June 1, 2011

Cyberwarfare – the Doctrine of Equivalence

Hack the United States with a crippling computer virus, and the Pentagon may respond with smart bombs and commando teams.

The military and intelligence communities have known for at least two decades that “cyberwar” is war. Everyday experience has confirmed that the digital fight is very real, as cyber-attackers probe and occasionally crack the digital communications and data storage systems of military organizations, intelligence agencies, financial institutions and, frankly, just about everyone with a networked digital device.

Hack the United States with a crippling computer virus, and the Pentagon may respond with smart bombs and commando teams.

The military and intelligence communities have known for at least two decades that “cyberwar” is war. Everyday experience has confirmed that the digital fight is very real, as cyber-attackers probe and occasionally crack the digital communications and data storage systems of military organizations, intelligence agencies, financial institutions and, frankly, just about everyone with a networked digital device.

Now the definition of warfare and military doctrine – theory, principles and policies that guide the use of military force – are catching up with reality.

According to a Wall Street Journal report this week, the Pentagon’s new doctrinal term is “equivalence.” If a cyberspace based attack inflicts damage comparable (equivalent) to a conventional attack using bombs, gunfire or beam weapons, then the cyber-attacker can expect the U.S. to retaliate with a range of weaponry, not just anti-viral software or a cyberspace-only counterattack.

Essentially, the U.S. military will no longer treat cyberspace as a semi-mystical gray zone somehow detached from the physical world. In 21st century Information Age societies that rely on digital devices for an array of critical safety, economic and security services, cyberspace provides fundamental connectivity. Fundamental reliance creates fundamental vulnerabilities. Vulnerabilities require protection.

Determining equivalence relies on judgment, and very likely a judgment made in the midst of a crisis. The odds are, however, like pornography, you and the Joint Chiefs of Staff will know it when you see it – for example, when every computer screen in Washington freezes, geosynchronous military communications satellites suddenly fritz and die, and the entire East Coast’s electrical grid stalls then quits.

Yet simply suggesting a notional Doctrine of Equivalence serves a valuable purpose: deterrence. The U.S. is indicating that it will not limit its response to a digital attack to cyberspace. A nation, transnational terror organization, gang or even an individual engaging in a cyber-attack on U.S. digital assets and capabilities risks physical counterattack – a fancy way of saying they risk death for wreaking large-scale digital havoc.

For the last decade, defense and intelligence agencies have been slowly creeping toward a Doctrine of Equivalence between cyber-attack and kinetic attack. The rub in cyberspace has been twofold: deniability and lethality. Cyberspace is a vast, global jungle providing camouflage for clever snipers, crooks and armies. Determining where the cybershot came from can be difficult. Attackers can blame other organizations for the assault.

Estonia’s cyberbattle with Russia illustrates the problem of deniability. In April and May 2007, Estonia suffered a sophisticated, sustained and coordinated “hack” of the country’s digital systems. Estonia claimed that the attacks originated at the Internet addresses of “state agencies in Russia.” Russia denied the charge, attributing the attacks to criminal organizations. Were the criminals proxies? Estonia lacked absolute proof of Russian culpability.

As for lethality, a digital attack doesn’t leave shell craters or bleeding human casualties – at least, not in the same overt sense of an assault with artillery and bombs. But the contingent lethality of a cyber-attack is real; a sustained digital attack erodes defense capabilities. Destroying spy and communications satellites in order to blind and disrupt U.S. command capabilities is a rough equivalent.

Moreover, the economic costs of a digital attack can be much larger than a classic barrage or bombing campaign.

The international agreements, customs and understandings that attempt to give warfare a legal framework will also adapt to these 21st century conditions. Treaties don’t bind rogues and fanatics, but perception of a common threat and common vulnerabilities can bridge differences between rational antagonists and competitors.

The Wall Street Journal reported that the U.S. is attempting to reach a consensus position with American allies on how to respond to cyber-attacks, though the U.S. leans toward the position that holding countries which create cyberweapons responsible for their use serves a deterrent function.

As a member of NATO and cyber-attack victim, Estonia will no doubt forcefully contribute to that discussion.

COPYRIGHT 2011 CREATORS.COM

Who We Are

The Patriot Post is a highly acclaimed weekday digest of news analysis, policy and opinion written from the heartland — as opposed to the MSM’s ubiquitous Beltway echo chambers — for grassroots leaders nationwide. More

What We Offer

On the Web

We provide solid conservative perspective on the most important issues, including analysis, opinion columns, headline summaries, memes, cartoons and much more.

Via Email

Choose our full-length Digest or our quick-reading Snapshot for a summary of important news. We also offer Cartoons & Memes on Monday and Alexander’s column on Wednesday.

Our Mission

The Patriot Post is steadfast in our mission to extend the endowment of Liberty to the next generation by advocating for individual rights and responsibilities, supporting the restoration of constitutional limits on government and the judiciary, and promoting free enterprise, national defense and traditional American values. We are a rock-solid conservative touchstone for the expanding ranks of grassroots Americans Patriots from all walks of life. Our mission and operation budgets are not financed by any political or special interest groups, and to protect our editorial integrity, we accept no advertising. We are sustained solely by you. Please support The Patriot Fund today!


The Patriot Post and Patriot Foundation Trust, in keeping with our Military Mission of Service to our uniformed service members and veterans, are proud to support and promote the National Medal of Honor Heritage Center, the Congressional Medal of Honor Society, both the Honoring the Sacrifice and Warrior Freedom Service Dogs aiding wounded veterans, the National Veterans Entrepreneurship Program, the Folds of Honor outreach, and Officer Christian Fellowship, the Air University Foundation, and Naval War College Foundation, and the Naval Aviation Museum Foundation. "Greater love has no one than this, to lay down one's life for his friends." (John 15:13)

★ PUBLIUS ★

“Our cause is noble; it is the cause of mankind!” —George Washington

Please join us in prayer for our nation — that righteous leaders would rise and prevail and we would be united as Americans. Pray also for the protection of our Military Patriots, Veterans, First Responders, and their families. Please lift up your Patriot team and our mission to support and defend our Republic's Founding Principle of Liberty, that the fires of freedom would be ignited in the hearts and minds of our countrymen.

The Patriot Post is protected speech, as enumerated in the First Amendment and enforced by the Second Amendment of the Constitution of the United States of America, in accordance with the endowed and unalienable Rights of All Mankind.

Copyright © 2024 The Patriot Post. All Rights Reserved.

The Patriot Post does not support Internet Explorer. We recommend installing the latest version of Microsoft Edge, Mozilla Firefox, or Google Chrome.