Small Wars Journal

Would da Vinci Support the Pentagon’s New Cyber Strategy?

Thu, 01/16/2020 - 8:03am

Would da Vinci Support the Pentagon’s New Cyber Strategy?

Jessica ‘Zhanna’ Malekos Smith

1

Leonardo da Vinci’s notebook on Art and Life(link is external) holds many fascinating observations on painting, human nature, and warfare. But based on these insights, how might da Vinci advise the Defense Department about its new strategy for cyberspace operations? 

First, the Cyber Strategy Summary(link is external) describes defend forward as “confronting threats before they reach U.S. networks” with two core elements(link is external): the strategic persistent engagement of adversaries and working with allies and partners to promote security.

Da Vinci would probably call this military strategy a misnomer. 

Using a hunting example, he invites us to imagine(link is external) how inefficient an archer’s reach would be if they constantly held a forward-leaning posture. Noting that if “anyone wishes to make a bow carry a very long way, he should draw himself up on one foot, raising the other so far from it as to create the necessary balance for his body, which is thrown forward on the first foot and he should not leave his arm fully extended.” Archery tips aside, the sharpest contemporary critiques of defend forward are that it is “a vague concept(link is external)” and “promises to do too much all the time and doesn’t articulate priorities(link is external)[.]” 

Instead, a concept that more accurately conveys U.S. Cyber Command’s strategy and is derived from this Italian polymath’s writings is defense impetus.

Defense Impetus?      

Impetus is a type of power that a mover impresses upon a moveable thing(link is external)

Da Vinci explains “[e]very impression tends to permanence or desires permanence;” such as the impression of sound when the clapper strikes the bell, or the visual impression made by the sun’s glare on one’s eyes. Similarly here, defense impetus is a power impressed by CYBERCOM’s 133(link is external) cyber mission force teams(link is external) upon the moveable target, or adversary. 

To understand impetus in theory and in practice, let’s examine some of CYBERCOM’s recent known cyberspace operations:

In 2018 CYBERCOM exercised defense impetus by conducting an operation to disrupt the Internet access of the Russian troll factory(link is external) (the Internet Research Agency), on the day of the midterm election.  The operation’s objective, or desired impression, was to deter foreign interference in the U.S.’ elections.  In 2019 CYBERCOM exercised defense impetus by disabling a critical database(link is external) used by Iran’s paramilitary forces. Here, the desired impression was to curtail Iranian aggression after Iran launched a surface-to-air missile(link is external) on an unmanned U.S. Navy MQ-4 surveillance aircraft and waged mine attacks against tankers in the Strait of Hormuz(link is external)

Focusing on deterrence, the congressionally established Cyberspace Solarium Commission is exploring “looking at a strategy built around deterrence through punishment(link is external)” and will publish its formal report in several months.  Defense impetus can help the Commission develop its strategy by exploring patterns of how the impression of each cyber operation, whether it’s by a state or non-state actor, tends to permanence, or desires permanence.

Another facet of defense impetus is collaboration. One example is CYBERCOM’s ongoing information sharing and training efforts with Montenegro, a NATO ally, to promote election s(link is external)ecurity in 2020. According to CYBERCOM’s executive director, David Luber, the agency is “seeing some very interesting malware and other activities when we conduct some of those defend-forward missions(link is external) . . . . Then we take that information and we share that broadly with industry and the rest of the government.”  Collectively, CYBERCOM’s operations —impressions — are designed to protect the U.S. and its allies, and signal strength and deterrence to competitors. Defense impetus therefore best embodies the Pentagon’s objectives to compete and deter aggressive actions in cyberspace, (link is external)and General Paul M. Nakasone’s vision(link is external) of strategic persistent engagement and collaboration.

According to Brandon Valeriano, a senior advisor to the Solarium Commission, a major shortcoming of “defend forward” is that it unfortunately lacks a “"clear conception of metrics(link is external)" to measure the success of the new strategy.”

So, What Should the Metrics Be?

Drawing inspiration from da Vinci’s observations on force, power, and movement – elements in which “all the works of mortals have their beginning and their end(link is external)” – this article suggests four cyberspace operations principles.  The following principles are intended to augment CYBERCOM’s strategy as it flexes its new authorities(link is external) to take action outside Defense Department information networks.  Below, resources refers to money, human capital, and materials, and force refers to the operational scope, or offensive parameters of cyberspace operations(link is external)

Defense Impetus Principles

  • Principle 1:  If you double the resources and not the force in the cyberspace operation, it becomes necessary to double the time to execute it.
  • Principle 2:  If you double the resources and not the force, nor the time to execute, it becomes necessary to halve the mission objectives of the cyberspace operation.
  • Principle 3:  If you double the resources and not the mission objectives of the cyberspace operation, nor the time to execute, it becomes necessary to double the force.
  • Principle 4:  If you halve the resources and not the mission objectives of the cyberspace operation, nor the time to execute, then the force is halved.

This concept can serve as a useful starting point to help CYBERCOM measure(link is external) the progress of its strategy — but only if it’s willing to consider new paradigms.  For as da Vinci encourages us, “it is by testing that we discern fine gold(link is external).”

About the Author(s)

J. ‘Zhanna’ Malekos Smith, J.D., served as a captain in the U.S. Air Force Judge Advocate General’s Corps and is a delegate in Stanford University’s U.S.-Russia Forum. She received a B.A. from Wellesley College, an M.A. and A.K.C. from King’s College London, Department of War Studies, and J.D. from the University of California, Davis School of Law. She has held fellowships with the Madeleine K. Albright Institute for Global Affairs, the Belfer Center’s Cyber Security Project at the Harvard Kennedy School, and Duke Law School as the Everett Cyber Scholar.

Comments

AnnaTors

Thu, 11/26/2020 - 6:59am

Thanks to you, a very informative cybersecurity article. I am collecting materials to prepare an essay on cybersecurity for children and cyberbullying. Now I want to use data and from here in my work. Check out similar studies here https://writingbros.com/essay-examples/cyber-bullying/(link is external) but this isn't about strategy, it's about cyberbullying. But they also compare theses for clearer narration and foresight of the example. In general, I believe that the strategy should be justified not only strategically, but also financially. And, of course, it's clear how important strategy is, but pay attention to how time and money will be spent. Read also another point of view here https://www.cisco.com/c/en/us/products/security/cybersecurity-strategies.html(link is external) There are other areas in our country that require such attention.