Assessment of the Role of Cyber Power in Interstate Conflict

Eric Altamura is a graduate student in the Security Studies Program at Georgetown University’s School of Foreign Service. He previously served for four years on active duty as an armor officer in the United States Army.  He regularly writes for Georgetown Security Studies Review and can be found on Twitter @eric_senlu.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Role of Cyber Power in Interstate Conflict

Date Originally Written:  May 05, 2018 / Revised for Divergent Options July 14, 2018.

Date Originally Published:  September 17, 2018.

Summary:  The targeting of computer networks and digitized information during war can prevent escalation by providing an alternative means for states to create the strategic effects necessary to accomplish limited objectives, thereby bolstering the political viability of the use of force as a lever of state power.

Text:  Prussian General and military theorist Carl von Clausewitz wrote that in reality, one uses, “no greater force, and setting himself no greater military aim, than would be sufficient for the achievement of his political purpose.” State actors, thus far, have opted to limit cyberattacks in size and scope pursuant to specific political objectives when choosing to target information for accomplishing desired outcomes. This limiting occurs because as warfare approaches its unlimited form in cyberspace, computer network attacks increasingly affect the physical domain in areas where societies have become reliant upon IT systems for everyday functions. Many government and corporate network servers host data from industrial control systems (ICS) or supervisory control and data acquisition (SCADA) systems that control power generation, utilities, and virtually all other public services. Broader attacks on an adversary’s networks consequently affect the populations supported by these systems, so that the impacts of an attack go beyond simply denying an opponent the ability to communicate through digital networks.

At some point, a threshold exists where it becomes more practical for states to utilize other means to directly target the physical assets of an adversary rather than through information systems. Unlimited cyberattacks on infrastructure would come close to replicating warfare in its total form, with the goal of fully disarming an opponent of its means to generate resistance, so states become more willing to expend resources and effort towards accomplishing their objectives. In this case, cyber power decreases in utility relative to the use of physical munitions (i.e. bullets and bombs) as the scale of warfare increases, mainly due to the lower probability of producing enduring effects in cyberspace. As such, the targeting and attacking of an opponent’s digital communication networks tends to occur in a more limited fashion because alternative levers of state power provide more reliable solutions as warfare nears its absolute form. In other words, cyberspace offers much more value to states seeking to accomplish limited political objectives, rather than for waging total war against an adversary.

To understand how actors attack computer systems and networks to accomplish limited objectives during war, one must first identify what states actually seek to accomplish in cyberspace. Just as the prominent British naval historian Julian Corbett explains that command of the sea does not entail “the conquest of water territory,” states do not use information technology for the purpose of conquering the computer systems and supporting infrastructure that comprise an adversary’s information network. Furthermore, cyberattacks do not occur in isolation from the broader context of war, nor do they need to result in the total destruction of the enemy’s capabilities to successfully accomplish political objectives. Rather, the tactical objective in any environment is to exploit the activity that takes place within it – in this case, the communication of information across a series of interconnected digital networks – in a way that provides a relative advantage in war. Once the enemy’s communication of information is exploited, and an advantage achieved, states can then use force to accomplish otherwise unattainable political objectives.

Achieving such an advantage requires targeting the key functions and assets in cyberspace that enable states to accomplish political objectives. Italian General Giulio Douhet, an airpower theorist, describes command of the air as, “the ability to fly against an enemy so as to injure him, while he has been deprived of the power to do likewise.” Whereas airpower theorists propose targeting airfields alongside destroying airplanes as ways to deny an adversary access to the air, a similar concept prevails with cyber power. To deny an opponent the ability to utilize cyberspace for its own purposes, states can either attack information directly or target the means by which the enemy communicates its information. Once an actor achieves uncontested use of cyberspace, it can subsequently control or manipulate information for its own limited purposes, particularly by preventing the escalation of war toward its total form.

More specifically, the ability to communicate information while preventing an adversary from doing so has a limiting effect on warfare for three reasons. Primarily, access to information through networked communications systems provides a decisive advantage to military forces by allowing for “analyses and synthesis across a variety of domains” that enables rapid and informed decision-making at all echelons. The greater a decision advantage one military force has over another, the less costly military action becomes. Secondly, the ubiquity of networked information technologies creates an alternative way for actors to affect targets that would otherwise be politically, geographically, or normatively infeasible to target with physical munitions. Finally, actors can mask their activities in cyberspace, which makes attribution difficult. This added layer of ambiguity enables face-saving measures by opponents, who can opt to not respond to attacks overtly without necessarily appearing weak.

