Military Review English Edition May-June 2014 | Page 35

UTILITY OF CYBERPOWER 21 June 2009, . 22. “We will improve our cyberspace capabilities so they can often achieve significant and proportionate effects with less cost and lower collateral impact.” Chairman of the Joint Chiefs of Staff, The National Military Strategy of the United States of America 2011: Redefining America’s Military Leadership, (Washington, DC: GPO, 2011), 19. 23. Thomas C. Schelling, Arms and Influence (New Haven, CT: Yale University, 2008), 2-4. 24. For Russian pipeline, see Clarke and Knake, 93; for Stuxnet, see Nye, 127. 25. Lonsdale, 143-45. 26. Rear Adm. J.C. Wylie, Military Strategy: A General Theory of Power Control (Annapolis, MD: Naval Institute Press, 1989), 74. 27. Evgeny Morozov, The Net Delusion: The Dark Side of Internet Freedom (New York: PublicAffairs, 2011), 19. 28. Nye, 147. 29. Richard L. Kugler, “Deterrence of Cyber Attacks,” Cyberpower and National Security, eds. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington, DC: NDU Press, 2009), 320. 30. See United States Office of the President, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, May 2011. 31. See Clarke and Knake, 155. International strategy for cyberspace addresses diplomacy, defense, and development in cyberspace but fails to outline relative priorities for conflicting policy interests. 31. 32. First Amendment free speech rights and their limits have been a contentious issue for decades. “Shouting fire in a crowded theater” comes from a 1919 U.S. Supreme Court case, Schenck v. United States. Justice Oliver Wendell Holmes’ established context as relevant for limiting free speech. An “imminent lawless action” test superseded his “clear and present danger” test in 1969, . 33. Morozov, 28. 34. “Today’s information technology capabilities have made this vision [of precision logistics] possible, and tomorrow’s demand for efficiency has made the need urgent.” Gen. Norton Schwartz, chief of staff, U.S. Air Force, “Toward More Efficient Military Logistics,” address on 29 March 2011, to the 27th Annual Logistics Conference and Exhibition, Miami, FL, . 35. Chris C. Demchak, Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security (Athens, GA: University of Georgia Press, 2011), 44. 36. Van Creveld, 269-70. 37. Demchak, 73. 38. Antoine Bousquet, The Scientific Way of Warfare: Order and Chaos on the Battlefields of Modernity (New York: Columbia University Press, 2009), 228-29. 39. See R.A. Ratcliff, Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers (Cambridge, UK: Cambridge University Press, 2006), 229-30. Allied World War II Enigma code-breaking offers a successful example of creatively task-organizing without rigid hierarchy. 40. Colin S. Gray, Explorations in Strategy (Westport, CT: Praeger, 1996), 133. 41. DOD Strategy for Operating in Cyberspace, 8. 42. Clarke and Knake, 160. 43 Geoffrey A. Fowler, “Wikipedia, Google Go Black to Protest SOPA,” Wall Street Journal, 18 January 2012, ; Associated Press, “White House objects to legislation that would undermine ‘dynamic’ Internet,” Washington Post, 14 January 2012, . 44. “Soft power,” see Nye, 81-82; “friendly conquest,” see Martin C. Libicki, Conquest in Cyberspace: National Security and Information Warfare (Cambridge, UK: Cambridge University Press, 2007), 166. 45. U.S. Government, USASpending.gov official Web site, “Prime Award Spending Data,” (18 January 2012). “2011” refers to the fiscal year. 46. DOD Web site, “About the Department of Defense,” (18 January 2012). DOD employs 1.4 million active, 1.1 million National Guard/Reserve, 718,000 civilian personnel. 47. Clausewitz, 357. 48. Kugler, “Deterrence of Cyber Attacks,” 335. 49. “Many observers postulate that multiple actors are developing expert [cyber] attack capabilities.” Ibid., 337. 50. Clarke and Knake, 144. 51. “Narratives are particularly important in framing issues in persuasive ways.” Nye, 93-94. 52. Quote from Gen. Robert Elder as commander of Air Force Cyber Command. See Clarke and Knake, 158; Defense Tech, “Chinese Cyberwar Alert!” 15 June 2007, . 53. Nye, 234. 54. Clausewitz, 220. 55. John Cotesworth Slessor, Air Power and Armies (Tuscaloosa, AL: University of Alabama Press, 2009), iv. 56. Lonsdale, 232. 57. Clausewitz, 89. 58. Gray, 58. 59. Colin S. Gray, Modern Strategy (Oxford, UK: Oxford University Press, 1999), 270. 60. Arthur W. Tedder, Air Power in War, (Tuscaloosa: University of Alabama Press, 2010), 88. Tired of waiting between issues for great articles? You no longer have to—MR Spotlight is online now! This new feature publishes articles bi-weekly, so you now have access to more information more often! Check out our most current and previous articles now on our website! Go to http://usacac.army.mil/CAC2/MilitaryReview/index. asp and click on the”MR Spotlight” link to get started. Want to comment? Military Review is on Facebook and Twitter. The official Military Review Facebook and Twitter sites are now available for readers to comment on the overall layout, design, or content of the magazine. We also strongly encourage professional discussion and debate on all articles published in Military Review. To comment, go to our webpage at http:// militaryreview.army.mil/ and click on the Facebook icon, or reach out to us on Twitter at http://twitter.com/ @MilReview. “Military Review is an important forum that helps shape the dialogue of our profession.” —GEN Raymond T. Odierno MILITARY REVIEW May-June 2014 33