Wired Fast and Thinking Slow:
Cyber Technology and the US Army
A Monograph
by
Major Johanna Thompson Wynne
US Army
School of Advanced Military Studies
United States Army Command and General Staff College
Fort Leavenworth, Kansas
2016
Approved for public release; distribution is unlimited
Form Approved
OMB No. 0704-0188
REPORT DOCUMENTATION PAGE
The public reporting burd en for this collection of inform ation is estimated to average 1 hour per response. including the time for reviewing instructions. searching exi sting data sources. gathering and
maintaining the data needed . and co mpleting and rev1ew 1ng the collection of 1nforma t1 on. Send co mments regarding this burden estim ate or any other aspect o fth1s collection of information . 1nclud1ng
suggesti ons for reducing the burden, to the Department of De fense, Executive Service Directorate (0704 -0 188) Respo ndents should be aware that notw1thstand1ng any other prov1s1on of law, no
person sha ll be sub;ect to any penalty for falling to comply with a collection of 1nform at1on if 1t does not display a currently valid OMB co ntrol number
PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ORGANIZATION.
1. REPORT DATE (DD-MM-YYYY)
12. REPORT TYPE
10-05-20 16
3. DATES COVERED (From - To)
nJN 2015 - MAY 2016
Monograph
Sa. CONTRACT NUMBER
4. TITLE AND SUBTITLE
Wired Fast and Thinking Slow : Cyber Technology and the US Army
Sb. GRANT NUMBER
Sc. PROGRAM ELEMENT NUMBER
Sd. PROJECT NUMBER
6. AUTHOR(S)
MAJ Johanna Thompson Wynne
Se. TASK NUMBER
Sf. WORK UNIT NUMBER
8. PERFORMING ORGANIZATION
REPORT NUMBER
7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)
U.S. Army Command and General Staff College
ATTN: ATZL-SWD-GD
Fort Leavenworth, KS 66027-2301
10. SPONSOR/MONITOR'S ACRONYM(S)
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES)
School of Advanced Military Studies, Advanced Military Studies Program
11. SPONSOR/MONITOR'S REPORT
NUMBER(S)
12. DISTRIBUTION/AVAILABILITY STATEMENT
Approved for Public Release; Distribution is Unlimited
13. SUPPLEMENTARY NOTES
14. ABSTRACT
Understanding the impacts of cyber technologies on war and warfare is increasingly critical for a planner's ability to design and execute operational
art. The purpose of this monograph is to examine how the US Army describes cyberspace and the effects that cyber technologies have on military
strategy and operational planning writ large. The work specifically examines how cyberspace increases the speed and quantity of social transactions
over space with effects on military and social forces. Secondly it addresses how the Army recognizes the impact of cyber technology on identity
formation and virtual identity of both friendly and enemy actors. The author concludes that society's and the Army's increasing dependence and
activity in cyberspace marks a change in warfare that the Army has been slow to accept. Inadequate coverage of the implications of cyberspace
throughout doctrine combined with insufficient emphasis in professional military education and training may limit the Army' s potential in all levels
of war.
1S. SUBJECT TERMS
Cyber, Cyberspace, Technology, Operational Art, Cyber Planning, Domain, Virtual Identity, Space, Time, Strategy
16. SECURITY CLASSIFICATION OF:
a. REPORT b. ABSTRACT c. THIS PAGE
(U)
(U)
(U)
17. LIMITATION OF
ABSTRACT
(U)
18. NUMBER 19a. NAME OF RESPONSIBLE PERSON
OF
MAJ Johanna Thompson Wynne
PAGES
19b. TELEPHONE NUMBER (Include area code)
56
Reset
Standard Form 298 (Rev. 8/98)
Prescribed by ANSI Std Z39 18
Adobe Professional 7 .0
Monograph Approval Page
Name of Candidate:
Major Johanna Thompson Wynne
Monograph Title:
Wired Fast and Thinking Slow: Cyber Technology and the US
Army
Approved by:
__________________________________, Monograph Director
Alice Butler-Smith, PhD
__________________________________, Seminar Leader
Christopher M. McGowan, COL
___________________________________, Director, School of Advanced Military Studies
Henry A. Arnold III, COL
Accepted this 10th day of May 2016 by:
___________________________________, Director, Graduate Degree Programs
Robert F. Baumann, PhD
The opinions and conclusions expressed herein are those of the student author and do not
necessarily represent the views of the U.S. Army Command and General Staff College or any
other government agency.(References to this study should include the foregoing statement.)
Fair use determination or copyright permission has been obtained for the inclusion of pictures,
maps, graphics, and any other works incorporated into this manuscript. A work of the United
States Government is not subject to copyright, however further publication or sale of copyrighted
images is not permissible.
ii
Abstract
Wired Fast and Thinking Slow: Cyber Technology and the US Army, by MAJ Johanna Wynne,
56 pages.
Understanding the impacts of cyber technologies on war and warfare is increasingly critical for a
planner’s ability to design and execute operational art. The purpose of this monograph is to
examine how the US Army describes cyberspace and the effects that cyber technologies have on
military strategy and operational planning writ large. The work specifically examines how
cyberspace increases the speed and quantity of social transactions over space with effects on
military and social forces. Secondly it addresses how the Army recognizes the impact of cyber
technology on identity formation and virtual identity of both friendly and enemy actors. The
author concludes that society’s and the Army’s increasing dependence and activity in cyberspace
marks a change in warfare that the Army has been slow to accept. Inadequate coverage of the
implications of cyberspace throughout doctrine combined with insufficient emphasis in
professional military education and training may limit the Army’s potential in all levels of war.
iii
Contents
Acknowledgments……………………………………………………………………………….....v
Acronyms………………………………………………………………………………………….vi
Figures…………………………………………………………………………………………....vii
Introduction………………………………………………………………………………...………1
Method………………………...…………………………………………………..........………3
Review of Terms and Literature…………………………………………………..........………4
The Importance of the Outcome …………………….………………………….…..…...........11
A Critical Illustration…………………………………….………………………...……….....16
Cyberspace and the Operational Artist…………………………………………………………...19
The First Condition of Adequacy: Accounting for Time and Space in the Contemporary
Operating Environment………………...............................................................................…...20
The Fixing of Space in War.………………………………...…………………...……………26
Time and Decision Time…………………….…...………………………………...………….28
Virtual Space and the Future of War……..……………………………………...……………29
Broadening the Army’s Conception of Cyberspace……………………......……...………….35
The Second Condition of Adequacy: Emphasis on Techno-Social Relations………........…...38
Army Understanding of Real and Virtual Identity: What’s in a Name? ……..………….……40
The Digital Immigrant and Digital Native Divide……………………………………………44
Artificial Intelligence and the Army………………………………………………………......45
Conclusion………………………………………………...……………………………………...46
Bibliography……………………………………………………………………………………...50
iv
Acknowledgments
This monograph is largely inspired by my fourteen year old protégé Jasmine Del Cid
Reyes. I am indebted to Dr. Gene Rochlin for our correspondence throughout this journey and the
Combined Arms Resource Library for carrying his and many other valuable works. A special
thanks to Dr. Alice Butler-Smith for her initial and lasting belief in me and for her impact on the
School of Advanced Military Studies. I am grateful for my seminar leader, Colonel McGowan for
his thoughtful guidance and patience throughout the course of the year. To Drew and Laura
Brooks, thank you for being the best neighbors. The greatest recognition goes to my husband
Brian, son John, my parents Linda and John, and my sister Heather – you make all things possible
and worthwhile. I love you.
v
Acronyms
ADRP
Army Defense Reference Publication
CJTF
Combined Joint Task Force
CO
Cyber Operations
DARPA
Defense Advanced Research Project Agency
DOD
Department of Defense
GPS
Global Positioning System
IS
Islamic State
MRI
Magnetic Response Imaging
NSDD
National Security Decision Directive
OCO
Offensive Cyber Operations
OIR
Operation Inherent Resolve
PTSD
Post Traumatic Stress Disorder
VR
Virtual Reality
vi
Figures
1
If the Titanic Sank In 2015 ............................................................................................24
vii
Introduction
I AM a copper wire slung in the air,
Slim against the sun I make not even a clear line of
shadow.
Night and day I keep singing--humming and thrumming:
It is love and war and money; it is the fighting
and the tears, the work and want,
Death and laughter of men and women passing through
me, carrier of your speech,
In the rain and the wet dripping, in the dawn and the
shine drying,
A copper wire.
— Carl Sandberg, Under A Telephone Pole
Throughout recorded history, individuals and societies have had a fascination and a complex
relationship with technology. Carl Sandberg’s poem, “Under a Telephone Pole,” is one such example
from the twentieth century. The work personifies a telephone wire as being aware of its disparate uses—
coursing with conversations that vary in substance 1— a tangible wire, essential for modern
communication, considered ubiquitous, and taken for granted. Sandberg’s poem illustrates the paradoxical
nature of technology.
Prior to the electric telegraph, the speed of almost all information flow was limited to the speed at
which a human or animal could travel. 2 In 1858, the first transatlantic messages traveled between Europe
and North America via underwater telegraph cables. This cable signaled the reduction of information
transmission time from days to hours in the transatlantic space. 3 Along with other technological advances
in power and transportation, the transatlantic telegraph freed communication from the constraints of space
1
Carl Sandburg, Chicago Poems (New York: Henry Holt and Company, 1916), 171.
2
“1830s-1860s: The Telegraph,” Imagining the Internet, A History and a Forecast, Elon
University, accessed 30 March 2016, http://www.elon.edu/e-web/predictions/150/1830.xhtml.
3
Barney Warf, Time- Space Compression (New York: Routledge, 2008), 168
1
and time and occasioned a revolution in the global economy and social order. For many, the increased
scale of economic, diplomatic, and social interdependencies seemed to presage the inevitability of world
peace. 4 Instead, two world wars, a cold war, and scores of regional and local wars marked this unrealized
vision.
Though underwater cables similar to those used by the first transatlantic telegraph endure as a
critical element in the twenty-first century global communications infrastructure, wireless cyber
technology now connects people, things, and systems virtually and instantaneously from and to locations
across the globe. The pace of life continues to increase as perceptions of physical distances and time
contract in a world simultaneously enlarged and shrunk by technology. Exponentially rapid technological
progress now inspires utopian hopes similar to those generated by the telegraph, yet war perseveres as part
of human experience. 5
The role of cyber technology in society has changed profoundly over the last decades. Not only is
it being used for a wide array of applications, it is also at the same time embedded in our environment,
often present largely without user awareness. With a rapidity unprecedented in previous revolutions in
technology, cyber technology has become increasingly involved in decisions that have moral impact, such
as war. The push for faster and enhanced methods of communication, information processing, and
simulated activity continues to define and shape global action and conflict. Despite the worldwide use and
pervasiveness of cyber technology, there is little consensus—within the US Army or broader society—on
how cyber technology should be understood and conceptualized. Is it a means to democratize or way to
4
Paul Reynolds, “The Man Who Predicted the Great War,” History Today 20, no. 2 (2013),
accessed 24 March 2016, http://www.historytoday.com/paul-reynolds/man-who-predicted-great-war.
Financier Jan Bloch outlined his vision to Britain’s military establishment in 1901. Earlier in 1899 at the
Hague, he called for arbitration to replace warfare as a way to settle disputes.
5
Dex Torrike-Barton, “How the internet is uniting the world,” A Medium Corporation, October
14, 2015, accessed, October 14, 2015, https://medium.com/@dextbarton/how-the-internet-is-uniting-the
world-36408b457692#.7uzz7i54n.
2
control? Does it diffuse or consolidate power? Do people define the technology or does the technology
define people? To each of these questions, the answer is yes.
The Army’s initial attempts to create and clarify doctrine related to cyberspace operations, to
establish a cyber branch, and to develop elite cyber warriors are positive steps, but may effectively limit
the organization’s ability to address the broader significance and strategic potential of cyberspace. 6
Military discourse reveals little examination of political theory, social theory, and other foundational
frameworks of relevance for exploring this most transformative time in human history, even though. the
nature of cyberspace, the full potential of cyber operations, and the long-term societal effects are selfevidently of military concern.
The Method for Demonstrating the Need
A proof of inadequacy must always start with certain assumptions about what is adequate in the
first place. This work proposes that notions of cyberspace as related to the development of military
strategy are observationally and descriptively adequate when they include, at a minimum, the following
two assertions: 7
Condition of Adequacy #1: This requires in-depth treatment of the variables of time and space as
related to the contemporary operating environment. Conceptualizations of cyberspace must meet this
condition because cyber technology facilitates the increased speed and quantity of social transactions over
space, thus compressing cognitive understandings of time and space with effects on military, political,
cultural, economic, and ideological forces. 8
6
Victor Delacruz, “Enabling Army Commanders to More Effectively Integrate Cyberspace
Operations,” Cyber Compendium: Cyberspace Professional Continuing Education Course
Papers (Wright-Patterson Air Force Base, OH, 2015): 110-118.
7
For further discussion of the concepts of observational, descriptive, and explanatory adequacy in
scientific theory, see Noam Chomsky, Syntactic Structures (The Hague: Mouton, 1957).
8
Barney Warf, Time- Space Compression (New York: Routledge, 2008), 168.
3
Condition of Adequacy #2: This requires proper weighting of the relationship between cyber
technology and human behavior from both friendly and adversarial perspectives. It must meet this
condition because cyber technology continues to alter how individuals and societies construct reality and
expressions of life today and in the future.
The purpose of this monograph is to determine whether the US Army’s current construction of
cyberspace in informing military strategy meets these conditions of adequacy. The paper uses two
research questions to demonstrate its intent:
The first question considers how the Army accounts for the fundamental concepts of time and
space, especially as related to cyberspace and the execution of operational art. The second question asks
how the Army recognizes the role that cyberspace plays in identity formation and the social constructions
of reality of both friendly and enemy actors.
The work has four sections. The first section begins with the introduction and method and
concludes with key terms in the research and a review of definitive literature. Section two illustrates the
complexity of cyberspace for the military practitioner and provides analysis of how cyber technology
compresses cognitive understandings of time and space with effects on the contemporary operating
environment and operational art. The third section examines the significance for both friendly and enemy
actors of cyber technology’s effects on the construction of identity and virtual identities. The fourth and
final section concludes the work by highlighting the implications of conceptualizing cyberspace according
to these conditions of adequacy and makes explicit recommendations to broaden strategic thinking into
existing core Army doctrine and force structures. Potential lines of further inquiry of these and related
topics are included throughout the work.