In essence, cyber power has become particularly useful for states as a tool for preventing conflict escalation, as an opponent’s ability to respond to attacks becomes constrained when denied access to communication networks. Societies’ dependence on information technology and resulting vulnerability to computer network attacks continues to increase, indicating that interstate violence may become much more prevalent in the near term if aggressors can use cyberattacks to decrease the likelihood of escalation by an adversary.


Endnotes:

[1] von Clausewitz, C. (1976). On War. (M. Howard, & P. Paret, Trans.) Princeton: Princeton University Press.

[2] United States Computer Emergency Readiness Team. (2018, March 15). Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. (United States Department of Homeland Security) Retrieved May 1, 2018, from https://www.us-cert.gov/ncas/alerts/TA18-074A

[3] Fischer, E. A. (2016, August 12). Cybersecurity Issues and Challenges: In Brief. Retrieved May 1, 2018, from https://fas.org/sgp/crs/misc/R43831.pdf

[4] Corbett, J. S. (2005, February 16). Some Principles of Maritime Strategy. (S. Shell, & K. Edkins, Eds.) Retrieved May 2, 2018, from The Project Gutenberg: http://www.gutenberg.org/ebooks/15076

[5] Ibid.

[6] Douhet, G. (1942). The Command of the Air. (D. Ferrari, Trans.) New York: Coward-McCann.

[7] Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press.

[8] Boyd, J. R. (2010, August). The Essence of Winning and Losing. (C. Richards, & C. Spinney, Eds.) Atlanta.

Aggression Assessment Papers Cyberspace Emerging Technology Eric Altamura

Assessment of the Search for Security in the Eastern Baltic

Jeremiah Cushman is a senior analyst at Military Periscope, where he writes about weapons.  He holds an M.A. in European and Eurasian Studies from the George Washington University.  He can be found on Twitter @jdcushman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Search for Security in the Eastern Baltic

Date Originally Written:  July 15, 2017.

Date Originally Published:  August 14, 2017.

Summary:  For much of the last 800 years, the natives of the Baltic States and Finland were ruled by others, whether Baltic Germans, Swedes, Russians or Hitler’s Germany.  History shows these countries that, to retain independence, they must be willing and able to fight for it, and possibly join collective security organizations.

Text:  Lithuania existed as an independent nation prior to 1918, in contrast to Estonia, Latvia and Finland.  In 1385, the Grand Duchy of Lithuania joined with the Kingdom of Poland via a dynastic marriage.  Although not specifically made for security purposes, the result was a great Central European power that eventually spread from the Baltic to the Black Sea.  This was, however, an unstable union, with divergent interests between the Lithuanian and Polish halves.  (Poland ultimately became the dominant power.)  Efforts were made to strengthen the union, culminating with the establishment of the Polish-Lithuanian Commonwealth in 1569.  The commonwealth eventually succumbed to its own weaknesses and the machinations of neighboring powers, Austria, Prussia and Russia, which divided it among themselves in the partitions of 1772, 1790 and 1795.  If ultimately unsuccessful, the commonwealth nevertheless provided security for the Lithuanians for centuries.

Upon gaining independence in 1918, the Baltic States struggled to navigate their security environment.  For the most part, they sought refuge in the collective security arrangements of the League of Nations.  Different threat perceptions, a territorial dispute over Vilnius between Lithuania and Poland, and the maneuvers of the Germans and Soviets hindered trilateral defense efforts.  A proposed four-way alliance among Estonia, Finland, Latvia and Poland foundered on Finnish reservations.  Helsinki elected to focus on a Scandinavian orientation.  Estonia and Latvia managed to conclude a defense alliance in 1923.

The Soviet Union saw Baltic cooperation as a threat and worked to undermine it.  The Baltic States concluded their own treaty of cooperation and friendship in 1934, although little came from it.  Non-aggression pacts signed with Moscow and Berlin came to nought and the three nations were occupied by Soviet forces in 1940 and annexed.  While Finland fought for its independence and survived World War II, Baltic failures to prepare, and the overwhelming strength of the Soviet and German states that opposed them, ended their initial experiment with independence.

