facebook of China, or Weibo and Twitter, while adhering to government restrictions. Perhaps the most important (and protectionist) policy within Chinese law is the requirement that companies cough up their source code so that the government may ensure that it is ‘secure’ and ‘legal.’ The Chinese then steal such source code and provide it to Chinese companies, who integrate it and subsequently push the American firms out of the market. Yet these American firms just cannot help themselves but comply. The US Government ought to admit to these companies that they cannot protect them in China from industrial espionage and that they are most likely to lose their intellectual advantage.[3]
Action in violence-free cyberspace is far easier for authoritarian and totalitarian states to conduct than liberal, consensus-building democracies. In short, the invention once thought as a panacea for advancing free speech and liberal democracy is instead the perfect tool to effect internal political control against dissidents and freedom seekers and asymmetrical warfare against the United States.
Cyberspace is sometimes referred to as the Wild West
precisely because it has not been tamed by the United States and its allies. The shaping of cyberspace requires a combination of international norms promulgated on paper in international forums but also clear, well-signaled responses to unacceptable activities. The United States needs to introduce the concepts of dominating and ‘winning’ in cyberspace, first and foremost to protect internationally accepted notions of property and