SlideShare a Scribd company logo
1 of 10
Strategic Culture and
                                                                         Cyber Security

                                                           Patterson School of Diplomacy
                                                                & International Commerce
                                                                                                                                9 April 2012

                                                                                           W. Alexander Vacca, Ph.D.
                                                                            Corporate Director- Business Assessment




The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
How Culture Matters


    • Shared among groups of individuals
        – Cross cuts organizational and national boundaries
        – Cross cuts generations
        – Cross cuts personal experiences

    • Provides the “evoked set” of relevant analogies and metaphors
        – Guides the search for relevant information
        – Suggests the motives of other actors
        – Suggests cause-effect relationships
        – Implies probability of policy success or failure
        – Constrains the search for policy options

    • Shapes the processing of new information



      The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
2
Two Approaches to Warfare




                                                                   Mahan                                                 Douhet

      The Commons                                          Possess                                       Transverse

      Offense / Defense                                    Balanced Fleet                                Best Defense is Offense

      Force Targeting                                      Military                                      Civil & Industrial

      “Moral” Effects                                      Secondary                                     Crucial

      Climax of War                                        Defeat the Fleet                              Obliterate the Cities

      The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
3
Mahan: From SLOC to CLOC


    • The modern economy is dependent upon the “Cyber Lines of
      Communication” (CLOC).

    • Build a force capable of ensuring freedom of the CLOC. Focus efforts
      on defeating enemy actions within cyberspace, including building a
      robust defense.




      The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
4
Douhet: Victory Through Cyber Power!


    • Pass through cyberspace to conduct decisive kinetic operations

    • Defense is a low priority, maintain the ability to conduct cyber offense
      and achieve cyber deterrence

    • Civil and industrial targeting can break the will and ability of an enemy
      to fight

    • Pay close attention to the links between cyber means and kinetic
      effects




      The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
5
Cyber Security in the USAF Today




                                                          “Cyber, as a warfighting domain . . . like
                                                          air, favors the offense. If you’re defending in
                                                          cyber, you’re already too late. Cyber delivers on
                                                          the original promise of air power. If you don’t
                                                          dominate in cyber, you cannot dominate in
                                                          other domains. If you’re a developed
                                                          country, you can’t conduct daily life [after a
                                                          large scale cyber attack], your life comes to a
                                                          screeching halt.”

                                                                 - Lani Kass (Director USAF Cyberspace Taskforce), 2007



      The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
6
The Rise of Cyber Deterrence


    • Deterrence is comforting and familiar
        – For Policymakers: a peaceful and successful Cold War
        – For the Military: support for military spending
        – For Analysts: a framework well studied and specified

    • But is it applicable?
        – Myriad of cyber actors
        – Multiple motives for cyber actions
        – Problems of attribution
        – Linking deterrent penalties to deterrent triggers

    • Students of strategic studies and the “Culture of Deterrence”?




      The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
7
Some Policy Implications


    • Knowledge about the roots of analytical perspectives (ie, knowing your
      history) provides insight into the logic of others.

    • Beware the logic of policy metaphors and analogies (“e-
      Katrina”, “Cyber Pearl Harbor”).

    • Bring multiple cultural perspectives to bear on problems of national
      importance (especially new problems).




      The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
8
For Further Discussion…




    Gluttons for punishment are advised to consult:

    Vacca, W. Alexander. “Military Culture and Cyber Security,”
     Survival 53:6 (December 2011), pages 159-176




      The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
9
Wav Cyber Uk 2012 V2

More Related Content

Viewers also liked

Big Data Airline Project at UAEU
Big Data Airline Project at UAEUBig Data Airline Project at UAEU
Big Data Airline Project at UAEUZiyad Saleh
 
Big Data Analytics for Commercial aviation and Aerospace
Big Data Analytics for Commercial aviation and AerospaceBig Data Analytics for Commercial aviation and Aerospace
Big Data Analytics for Commercial aviation and AerospaceSeda Eskiler
 
Big Data para Dummies
Big Data para DummiesBig Data para Dummies
Big Data para DummiesStratebi
 
Big data para principiantes
Big data para principiantesBig data para principiantes
Big data para principiantesCarlos Toxtli
 
Introducción al Big Data
Introducción al Big DataIntroducción al Big Data
Introducción al Big DataDavid Alayón
 
Airline Analytics: Decision Analytics Centers of Excellence
Airline Analytics: Decision Analytics Centers of ExcellenceAirline Analytics: Decision Analytics Centers of Excellence
Airline Analytics: Decision Analytics Centers of ExcellenceBooz Allen Hamilton
 

Viewers also liked (6)

Big Data Airline Project at UAEU
Big Data Airline Project at UAEUBig Data Airline Project at UAEU
Big Data Airline Project at UAEU
 
Big Data Analytics for Commercial aviation and Aerospace
Big Data Analytics for Commercial aviation and AerospaceBig Data Analytics for Commercial aviation and Aerospace
Big Data Analytics for Commercial aviation and Aerospace
 
Big Data para Dummies
Big Data para DummiesBig Data para Dummies
Big Data para Dummies
 
Big data para principiantes
Big data para principiantesBig data para principiantes
Big data para principiantes
 
Introducción al Big Data
Introducción al Big DataIntroducción al Big Data
Introducción al Big Data
 
Airline Analytics: Decision Analytics Centers of Excellence
Airline Analytics: Decision Analytics Centers of ExcellenceAirline Analytics: Decision Analytics Centers of Excellence
Airline Analytics: Decision Analytics Centers of Excellence
 

Similar to Wav Cyber Uk 2012 V2

Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Dragos, Inc.
 
