SlideShare a Scribd company logo
American Military University
Book Review
Of
Cyber War: The Next Threat to National Security and What to Do About It
Authored by
Richard Clarke and Robert Knake
By
CPT Matthew C. Kurnava
Arlington, VA
April 03, 2016
1
In 1982, Robert Schnell’s book The Fate of the Earth hit bookstores across the nation. This
book was not like other books. This book affected the American people in its view of
impending nuclear war like no other book before it. It urged the reader to act and to confront the
issues of nuclear proliferation head on. (Knopff 1982) The book envisioned the world after the
events of a nuclear holocaust. It spoke about what a nuclear holocaust was physically, morally,
and politically. It was remarkable and it affected the way people thought about the nuclear
proliferation and what needed to be done. (Knopff 1982)
Authors Robert Knake and Richard Clarke face a similar problem, a war is looming in
the United States and most Americans are unaware of the capabilities of the weapons of this war
and the effects it could have for the future of the United States. This war does not take place on
a physical battle ground, but within a virtual one. Cyberspace is the battleground, cyber warriors
and hackers are the players and the weapons have the ability to shut down critical infrastructure
from anywhere in the world. This war is a cyber war. Cyber War: The Next Threat to National
Security and What to Do About It, is Knake and Clarke’s venture into revealing this war to its
reader and then propose a solution that could help protect the United States from being shut
down from cyber-attacks.
Summary
It is important to note on what grounds the authors have to speak with authority on their
topic. Although the book was written in 2012, their current profiles reveal a vast amount of
experience in cyber security.
Richard A. Clarke served as a Pentagon official over several positions and as Assistant
Secretary of State before moving on to work in as a White House official for three presidents.
2
During this time, he was “Special Assistant to the President for Global Affairs, Special Advisor
to the President for Cyberspace, and National Coordinator for Security and Counter-terrorism.”
(Enterprise RAC 2016) He also taught at the Harvard School of Government for five years.
(Enterprise RAC 2016)
Robert Knake served as the director for cybersecurity policy at the National Security
Council from 2011 to 2015. (Council of Foreign Relations 2016) He has vast experience in
cyber vulnerability assessment and Federal Computer Week dubbed him the ‘White House’s
Cyber Wizard’ for his work on Executive Order 13636”. (Council of Foreign Relations 2016)
The thesis presented by Knake and Clarke in “Cyber War” is developed into two parts.
The first centralizes on the threat to the United States in cyberspace. They elaborate on how this
threat is real and Cyber War is evident. Secondly, the authors provide a solution regarding the
defensive and offensive strategies for the United States in cyberwar that is government centric.
The book can be separated into two parts. Chapters 1-4 :(1. “Trial Runs”, 2. “Cyber Warriors”,
3. “The Battle Space” ,4. “The Defense Falls”) focus on the journey of Cyber Security, its
development and progress, how it has been conducted and its struggles. The authors show
through these chapters their evidence for the Cyber War that they state we are now facing.
Chapters 5-8: (5. “Toward a Defensive Strategy”, 6. “How Offensive”, 7. “Cyber Peace”, 8.
“The Agenda”) focus on how the authors’ vision to the solutions to our offensive and defensive
strategies in cyber war.
The authors define “cyber war” at the very beginning of chapter one, “Trial Runs”. They
define “cyber war” as “actions by a nation state to penetrate another nation’s computers or
networks for the purpose of causing damage or disruption” (Clarke and Knake 2012,6) From
3
this point forward, the authors go through many key incidents that they use as evidence to
support the following:
1. Cyber war is real
2. Cyber war happens at the speed of light
3. Cyber war is global
4. Cyber war skips battlefields
5. Cyber war has begun
(Clarke and Knake 2012, 30-31)
Knake and Clarke summarize the issues with China and the building of their offensive
strategy throughout chapter two, and detail how vulnerable the United States is to these attacks.
