Military Review English Edition May-June 2014 | Page 35
UTILITY OF CYBERPOWER
21 June 2009, .
22. “We will improve our cyberspace capabilities so they can often achieve
significant and proportionate effects with less cost and lower collateral impact.”
Chairman of the Joint Chiefs of Staff, The National Military Strategy of the United
States of America 2011: Redefining America’s Military Leadership, (Washington,
DC: GPO, 2011), 19.
23. Thomas C. Schelling, Arms and Influence (New Haven, CT: Yale University,
2008), 2-4.
24. For Russian pipeline, see Clarke and Knake, 93; for Stuxnet, see Nye, 127.
25. Lonsdale, 143-45.
26. Rear Adm. J.C. Wylie, Military Strategy: A General Theory of Power Control
(Annapolis, MD: Naval Institute Press, 1989), 74.
27. Evgeny Morozov, The Net Delusion: The Dark Side of Internet Freedom (New
York: PublicAffairs, 2011), 19.
28. Nye, 147.
29. Richard L. Kugler, “Deterrence of Cyber Attacks,” Cyberpower and National
Security, eds. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington,
DC: NDU Press, 2009), 320.
30. See United States Office of the President, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, May 2011.
31. See Clarke and Knake, 155. International strategy for cyberspace addresses
diplomacy, defense, and development in cyberspace but fails to outline relative
priorities for conflicting policy interests. 31.
32. First Amendment free speech rights and their limits have been a contentious
issue for decades. “Shouting fire in a crowded theater” comes from a 1919 U.S.
Supreme Court case, Schenck v. United States. Justice Oliver Wendell Holmes’
established context as relevant for limiting free speech. An “imminent lawless action”
test superseded his “clear and present danger” test in 1969, .
33. Morozov, 28.
34. “Today’s information technology capabilities have made this vision [of
precision logistics] possible, and tomorrow’s demand for efficiency has made the
need urgent.” Gen. Norton Schwartz, chief of staff, U.S. Air Force, “Toward More
Efficient Military Logistics,” address on 29 March 2011, to the 27th Annual Logistics
Conference and Exhibition, Miami, FL, .
35. Chris C. Demchak, Wars of Disruption and Resilience: Cybered Conflict,
Power, and National Security (Athens, GA: University of Georgia Press, 2011), 44.
36. Van Creveld, 269-70.
37. Demchak, 73.
38. Antoine Bousquet, The Scientific Way of Warfare: Order and Chaos on the
Battlefields of Modernity (New York: Columbia University Press, 2009), 228-29.
39. See R.A. Ratcliff, Delusions of Intelligence: Enigma, Ultra, and the End of
Secure Ciphers (Cambridge, UK: Cambridge University Press, 2006), 229-30. Allied World War II Enigma code-breaking offers a successful example of creatively
task-organizing without rigid hierarchy.
40. Colin S. Gray, Explorations in Strategy (Westport, CT: Praeger, 1996), 133.
41. DOD Strategy for Operating in Cyberspace, 8.
42. Clarke and Knake, 160.
43 Geoffrey A. Fowler, “Wikipedia, Google Go Black to Protest SOPA,” Wall
Street Journal, 18 January 2012, ; Associated
Press, “White House objects to legislation that would undermine ‘dynamic’ Internet,”
Washington Post, 14 January 2012, .
44. “Soft power,” see Nye, 81-82; “friendly conquest,” see Martin C. Libicki,
Conquest in Cyberspace: National Security and Information Warfare (Cambridge,
UK: Cambridge University Press, 2007), 166.
45. U.S. Government, USASpending.gov official Web site, “Prime Award Spending Data,” (18 January 2012).
“2011” refers to the fiscal year.
46. DOD Web site, “About the Department of Defense,” (18 January 2012). DOD employs 1.4 million active, 1.1 million National
Guard/Reserve, 718,000 civilian personnel.
47. Clausewitz, 357.
48. Kugler, “Deterrence of Cyber Attacks,” 335.
49. “Many observers postulate that multiple actors are developing expert [cyber]
attack capabilities.” Ibid., 337.
50. Clarke and Knake, 144.
51. “Narratives are particularly important in framing issues in persuasive ways.”
Nye, 93-94.
52. Quote from Gen. Robert Elder as commander of Air Force Cyber Command.
See Clarke and Knake, 158; Defense Tech, “Chinese Cyberwar Alert!” 15 June 2007,
.
53. Nye, 234.
54. Clausewitz, 220.
55. John Cotesworth Slessor, Air Power and Armies (Tuscaloosa, AL: University
of Alabama Press, 2009), iv.
56. Lonsdale, 232.
57. Clausewitz, 89.
58. Gray, 58.
59. Colin S. Gray, Modern Strategy (Oxford, UK: Oxford University Press,
1999), 270.
60. Arthur W. Tedder, Air Power in War, (Tuscaloosa: University of Alabama
Press, 2010), 88.
Tired of waiting between issues for great articles?
You no longer have to—MR Spotlight is online now! This
new feature publishes articles bi-weekly, so you now have
access to more information more often! Check out our
most current and previous articles now on our website!
Go to http://usacac.army.mil/CAC2/MilitaryReview/index.
asp and click on the”MR Spotlight” link to get started.
Want to comment? Military Review is on Facebook and Twitter.
The official Military Review Facebook and Twitter sites are now available for
readers to comment on the overall layout, design, or content of the magazine.
We also strongly encourage professional discussion and debate on all articles
published in Military Review. To comment, go to our webpage at http://
militaryreview.army.mil/ and click on the Facebook icon, or reach out to us on
Twitter at http://twitter.com/ @MilReview.
“Military Review is an important forum that helps shape the
dialogue of our profession.”
—GEN Raymond T. Odierno
MILITARY REVIEW
May-June 2014
33