Betz, David J

 1. TITLE AND BIBLIOGRAPHICAL INFO: ''Cyberspace and the State: Toward a Strategy for Cyber-Power. ''Temple Place, London: The International Institute for Strategic Studies, 2011.



 2. AUTHOR : David J. Betz and Tim Stevens           3. AUTHOR’S BACKGROUND: Betz: Dept of War

                                                                         Studies Professor at Kings College, Head of             Insurgency                                                                                  Research Group. Stevens: Betz’s PhD student



 4. CONTEXT :   Intended as a strategic primer on the new reality of the Information Age, of which cyberspace is a preeminent part , for those who would elect to intervene in it or mold it to their advantage. (acknowledgments)



 5. SCOPE: Cyberspace and Cyberpower. Discussion of the unique characteristics of “cyber” while illuminating the persistent nature of war.



      EVIDENCE: US and UK strategic guidance, historical events



 6. CENTRAL PROPOSITIONS:

 ·          “Cyberspace is not all that new.”  (13)

 o     The basis of a cyber strategy is still the reciprocal interaction of human choice in conflict.

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-list:l2level1lfo3"><span style="font-size:10.0pt; font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"> ·         Balancing internet freedom and national security is difficult

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l2level2lfo3"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     “It is difficult to see how any government can achieve both of these objectives simultaneously, without substantially altering the ways in which cyberspace functions.” (71)

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-list:l2level1lfo3"><span style="font-size:10.0pt; font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"> ·         “The problem for future war horizon-scanners is not so much the degree to which they correctly apprehend emerging technology, it is the degree to which they understand the human motivations behind the usages of that technology” (124).

<p class="MsoListParagraphCxSpMiddle" style="margin-left:0in;mso-add-space:auto; line-height:normal">''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:0in;mso-add-space:auto; line-height:normal">''' Notes: '''

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-list:l0level1lfo2"><span style="font-size:10.0pt; font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"> ·         ''' POWER: '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     ''' Power does not exist without the relationship through which it is manifest (42) '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Power=the production, in and through social relations, of effects on actors that shape their capacity to control their fate (42). Power is best conceived as a family of related factors (52).''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Cyberpower can simply be thought of as the manifestation of power in cyberspace rather than a new or different from of power (44)

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.5in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level3lfo2"><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"> §    4 forms of cyberpower: Compulsory, Institutional, Structural, Productive

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Unfortunately, the web does allow for an asymmetric advantage for an otherwise weaker actor.''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Internet sometimes allows for the aggregate of peoples’ worst tendencies more than it does their best ones (34)''' '''

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-list:l0level1lfo2"><span style="font-size:10.0pt; font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"> ·          SOVEREIGNTY:  (a concept wholly derived from politics)''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     The state is far from decline as some have suggested is the case in the age of globalization and technological advance (55).

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Pragmatism wins over ideology…need to re-evaluate the relationship between the state and sovereignty (74)

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.5in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level3lfo2"><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"> §    For the state to thrive, it will have to accept that pure sovereignty in cyberspace may have to be delegated or at least relaxed.

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     4 categories: Domestic, Interdependence, International Legal, Westphalian (57)

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     3 forms of control utilized by states to filter access for their citizens: (66)

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.5in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level3lfo2"><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"> §    1st Gen: Deny users access to specific online resources through manipulation of Internet traffic

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.5in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level3lfo2"><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"> §    2nd Gen: Adopt a multi-faceted legal, normative and technical approach in order to allow states to deny access to information on an ‘as-and-when’ basis

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.5in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level3lfo2"><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"> §    3rd Gen: aim not at physical control but at effecting cognitive change through the use of information and propaganda campaigns