Review of Terms and Literature
4
Given the enormity of the literature dealing with cyber technology, sufficiency rather than
relevance guides this section of the monograph. 9 The research draws on literature from several disciplines
in its exploration of the concepts related to time, space and identity. The review reaches sufficiency when
it finds descriptive evidence or analysis that persuasively addresses how the Army conceptualizes
cyberspace in time and space and how cyber technologies affect individuals and society. Four prominent
themes from military, historical, social science, and technology perspectives emerge to help answer the
research questions posed.
Key Terms
Numerous definitions have emerged to describe computer networking and related phenomena
over the past few decades. For example, in the years since the development of the first cyber networks in
the late nineteen sixties, the US Department of Defense has issued at least twelve different definitions of
what it thinks of as cyberspace. 10 Furthermore, terms used to describe cyberspace are understood to mean
different things by different nations and organizations, despite their commonness in media, national and
international organizational policies and programs, and in everyday speech. 11
A generation ago, writer William Gibson first coined the term cyberspace in his science fiction
novel, Neuromancer. He combined the word cybernetics and space to describe his concept of cyberspace
as “a graphic representation of data abstracted from the banks of every computer in the human system.
9
In other words, sufficient to prove the point, not all that may be relevant.
10
P.W. Singer and Allan Friedman, Cybersecurity and CyberWar: What Everyone Needs to
Know (New York: Oxford University Press, 2014), 16.
11
“Cyber Definitions,” NATO Cooperative Defence Center of Excellence: Tallin, Estonia,
accessed March 10, 2016, https://ccdcoe.org/cyber-definitions.html.
5
Lines of light ranged in the nonspace of the mind, clusters and constellations of data.” 12 Joint and Army
doctrine currently hold that cyberspace is “a global domain within the information environment consisting
of the interdependent network of information technology infrastructures, including the Internet,
telecommunications networks, computer systems, and embedded processors and controllers.” 13 US
National Security experts have referred to cyberspace as “like a game of global chess, wherein the players
are unsure who else is playing, uncertain of friend or foe, unclear about the terrain and unconvinced the
players will act according to established rules and norms.” 14 These multiple definitions of cyberspace and
the elements that comprise them have done much to challenge the Army’s current comprehension and
operationalization of cyberspace.
It is useful then to address here how this monograph defines cyber and related key terms. The
word cyber is generally believed to originate from the Ancient Greek verb κυβερεω (kybereo), ”to steer,
to guide, to control.” 15 Today, it is often the prefix for a term or the modifier of a compound word. Its
inference usually relates to electronic information (data) processing, information technology, data
transfer, or information and computer systems. An example of its misapplication is in such guidance to
offensive cyber operations (OCO) planners within the conventional operations community as “I want to
12
Peter Singer, introduction to “Gen. Dempsey’s Remarks and Q&A on Cyber Security at the
Brookins Institute,” Joint Chiefs of Staff Speech Archive, July 27, 2013, accessed September 28, 2015,
http://www.jcs.mil/Media/Speeches/tabid/3890/Article/571864/gen-dempseys-remarks-and-qa-on-cyber
security-at-the-brookings-institute.aspx and William Gibson, Neuromancer (New York: Berkley
Publishing Group, 1989), 128.
13
Joint Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated
Terms. Washington, DC: Government Printing Office, 2011; Field Manual (FM) 3-38, Cyber
Electromagnetic Activities (Washington, DC: Government Printing Office, 2014), 3-3.
14
Frank L.Turner, “The Army in Cyberspace,” National Security Watch 14-1, Institute of Land
Warfare, May 5, 2014, accessed March 16, 2016, http://www.ausa.org/publications/ilw/Digital
Publications/Documents/nsw14-1/files/1.html. The analogy was collectively developed at the Information
Environment Advanced Analysis Course (IEAA) in October 2012.
15
“Cyber Definitions,” NATO Cooperative Defence Center of Excellence: Tallin, Estonia,
accessed March 10, 2016, https://ccdcoe.org/cyber-definitions.html.
6
do some cyber here.” 16 Only a complete term that includes cyber as a prefix or compound element can be
considered to possess operational meaning.
Cyberspace is composed of the information and connections in a virtual space that is in fact
grounded in the physical world of hardware and software and dependent on human design and
maintenance. Despite their common conflation, the Internet is a distinct, smaller subset of the larger
cyberspace. Although everything connected to the Internet connects to cyberspace, the converse is not
true. This is an important distinction as there are many interdependent networks of infrastructures that are
not part of the Internet that include air gapped systems and embedded processors and controllers in a
range of platforms from cars to satellites. 17 Cyber technology is defined as the physical computer
hardware and software systems that contribute to the creation of cyberspace. A cyber capability is a
device, computer program, or technique, including any combination of software, firmware, or hardware,
designed to create an effect in or through cyberspace.18 It is possible, that over time, these varied terms
may become more universally defined and understood. Until then, or in the case that does not occur, the
US Army must ensure its leaders across every branch work to understand the basic nuances of language
used to describe cyber technology and cyberspace.
Literature
The study of cyberspace as related to military doctrine and strategy is a developing field of
inquiry and, thus, requires research from multiple disciplines. The first theme of this monograph includes
16
Jason Bender, “The Cyberspace Operations Planner,” Small Wars Journal November 5, 2013.
Bender explains, “As funny as it might sound, this is not different than providing guidance “to do some
logistics during Phase 2,” or my intent is to reinforce the airborne insertion by doing some Air Force.”
17
The employment of the Stuxnet virus may be the most well-known state sponsored example of
an air gapped virus.
18
Field Manual (FM) 3-38, Cyber Electromagnetic Activities (Washington, DC: Government
Printing Office, 2014), 3-3.
7
the work of national security experts and military practitioners. Articles from the Center for Strategic &
International Studies, Joint Force Quarterly, the US Army War College Strategic Studies Institute,
Military Review, the Small Wars Journal and the Cyber Defense Review demonstrate that military
practitioners largely view cyber technology as a capability that is to be integrated into hierarchical,
industrial age paradigms of understanding. Many works address adversarial threats to physical networks
and critical infrastructure. The foci in over ten articles associated with the above publications were related
to frustrations in operationalizing cyberspace, and/or incorporating cyber operations more fluidly at the
operational and tactical level. A majority of the handful that did address limitations associated with the
lack of a comprehensive cyber strategy attributed this largely to the complex nature of the domain.
In his work Team of Teams, General Stanley McCrystal offers another perspective as he argues
that the military must break away from a tradition of “predictive hubris, perhaps bred by centuries of
success at applying Newtonian models to complicated problems,” which has led the organization to have
a false sense of control. 19 Dr. Timothy Thomas’s work, “Creating Cyber Strategists: Escaping the ‘DIME’
Mnemonic,” provides a strong case that cyber technologies are creating a new strategic paradigm that the
DOD needs to understand and adapt to. In pointed consideration of the unprecedented operational
challenges and opportunities that cyberspace presents he concludes that a cyber task force of many
experts is required to implications of the military and society’s increasing dependence on cyber
technologies. 20
The research within the military category also consults cyber specific US Joint and Army
doctrinal publications. The study of these point to the indication that the Army primarily thinks about
cyberspace in tactical terms, as a capability. The final military themed works include TRADOC Pamphlet
525-3-1, The Army Operating Concept (AOC), Army Defense Reference Publication (ADRP) 3-0,
19
Stanley McCrystal, Team of Teams: New Rules of Engagement for a Complex World (New
York: Penguin, 2015), 74.
20
Tim Thomas, “Creating Cyber Strategists: Escaping the ‘DIME,’” Mnemonic, Defence Studies
14, no. 4 (2014): 370, accessed January 5, 2016, http://dx.doi.org/10.1080 /14702436.2014.952522.
8
Unified Land Operations; ADRP 3-90, Offense and Defense, ADRP 5-0, The Operations Process, and
ADRP 6-0, Mission Command. Overall, this collection suggests that significant gaps exist in the Army’s
ability to appreciate and pursue the full scope of the cyber domain.
The next source of research considers the work of historians interested in using past experience to
search for reflections of things to come. Johnny Ryan’s A History of the Internet and the Digital Future
tells the story of the development of the internet from the 1950s to the present and informs this author’s
insight into technology’s conceptual compression of time and space. This work also provides examples of
how cyber technology affects the balances of power between the individual and the state. Martin van
Creveld’s Technology and War and Annie Jacobsen’s The Pentagon’s Brain: An Uncensored History of
DARPA, America’s Top Secret Military Research Agency provided additional historical windows on the
influence of previous technical innovations on society and war. Numerous historical references within
these and other historical works offered examples of how social effects of previous technologies are often
misestimated or underexplored.
The third category of research is comprised of technological futurists who attempt to project
future trends given their subject matter expertise and, in some cases, their personal desire to influence
world outcomes. 21 Prominent in this category is The New Digital Age by Google founders and executives
Eric Schmidt and Jared Cohen, who offer a prescriptive glimpse into how cyber technology is reshaping
warfare, the world, and the lives of people within it. Their work addresses their understanding of virtual
and physical identity today and in the future. They also provide specific examples of how virtual space
fails to parallel physical space perfectly, causing significant geopolitical confusion as related to the
defining of norms and in the attribution of hostile activities in cyberspace to state or nonstate actors.
Futurist P.W. Singer’s book Wired for War, his recent testimony to Congress, and several of his articles
21
Mark Zuckerberg of Facebook, Steve Jobs of Apple, Jeff Bezos of Amazon, and Elon Musk of
Tesla are a few such examples.
9
dealing with the unique relationship between current technological advances and the future of war are
also key references.
This collection of works indicates that the pace of technological change is likely to remain a
challenge for military planners in the years to come. They also demonstrate there are individuals with
command of and investment in powerful cyber technologies with which they will actively work to shape
the conditions of the future. Given that the future outcomes are in the long term unknowable and that the
effects of their activities are largely unpredictable, this paradox further demonstrates that a most broadly
grounded understanding of the potentials associated with cyber technology will provide the Army the best
chance of coping with uncertainties as they emerge.
Finally, the fourth group of research includes academic and think-tank works of social scientists
dealing with philosophy, anthropology, geography, international relations, and postmodern theory. These
works examine how previous technologies and cyber technologies transform human experience across
dimensions of temporality, spatiality, embodiment, and sociality. Prominent in this grouping is Trapped
in the Net: The Unanticipated Consequences of Computerization by Gene I. Rochlin, who examines how
the pervasive effects of cyber technology have become embedded in society creating many unforeseen
and increasingly unmanageable outcomes. Barney Warf’s work Time-Space Compression: Historical
Geographies provides a deep analysis of geography, time, and space and an understanding of pre-modern,
modern, and postmodern thought. Also within this fourth group of social scientists are works by Clay
Shirky and Sheryl Turkle, both of whom attempt to examine the social effects in societies that increase
their cyber technological dependencies.
International relations expert James Der Derian’s work Virtuous War: Mapping the military–
industrial-media entertainment network, Adam Segal’s, The Hacked World Order: How Nations Fight,
Trade, Maneuver and Manipulate in the Digital Age and Henry Kissinger’s World Order are the political
science works prominent in this category. Segal argues that cyber conflict demands that rules of
engagement be completely reworked and all the “old niceties of diplomacy be recast.” He also addresses
the fact that many of the critical resources of statecraft are now in the hands of giant technology
10
companies. 22 Kissinger argues: “Cyberspace challenges all historical experience.” 23 In his view, the
influence of cyber technology on strategy and decision making has eclipsed knowledge and wisdom. 24
These works demonstrate the unique and emergent role of cyberspace on and between actors and the
discomfort of many in dealing with the challenges of the domain. In sum, the study of cyber technology
through the lens of multi-disciplinary research is and will continue to be critical to understanding how and
why the Army understands cyberspace and its role in war.
The most significant limitation of this monograph is its range. The investigative questions
arguably constitute a mega-topic. Therefore, there is a vast amount of literature and research production
that the manuscript necessarily ignores, leaving the danger—indeed the likelihood— that within the
ignored material lies a critical nugget. The research scope itself is limiting because it is impossible to
provide coverage for the myriad existing cyberspace related opportunities and challenges.
Most military practitioners assert that war is an inherently human experience—a contest of wills,
one that technology alone will not change. 25 However, growing evidence provided by other disciplines
demonstrates cyber technology’s tremendous influence on social understanding and life meaning, which
at a minimum constitutes the potential for significant changes in the execution of warfare. It falls to the
Army to act deliberately and aggressively to understand the implications of these changes for every level
of war. As of 2016, no prevailing US military cyber theory exists. 26 Through an examination of cyber
22
Adam Segal, The Hacked World Order: How Nations Fight, Trade, Maneuver and Manipulate
in the Digital Age (New York: Public Affairs, 2016), 15.
23
Henry Kissinger, World Order (New York: Penguin Books), 344.
24
Ibid.
25
Army Doctrine Publication (ADP)1-01, Doctrine Primer (Washington, DC: Government
Printing Office, 2014).
26
Sean Charles and Gaines Kern, “Expanding Combat Power Through Military Cyber Power
Theory,” Joint Force Quarterly 79 (4th Quarter 2015), 88-94.
11
technology’s impact on modern conceptions of space, time, identity, and what this means for the military,
this work is meant to contribute to the construction of such a theory.
The Importance of the Outcome
The explosion in the use of cyberspace by individuals and communities across the globe both
supports and challenges the military’s comprehension of its operational environment in depth and scale.
Part of the gap in current understanding of the operational environment relates to how cyber technologies
were originally introduced to society. The Internet, for example, was designed to be open, transparent and
interoperable with security and identity management as secondary objectives in system design. 27 The
roots of cyber technical related opportunities and challenges were identified decades ago by prescient
innovators, academics, members of the Department of Defense and even the White House. For example,
as early as 1984, President Reagan, issued a confidential national security decision directive (NSDD),
NSDD-145, titled “National Policy on Telecommunications and Automated Information Systems
Security.” In it, the government noted computers as “highly susceptible to interception, unauthorized
electronic access, and related forms of technical exploitation” by hostile foreign intelligence agencies,
terrorist groups, and criminal elements. 28
Less than a decade later, in 1992, Department of Defense leaders issued DOD Directive
TS3600.1, which stated that the central role of information in modern warfare (a) requires that US forces
be prepared to operate in an information-hostile environment, (b) cautions not to plan to fight in ways that
require more bandwidth than can be protected, (c) instructs commanders to understand the impact to
27
Paul Rosenzweig, “Cyberwar is Here to Stay,” George Washington University, February 24,
2016, accessed March 6, 2016, http://www.governing.com/templates/ gov_print_article?id=370008341.
28
NSDD 145 National Policy on Telecommunications and Automated Information Systems
Security, September 17, 1984, National Archives Catalog, accessed January 15, 2016,
https://research.archives.gov/id/6879742.
