Presentation to the Patterson School of Diplomacy at the University of Kentucky on cultural legacies and cyber security strategy, based on an article I published in Survival.
1 of 10
Download to read offline
More Related Content
Wav Cyber Uk 2012 V2
1. Strategic Culture and
Cyber Security
Patterson School of Diplomacy
& International Commerce
9 April 2012
W. Alexander Vacca, Ph.D.
Corporate Director- Business Assessment
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
2. How Culture Matters
Shared among groups of individuals
Cross cuts organizational and national boundaries
Cross cuts generations
Cross cuts personal experiences
Provides the evoked set of relevant analogies and metaphors
Guides the search for relevant information
Suggests the motives of other actors
Suggests cause-effect relationships
Implies probability of policy success or failure
Constrains the search for policy options
Shapes the processing of new information
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
2
3. Two Approaches to Warfare
Mahan Douhet
The Commons Possess Transverse
Offense / Defense Balanced Fleet Best Defense is Offense
Force Targeting Military Civil & Industrial
Moral Effects Secondary Crucial
Climax of War Defeat the Fleet Obliterate the Cities
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
3
4. Mahan: From SLOC to CLOC
The modern economy is dependent upon the Cyber Lines of
Communication (CLOC).
Build a force capable of ensuring freedom of the CLOC. Focus efforts
on defeating enemy actions within cyberspace, including building a
robust defense.
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
4
5. Douhet: Victory Through Cyber Power!
Pass through cyberspace to conduct decisive kinetic operations
Defense is a low priority, maintain the ability to conduct cyber offense
and achieve cyber deterrence
Civil and industrial targeting can break the will and ability of an enemy
to fight
Pay close attention to the links between cyber means and kinetic
effects
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
5
6. Cyber Security in the USAF Today
Cyber, as a warfighting domain . . . like
air, favors the offense. If youre defending in
cyber, youre already too late. Cyber delivers on
the original promise of air power. If you dont
dominate in cyber, you cannot dominate in
other domains. If youre a developed
country, you cant conduct daily life [after a
large scale cyber attack], your life comes to a
screeching halt.
- Lani Kass (Director USAF Cyberspace Taskforce), 2007
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
6
7. The Rise of Cyber Deterrence
Deterrence is comforting and familiar
For Policymakers: a peaceful and successful Cold War
For the Military: support for military spending
For Analysts: a framework well studied and specified
But is it applicable?
Myriad of cyber actors
Multiple motives for cyber actions
Problems of attribution
Linking deterrent penalties to deterrent triggers
Students of strategic studies and the Culture of Deterrence?
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
7
8. Some Policy Implications
Knowledge about the roots of analytical perspectives (ie, knowing your
history) provides insight into the logic of others.
Beware the logic of policy metaphors and analogies (e-
Katrina, Cyber Pearl Harbor).
Bring multiple cultural perspectives to bear on problems of national
importance (especially new problems).
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
8
9. For Further Discussion
Gluttons for punishment are advised to consult:
Vacca, W. Alexander. Military Culture and Cyber Security,
Survival 53:6 (December 2011), pages 159-176
The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
9