Finland was able to maintain its independence during and after World War II, fighting the Soviet Union twice in the Winter War of 1939-1940 and the Continuation War of 1941-1944.  The Finnish state was saved, though it lost the Karelia region to the Soviets.  Viewing Moscow as a direct threat, Helsinki allied with the Nazi regime as Berlin prepared its own attack on the Soviet Union.  The Finnish government took pains to portray its own war as separate from that of Germany’s, without much success.

At the end of the war, Finland was left with an 830-mile border with Russia and a difficult position between its preferred partners in the democratic West and the Soviet Union.  Moscow was able to dictate terms as the Finnish war effort collapsed in 1944 along with the fortunes of its German allies.  In 1948, the Finnish government concluded a mutual assistance treaty with Moscow, including military obligations to come to the Soviet Union’s assistance in the event of an attack by Germany or its allies, or an attack from Finnish territory.  The goal was to maintain independence and reduce the chance of conflict in Northern Europe.

By resolving Moscow’s security concerns, Finland was able to pursue trade with Western countries and play an active role in détente during the 1970s.  The Nordic country benefited from trade with its eastern neighbor, while holding off Soviet efforts to tighten military relations.  While this “Finlandization” policy ensured the nation’s sovereignty during the Cold War, it came at a cost to Finland’s freedom of action.  Habits formed over those decades continue to influence national policy, including hindering those who might prefer new security arrangements in light of Russia’s increasingly aggressive posture.

The Baltic States declared their independence from the Soviet Union in 1990.  Remembering the lessons of 1940, they immediately focused on trilateral cooperation and integration with European security organizations to secure their freedom.  Their security bodies focused on developing modern, capable forces on the Western model with the object of joining the North Atlantic Treaty Organization (NATO) and the European Union (EU).  These goals were achieved in 2004.  NATO’s Article 5 pledge that an attack on one is an attack on all is seen as the cornerstone of Baltic security.  Accordingly, all three countries recognize the United States as their most important security partner.  The Baltic States also pursue regional cooperation with their Nordic neighbors.  These multilateral cooperation efforts have, in some cases, detracted from trilateral endeavors. Small countries have limited resources.

Accession to NATO and the EU, which has its own security mechanisms, seemed to resolve the security concerns of the Baltic States.  However, the election of Donald Trump in the U.S. has led to uncertainty about the wisdom of relying on Washington.  Trump has threatened to assist only those NATO members who meet the alliance’s defense spending goals and his commitment to Article 5 appears uncertain, despite efforts from other administration officials to reinforce American support for the Baltic allies.  Trump’s apparent ties to Russia cause additional discomfort in the region.

Officially, the governments of Estonia, Latvia and Lithuania emphasize the continued importance of security ties with the U.S. and a belief that Trump will live up to Washington’s NATO commitments should it become necessary.  So far, U.S. and NATO activities in the Baltic region have been unchanged from the previous administration, with multinational battalion task groups active in all three countries.

As for Finland, it has eschewed its former relationship with Moscow in favor of closer security relations with NATO and the U.S., and strengthened ties with neighboring Sweden.  Helsinki still sees a strong national defense capability as vital for its security.  NATO membership remains politically challenging, although Finland potentially benefits from E.U. mutual assistance mechanisms.

The lessons of history for this region are simple.  To retain independence, one must first be willing and able to fight for it.  States as small as Estonia, Latvia and Lithuania must additionally find allies to bolster their own defense efforts.  If one cannot be a great power, joining a great power organization, such as NATO, is the next best thing.


Endnotes:

[1]  Kirby, David. (1998). Northern Europe In The Early Modern Period: The Baltic World 1492-1772. New York, NY: Addison Wesley Longman.

[2]  Kirby, David. (1998). The Baltic World 1772-1993: Europe’s Northern Periphery in an Age of Change. New York, NY: Addison Wesley Longman.

[3]  Kasekamp, Andres. (2010). A History of the Baltic States. New York, NY: Palgrave Macmillan.

[4]  Plakans, Andrejs. (2011). A Concise History of the Baltic States. New York, NY: Cambridge University Press.

Aggression Assessment Papers Baltics Estonia European Union Finland Jeremiah Cushman Latvia Lithuania North Atlantic Treaty Organization Russia Trump (U.S. President) United States