12
forces under their command if they are denied the information they expect to have, and (d) to train in
ways that gain an appreciation of their degree of information dependency. 29
Despite identification of US vulnerabilities and adversarial opportunities associated with
computing well prior to dependency at the institutional level, the government did not emphasize security
in hardware, software, or network design; nor did it invest heavily in the study of the related social
implications of the nation’s increasing reliance on cyber technology. 30 In part, the explanation for this
lack of investment by the government and the military lies with the already mentioned rate at which cyber
technologies develop and deploy. Their extremely rapid pace routinely cuts short or prevents necessary
conversation regarding its effects on people, organizations, and society.
In 1997, Rochlin wrote, with great foresight,
The United States is now on the verge of being fully committed to a military that is fully
interconnected horizontally and vertically, without any real sense of what the increased
dependence on information management, data flows, real-time battle management, and other
manifestations of the computer transition will do either to organizational structure and behavior
or to performance in combat. 31
Again, this prescient assessment was made well before the military’s exponential increase in use and
capability of mobile devices and nearly a decade before the launching of successful and now pervasive
social media platforms. 32
In his fiscal 2017 budget proposal, President Barack Obama asked for nineteen billion dollars in
budgeting for cyber domain related activity across the US Government, a five billion dollar increase from
29
Ronald J. Knect, “Thoughts About Information Warfare,” in Cyberwar: Security, Strategy and
Conflict in the Information Age, eds. Alan D. Campen, Douglas H. Dearth, and R. Thomas Gooden
(Fairfax, VA: Armed Forces Communications and Electronics Association), 162.
30
Craig Timber, “Net of Insecurity: A Flaw in the Design,” The Washington Post, May 30, 2015,
accessed February 15, 2016, http://www.washingtonpost.com/sf/business/2015/05/30/ net-of-insecurity
part-1/.
31
Gene I. Rochlin, Trapped in the Net: The Unanticipated Consequences of Computerization
(Princeton, NJ: Princeton University Press, 1997), 191.
32
Examples include Facebook, Twitter, Snapchat, Instagram, Kik, WhatsApp.
13
the previous year. 33 The Department of Defense fights for funding and resources to achieve the
government’s priorities and, therefore, military leaders are increasingly expected to incorporate
cyberspace operations as part of planning at all levels of war. 34 It follows that Army leaders are obliged to
study and help evaluate the effects of cyber technology on both the military and society to be able to
provide informed assessments and options to senior Army leaders and political decision makers.
Futurists Alvin and Heidi Toffler have long argued that the way in which a society makes war
reflects the way it makes wealth. 35 Historian Peter Paret has advised that war should be studied in the
shifting reality in which it occurs. 36 Strategist and military practitioner Carl von Clausewitz declared,
We can thus only say that the aims a belligerent adopts, and the resources he employs, must be
governed by the particular characteristics of his own position; but they will also conform to the
spirit of the age and to its general character. Finally, they must always be governed by the general
conclusions to be drawn from the nature of war itself. 37
However, many, if not most, uniformed Army service members lack a fundamental understanding
of not just the technical aspects of cyberspace activity, but also the political, economic, and social
implications. As military decision makers are unprepared to answer questions associated with what
cyberspace is or how to conduct cyberspace operations, they are equally unable to assess the related
33
White House Fact Sheet: Cybersecurity National Action Plan https :// www.
whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan, accessed
March 11, 2016.
34
Department of Defense 2017 Budget Fact Sheet
http://www.defense.gov/Portals/1/features/2016/0216_budget/docs/2-4-16_Consolidated_
DoD_FY17_Budget_Fact_Sheet.pdf, accessed March 11, 2016.
35
Alvin Toffler and Heidi Toffler, War and Anti-War (New York: Warner Books, 1995), 57-80.
36
Peter Paret, The Cognitive Challenge of War (Princeton: Princeton University Press, 2009), 5.
37
Carl von Clausewitz, On War, Michael Howard and Peter Paret, eds. (Princeton: Princeton
University Press, 1984), 718.
14
questions of what should we do and perhaps, most important, why? 38 Increasingly prevalent conflict in
cyberspace and US society’s willful and perhaps unavoidable submission to surveillance by corporateowned cyber technologies forms the background against which the positivist organizational culture of the
Army continues to allow reductionist thinking and illusions of control, based on traditional models of
planning and prediction. 39 Yet the intensifying global interdependence on cyberspace bears on more than
the employment of Army’s cyber capabilities.
Cyberspace is hypercomplex and arguably beyond individual comprehension; it is infinite,
therefore, in the same practical sense as are the moves on a chessboard. 40 Priority efforts to improve
understanding of this contemporary reality verses limiting the study of their significance is a first step in
developing the real strategic potential of cyber technology in war. Broadening the conceptualization of
cyberspace beyond specific cyber operational capabilities performed by unique military occupational
specialties or branches within services will accelerate urgently needed understanding and emphasis across
the force. In order for the United States to achieve and maintain positions of strategic, operational, and
tactical advantage in warfighting and for it to exploit the shifting power dynamics writ large, there comes
a growing, critical need for Army soldiers across all branches to acquire and participate in a mindset that
apprehends the fullest reach and potentiality of cyberspace in affecting every military niche from the
recruitment and training of the force to the successful execution of operational art.
38
Martha S.H. VanDriel “Bridging the Planning Gap: Incorporating Cyberspace Into Operational
Planning,” Strategic Studies Institute, May 4, 2015, accessed December 10, 2015,
http://www.strategicstudiesinstitute.army.mil/index.cfm/articles/Bridging-the-planning-gap/2015/05/04.
39
McCrystal, 79; Rochlin, 191.
40
For purposes of familiarity the chess example is provided but the game of “Go” is even more
hypercomplex. In chess, the number of legal moves a player can make each turn is, on average, 35. In Go,
that number is 250.Even the computer that mastered Go could not solve it; it only outmaneuvered the
human champion it beat.
15
Living within such rapid change makes the mere recognition of the tremendous and unknown
consequences very difficult, but very important to achieve at a practical level. 41 Throughout much of its
history, US military strategy and doctrine has set a premium on trying to prepare for and anticipate the
dimly perceived outlines of the “shape-of-things-to-come” future. 42 Because of the accelerated
advancements in cyber technology, even what can dimly be perceived as an outline of an anticipated
future quickly recedes into unrecognizable white noise.
A minimum requirement in designing successful operations is an appreciation of war’s indistinct
nature against an overwhelming tendency to try to control it. The effect of bureaucratizing the domain of
strategic planning for using and protecting cyber technology – with self-perpetuation the primary goal of
every bureaucracy –is “largely ignored until made glaring clear by the un-strategic, ambiguous and often
non-substantive official documents laid out by and for them.” 43 While the nature of war may be timeless,
history demonstrates that its rules are not stagnant. Cyber technologies engender new questions, which
require new rules and new approaches. 44 The Army must now indeed play “catch up.”
A Critical Illustration
41
“US Cybercom and the NSA: A Strategic Look with ADM Michael S. Rogers,” Atlantic
Council Commanders Series Event, January 21, 2016, accessed on January 25, 2016,
http://www.atlanticcouncil.org/events/webcasts/us-cybercom-and-the-nsa-a-strategic-look-with-adm
michael-s-rogers.
42
The Shape of Things to Come is a work of science fiction by H. G. Wells, published in 1933,
which speculates on future events from 1933 until the year 2106. In the book, a world state is established
as the solution to humanity's problems.
43
Joan Johnson-Freese, “Domains, Budgets and Bureaucracies: Nukes, Space & Now — Cyber,”
Breaking Defense, October 24, 2014, accessed March 26, 2016,
http://breakingdefense.com/2014/10/domains-budgets-and-bureaucracies-nukes-space-now-cyber/
44
James Der Derian, “Virtuous War/Virtual Theory,” International Affairs (Royal Institute of
International Affairs 1944-), 76, No.4 (2000), 771-778, accessed February 29, 2016,
http://www.jstor.org/stable/2626459.
16
In February 2016, Facebook inventor and Chief Executive Officer, Mark Zuckerberg encouraged
the world to share on his social network “what they’re thinking about, what they’re experiencing on a
day-to-day basis, and the idea is that everyone has the power to share those things, then that makes the
world more understanding, it helps people stay closer to the people who they love, all these good things
that we value.” 45 Facebook is obviously not a physical country, but with 1.6 billion users, the service has
a "population" larger than the world’s most populous nations of China and India. While Facebook is
unable to tax or jail its inhabitants, its executives, programmers, and engineers do exercise a form of
governance over people’s online activities and identities. 46 Notably, for purposes of this work, Mr.
Zuckerberg’s message has evidently been interpreted and taken to heart by the Islamic State of Iraq and
the Levant (ISIL) or Daesh, despite recent efforts by the US and Coalition militaries and Silicon Valley to
exclude the group from Facebook’s family and from other popular social media platforms. 47
Daesh’s hacking unit, “Sons of the Caliphate Army,” recently boasted to the leadership of
Facebook, Twitter, and the US government of their more than 10,000 Facebook accounts, 150 Facebook
groups, and 5,000 Twitter accounts. 48 Though the terrorist organization’s numbers and capabilities are
likely inflated, truth rests in eye of the beholder, and the group’s enticing messages to the disenfranchised,
45
Barbara Kollmeyer, “Want World Peace? Share much more on Facebook, Mark Zuckerberg
says,” Marketwatch, February 26, 2016, , accessed March 16, 2016, http://www .marketwatch.com/
story/facebooks-mark-zuckerberg-touts-more-sharing-as-a-route-to-world-peace-2016-02-26.
46
Rebecca McKinnon, “Ruling Facebookistan: The world's largest social networking site has a
population nearly as large as China or India's. And the natives are getting restless,” Foreign Policy
Magazine, June 14, 2012, accessed March 25, 2016, http://foreignpolicy.com/2012/06/14/ ruling
facebookistan/.
47
Anthony Cuthbertson “US Military Launches Cyberattacks against ISIS,” Newsweek Magazine,
March 2, 2016, http://www.newsweek.com/us-military-launches-cyber-attacks-isis-432441accessed
March 2, 2016. ISIL would prefer to be referred as "Islamic State." The term Daesh is considered
uncomplimentary, but is used in addition to ISIL, however, by the US government.
48
William Watkinson, “ISIS threatens Facebook founder Mark Zuckerberg and Twitter CEO Jack
Dorsey in chilling video,” International Business Times, February 25,2016, accessed March 2, 2016,
http://www.ibtimes.co.uk/isis-threatens-facebook-founder-mark-zuckerberg-twitter-ceo-jack-dorsey
chilling-video-1545849.
17
disgruntled, and/or naïve around the world continue to resonate. 49 For Daesh and its domain of influence,
social media is as compelling as any captured American tank or rocket launcher. By providing immediate
access to other radicals, the social media space provides a virtual “echo chamber” in which the most
extreme ideas and suggestions receive the most encouragement and support—instantaneously. 50
Additionally, state adversaries of the United States—Russia, China, and Iran among others—are
leveraging the power and extension of cyberspace to shape domestic and international environments. 51
Many of these nations and non-state actors possess a multitude of outstanding mathematicians, software
writers, and media experts who, driven by intense ideologies or pure malice, are applying technical and
cognitive understanding of cyberspace across the range of strategic thought in support of their political
aims. 52 The fighting forces of many state and non-state actors are effectively navigating and exploiting
activity in cyberspace with a deep appreciation of its potential to reshape warfare. 53 As the operational
landscape continues to rapidly change, the US Army’s need to study implications that the future has
already challenged us with is a fateful imperative.
Beyond the recent Daesh example, consider the following hypotheticals – all of which are
plausible and represent a mere fraction of the possibilities associated with cyberspace. How would the
conventional Army respond to a known or unknown adversary of the United States that: (a) uses cyber
technology to disrupt early warning radar systems within a theatre of operations; (b) implants a worm into
49
Hisham Melhem, “Keeping Up With the Caliphate: An Islamic State for the Internet Age,”
Foreign Affairs 94, no. 6 (2015): 148-153.
50
Tim Stevens and Peter R. Neumann, “Countering Online Radicalisation: A Strategy for
Action,” Policy Report of the The International Centre For The Study of Radicalization and Political
Violence, March 16, 2009,12, https://cst.org.uk/docs/countering_online_radicalisation1.pdf.
51
Thomas, 381-382.
52
Thomas, 381.
53
Johan, Sighholm, “Non-State Actors in Cyberspace Operations,” Journal of Military Studies 4,
no.1 (2013): 32, accessed October 15, 2015, http://ojs.tsv.fi/index.php/jms/article/view/7609/pdf_1.
18
a DOD network that slowly corrupts GPS data on which military applications rely; (c) significantly
degrades or disrupts Army command and control systems at home and/or abroad; (d) manipulates the
social media feeds of US citizens to create fear and confusion across the country. Not only are the
answers complex and unclear, they are not thoughtfully discussed – if at all – as part of the Army’s
current professional military education curriculum.
While we cannot forecast the future, the actors who invest most in understanding the range of
potential impacts of cyber technology will be better suited to deal with the ambiguity and complexity of
everyday life and the conduct of war in the twenty-first century. Efforts to project power throughout the
world remains a top priority for the United States. As next-generation will-be nonstate terrorists and
nation state adversaries are growing up with increasing use of computers and smart phones, the advent of
attacks on critical infrastructure of magnitudes greater than those previously witnessed, are likely
approaching in addition to a range of other unforeseen challenges associated with dependency on cyber
technology. 54 In examining the rapid growth over time of the potential power and risks of cyber techno
social relations, the Army must prioritize and empower leaders at all levels of war to deepen its
understanding of cyberspace and its impacts on war and warfare. 55
Cyberspace and the Operational Artist
Thirty three years ago, in 1982, the year of the author’s birth, there was no global Internet.
Personal computers were in less than five percent of US households and they were slowly finding their
way into the personal offices of the most senior of Army leaders. There were no magnetic resonance
imaging (MRI) machines with which to assess the status of a soldier’s injury, no fiber optic
54
Sighholm, 32.
55
Walter Issacson, “The Future of the Human Spirit in a World of Machines,” May 14, 2015,
(video of guest speaker for Smithsonian Magazine’s The Future is Here Festival), accessed October 11,
2015, http://www.smithsonianmag.com/videos/category/future-is-here/future-is-here-festival-2015
walter-isaacson/#ooid=BwczB5dTrQqajwipRxK0OBxxcJxW0v7Z.