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-list:l0level1lfo2"><span style="font-size:10.0pt; font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol"> ·         ''' WAR: '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     As CvC suggested: the character of war is highly mutable, but the true nature of war changes very slowly if at all (76)''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     War has not gone away as some have suggested. Instead, we have not seen war as fought during WWII ''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Forming a strategy for cyberspace cannot begin on a false premise about the nature of war (81).''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     We cannot escape the ramifications of new technologies (83)''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Similarities between AP advocates and Cyber advocates (85). Cyber advocates can learn several lessons from the AP story (87).''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.5in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level3lfo2"><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"> §    Both were concerned w/ restoring decisiveness to war and see in the new technology a potential means for doing so (84).''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     War, to be a rational tool of po9licy, must be clear about what that policy is (95).''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o      Instead of the term “cyberwar”, the authors suggest “cyber-skirmish”  (97)''' '''

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-pagination:none;mso-list:l0level1lfo2"><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-font-family:Symbol"> ·         ''' DOMINION: '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Cyberspace has the potential to alter the longstanding configuration of the commons, because of the key difference b/w it and other domains…the death of distance (102).''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     The main effect of cyberspace on the present international order is subversive: it changes the relative relationship of power among states indirectly (reshapes relations b/w state and non-state actors in ways that enable the latter to perform acts of ‘resistance’ in places and on a scale which it never could have done otherwise) (emboldens non-state actors)''' '''

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l0level2lfo2"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o      “Cyberspace is like the chimera: what you make of it depends on the way that you are looking at it and why.”  (116, 106) (where you stand is based on where you sit)''' '''

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-pagination:none;mso-list:l0level1lfo2"><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-font-family:Symbol"> ·         Martin Libicki’s model for cyberspace: physical (hardware)-syntactic (software and protocols)-semantic

<p class="MsoListParagraphCxSpMiddle" style="line-height:normal;mso-pagination: none"> (information exchanged), (37)

<p class="MsoListParagraphCxSpMiddle" style="line-height:normal;mso-pagination: none">

<p class="MsoListParagraphCxSpMiddle" style="margin-left:0in;mso-add-space:auto; line-height:normal;mso-pagination:none">''' Themes: '''

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-pagination:none;mso-list:l1level1lfo1"><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-font-family:Symbol"> ·         Stories of “cyber doom” are not useful, and neither is the all-inclusive use of the term “cyberwar”

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l1level2lfo1"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     The scare tactics make it necessary to bring policy makers back to reality.

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l1level2lfo1"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     The  debate over cyberwar conflates activities in cyberspace and elevates them to the level of war…problematic  as it distracts us from the actual strategic context of the day (81)

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.5in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l1level3lfo1"><span style="font-size:10.0pt;font-family:Wingdings;mso-fareast-font-family:Wingdings; mso-bidi-font-family:Wingdings"> §    Today: “a world of confrontations and conflicts rather than one of war and peace”

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-pagination:none;mso-list:l1level1lfo1"><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-font-family:Symbol"> ·         Cyberspace is not independent…simply another instrument of state power

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l1level2lfo1"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Cyberspace cannot be separated from the rest of the ‘real’ world (41)

<p class="MsoListParagraphCxSpMiddle" style="margin-left:1.0in;mso-add-space: auto;text-indent:-.25in;line-height:normal;mso-pagination:none;mso-list:l1level2lfo1"><span style="font-size:10.0pt;font-family:"CourierNew";mso-fareast-font-family:"CourierNew"; mso-bidi-font-family:"CourierNew""> o     Does not, as airpower did not, obviate the other military capabilities, or change the objective nature of war (96).

<p class="MsoListParagraphCxSpMiddle" style="text-indent:-.25in;line-height:normal; mso-pagination:none;mso-list:l1level1lfo1"><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol; mso-bidi-font-family:Symbol"> ·         There are other uses of cyberspace “beyond kinetic destruction or terrorism that can enhance the power of state and non-state actors.” (CTO Vision book review)

<p class="MsoListParagraphCxSpLast" style="margin-left:0in;mso-add-space:auto; line-height:normal;mso-pagination:none">''' '''