Special Operations Summit (Tampa, FL - December 2011)
Special Operations Summit (Tampa, FL - December 2011)Special Operations Summit (Tampa, FL - December 2011)
Special Operations Summit (Tampa, FL - December 2011)Alexa Deaton
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research CSSaunders
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Livingstone Advisory
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksPhil Huggins FBCS CITP
 
Cyber-enabled adversaries: Emerging aspect of targeted attacks
Cyber-enabled adversaries: Emerging aspect of targeted attacksCyber-enabled adversaries: Emerging aspect of targeted attacks
Cyber-enabled adversaries: Emerging aspect of targeted attacksAdam Klus
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Livingstone Advisory
 
Business Antifragility: The New abNormal
Business Antifragility: The New abNormalBusiness Antifragility: The New abNormal
Business Antifragility: The New abNormalTathagat Varma
 
Countering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design IssueCountering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design Issuezadok001
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!wmetcalf
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...CODE BLUE
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Modern Cyber Battlefield - Application of COIN Principals to Today's Kinetic ...
Modern Cyber Battlefield - Application of COIN Principals to Today's Kinetic ...Modern Cyber Battlefield - Application of COIN Principals to Today's Kinetic ...
Modern Cyber Battlefield - Application of COIN Principals to Today's Kinetic ...crmcg2007
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 

Similar to Wav Cyber Uk 2012 V2 (20)

Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response Rising Cyber Escalation US Iran Russia ICS Threats and Response
Rising Cyber Escalation US Iran Russia ICS Threats and Response
 
Special Operations Summit (Tampa, FL - December 2011)
Special Operations Summit (Tampa, FL - December 2011)Special Operations Summit (Tampa, FL - December 2011)
Special Operations Summit (Tampa, FL - December 2011)
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
Cyber-enabled adversaries: Emerging aspect of targeted attacks
Cyber-enabled adversaries: Emerging aspect of targeted attacksCyber-enabled adversaries: Emerging aspect of targeted attacks
Cyber-enabled adversaries: Emerging aspect of targeted attacks
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?
 
Business Antifragility: The New abNormal
Business Antifragility: The New abNormalBusiness Antifragility: The New abNormal
Business Antifragility: The New abNormal
 
Countering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design IssueCountering Violent Extremism In Urban Environments Through Design Issue
Countering Violent Extremism In Urban Environments Through Design Issue
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Modern Cyber Battlefield - Application of COIN Principals to Today's Kinetic ...
Modern Cyber Battlefield - Application of COIN Principals to Today's Kinetic ...Modern Cyber Battlefield - Application of COIN Principals to Today's Kinetic ...
Modern Cyber Battlefield - Application of COIN Principals to Today's Kinetic ...
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 

Wav Cyber Uk 2012 V2

  • 1. Strategic Culture and Cyber Security Patterson School of Diplomacy & International Commerce 9 April 2012 W. Alexander Vacca, Ph.D. Corporate Director- Business Assessment The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders.
  • 2. How Culture Matters • Shared among groups of individuals – Cross cuts organizational and national boundaries – Cross cuts generations – Cross cuts personal experiences • Provides the “evoked set” of relevant analogies and metaphors – Guides the search for relevant information – Suggests the motives of other actors – Suggests cause-effect relationships – Implies probability of policy success or failure – Constrains the search for policy options • Shapes the processing of new information The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders. 2
  • 3. Two Approaches to Warfare Mahan Douhet The Commons Possess Transverse Offense / Defense Balanced Fleet Best Defense is Offense Force Targeting Military Civil & Industrial “Moral” Effects Secondary Crucial Climax of War Defeat the Fleet Obliterate the Cities The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders. 3
  • 4. Mahan: From SLOC to CLOC • The modern economy is dependent upon the “Cyber Lines of Communication” (CLOC). • Build a force capable of ensuring freedom of the CLOC. Focus efforts on defeating enemy actions within cyberspace, including building a robust defense. The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders. 4
  • 5. Douhet: Victory Through Cyber Power! • Pass through cyberspace to conduct decisive kinetic operations • Defense is a low priority, maintain the ability to conduct cyber offense and achieve cyber deterrence • Civil and industrial targeting can break the will and ability of an enemy to fight • Pay close attention to the links between cyber means and kinetic effects The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders. 5
  • 6. Cyber Security in the USAF Today “Cyber, as a warfighting domain . . . like air, favors the offense. If you’re defending in cyber, you’re already too late. Cyber delivers on the original promise of air power. If you don’t dominate in cyber, you cannot dominate in other domains. If you’re a developed country, you can’t conduct daily life [after a large scale cyber attack], your life comes to a screeching halt.” - Lani Kass (Director USAF Cyberspace Taskforce), 2007 The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders. 6
  • 7. The Rise of Cyber Deterrence • Deterrence is comforting and familiar – For Policymakers: a peaceful and successful Cold War – For the Military: support for military spending – For Analysts: a framework well studied and specified • But is it applicable? – Myriad of cyber actors – Multiple motives for cyber actions – Problems of attribution – Linking deterrent penalties to deterrent triggers • Students of strategic studies and the “Culture of Deterrence”? The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders. 7
  • 8. Some Policy Implications • Knowledge about the roots of analytical perspectives (ie, knowing your history) provides insight into the logic of others. • Beware the logic of policy metaphors and analogies (“e- Katrina”, “Cyber Pearl Harbor”). • Bring multiple cultural perspectives to bear on problems of national importance (especially new problems). The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders. 8
  • 9. For Further Discussion… Gluttons for punishment are advised to consult: Vacca, W. Alexander. “Military Culture and Cyber Security,” Survival 53:6 (December 2011), pages 159-176 The views herein are strictly those of the presenter. They do not necessarily reflect the view of Northrop Grumman, its employees, customers, or shareholders. 9