19
communications to send or receive operations orders instantaneously, no Global Positioning System
(GPS) navigation to put steel on target with precision, and no way to imagine harvesting food with
computer code. 56 Today, it would be difficult to find a soldier who did not have a mobile smart phone
computer in his or her pocket with the capability to perform or provide instant information related to
multiple tasks, impossible in 1982. To add additional context and perspective, Annie Jacobson writes,
“By June 29, 2007, when Apple rereleased its first-generation iPhone, Americans could now carry in their
pockets more technology than NASA had when it sent astronauts to the moon.” 57 In the nine years since,
the iPhone has more than followed Moore’s Law, allowing capabilities such as virtual reality and control
of internet-connected devices to be carried in one’s pocket. 58
One of the most challenging attributes of cyber technology is the speed of its evolution, its
distortion of time, and its obliteration of space, recreating the shock that the Western world must have
experienced with the first transatlantic telegraph messages, but on a near daily basis, often leaving
insufficient time to understand, conceptualize, or exploit its effects. 59 As these ideas apply to war
preparation, Army leaders and planners continually work to be fluent in the language of operational art,
defined in ADRP 3-0 as “the pursuit of strategic objectives, in whole or in part, through the arrangement
of tactical actions in time, space, and purpose.” 60 Army doctrine further states that this approach enables
commanders and staffs to use skill, knowledge, experience, and judgment to overcome the ambiguity and
56
Caleb Harper, “This Computer Will Grow Your Food in the Future,” TED Talks, accessed
January 20, 2016, http://www.ted.com/talks/caleb_harper_this_computer
_will_grow_your_food_in_the_future.
57
Annie Jacobson, The Pentagon’s Brain: An Uncensored History of DARPA, America’s TopSecret Military Research Agency (New York, NY: Little, Brown & Company, 2015), 412.
58
Jonny Evans, “Is the iPhone evolving faster than Moores Law?” Computerworld, August 27,
2010, accessed May 6, 2016, http://www.computerworld.com/article/2468951/mobile-apps/is-the-iphone
evolving-faster-than-moore-s-law-.html.
59
Rochlin, 205.
60
Army Doctrinal Reference Publication 3-0.
20
intricacies of a complex, ever changing, and uncertain operational environment to gain a more fluent
understanding of problems. 61As the core and essence of operational art, the dimensions of time and space
define the execution and narratives of all wars and are examined in the work’s next section.
The First Condition of Adequacy: Accounting for Time and Space in the Contemporary Operating
Environment
This section examines multi-disciplined arguments to address the first condition of adequacy and
the first research question, which asks how the fundamental concepts of time and space relate to
cyberspace and current executions of operational art. The work does so through discussion of concepts, of
and related, to space and time in military and societal contexts throughout history. It also presents
multiple vignettes that demonstrate how cyberspace challenges contemporary conceptions as compared to
representations within core Army doctrine. The author illustrates the value to be derived from increased
study of the fifth domain in preparing for the inherent ambiguity of war. 62
Philosophy is an academic discipline that attempts to understand reality and answer fundamental
questions about knowledge, life, morality, and human nature. Philosopher John Campbell, describing the
purpose of philosophy, asserts, “It helps break down, describe, and assesses moves we ordinarily make at
great speed…It then becomes evident that alternatives are possible.” 63 With that context in mind,
philosophy’s relationship to framing the operational environment and the execution operational art is of
value to the military planner.
61
Ibid.
62
Larry D. Welch, “Cyberspace – The Fifth Operational Domain,” Institute for Defense Analysis,
Research Notes (2011), accessed March 16, 2016, https://www.ida.org/~/media/Corporate/Files
/Publications /ResearchNotes /RN2011/2011%20 Cyberspace %20-%20The
%20Fifth%20Operational%20Domain.pdf.
63
Harvard University Department of Philosophy, accessed March 15, 2016,
http://philosophy.fas.harvard.edu/why-study-philosophy.
21
The philosophical concepts of time and space are fundamental to our understanding of human
existence. Increasingly, activity influenced by cyber technology is filtering into this understanding.
Unlike many other characteristics of the young cyber domain, the concepts of time and space have been
subjects of evaluation throughout recorded history. Newton's views on space and time dominated physics
and philosophical thought from the 17th Century until the advent of the theory of relativity in the
twentieth century. In the Newtonian perspective, space is distinct from body and time passes uniformly
without regard to whether anything happens in the world. 64
Einstein’s theory of special relativity, supported by a century of work by other physicists,
however, has shown that these notions may be subjective. In the age of relativity, wherein society
experiences time as Einstein imagined it, time contracts and expands relative to the velocities of
observers. The reality of nature according to quantum theory, therefore, is a realm of possibilities and
probabilities. 65 It follows that as vivid as our experience of the passage of time in space may appear to us,
this appearance may not reflect a fundamental aspect of reality. While the human design and use of cyber
technologies creates cyberspace, such space is not metric; most of the ready-made constructs, like the
topology of space or even the relativistic time– space continuum, are too imprecise for a true appreciation
for the complexity of the cyber domain. 66
In his work on International Conflict and Cyberspace Superiority: Theory and Practice, William
D. Bryant writes that cyberspace is difficult to grasp intuitively because we cannot experience it directly
with our senses. “We can stand on the land, dive into the water, and see aircraft or satellites with our
eyes.” The intimate connection between cyberspace and physical space also represents a fundamental
64
Staff of the Stanford Encyclopedia of Philosophy, “Newton’s Views on Space, Time and
Motion,” last modified August 22, 2011, accessed April 10, 2016, http://plato.stanford.edu
/entries/newton-stm/.
65
Everett Carl Dolman, Pure Strategy: Power and Principle in the Space and Information Age
(New York: Frank Cass, 2005), 98.
66
Adrian Mihalache, “The Cyber-Space Time Continuum: Meaning and Metaphor,” Information
Society 18, no 4 (2002): 293.
22
difference between them, as physical space depends on nothing at all. 67 We have to rely on screens or
representations to “see” it, but we are not directly experiencing cyberspace. According to Professor Chris
Demchak, “Cyberspace is hard to see physically in any case, but especially so now as it is deeply
embedded in normal societal functions.” 68
Yet despite our inability to see, touch, or measure all properties of the domain, cyberspace has
become fundamentally important to the everyday working of society and critical to all military operations.
As a result, the Army writ large is compelled to reconsider its understanding of time and space in in a
world in which cyber technology is deeply and totally embedded and in which the institution is now
dependent. To make the evolution in conceptualizing time and space feel more tangible for the reader, the
author now compares a work of contemporary art and two historic, globally recognized boating tragedies
that occurred approximately one hundred years apart.
Over one hundred years ago, the failure of the communications equipment aboard the Titanic,
significantly complicated rescue efforts. Although the Titanic’s owners boasted that the ship was the most
modern of its day, the radio system installed in the weeks before the disaster was already obsolete. 69 The
actual confirmation of the sinking took three days to reach land with the facts associated with the tragedy
unclear to the world until the survivors reached New York. 70 Figure 1 is the work of a French artist
satirically depicting contemporary society’s response if Titanic were to sink in 2015. Victims of the
67
Rebecca Bryant, “What Kind of Space is Cyberspace?” Minerva - An Internet Journal of
Philosophy 5, (2001), http://www.minerva.mic.ul.ie//vol5/cyberspace.html.
68
Chris C. Demchak, Wars of Disruption and Resilience: Cybered Conflict, Power, and National
Security (Athens, GA : University of Georgia Press, 2011), 176.
69
Bill Kovarik, “The Radio and The Titanic,” accessed April 5, 2016,
http://www.environmentalhistory.org/revcomm/features/radio-and-the-titanic/.
70
Ibid.
23
disaster are shown recording the tragedy as it unfolds, filming and taking selfies as they tread for their
lives. 71
Figure 1. If the Titanic sank in 2015.
Source: Cartoonist Pierre Brignaud, as part of the International Visual Arts Contest Just for
Laughs 2015, accessed January 15, 2016, http://www.oeilregional.com/opinion/2015/7/27/3e
place-pour-pierre-brignaud.html.
If his artistic visualization seems improbable, one only has to recall the tragic passing of 295
individuals aboard a South Korean Ferry in 2014. Video clips from recovered cell phones show teenagers
anxiously referring to the sinking ferry as their "Titanic." Not fully aware of the seriousness of their peril,
the teens wonder if they will make the news and discuss posting about the excitement on Facebook. 72
71
Pierre Brignaud, as part of the International Visual Arts Contest Just for Laughs 2015, accessed
January 15, 2016, http://www.oeilregional.com/opinion/2015/7/27/3e-place-pour-pierre-brignaud.html; A
selfie is defined by Websters as a digital image of oneself taken by oneself usually for posting on social
media.
72
Patrick Gerrity, “South Korea Ferry: Heartbreaking Video Shows Last Minutes Aboard,” May
1, 2014, accessed January 15, 2016, http://www.nbcnews.com/storyline/south-korea-ferry-disaster/south
korea-ferry-heartbreaking-video-shows-last-minutes-aboard-n94876.
24
If a similar event were to happen today, in 2016, Facebook, among other popular social media
platforms, now provides the potential for a tragedy such as this to be recorded live and broadcast globally
among millions of subscribers. 73 Throughout the range of life experiences on Earth, one culture’s totally
normal practice may be taboo in another and lead to potentially unprecedented cultural conflicts and
opportunities. While this opens positive and empowering new vistas for those with the ability and interest
in making these live connections, the potential broadcast of unsavory material is also real. Twitter’s
launch of their live streaming feature has captured a range of activity in real time from violence on the
streets of Jerusalem to video of the Paris attacks, literally as they unfolded.74
Cyber technology today allows for the transcendence of perceptions of fixed time and space.
Postmodern theorist Paul Virilio suggests in Pure War that all history was written in local space and
time. 75 For example, time and space for Titanic passengers in the North Atlantic’s icy waters was distinct
from the time and space of their family members residing in New York City or elsewhere. In the twentyfirst century, physical space includes all the potential of virtual space with history synchronized to world
time. Cyber technology as represented in this example of artwork and in consideration of instant
streaming social media applications allows for the synthesis of experiences in totally disparate physical
73
Julia Greenberg, “Facebook’s Plan to Stop People From Livestreaming Sex? You,” Wired
Magazine, April 8, 2016, accessed April 9, 2016, http://www.wired.com /2016/04/facebooks-plan-stop
people-livestreaming-sex/.
74
Posts praising and encouraging attacks on Israelis have emerged on YouTube and Facebook,
while Twitter hashtags including "Jerusalem Intifada" or "Intifada of the Knives" are gaining traction
among Palestinians. See “Is Palestinian-Israeli violence being driven by social media?” BBC News,
October 22, 2015, accessed January 15,2016, http://www.bbc.com /news/world-middle-east-34513693.
75
Paul Virilio and Sylvère Lotringer, Pure War: Twenty-Five Years Later, new and updated ed.
(Los Angeles: Semiotext(e), 2008), 205. For more on postmodernism, See Mary Jo Hatch’s Work on
Organization Theory. She explains that in postmodernist thinking, knowledge cannot be an accurate
account of truth because meaning cannot be fixed; there is no independent reality; there are no facts, only
interpretations; knowledge is a power play.
25
locations simultaneously. In its man-made and hyper-evolving configurations, cyberspace is at once
chronically instant, everywhere and nowhere. 76
This capability creates vast new challenges in leadership and operational planning. How does this
capability square, for example, with the presumption of innocence when a soldier is captured on film
committing a war crime? What are the implications for soldiers operating in environments where
increasing amounts of the population have access to this technology? Can acceptable constraints be
placed on soldiers to minimize the potential for misuse or does the prohibition of cyber technologies
decrease situational awareness and actually promote inappropriate activity in cyberspace?
The newness of this particular live streaming technology and the inability to forecast how the
capability will effect society or the military makes understanding its implications extremely difficult.
However, to ignore the potential opportunities and challenges for the operational artist is troublesome
given growing evidence that cyber technologies are affecting and perhaps transforming, how people
interact with each other, with data, and with their surroundings. Specific examples of the Army’s
inadequate conceptualization of cyberspace will be addressed in the paragraphs that follow.
Fixing of Space
In the study of war over many centuries, it is evident that social, political, and technological
factors have influenced, or in other words, “fixed” the determination of the space in which humans
conduct battle. For example, the centralized control of state resources in the early Modern period
contributed to the increased mobilization of manpower and enlarged the scope of the battlefield, while
setting conditions for the modern military profession. 77 In the nineteenth century, the increasing scale of
76
Virlio, 205.
77
John Andreas Olsen and Martin van Crevald, eds., “Conclusion,” in The Evolution of
Operational Art: From Napoleon to the Present (Oxford: Oxford University Press, 2011), 222-5; see also
Michael D. Kruause and R.Cody Phillips, eds., Historical Perspectives of the Operational Art
(Washington, DC: Center of Military History, 2007).
26
land warfare, necessitated by the increasing lethality of the battlefield, forced an increase the physical
space over which single engagements tended to occur.78 Military efforts began to require greater
synchronization in order to achieve strategic aims and drove the formation of tactical actions into
campaign frameworks. 79
Twenty-first century characterizations of space are markedly different from those of previous
eras. From the storage of information to social media platforms instantly amplifying global
communication, space in cyberspace includes algorithms of bits and bytes that have the ability to rapidly
replicate, iterate, and mutate. 80 Until recently, territorial boundaries were clear, with mountains, rivers,
and walls as physical barriers between adversaries. For example, during the Cold War, the United States
and the North Atlantic Treaty Organization (NATO) prepared for an allied response to a Soviet tank
invasion along the Fulda Gap between East and West Germany. In today’s environment, an adversarial
hacker in Russia has an entirely different destructive capability in his mind and in his arsenal. Simply
with access to a modem or smart phone, from anywhere in the world, the Russian government-sponsored
hacker has the potential to deploy cyber code programmed for deliberate effects against a networked
target anywhere advantageous to aim accomplishment. 81 Whether or when that adversary crossed an
international boundary to do so is difficult to determine, but, more importantly, it is irrelevant.
The current mindset of the Army predominately leaves the charge of understanding cyberspace to
those trained to serve in cyber or military intelligence positions. Both ADRP 3-0, Unified Land
Operations (ULO) and ADRP 3-90, Offense and Defense, fail to appropriately account for the influence
78
Olsen and van Crevald, 222-5.
79
Ibid.
80
A bit is the smallest unit of data and it can be coded as being “on” or “off” or, equivalently, as a
0 or a 1. One byte is the grouping of eight bits, e.g., 01011010. In the writing of code, one byte can store
one letter.
81
Segal, 12.
27
of cyber technologies on physical events in time and space. Despite the potential of cyberspace to
significantly affect all operations in physical realm, its potential impacts are insufficiently addressed. In
the Army’s doctrinal reference publication on offense and defense, the word “cyber” is found only four
times in its 124 pages of “guidance in the form of combat-tested concepts and ideas modified to exploit
Army and joint offensive and defensive tasks.” 82 Without appropriate emphasis in core doctrine, both in
the field and in the classroom, this cultural mind shift will be long in the making.
