Military Review English Edition May-June 2014 | Page 29
UTILITY OF CYBERPOWER
Defining Cyberspace and
Cyberpower
A range of definitions for cyberspace and
cyberpower exist, but even the importance of
establishing definitions is debated. Daniel Kuehl
compiled 14 distinct definitions of cyberspace from
various sources, only to conclude he should offer
his own.6 Do exact definitions matter? In bureaucratic organizations, definitions do matter because
they facilitate clear division of roles and missions
across departments and military services. Within
DOD, some duplication of effort may be desirable
but comes at a high cost; therefore, definitions are
necessary to facilitate the rigorous analyses essential for establishing organizational boundaries and
budgets.7 In executing assigned roles, definitions
matter greatly for cross-organizational communication and coordination.
No matter how important, precise definitions to
satisfy all viewpoints and contexts are elusive. Consider defining the sea as all the world’s oceans. This
definition lacks sufficient clarity to demarcate bays or
riverine waterways. Seemingly inconsequential, the
ambiguity is of great consequence for organizations
jurisdictionally bound at a river’s edge. Unlike the
sea’s constant presence for millennia, the Internet is a
relatively new phenomenon that continues to expand
and evolve rapidly. Pursuing single definitions of
cyberspace and cyberpower to put all questions to
rest may be futile. David Lonsdale argued that from
a strategic perspective, definitions matter little. In his
view, “what really matters is to perceive the infosphere as a place that exists, understand the nature of
it and regard it as something that can be manipulated
and used for strategic advantage.”8 The definitions
belo w are consistent with Lonsdale’s viewpoint and
suffice for the purposes of this discussion, but they
are unlikely to satisfy practitioners who wish to apply
them beyond a strategic perspective.
Cyberspace: the domain that exists for inputting,
storing, transmitting, and extracting information
utilizing the electromagnetic spectrum. It includes
all hardware, software, and transmission media
used, from an initiator’s input (e.g., fingers making
keystrokes, speaking into microphones, or feeding
documents into scanners) to presentation of the
information for user cognition (e.g., images on
displays, sound emitted from speakers, or document reproduction) or other action (e.g., guiding
an unmanned vehicle or closing valves).
Cyberpower: The potential to use cyberspace
to achieve desired outcomes.9
U.S. Cyber Command held a joint cyberspace training exercise during November 2011, primarily conducted at the Air Force Red Flag Facility
at Nellis Air Force Base, Nev. The exercise brought together approximately 300 cyber and information technology professionals, 2 November
2011. (U.S. Army)
MILITARY REVIEW
May-June 2014
27