There is much talk about the militarization of cyber space with Russians, Chinese and Americans accusing each other of triggering a cyber "arms race." At the same time, policy makers in many countries are calling for "rules of the road" to regulate cyber conflict. However, due to the novelty of the threat and policy makers' inexperience with this rapidly changing new field, cyber diplomacy is rife with misunderstandings among major cyber nations. Take the example of the supposedly "militarization of cyberspace" by the United State -- an often heard cliché.
Ever since the establishment of Cyber Command in May 2010 to defend American military networks and attack other countries' systems, the U.S. military has dominated the discourse on cybersecurity in the United States. The Pentagon called cyberspace a "domain," and described cyber warfare as "the fifth domain of warfare after land, sea, air, and space." This characterization implies that cyberspace as a "domain" can be protected from intrusion, and offensive and defensive military strategies can be devised to protect this space.
Indeed, if one scans policy papers from leading institutions of higher military education in the United States, one often encounters concepts such as "first strike capabilities," "windows of vulnerability," and "cyber deterrence." A lot of this military thinking is derived from the debate surrounding nuclear strategy in the 1950s as confirmed by a former senior White House official: "In the 1950s to 1960s, civilians--many of them outside of the government--came up with a complex strategy for the use of nuclear weapons. This strategy was then debated publicly and later incorporated into national policy...Today, planning for cyberwar is at a similar stage." This implies that the United States military must lead in the field similar to the nuclear standoff during the Cold War.
The former commander of the Air Force's Cyberspace Command, Lt. Gen. Robert J. "Bob" Elder, stated his priorities in cyberspace: "First, we must control the domain," he said. "This is about operational freedom of action. We have to be able to protect the electromagnetic spectrum we use to communicate with each other, for example. We have to protect the electronics that we use to establish that domain, and we have to protect those networks. Conversely, we want to have the capability to deny those things to our adversaries."
The descriptions above can be widely misinterpreted and create inherent tensions as visible, for example, in U.S.-China relations. Since the publication of the 1999 book Unrestricted Warfare, by two colonels of the People's Liberation Army, cyber warfare has been one of the most talked about subjects in U.S.-China military relations, largely triggered by the United States, which at the beginning mistakenly took this publication to be official Chinese military doctrine. The wake-up calls for the Chinese military were the First Gulf War and the NATO Kosovo Air Campaign. Both illustrated the overwhelming conventional superiority of the United States and the efficiency of its revolution in military affairs (RMA) based on smart weapons and network centric warfare. To counter the United States' dominance in a future conflict over Taiwan, China started its own RMA and began to develop cyber weapons ('asymmetric, disruptive technologies') to exploit weak spots in U.S. defenses and critical infrastructure. China's main idea was to degrade an enemies' information flow -- the 'center of gravity' of network centric warfare as practiced by the United States.
According to both Russian and Chinese analysts recently interviewed, the specific mission of the Cyber Command to dominate cyberspace and guarantee freedom of maneuver narrows the diplomatic leverage of the United States, reduces the ability to foster partnerships in other cybersecurity areas, and 'radicalizes' the response of countries such as China and Russia in countering the perceived technological superiority of the United States. The doctrine of dominance sent shock waves through China and other countries such as Russia, accelerating the "arms race in cyberspace," and hastened the emphasis on developing additional asymmetric capabilities within the Chinese and Russian militaries.
What is important to realize, however, is that the United States' doctrine of cyber dominance does only apply in military situations and in times of war -- a fact misunderstood in both Russia and China. The military doctrine of cyber dominance is comparable to the NATO doctrine of air supremacy, which NATO defines as "that degree of air superiority wherein the opposing air force is incapable of effective interference." Both the Chinese and Russian Air Force have similar doctrines but it has not been a subject of diplomatic debate for a good two decades, since they are naturally applicable only in times of war.
The recently published "International Strategy for Cyberspace - Prosperity, Security, and Openness in a Networked World" outlines the United States' defensive objective: "The United States will, along with other nations, encourage responsible behavior and oppose those who would seek to disrupt networks and systems, dissuading and deterring malicious actors and reserving the right to defend these vital national assets as necessary and appropriate."
This responsible behavior, however, cannot be achieved when there are some inherent misunderstandings among nations, who each accuse each other of attempting to dominate a space while at the same time seeking closer cooperation in protecting it. The United States, China, and Russia rather sooner than later have to start a military to military dialogue to reduce some of these misunderstandings. While the novelty of cyber diplomacy makes it often difficult to decouple military from diplomatic activities, there has to be an increased effort to collaborate; otherwise, conversations around cyberwarfare will remain "lost in translation."
Franz-Stefan Gady is an associate at the EastWest Institute. The EastWest Institute is hosting the Second Worldwide Cybersecurity Summit on June 1 - 2, 2011 in London. Be part of the Solution: Register Now
Follow Franz-Stefan Gady on Twitter: www.twitter.com/hoanssolo