Time and Decision Time
Standardized time according to which most societies now function is an invention of the midnineteenth century. 83 It was invented for the efficiency of railroad operation and coincided with the
Industrial Revolution. Prior to the institutionalization of standard time, clocks were set using widely
varying local meridians or local mean times. 84 The timeless nature of the Internet has coincided with
globalization. As part of his overall argument that time is a more significant variable than space in
military planning, Robert Leonhard argues in Fighting by Minutes that the advantage of time has been
crucial to success at every level in war throughout history. He further suggests that, more than with any
other technological advance, changes in communications often mandate changes in tactical doctrine and
that the full incorporation of new technologies will change the perception of the very meaning of victory
or defeat in battle. 85
82
Army Doctrine Reference Publication (ADRP) 3-90, Offense and Defense (Washington, DC:
Government Printing Office, 2012).
83
D’erasmo, “Living on Internet Time.”
84
Ibid.
85
Robert R. Leonhard, Fighting by Minutes: Time and the Art of War (Westport, CT: Praeger
Publishers, 1994), 124.
28
In the period of the Napoleonic Wars, decisions that ultimately led to battle were measured in
days or weeks before the first shot was fired. 86 In World War One, commitment time to start the war was
measured in days, where commitment for decisions in combat was often measured in hours. Plans defined
the actions of actors and there was little way to alter the course of the battle.87 This trend in the
shortening of time horizons for decision making has continued, and the operational environment today is
“as short in decision time as it is high in information flows.” 88 As part of decisions made within or
influenced by cyber technology, the time from detection to commitment is measured in fractions of
seconds and, in some cases, is not made by a human.
The ability for events to happen nearly simultaneously within cyberspace has potential impacts in
physical space. Consider the instantaneous nature of the synchronized collection of millions of data points
from networked people and things with unlimited regard to physical location. An Internet-based platform
website is not merely a point in space, but a space-time synthesis which we refer to in locational
terms. 89 In April 2013, the Syrian Electronic Army (SEA) hacked the Twitter account of the Associated
Press by sending malware through a “phishing” email.90 The software allowed the hackers the ability to
send an erroneous tweet about bomb attacks in the White House and the injury of President Obama.
Within seconds, the Dow Jones Industrial Average plunged 146 points, near instantly erased 136 billion
dollars in market value. The market bounced back almost as quickly as it fell, but the event demonstrated
86
Rochlin, 204-205.
87
Ibid, 205. The innovation and mission command employed by the Germans ultimately broke
this cycle of cognitive distortion.
88
Ibid, 204.
89
Adrian Mihalache, “The Cyber-Space Time Continuum: Meaning and Metaphor,” Information
Society 18, no. 4 (2002): 293.
90
Nicole Perlroth, “No Joke: Syrians Hack the The Onion,” Bits (blog), New York Times, May 6,
2013, accessed March 24, 2016, http://bits.blogs.nytimes.com/2013/05/06/no-joke-syrians-hack-the
onion/?_r=0.
29
the speed at which complex systems could be destabilized and trust in information systems undermined at
all levels of governance. 91 All indications suggest that the increase of ubiquitous cyber technologies into
our lives will continue and every element of combat will be effected, thus, proper conception of the
operational environment must be made adequate as cyber technologies are far more significant than the
capabilities they bear.
Virtual Space and War
The compression of time and space that characterizes activity in cyberspace includes the
experiences of virtual reality (VR). VR is a fabricated experience made possible by cyber technologies
that humans perceive to be so real as to be indistinguishable from the “really real” world. 92 Crucially for
practical effects, once persons believe that a digital experience is real, their experiences in the physical
realm can be more easily manipulated.93 The US Army already employs virtual reality in a variety of
ways and has for over two decades. 94
In his experiences observing war simulations at the National Training Center, Professor Der
Derian writes, in Virtuous War, “New technologies of imitation and simulation as well as surveillance and
speed…collapsed the geographical distance, chronological duration, the gap itself between the reality and
virtuality of war.” 95 Arguably, since the Gulf War of 1991, this blurring of real war and virtual war has
91
Segal, 17.
92
Jim Blascovich and Jeremy Bailenson, Infinite Reality: Avatars, Eternal Life, New Worlds and
the Dawn of the Virtual Revolution (New York: HarperCollins, 2011),15.
93
Matthias Mccoy-Thompson, “Virtue and the Virtual—The Moral Implications of Virtual
Reality,” A Medium Corporation, February 29, 2016, accessed March 2, 2016, https://medium.com/the
metaverse-muse/virtue-and-the-virtual-7092af8b34ec#.lz405mmbt.
94
David L Neyland, Virtual Combat: A Guide to Distributed Interactive Simulation
(Mechanicsburg, PA: Stackpole Books, 1997), 1.
95
Der Derian, Virtuous War: Mapping the military-industrial-media-entertainment network 2nd
ed. (New York: Routledge, 2009), 11.
30
existed. The Gulf War, which was broadcast in near real time, distorted the conceptual division between
war and peace. Although Western viewers watching from the comfort of their living rooms saw “smart
bombs exploding, footage of disoriented Iraqi troops fleeing and being bombarded were largely hidden
from the television audience.” 96
The implications on future policy making or perceptions by society in seeing the military as an
inanimate tool whose work in some cases is indistinguishable from a video game is not emphasized in
Army policy, doctrine or as part of professional military education. 97 This is a concern given the ease in
which real and virtual training environments blend. Instead, Army simulations are highlighted for their
value in providing realistic simulated warfighting experiences and reducing overall training costs. 98
Unlike actual war or dangerous training environments on actual terra firma, the cost of mistake or
misfortune is not death. 99
In consideration of this blending, many questions emerge. Does the blurring of virtual and real
environments make decision making in the latter easier or more difficult over time? Even if virtual
practice does improve comfort with actions or decision-making, what does the increased reliance on this
disembodied experience signify for sustained long-term combat where an individual cannot simply power
off the experience? The Army must work to understand the implications of life within and between these
96
Chris H. Gray, Kuwait 1991: A Postmodern War, 1991, Chapter 1, accessed April 9, 2016,
http://www.guilford.com/excerpts/grayEX.html.
97
Daniel T. Zimmer, Programmatic Integration of Cyber into The Institutional Domain of Leader
Development, (Master of Military Art and Science Thesis, Command and General Staff College, 2015).
The author conducted a cross case comparative analysis to identify what cyber leader development the
Army’s Training and Doctrine Command is currently implementing within Army learning institutions.
The author compares that emerging program to historical cases of other leader development programs
created in response to technologies that changed how the Army developed its leaders in the past.
98
Jane Benson, “Virtual Reality Dome Impact of Real-Life Scenarios on Cognitive Abilities,”
The Official Homepage of the United States Army, February 24, 2016, accessed 7 March, 2016,
http://www.army.mil/article/162899/Virtual_reality_dome_impact_of_real_life_scenarios_on_cognitive_
abilities/.
99
Der Derian, 11.
31
two domains and the effects they have on each other. This requires thoughtful examination from both
strategic and cultural perspectives, especially given projections of the Army’s employment of virtual
reality training. 100 How cyber technologies alter space and time to create virtual space must be included
in describing current operational environments affected by cyberspace in order to be adequate.
The twentieth century philosopher Peter Lamborn Wilson (alias Haikem Bey,) proposed the
concept of hyperreal war which he suggests began in Vietnam with the involvement of television and
reached full exposure in the Gulf War of 1991. Bey distinguishes three types of war: ancient and largely
ceremonial ritual brawls, increasingly technical war that “occurred at least through World War II,” and
the third, hyperreal war, conducted in the forms of images and internalized in the mind. 101 He noted, “[I]n
the first the body is risked; in the second, the body is sacrificed; in the third the body has disappeared,”
suggesting that today, there are elements of war whereby, “[T]he body disappears as an object of vision,
although of course, the body itself does still exist and is being subjected to the same sacrifices that always
existed.” 102
In 2002, the joint military training event named “Millennium Challenge” blended reality and
video gaming to simulate the United States fighting a Middle Eastern adversary, presumably Saddam
Hussein’s Iraq. As chronicled in Malcolm Gladwell’s Blink, and acknowledged by the military in a final
752-page report on the event, the exercise was recalibrated after the red team’s success using asymmetric
tactics overwhelmed the blue force’s systems and planning. For example, the red team commander
destroyed sixteen American ships with a notional fusillade of cruise missiles and had the exercise been a
real war, “twenty thousand American servicemen and women would have been killed before their own
100
Jane Benson, “Virtual Reality Dome Impact.”
101
Jonathan Taylor, “The Emerging Geographies of Virtual Worlds,” Geographical Review 87,
no.2 (1997), 192-192, accessed February 29, 2016, http://www.jstor.org/stable/216004.
102
Ibid.
32
army had even fired a shot.” 103 Rather than requiring that the joint staff work through the complexity
posed by the red team as part of the scenario, the variables of the scenario were recalibrated to
accommodate the victory of the joint plan. 104 Perhaps of most concern, the simulation of success
supported the political aims of those wishing to turn their attention to the real Persian Gulf.
The 2015 DoD operational test and evaluation (DOT&E) report recently examined the role of
cyber activities as part of thirteen different training exercises. It concluded that most military exercises do
not appropriately account for cyberspace. Furthermore, the report stated that “exercise authorities seldom
permitted cyber attacks from being conducted to the full extent that an advanced adversary would likely
employ during conflict.” 105 In both cases, the military’s ability and tendency to want to control war and
manipulate virtual war conditions in the favor of the friendly force are largely unconstructive for the
purposes of military strategy.
Given the increase in use of these cyber technologies, one would think, at a minimum, that the
Army’s professional military education programs would provide multiple training opportunities for the
complexities and confusion of the real world to inform notional war scenarios. However, adjustments in
favor of friendly forces often remains the fact in planning and wargaming. 106 Although there are
indications to suggest value in simulations associated with the conduct of war, evidence, such as
suggested herein, also illustrates potential danger of leveraging these virtual spaces to support illusions of
103
Ibid, 110.
104
Malcom Gladwell, Blink: The Power of Thinking Without Thinking (New York: Little Brown
and Company, 2005), 99-145.
105
Jared Serbu, “Pentagon Report Says Most Military Exercises Don’t Account for Cyber
Threats,” Federal News Radio, February 2, 2016, accessed February 11, 2016, http:federalnewsradio.com
/defense/ 2016/02/pentagon-report-says-military-exercises-don’t-account-for-cyber-threats.
106
This is based in part on the authors experience while assigned at the Command and General
Staff College and School of Advanced Military Studies, and Army service on active duty since 2004.
33
control, both in breeding false senses of military confidence and as a way to manipulate public and
governmental support favoring a particular strategic political aim.
This virtual expression of war continues today. One example outside of the training realm is the
current social media coverage of coalition efforts against Daesh. The Combined Joint Task Force
Operation Inherent Resolve (CJTF-OIR) posts information on a US government-hosted website in
addition to a variety of social media platforms. 107 Among many brief written updates and articles, dozens
of videos, called “Strike Updates,” are posted that visually depict targeted destruction of assessed enemy
command and control elements and support infrastructure. 108 Research suggesting the relative impact of
CJTF-OIR’s social media campaign was not found. Numerous open source reports and opinions
regarding the efficacy of the air strike campaign however are plentiful. This supports the early suggestion
that much work remains to be achieved in understanding the social implications of cyberspace.
The incorporeal experience of unique interactions in and through cyberspace and its
fundamentally complex nature makes comprehension of it and all related ideas challenging. However,
these ideas and examples suggested here make apparent that beyond understanding cyber capabilities, the
Army must thoughtfully account for a new, global understanding of time and an appreciation of space in
its virtual forms as part of an adequate comprehension of cyberspace and the operational environment.
Broadening the Army’s Conception of Time, Space and Cyberspace
The military’s struggle against the inevitable chaos of environments and the spontaneous activity
that occurs within it is constant. 109 This idea is supported by the Department of Defense’s Third Offset
Strategy and the increasing investments by the Defense Advanced Research Project Agency (DARPA) in
107
Combined Joint Task Force, Combined Joint Task Force Operation Inherent Resolve (video),
accessed 7 April, 2015, http://www.inherentresolve.mil/Video.
108
Ibid.
109
Virlio, 96.
34
cyber technologies, specifically, deep learning computers, artificial intelligence, and virtual reality among
other potentially game changing technologies. 110
At present, very few of these new dimensional understandings are reflected in Army operations
doctrine outside of cyber and information operation-specific doctrinal references. The preponderance of
Army doctrine derives understanding of space and time largely from four-dimensional thinking based
upon Newtonian physics, linear dynamics, proportionality, synchronized processes, and reductionist
principles. 111 The Department of Defense elevated cyber to a domain status in 2011 to direct the treatment
of cyberspace as “an operational domain to organize, train, and equip so DOD can take full advantage of
cyberspace’s potential.” 112 In so doing, it “unintentionally forced the discussion away from the properties
of cyberspace and its impacts on society and modern warfare,” writes Martin C. Libicki in his essay,
“Cyberspace Is Not a Warfighting Domain. 113” Libicki contends that the effort to make cyberspace a fifth
domain misrepresents the problem thereby leading “strategists and operators to presumptions or
conclusions that are not derived from observation and experiences.” He further contends that by calling
cyberspace a domain, but a really different one, begs the question of what purpose is served by calling
cyberspace a domain to begin with. 114
110
Jacobson, 451; Bob Work, “The Third US Offset Strategy and its Implications for Partners and
Allies” Deputy Secretary of Defense Speech, January 28, 2015, accessed December 17, 2015,
http://www.defense.gov/News/Speeches/Speech-View/Article/606641/the-third-us-offset-strategy-and
its-implications-for-partners-and-allies.
111
Robert J. Bunker and Charles “Sid” Heal. Fifth Dimensional Operations: Space-Time-Cyber
Dimensionality in Conflict and War (Bloomington: iUniverse, 2014).
112
Department of Defense, Department of Defense Strategy for Operating in Cyberspace
(Washington, DC: Department of Defense, July 2011), 3.
113
Martin C. Libicki, “Cyberspace is Not a Warfighting Domain,” I/S: A Journal of Law and
Policy for the Information Society 8, no. 2 (2012): 325-340.
114
Ibid.
35
According to Army Unified Land Operations, time is assessed as an operational and mission
variable. As an operational variable, time describes the timing and duration of activities, events, or
conditions within an operational environment and also how such timing and duration are perceived by
various actors in the operational environment. 115 References to the cultural perception of time,
information offset, tactical exploitation of time and key dates, time periods, or events are listed within the
doctrine, but no context including references to cyberspace are provided. As a mission variable, doctrine
suggests that commanders assess time as the time available for planning, preparing, and executing tasks
and operations. This includes the time required to assemble, deploy, and maneuver units in relationship to
the enemy and conditions. 116 A majority of references to space is combined with the variable of time.
