Journal of Homeland Security and Emergency Management Leaving Deterrence Behind : War-Fighting and National Cybersecurity

How should the United States organize itself to deal with the threat of cyberaggression? The initial effort of the Obama Administration, released in May 2009, focuses attention on the organizational and bureaucratic decisionmaking infrastructure necessary for cybersecurity and provides some general guidelines about goals and means. It does not address the more fundamental question of strategic approach. This article suggests the time has come to resolve the core issue of what organizing principle should drive national cybersecurity policy. Specifically, we argue that an offense-defense strategic framework must be adopted to think about and organize against cyber threats in the 21st century. This means that the United States must set aside deterrence–-the dominant strategic anchor of the past fifty-plus years-–and adopt a full war-fighting posture. What has worked in the nuclear realm, and remains relevant for homeland security against WMD terrorism, will not work in cyberspace.

[1]  Kelli Kinley What Constitutes an Act of War in Cyberspace , 2012 .

[2]  Richard K. Betts,et al.  Conflict After the Cold War: Arguments on Causes of War and Peace , 2012 .

[3]  Richard J. Harknett,et al.  The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen , 2009 .

[4]  Bryan Krekel,et al.  Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation , 2009 .

[5]  Martin C. Libicki Cyberdeterrence and Cyberwar , 2009 .

[6]  Greg Weaver,et al.  Waging Deterrence in the Twenty-First Century , 2009 .

[7]  C. Wilson Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress , 2008 .

[8]  C. Wilson,et al.  Terrorist Capabilities for Cyberattack: Overview and Policy Issues , 2005 .

[9]  Michael E. Brown,et al.  Offense, Defense, and War , 2004 .

[10]  K. Adams,et al.  Attack and Conquer? International Anarchy and the Offense-Defense-Deterrence Balance , 2004, International Security.

[11]  Thomas T. Land Offense And Defense , 2004 .

[12]  Richard J. Harknett Integrated security: A strategic response to anonymity and the problem of the few , 2003 .

[13]  Keir A. Lieber Grasping the Technological Peace 73 , 2003 .

[14]  Stephen D. Biddle Rebuilding the Foundations of Offense-Defense Theory , 2001, The Journal of Politics.

[15]  Gregory J. Rattray Strategic Warfare in Cyberspace , 2001 .

[16]  Thomas G. Mahnken,et al.  Causes of War: Power and the Roots of Conflict , 2000 .

[17]  Keir A. Lieber Grasping the Technological Peace: The Offense-Defense Balance and International Security , 2000, International Security.

[18]  William Yurcik Information Warfare Survivability: Is the Best Defense a Good Offense? , 2000 .

[19]  Charles L. Glaser,et al.  What Is the Offense-Defense Balance and How Can We Measure It? , 1998, International Security.

[20]  Richard J. Harknett The Logic of Conventional Deterrence and the End of the Cold War , 1994 .

[21]  John Arquilla,et al.  Cyberwar is coming , 1993 .

[22]  Jack S. Levy,et al.  The Offensive/Defensive Balance of Military Technology: A Theoretical and Historical Analysis , 1984 .

[23]  Scott L. Feld,et al.  Deterrence , 1978 .

[24]  R. Jervis Cooperation under the Security Dilemma , 1978, World Politics.

[25]  George H. Quester,et al.  Offense and Defense in the International System , 1977 .