Time and space are primary components of operational art; with time as critical to the generation of
maneuver space. There is little, if any, specific recognition of the effects that cyber technologies bear on
time or space in this and other core doctrinal references.
The Army’s understanding of cyberspace is currently centered on the means and not on an
overarching strategic frame. 117 The task of the operational artist however, is to temporally integrate and
spatially distribute operations into one coherent whole.118 Clausewitz emphasized the purpose of war as
compelling the enemy to do your will. 119 Sun Tzu argued that the best form of warfare is the one in which
the enemy is seized without a fight. 120 The strategic application of cyberspace iterates the essence of both
115
Army Doctrine Reference Publication (ADRP) 5-0, The Operations Process (Washington,
DC: Government Printing Office, 2012).
116
Ibid.
117
Amit Sharma, “Cyber Wars: A Paradigm Shift from Means to Ends,” accessed April 6, 2016,
https://ccdcoe.org/publications/books/VirtualBattlefield.pdf.
118
James Schnieder, “The Loose Marble – and Origins of Operational Art,” Parameters, Vol 19,
(March 1989), 85-99.
119
Von Clausewitz, Book I, 75.
120
Sun Tzu, The Art of War, trans. Samuel B. Griffith (Oxford University Press, 1963).
36
of these revered military theorists. Cyberspace creates potentials to paralyze an enemy strategically to
achieve desired ends with little or no application of physical force. There have been many efforts to find
lines of similarity between more conventional armed conflicts and conflict in cyberspace, but these
arguments arguably degrade the strategic aspect of cyber warfare to mere tactical cyber offensive or
defensive activities.
Organization and reorganization of the Army in its development of cyber branch and in training
cyber warriors has done little to address basic questions about military strategy. Traditional models of
understanding have limited application in adequately describing cyberspace. Johnson-Freese argues that
once a weapon or a domain gets its own bureaucracy, inertia becomes an organizations guiding strategic
principle. 121 Army leaders across all branches must have the courage to challenge foundational
assumptions of time and space to gain a deep and broad understanding of the operational environment of
the twenty first century. To affect change, the perception of a majority of military practitioners and the
The way in which the Army views the significance of cyberspace must change. 122 The Army’s present
conception of time and space with effects on physical space currently fail to meet the first condition of
adequacy proposed at the start of this monograph. As a first step, core Army doctrine and professional
military education training opportunities must account for cyberspace in representations of the
contemporary operational environment or the Army will continually cede the strategic advantage to
adversaries who do.
The Second Condition of Adequacy: Emphasis on Techno-Social Relations
This section will cover three ideas related to the second condition of adequacy. The second
condition of adequacy requires proper weighting of the relationship between cyber technology and human
121
Johnson-Freese, “Domains, Budgets and Bureaucracies: Nukes, Space & Now – Cyber.”
122
Patricia Frost and Matthew Hutchison, “The Top 10 Questions for Commanders to Ask About
Cyber Security,” Small Wars Journal, December 8, 2015, accessed February 11, 2016,
http://smallwarsjournal.com/jrnl.art/top-10-questions-for-commanders-to-ask-about-cybersecurity.
37
behavior from both friendly and adversarial perspectives. First, how individuals form identities in
cyberspace and the effect these individual approaches have on power dynamics and the roles actors play
in physical space is explored. Second, generational differences as related to these concepts are addressed.
Finally, the author addresses some potential implications of the DoD’s Third Offset Strategy for the
Army. The overall intent of this section is to illustrate the importance of understanding emergent techno
social dynamics in the development of military strategy.
The effects of cyber technology on humans and on conflict have yet to be analyzed systematically
and programmatically in conventional military circles. The central role of humans in war has always been
an important, if not the most important, consideration in understanding conflict. Humans increasingly
interface with cyber technology. Understanding that the resulting system can provide an alternative
environment for human interaction is important to gain full appreciation of the risks and potential of
cyberspace in informing strategy. The Internet is a sufficient example of how many-to-many
communication tools perform as instruments to facilitate shifts in political power. 123 The ability to
communicate words, images, and sounds globally heightens the ability to persuade, inform, witness,
debate, and discuss on an unprecedented scale and at an unprecedented rate. Additionally, the power to
slander, propagandize, engage in misinformation and/or disinformation is no longer the sole province of
institutions or wealthy individuals who own or control traditional media sources. 124
As a result, today’s operational environment must factor the potential power of an individual or
group to shape the overall narrative of a conflict with potential effect on individual and group behavior at
123
Maura Conway, “Terrorism and IT: Cyberterrorism and Terrorist Organizations Online”
(paper presented at the International Studies Association (ISA) Annual International Convention,
Portland, Oregon, February 25 – March 1, 2003),1-2, accessed March 15, 2016,
http://www.doras.dcu.ie/502/2/terrorism_it_2003.doc.
124
Ibid., 2.
38
scale. 125 Similar to the challenges of conceptualizing time and space and virtual space recognized in
relation to the first condition of adequacy, the intangible nature of social identity makes it tempting to
minimize in significance. What follows are illustrations as to why understanding identity and the concept
of legitimate virtual identities in the twenty-first century matter to the Army practitioner in adequately
conceptualizing the potential of cyberspace.
Real and Virtual Identity: What’s in a name?
Cyberspace is created by humans for human purposes. Turkle writes “We make our technologies
and they, in turn, make and shape us.” 126 Without human users, cyberspace would deteriorate and
eventually fail to exist. Unless or until something else takes over the maintenance and development of
cyber infrastructure and its content, the human remains an important part of the potential of cyberspace.
Human identity is a unique creation of self through societal forces, interpersonal relationships, and
geographical, political, and cultural motivations. 127 Sociologist Erik Erikson formulated that a healthy
identity is a multifaceted but ultimately coherent sense of self that is personally satisfying while at the
same time being recognized and affirmed by the surrounding community. 128 When individuals invest in
online experiences, they belong to different communities, practice different norms and values and are
provided the opportunity to perform various identities in movement from one context and space to
125
Paul Scharre, Uncertain Ground : Emerging Challenges in Land Warfare (Washington, DC:
Center for a New American Security, 2015), accessed on December 22, 2015,
http://www.cnas.org/search/site/Uncertain%20Ground%20%3A%20Emerging%20Challenges%20in%20
Land%20Warfare.
126
Turkle, 263.
127
N. B. Ellison and D. Boyd, Sociality through Social Network Sites, in The Oxford Handbook of
Internet Studies (Oxford, UK: Oxford University Press, 2013), 151-172.
128
Erik H. Erikson, Identity: Youth and Crises (New York: W.W. Norton, 1968).
39
another. 129 Lacking visible bodies, self-representation in online spaces, sometimes in the construction of
an avatar, offers participants many possibilities to create a representation of how they hope to be
identified within a given context.130 Friendships are formed, information is gathered, and impressions are
made in cyberspace with potential impact on the behavior of individuals and groups in physical space.
Published in 1966, The Social Construction of Reality by Peter L. Bergman and Thomas
Luckman constructs a sociological analysis of “knowledge that guides conduct in everyday life.” 131 They
clarify their definition of reality as that which is understood by the common sense of ordinary members of
society. 132 The world today, connected and communicated through cyber technology, serves as a primary
means for self-expression and identity formation. In some contexts, an online identity is clearly and
directly linked to an offline presence. For instance, online dating profiles represent a person who is,
seemingly, available for making offline connections. 133 In other contexts, the association to or the
expectation of an offline presence is less important. Nevertheless, in all cases, making oneself visible to
others online requires the presentation of a digital identity. There are over three billion people on earth
today that have some form of digital footprint. 134
In comparison to social groups formed in physical space, group interests online can be generated
and shared with millions of people regardless of actual localization. Much like the blur of war discussed
129
Howard Gardner and Katie Davis, The App Generation: How Today’s Youth Navigate Identity,
Intimacy and Imagination in a Digital World (New Haven. CT: Yale University Press, 2013), 60.
130
“Avatar” is a word used for the image that a person chooses as his or her "embodiment" in an
electronic medium.
131
Peter L. Berger and Thomas Luckman, The Social Construction of Reality: A Treatise in the
Sociology of Knowledge (New York: Random House, 1966), 19.
132
Ibid 19; As John Searle has pointed out, the reality referred to is the social interpretation and
meaning of artifacts and events, not their observer-independent existence. John. R. Searle, The
Construction of Social Reality (New York: Simon & Schuster, 1995).
133
Ellison and Boyd, 151-172.
134
A digital footprint is the data that’s left behind whenever you use a digital service.
40
previously, the social distinctions between the real world and the mediated virtual world are also
increasingly unclear. While socialization in cyberspace adds a new variable to the theory of social
construction of reality, identity and reality formation still remain dependent on social and cultural
influences. Experiences in physical realms continue to contribute to the understanding of self and the
institutions by which individuals shape and conform. 135 As humans are the creators of the virtual domain,
an interesting feedback loop develops in the sense that identity is both formed and shaped by virtual life
experiences. Returning back to Berger and Luckman, if one agrees that there is no such thing as reality
independent of its social construction and the way it is perceived and shaped by socialized agents, then
increasing time spent, relationships forged, and experiences created online have a structuring effect on the
physical life experiences of individuals and groups.
Consider the unprecedented ability of Daesh to recruit fighters purposed toward the effort to
legitimize its declared caliphate. They have an incredibly robust online recruitment strategy that tends to
use video of images rather than text, takes full advantage of the linguistic skills of members across the
world, and makes good use of video gaming and music—all with powerful resonance on youth culture. 136
Daesh creates a fantasy initially realized in virtual reality. Its ideological call to action is pervasive and
influential. 137 Energy is employed not only to recruit foot soldiers, but also to enlist technically proficient
and talented users of social media to sustain the recruitment processes. Online recruitment is one of the
organizations most prioritized and supported operations because they understand the ability to recruit as a
strategic element of their campaign against the West.138
135
Turkle, 11.
136
Scott Gates and Sukyana Podder, “Social Media, Recruitment, Allegiance and the Islamic
State,” Perspectives on Terrorism 9, no. 4 (2015), accessed April 3, 2016,
http://www.terrorismanalysts.com/pt/index.php/pot/article/view/446/html.
137
Hisham Melhem, “Keeping Up With the Caliphate: An Islamic State for the Internet Age,”
Foreign Affairs, November/December (2015), 148-153.
138
Ibid.
41
Another current example is found in the experience of US soldiers. Every aspect of a soldier’s
daily life is affected by increasing dependence on cyber technologies. Firsthand accounts of how
differences in non-battle time communication and socialization have manifest in combat performance are
increasingly common. In one such provocative illustration captured in a New York Times article, “From
Army of One to Band of Tweeters,” Major John Spencer remarks on the cohesion of his troops both on
and off the battlefield when serving in Iraq in 2003 and again in 2008. 139 He observes frequent and
personal communication between his soldiers and their ability to work together under stress,
remarkable. 140 Five years later, and complemented by upgrades in cyber technology, the officer recalls a
stark change in “the soldiers’ individuality in battle,” especially among the youngest troops. He observed
an increase in the frequency of arguments over unit decisions and he characterized communications as
more transactional as opposed to the friendly banter he was accustomed to on previous deployments. 141
His experience is not uncommon. The author had many conversations with fellow officers over the past
two years regarding similar observations. In one such conversation, an Army military police officer and
fellow SAMS student shared her frustrations. During convoy operations, she observed soldiers with more
interest in developing a most efficient battle drill to charge their smart phones than concern in executing
preventive maintenance checks and services (PMCS) on their Humvees.
Conventional wisdom claims that soldiers fight for each other. Since World War II, cohesion, or
the bonds between soldiers, has traditionally been posited as the primary motivation for soldiers in
combat. 142 Evaluating American soldiers in the early months of the 2003 Iraq war, Leonard Wong and a
139
John Spencer, “From Army of One to Band of Tweeters,” The NewYork Times, November 5,
2015, accessed November 15, 2015, http://www.nytimes.com/2015/11/05/opinion /from-army-of-one-to
band-of-tweeters.html?_r=0.
140
Ibid.
141
Spencer, “From Army of One.”
142
Leonard Wong, Thomas A. Kolditz, Raymond A. Millen, and Terrence M. Potter, Why They
Fight: Combat Motivation In The Iraq War (Carlisle, PA: Strategic Studies Institute, 2003), accessed
November 15, 2015, http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB179.pdf.
42
team of researchers concluded that emotional bonds of trust between soldiers were what motivated them
to fight within the context of that conflict. Notably, Wong’s research highlighted the importance of
communication outside of combat, “the hours of nothingness, the shared boredom, where bonds of trust,
friendships and group identity are built.” Today, increasing amounts of this nothing time is consumed
online, emerged in virtual space. This observation does not discount the potential added benefits of
improved communication between deployed soldiers and their families at home; however, recognition
and study of the effects is increasingly important given future generations’ lack of familiarity with being
disconnected. For example, how will a lack or degradation of communication affect a soldier’s mindset or
performance in training or combat? The ability to be virtually and intimately connected to the everyday
stressors of life back home adds a dynamic to conflict with implications well worth evaluating. Finally,
the idea that a soldier may have a persona online that is perceived to be much different than his identity in
physical space cannot be dismissed. To what extent do impressions in virtual space influence behavior in
physical space and vice versa?
The Digital Immigrant and Digital Native Divide 143
Generations born into this digitized world have fundamentally different understandings of what it
means to live with and without cyberspace in comparison to those born into a pre-cyber enabled world. 144
While senior Army leaders and those among their generation have adapted to environments driven by
cyber technical means, often relative to their personal curiosities, younger and future generations are only
able to imagine life without instant and chronic information. The understanding that the communication
of information and knowledge once emanated exclusively from physically known or trusted sources will
143
For more on digital natives (those born into a world enhanced by cyber technology) versus
digital immigrants (those who have adapted to a world enhanced by cyber technology,) see Mark Prensky,
“Digital Natives, Digital Immigrants,” On the Horizon 9, no.2, (2001): 1-6.
144
P.W. Singer and Allan Friedman, Cybersecurity and CyberWar: What Everyone Needs to
Know (New York, NY: Oxford University Press, 2014), 16.
43
likely be foreign to these digital natives. 145 This digital native understanding conflicts in many ways with
the Army’s hierarchical structure and may drastically challenge current models of indoctrination and
concepts such as trust.
Currently, younger military officers and soldiers being taught and led are increasingly of the
digital or millennial generation, and those teaching and leading them primarily are not. A study conducted
by the Center for Research and Education on Aging and Technology Enhancement found that adults’
attitudes toward technology are an important factor in predicting how comfortable they are in using it. 146
Adults who feel anxious or uncomfortable around technology, or who don’t believe they have the aptitude
to learn, are likely to avoid them. 147 The study suggests that independent of other factors, such as lack of
exposure to technology or a previous bad experience, age matters. While the average teenager in the
United States has grown up where “online” is as commonplace as hot water, technically-expert senior
military leaders are scarce. 148 The difficulty of learning cyber language and techniques are not intuitive
and again, given the speed of evolution, a difficult medium in which to stay current. 149
As one consequence, some commanders view the environment of cyberspace as a leadership
challenge to control. For example, regarding the social environment of cyberspace, some have limited the
access soldiers have to their technology. 150 These responses are the result of understandings framed in old
models ill-suited for current realities. Within the institutionally hierarchical Army organization, there
145
Prensky, “Digital Natives, Digital Immigrants.”
146
Sara J. Czaja et al., “Factors Predicting the Use of Technology,” Psychology and Aging, 21,
no.2 (2006): 333-352.
147
Ibid.
148
Brickey, Cox, Nelson, and Conti, “The Case for Cyber.”
149
Timothy L. Thomas, “Hezballah, Israel and Cyber PSYOP,” IO Sphere (Winter 2007): 24.
150
Andrew B. Stipp, “Leading Soldiers with – Not Primarily Through – Communication
Technology,” Military Review (November-December 2015): 101-107.
44
exists an obvious cultural divide between more senior generations and younger generations, born into a
world at the very least augmented by cyberspace but, as time goes by, into a world in which cyberspace
and the “really real” merge seamlessly into a new everything.
Of equal and almost opposite concern for the Army is the increasing population of young people
uncomfortable performing missions in analog settings. From socializing to banking to map reading, cyber
technologies now form the base of understanding for those born in a cyber enabled world. Which military
practitioner skills are best developed with cyber technology? Which historically “old fashioned” ways of
executing Army operations should be preserved? For example, a recent study that sought to test how notetaking by hand or by computer affects learning determined the former was more beneficial as it developed
critical thinking skills such as summarizing, paraphrasing, and concept mapping. 151 Yet another paradox
of technology is that the more dependent society becomes on cyber technology, the more valuable critical
thinking skills become. 152 Finally, how does the Army attract and retain young people interested and
accustomed to living between both domains if the predominate language of the institution continues to
minimize its potential, treating cyber technologies as mere capabilities?
Those who first recognize, understand, and implement processes that maximize the tools of all
generations and prepare for the vulnerabilities associated with dependency will have the potential to gain
a decisive advantage. 153 Conversely, a nation that is slow to adapt to new generational realities opens
itself to catastrophic defeat. 154
151
James Doubek, “Attention Students: Put Your Laptops Away,” National Public Radio, April
17, 2016, accessed April 17, 2016, http://www.npr.org/2016/04/17/474525392.
152
Anna Davies, Devin Fidler and Marina Gorbis, “Future Work Skills 2020,” University of
Phoenix Research Institute, 2011, accessed March 10, 2016, http://www.cdn.theatlantic.com/static
/front/docs/sponsored/phoenix/future_work_skills_2020.pdf.
153
William S. Lind et al., “The Changing Face of War: Into the Fourth Generation,” Marine
Corps Gazette, October 1989.
154
Ibid.
45
Artificial Intelligence and the Army
The Army is on the cusp of a major transformation in the relationships it has with many of its
tools. The development of autonomous capabilities is a critical component of the Pentagon’s third offset
strategy, which is “a research effort intended to endow the United States with strategic advantage over her
adversaries.” 155 Over the next decade, new and prolific “smart” machines will become integral to training,
combat, soldier wellness, security, and nearly every aspect of military experience. This includes machine
learning systems that search through volumes of data to find weak signals of social change for indicators
to inform analytical assessments to cyber defensive operations flying drones and boats. The cyber
technologies DARPA is pursing range from brain and prosthetic programs to the engineering of hunter –
killer robots. 156 Deputy defense secretary Robert Work recently shared, “You cannot have a human
operator operating at human speed fighting back at determined cyber tech. You are going to need to have
a learning machine that does that.” 157
As cyber technical machines replace humans in some responsibilities, and augment them in
others, it will require the institution confront important questions. What are human soldiers uniquely good
at? What constitutes an appropriate soldier machine relationship? The Army will have to rethink how
missions are executed and what processes shape their completion. In some cases, machines will become
collaborators, augmenting soldier skills and abilities. Artificial intelligence will likely establish new
expectations and standards of soldier performance. Army leaders will need to be increasingly aware of
155
Patrick Tucker, “The Future of Cyber Analytics In the Department of Defense,” Defense One,
(April 2016), accessed April 15, 2016, www.defenseone.com/assets/future-cyber-analytics-department
defense/.
156
Jacobson, 427.
157
Tucker, “The Future of Cyber Analytics In the Department of Defense,”
46
what it means to partner with machines in a relationship that will build on mutual strengths and result in a
new level of human-machine collaboration and codependence.
Conclusion
American astronomer Carl Sagan once stated, “It is suicidal to create a society dependent on
science and technology in which hardly anybody knows anything about the science and technology.” 158
While the statement is extreme, the message to the Army applies. The Army has become institutionally
reliant on cyber technologies that most within the organization cannot intuitively break down. This is a
relatively new experience for soldiers and comes with great and largely unknown implications. The
situation is exacerbated by an institutional disconnect and reluctance to embrace the complexity and
strategic potential of cyberspace, choosing instead to interpret the domain with tools and frameworks
from the industrial era past.
James Rosenau argues that to think theoretically, one has to be able to go to the conceptual level,
sacrifice detailed descriptions for broad observations, tolerate ambiguities, have concern about
probabilities, and be distrustful of absolutes. 159 Conceptually, this work addresses the idea that cyber
technologies create the potential to alter understandings of time, space, and identity both instantaneously
and subversively. Studies and examples presented throughout this monograph suggest that military
leaders charged with the design of military art are susceptible to falling victim to this powerful reality.
Notions of cyberspace as related to the development of military strategy achieve a level of
observational and descriptive adequacy when they include (a) in-depth treatment of the variables of time
and space as related to the contemporary operating environment and (b) proper weighting of the
relationship between cyber technology and human behavior from both friendly and adversarial
158
Jacobson, 424.
159
James N. Rosenau, The Scientific Study of Foreign Policy (London: Frances Pinter, 1980), 19
31.
47
perspectives. Conceptualizations of cyberspace must meet these conditions because cyber technology
compresses cognitive understandings of time and space with effects on all instruments of national power
and culture and because cyber technology continues to alter how individuals and societies construct
reality and express behavior.
Evidence in response to the first research question addressed how the Army accounts for the
fundamental concepts of time and space, especially as related to cyberspace and the execution of
operational art. The second question looked carefully at how the Army recognizes the role that cyberspace
plays in identity formation and the social constructions of reality of both friendly and enemy actors. The
work has demonstrated the existence and the extent of the gap between how the Army currently
understands cyberspace and the author’s proposed conditions of adequacy in conceptualizations of
cyberspace. The gap identified is very understandable given the speed of innovation in cyber technology
and the natural apprehension as to how to understand and exploit it, both of which exist amidst the
glimmerings of increased uses of artificial intelligence and the highly evident indications that the role of
human activity in war is changing.
The need for Army leaders and planners to function at a higher level of cyber conceptualization is
apparent in every example the monograph has cited. With the given of an unknowable future, the military
must figure out a way to deal with the paradox of maintaining perspective and control all the time,
accepting that the cyber environment cannot be controlled. This paradox severely challenges a culture that
has developed and thrived under linear rules and equation-based understandings of the world. The task is
as daunting and immediate as any the Army has ever faced and only the uncertainty of the outcome is
certain. The Army must protect its citizenry by fighting through the dualisms in which the rapid speed of
change is pitted against bureaucratic inertia and dogged culture.
Despite the challenges ahead, optimism must remain the watchword of the Army’s service to the
United States. The US Army and a majority of those who serve within its ranks are motivated and
resilient. Some of the required cultural changes will happen inevitably, as younger generations rise in
rank. However, given the speed of cyber evolution and the grindingly slow process of institutional
48
change, the Army cannot afford to lose time. The future is now and the time has come to act. The author
recommends as a first step of many, that the Army reconsider how it accounts for space and time
throughout all of its doctrinal publications. This includes emphasis on the potential of cyber technologies
throughout professional military education and training opportunities. As the operational environments
today are dependent on various cyber technologies, the sooner the significance of cyberspace is
broadened in doctrine and more directly addressed in training and education, all Army players on the
battlefield will be better equipped.
The understanding of cyber technologies and their use in war should include strategic, temporal,
geographic and human factors. The need for targeted research and theoretical and practical thinking on
the effects of computer technology and warfare continues to grow. The title of this monograph was
inspired, in part, by Daniel Kahneman’s book Thinking, Fast and Slow. In it, Kahneman explains the two
systems that drive the way humans think. One of the chapters of the book describes the significance of
frames and reality in human decision making. Kahneman suggests that most people “passively accept
decision problems as they are framed and therefore rarely have an opportunity to discover the extent to
which our preferences are frame-bound rather than reality-bound.” 160
Cyber technologies are rapidly altering the military’s operational environment, yet the Army
largely still uses frames that do not factor this reality. From an organizational perspective, the issue is
reminiscent in some ways to the Army in the interwar period. 161 The uncertain role of military aviation
fueled the debate between those who saw technology as way to revolutionize warfare and “those who
160
Daniel Kahneman, Thinking Fast and Slow (New York: Farrar, Straus and Giroux, 2011), 367.
161
Peter W. Singer, “Lessons from Defense Strategy in the Interwar Years,” Brookings, April
2013, accessed May 4, 2016,http://www.brookings.edu/research/articles/2013/08/strategic-defense
reform-singer.
49
clung to the past and saw machines merely as a means to improve existing concepts.” 162 In considering
cyberspace as primarily limited to the deployment of cyber capabilities, its strategic potential is easily
overlooked. In war, the act of framing—the act of describing the operational environment, and thus
determining decisions to be made—is a moral task. It is often the moral task. Cyber technologies are
going to continue to alter perceptions of space and time and shape human behavior around the world
whether or not the Army takes the implications of these facts seriously and in depth. The Army needs to
find the courage to reconstruct itself in ways that will violate its historical understanding of its role and
structure, and therefore will be very costly institutionally and, for some, personally. In order to be best
prepared for the wars of today and wars of the future, it is time for the Army to accept a new reality
proactively and reframe it with an institutional investment in an adequate conceptualization of cyber
technology and its effects on war and warfare.
162
David E. Johnson, “From Frontier Constabulary to Modern Army: The US Army between the
World Wars,” in The Challenge of Change: Military Institutions and New Realities, 1918-1941, ed.
Harold R. Winton and David R. Mets (Lincoln: University of Nebraska Press, 2000), 173.
50
Bibliography
Army Doctrine Publication 3-0. Unified Land Operations. Washington, DC: Government Printing Office,
2012.
Army Doctrine Publication 5-0. The Operations Process. Washington, DC: Government Printing Office,
2012.
Army Doctrine Publication 1-01. Doctrine Primer. Washington, DC: Government Printing Office, 2014.
Army Doctrine Reference Publication 3-0. Unified Land Operations. Washington, DC: Government
Printing Office, 2012.
Army Doctrine Reference Publication 3-90. Offense and Defense. Washington, DC: Government Printing
Office, 2012.
Army Field Manual 3-38. Cyber Electromagnetic Activities. Washington, DC: Government Printing
Office, 2014.
Allhoff, Fritz, and Patrick Lin, eds. Nanotechnology and Society. New York: Springer-Verlag, 2008.
Bender, Jason. “The Cyberspace Operations Planner: Challenges to Education and Understanding of
Offensive Cyberspace Operations.” Small Wars Journal (November 2013). Accessed January 10,
2016. http://smallwarsjournal.com/jrnl/art/the-cyberspace-operations-planner.
Berger, Peter L., and Thomas Luckmann. The Social Construction of Reality: A Treatise in the Sociology
of Knowledge. New York: Doubleday, 1967.
Blascovich, Jim, and Jeremy Bailenson. Infinite Reality: Avatars, Eternal Life, New Worlds and the Dawn
of the Virtual Revolution. New York: HarperCollins, 2011.
Brantly, Aaron F. “Strategic Cyber Maneuver.” Small Wars Journal (October 2015). Accessed November
12, 2015. http://smallwarsjournal.com/jrnl/art/strategic-cyber-manuever.
Brenner, Joel. America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and
Warfare. New York: Penguin Group, 2011.
Brickey, Jon, Jacob Cox, John Nelson, and Gregory Conti. “The Case for Cyber.” Small Wars Journal.
(September 2012). Accessed January 5, 2016. http://smallwarsjournal.com/jrnl/art/the-case-for
cyber.
Bryant, Rebecca. “What Kind of Space is Cyberspace?” Minerva - An Internet Journal of Philosophy 5
(2001). Accessed March 11, 2016. http://www.minerva.mic.ul.ie//vol5/cyberspace.html.
Brynjolfsson, Erik, and Andrew McAfee. The Second Machine Age: Work, Progress, and Prosperity in a
Time of Brilliant Technologies. New York: W.W. Norton & Company, 2014.
51
Bunker, Robert J., and Charles Sid Heal. Fifth Dimensional Operations: Space-Time-Cyber
Dimensionality in Conflict and War-a Terrorism Research Center Book. Bloomington, IN:
iUniverse, 2014.
Case, Amber. Calm Technology: Designing for Billions of Devices and the Internet of Things. Sebastopol,
CA: O’Reilly Media, 2015.
Cohen, Jared, and Eric Schmidt, The New Digital Age: Reshaping the Future of People, Nations and
Business. New York: Random House, 2013.
Chomsky, Noam. Syntactic Structures. The Hague: Mouton, 1957.
Cuthbertson, Anthony. “US Military Launches Cyberattacks against ISIS.” Newsweek Magazine, March
2, 2016. Accessed March 2, 2016. http://www.newsweek.com/us-military-launches-cyber
attacks-isis-432441.
Demchak, Chris C. Wars of Disruption and Resilience: Cybered Conflict, Power and National Security.
Athens, GA: University of Georgia Press, 2011.
D’Erasmo, Stacey. “Living on Internet Time,” New Yorker, October 30, 2014. Accessed March 16, 2016.
http://www.newyorker.com/books/page-turner/lost-time.
Delacruz, Victor. “Mission Command In and Through Cyberspace: A Primer for Army Commanders.”
The Cyber Defense Review (December 2015). Accessed December 20, 2015.
http://www.cyberdefensereview.org/2015/12/10/mission-command-primer/.
Derian, James Der. Virtuous War: Mapping the Military-Industrial-Media-Entertainment-Network. 2nd
ed. New York: Routledge, 2009.
Diener, C. Borderlines and Borderlands: Political Oddities at the Edge of the Nation State. Edited by
Alexander C. Diener and Joshua Hagen. Lanham, MD: Rowman & Littlefield Publishing Group,
2009.
Dolman, Everett Carl C. Pure Strategy: Power and Principle in the Space and Information Age. New
York: Routledge, 2005.
Dutton, William H., ed. The Oxford Handbook of Internet Studies. Oxford: Oxford University Press,
2014.
Elkus, Adam. “A Critical Perspective on Operational Art and Design Theory.” Small Wars Journal.
(April 2012). Accessed April 11, 2016. http://smallwarsjournal.com/jrnl/art/a-critical-perspective
on-operational-art-and-design-theory.
Elon University. “1830s-1860s: The Telegraph.” Accessed 30 March 2016. http://www.elon.edu/e
web/predictions/150/1830.xhtml.
Frost, Patricia, and Matthew Hutchison. “The Top 10 Questions for Commanders to Ask About Cyber
Security.” Small Wars Journal (December 2015). Accessed February 11, 2016.
52
http://smallwarsjournal.com/jrnl.art/top-10-questions-for-commanders-to-ask-about
cybersecurity.
Gardner, Howard, and Katie Davis. The App Generation: How Today’s Youth Navigate Identity, Intimacy
and Imagination in a Digital World. New Haven: Yale University Press, 2013.
Garza, Gilbert. “The Internet, Narrative, and Subjectivity.” Journal of Constructivist Psychology. 15
(2002): 185-203.
Gates, Scott, and Sukyana Podder. “Social Media, Recruitment, Allegiance and the Islamic State.”
Perspectives on Terrorism 9, no. 4 (2015). Accessed April 3, 2016.
http://www.terrorismanalysts.com/pt/index.php/pot/article/view/446/html.
Gladwell, Malcom. Blink: The Power of Thinking Without Thinking. New York: Little Brown and
Company, 2005.
Graham, Mark, and William H. Dutton, eds. Society and the Internet: How Networks of Information and
Communication Are Changing Our Lives. Oxford: Oxford University Press, 2014.
Gray, Colin S. The Future of Strategy. Cambridge: Polity Press, 2015.
Guha, Manabrata, and Sam Bateman. Reimagining War in the 21st Century: From Clausewitz to
Network-Centric Warfare. New York: Taylor & Francis, 2010.
Goodman, Marc. Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do
About It. New York: Doubleday, 2015.
Greenfield, Susan. Mind Change: How Digital Technologies Are Leaving Their Mark on Our Brains.
New York: Random House, 2015.
Harris, Shane. @War: The Rise of the Military-Internet Complex. New York: Eamon Dolan/Houghton
Mifflin Harcourt, 2014.
Harper, Caleb. “This Computer Will Grow Your Food in the Future” [video]. TED Talks. Posted March
2016. Accessed April 15, 2016. http://www.ted.com/talks/caleb_harper_this_computer
_will_grow_your_food_in_the_future.
Hatch, Mary Jo, and Ann L. Cunliffe. Organization Theory: Modern, Symbolic, and Postmodern
Perspectives. 2nd ed. New York: Oxford University Press, 2012.
Hayden, Michael V. Playing to the Edge: American Intelligence in the Age of Terror. New York: Penguin
Press, 2016.
Institution of Engineering and Technology. “The first transatlantic telegraph cable 1858.” Accessed
March 12, 2016. http://www.theiet.org/resources/library/archives /featured/trans-cable1858.cfm.
Issacson, Walter. “The Future of the Human Spirit in a World of Machines.” [video]. Posted May 14,
2015. Accessed October 11, 2015. http://www.smithsonianmag.com/videos/category/future-is
53
here/future-is-here-festival-2015-walter-isaacson/#ooid=BwczB5dTrQqajwipRxK0OB
xxcJxW0v7Z.
Jacobsen, Annie. The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top-Secret
Military Research Agency. New York: Little, Brown & Company, 2015.
Joint Publication 1-02. Department of Defense Dictionary of Military and Associated Terms. Washington,
DC: Joint Chiefs of Staff, 2013.
Johnson, David E. “From Frontier Constabulary to Modern Army: The US Army between the World
Wars.” In The Challenge of Change: Military Institutions and New Realities, edited by Harold R. Winton
and David R. Mets, 162-204. Lincoln: University of Nebraska Press, 2011.
Kahneman, Daniel. Thinking, Fast and Slow. New York: Farrar, Straus and Giroux, 2011.
Kaplan, Fred. Dark Territory: The Secret History of Cyber War. New York: Simon & Schuster, 2016.
Kern, Sean Charles Gaines. “Expanding Combat Power Through Military Cyber Power Theory.” Joint
Force Quarterly, no.79 (2015): 88-94.
Kissinger, Henry. World Order. New York: Penguin Books, 2014.
Kruause, Michael D., and R. Cody Phillips, eds. Historical Perspectives of the Operational Art.
Washington, DC: Center of Military History, 2007.
Kollmeyer, Barbara. “Want World Peace? Share much more on Facebook, Mark Zuckerberg says.”
Market Watch, February 26, 2016. Accessed March 16, 2016. http://www.marketwatch.com/story
/facebooks-mark-zuckerberg-touts-more-sharing-as-a-route-to-world-peace-2016-02-26.
Leonhard, Robert. Fighting by Minutes: Time and the Art of War. Westport, CT: Greenwood Publishing
Group, 1994.
Libicki, Martin. “Cyberspace is Not a Warfighting Domain.” I/S: A Journal of Law and Policy for the
Information Society 8, no. 2. (Fall 2012): 325-340.
Lind, William S. et al. “The Changing Face of War: Into the Fourth Generation,” Marine Corps Gazette,
(October 1989): 22-26.
Lyngas, Sean. “Former NSA chief: Data manipulation an ‘emerging art of war.’” The Business of Federal
Technology, October 22, 2015. Accessed March 16, 2016. https://fcw.com/articles/2015/10/22
/alexander-data-manipulation.aspx.
McChrystal, Stanley A. Team of Teams: New Rules of Engagement for a Complex World. New York:
Penguin Books, 2015.
McKinnon, Rebecca. “Ruling Facebookistan: The world's largest social networking site has a population
nearly as large as China or India's. And the natives are getting restless.” Foreign Policy
Magazine, June 14, 2012. Accessed March 25, 2016. http://foreignpolicy.com/2012/06/14/ ruling
facebookistan/.
54
Melhem, Hisham. “Keeping Up with the Caliphate: An Islamic State for the Internet Age.” Foreign
Affairs 94, no. 6 (2015): 148-153.
Mihalche, Adrian. “The Cyber-Space Time Continuum: Meaning and Metaphor.” Information Society 18,
no. 4 (2002): 293.
NATO Cooperative Defence Center of Excellence. “Cyber Definitions.” Accessed March 10, 2016.
https://ccdcoe.org/cyber-definitions.html.
Paret, Peter. Cognitive Challenge of War. Princeton: Princeton University Press, 2009.
Poulsen, Kevin. Kingpin: How One Hacker Took over the Billion-Dollar Cybercrime Underground. New
York: Random House, 2011.
Reynolds, Paul. “The Man Who Predicted the Great War.” History Today 20, no. 2 (2013). Accessed
March 24, 2016. http://www.historytoday.com/paul-reynolds/man-who-predicted-great-war.
Rheingold, Howard. Net Smart: How to Thrive Online. Boston: MIT Press, 2014.
Rosenzweig, Paul. “Cyberwar is Here to Stay.” February 24, 2016. Accessed March 6, 2016.
http://www.governing.com/templates/gov_print_article?id=370008341.
Rochlin, Gene. Trapped in the Net: The Unanticipated Consequences of Computerization. Princeton, NJ:
Princeton University Press, 1997.
Ryan, Johnny. A History of the Internet and the Digital Future. London: University of Chicago Press,
2013.
Sandburg, Carl. Chicago Poems. New York, NY: Henry Holt and Company, 1916.
Scharre, Paul. “Uncertain Ground: Emerging Challenges in Land Warfare.” Center for a New American
Security (December 2015): 6-7. Accessed January 3, 2016. https://www.cnas.org/emerging
challenges-in-land-warfare#.VyEFVhMrLGI.
Schiener, Bruce. Data and Goliath: The Hidden Battles to Collect Your Data and Control the World.
New York: W.W. Norton & Company, 2015.
Schnieder, James. “The Loose Marble – and Origins of Operational Art.” Parameters 19 (1989): 85-99.
Segal, Adam. The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the
Digital Age. NewYork: PublicAffairs, 2016.
Shirky, Clay. Here Comes Everybody: The Power of Organizing Without Organizations. New York:
Penguin Group, 2009.
. Cognitive Surplus: How Technology Makes Consumers into Collaborators. New York: Penguin
Group, 2010.
55
Sighholm, Johan. “Non-State Actors in Cyberspace Operations.” Journal of Military Studies 4, no.1
(2013): 32. Accessed October 15, 2015. http://ojs.tsv.fi/index.php/jms/article/view/7609/pdf_1.
Singer, Peter W, and Allan Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. New
York: Oxford University Press, 2014.
. Testimony to Senate Armed Services Committee. Hearing on The Future of War. November 3,
2015. Accessed November 23, 2015. http://www.armed-services.senate.gov/imo/media/
doc/Singer_11-03-15.pdf.
Steiner-Adair, Catherine, and Teresa H. Barker. The Big Disconnect: Protecting Childhood and Family
Relationships in the Digital Age. New York: HarperCollins Publishers, 2013.
Stevens, Tim, and Peter R. Neumann. Countering Online Radicalisation: A Strategy for Action. London:
International Centre for the Study of Radicalization and Political Violence, March 2009.
Accessed April 11, 2016. https://cst.org.uk/docs/countering_online_radicalisation1.pdf.
Stipp, Andrew B. “Leading Soldiers with – Not Primarily Through – Communication Technology.”
Military Review (November-December 2015): 101-107.
Spencer, John. “From Army of One to Band of Tweeters.” New York Times, November 5, 2015. Accessed
November 15, 2015. http://www.nytimes.com/2015/11/05/opinion /from-army-of-one-to-band-of
tweeters.html?_r=0.
Taylor, Jonathan. “The Emerging Geographies of Virtual Worlds.” Geographical Review, 87, no. 2
(1997): 172-192.
Thomas, Timothy. “Creating Cyber Strategists: Escaping the ‘DIME’ Mnemonic” Defence Studies 14,
no. 4 (2014): 370. Accessed January 5, 2016. http://dx.doi.org/10.1080 /14702436.2014.952522.
. “Hezballah, Israel, and Cyber PSYOP.” IO Sphere (Winter 2007): 30-35. Accessed March 11,
2016. http://www.fmso.leavenworth.army.mil/documents/new-psyop.pdf.
Tikk-Ringas, Eneken, Mika Kerttunen, and Christopher Mika.“Cyber Security as Field of Military
Education and Study.” Joint Force Quarterly 75 (4th QTR 2014): 57.
Toffler, Alvin, and Heidi Toffler. War and Anti-War. New York: Warner Books, 1995.
Torrike-Barton, Dex. “How the internet is uniting the world.” A Medium Corporation, October 14, 2015.
Accessed. October 14, 2015. https://medium.com/@dextbarton/how-the-internet-is-uniting-the
world-36408b457692#.7uzz7i54n.
Turabian, Kate L, Wayne C Booth, Gregory G. Colomb, Joseph M Williams, and University of
University of Chicago Press Staff. A Manual for Writers of Research Papers, Theses, and
Dissertations, Eighth Edition: Chicago Style for Students and Researchers. 8th ed. Chicago:
University of Chicago Press, 2013.
Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. New
York: Basic Books, 2013.
56
Turner, Frank. “The Army in Cyberspace.” National Security Watch, 14-1. Institute of Land Warfare:
2014. Accessed March 16, 2016. http://www.ausa.org/publications/ilw/DigitalPublications
/Documents/nsw14-1/files/1.html.
Tzu, Sun. The Art of War. Translated by Samuel B. Griffith. Oxford: Oxford University Press, 1963.
US Department of Defense. 2017 Budget Fact Sheet. Washington, DC: Department of Defense, 2016.
. Strategy for Operating in Cyberspace. Washington, DC: Department of Defense, 2011.
. The DoD Cyber Strategy. Washington, DC: Department of Defense, 2015.
US President. NSDD 145. “National Policy on Telecommunications and Automated Information Systems
Security, 1984.” National Archives Catalog. Accessed January 15, 2016.
https://research.archives.gov/id/6879742.
Valeriano, Brandon, and Ryan C. Maness. Cyber War Versus Cyber Realities: Cyber Conflict in the
International System. Oxford: Oxford University Press, 2015.
Van Creveld, Martin. Technology and War: From 2000 B. C. to the Present. New York: Free Press, 1989.
VanDriel, Martha S. H. Bridging the Planning Gap: Incorporating Cyberspace into Operational
Planning Carlisle, PA: Strategic Studies Institute, 2015. Accessed December 10, 2015.
http://www.strategicstudiesinstitute.army.mil/index.cfm/articles/Bridging-the-planning
gap/2015/05/04
Virilio, Paul, Sylvère Lotringer, and Mark Polizzotti. Pure War (Semiotext(e) / Foreign Agents).
Cambridge, MA: Semiotexte, 2008.
von Clausewitz, Carl. On War. Translated by Michael Howard, Peter Paret, and Bernard Brodie.
Princeton: Princeton University Press, 1984.
Warf, Barney. Time-Space Compression: Historical Geographies. London: Routledge, 2008.
Watkinson, William. “ISIS threatens Facebook founder Mark Zuckerberg and Twitter CEO Jack Dorsey
in chilling video.” International Business Times, February 25,2016. Accessed March 2, 2016.
http://www.ibtimes.co.uk/isis-threatens-facebook-founder-mark-zuckerberg-twitter-ceo-jack
dorsey-chilling-video-1545849.
Wong, Leonard, Thomas A. Kolditz, Raymond A. Millen, and Terrence M. Potter. Why They Fight:
Combat Motivation in the Iraq War. Carlisle, PA: Strategic Studies Institute, 2003. Accessed
November 15, 2015. http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB179.pdf.
Zimmer, Daniel T. Programmatic Integration of Cyber into The the Institutional Domain of Leader
Development. Master of Military Art and Science Thesis. Command and General Staff College.
2015.
57