Most of the chapter is focused on China and its capabilities and what they have done or can do
in relation to how the United States is vulnerable. They create an aura of “impending doom” to
the American way of life at the hands of the Chinese blackhat. (Clarke and Knake 2012, 54-62)
The battlefield in which the war is played out is outlined in great detail throughout
chapter three “Battle Space”, it provides the reader with detail on the three things that allow a
cyber war to occur: “1. Flaws in the design of the internet, 2. Flaws in the hardware and
software, 3. The move to put more and more critical systems online” (Clarke and Knake 2012,
73-74) The vulnerabilities of the internet are drawn out by the authors as five vulnerabilities.
They detail these vulnerabilities as:
1. ISP Domain Name System
2. The Border Gateway Protocol
3. Internet is mostly open and unencrypted
4
4.has the ability to spread malware
5. It is one network with decentralized design.
(Clarke and Knake 2012, 73-74)
The authors articulate these vulnerabilities in a prose that everyone can understand and
the explanations of these vulnerabilities seem to “pop” out from the rest of the chapter. They
point out that the flaws in the hardware and the software is a result of being produced by many
different companies and that the various software programs can be “easily tricked by hackers.
(Clarke and Knake 2012, 86-96) The rest of the chapter outlines the vulnerabilities of Industrial
Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems that
are dependent upon the Internet and how they are easily accessible. (Clarke and Knake 2012,
96-91) They provide several examples of how a hacker can attack a system and either take
control of the system or destroy it. (Clarke and Knake 2012, 86-96) These critical systems
control our electricity, water treatment facilities, oil refineries, transportation networks and
communication networks. The authors reveal how an attack on these would prove to be critical
to the infrastructure to any city within the United States.
Chapter four, “The Defense Fails”, details the issues that the United States faced
regarding cyber security through the turn of the century to present. The authors provide detailed
accounts of DDOS attacks and the political reactions of these attacks by the three separate
POTUS during this timeframe [Presidents William Clinton, George W. Bush, Barak Obama].
Salient points to take out of this chapter, other than the review of the creation cyber elements
within the Department of Defense and the advancement of policies for cyber defense during this
time, is the authors chart on cyber war strength. (Clarke and Knake 2012, 103-150) This chart is
5
important because it reveals how the authors view the United States in comparison to other
nations. This chart provides the lead in to the second half of the book on how to improve the
United States cyber capability. The chart is as follows.
NATION CYBER
OFFENSE
CYBER
DEPENDENCE
CYBER
DEFENSE
TOTAL
U.S. 8 2 1 11
Russia 7 5 4 16
China 5 4 6 15
Iran 4 5 3 12
North Korea 2 9 7 18
Table 1:(Clarke and Knake 2012, 148)
It is important to note where the authors place the United States in relation to the other
nations. According to their chart, the United States is the lowest scoring nation state in regards
to the data based on their expertise. And it forms the basis of the second portion of the book in
relation to these weighted factors. As the book notes:
When you think about “defense” capability and “lack of dependency” together,
many nations score far better than the U.S. Their ability to survive a cyber war,
with lower costs, compared to what would happen in the U.S., creates a cyber war
gap. The existence of that “cyber war gap” may tempt some nation to attack the
United States. Closing the gap should be the highest priority of U.S. Cyber warriors.
Improving our offense capability does not do that. It is impossible to reduce our
dependence on networked systems at this point. Hence, the only way we can close
the gap, the only way we can improve our overall Cyber War Strength is to improve
our defenses. Let’s look at how we might do that. (Clarke and Knake 2012, 149)
6
This is where I consider the book diverges from a history and review of cyber war over
the past 25-30 years to the authors’ pragmatic solution of the vulnerabilities already pointed out
in the first half of the book. Clarke and Knake have built their work and poised a problem, but
as any experience professional working in the strategic or operational environment can attest, if
you are going to pose a problem then you must provide a solution. The second half of the book
is Clarke and Knake’s magnum opus [emphasis added]and their pragmatic solution begins with
a solution for a defense strategy.
The key point of chapter five,” Toward a Defensive Strategy” is Clarke and Knake’s
defensive solution described as “The Defensive Triad”. The main point of the Defensive Triad
is “using federal regulation to create cyber security requirements.” (Clarke and Knake 2012,
160)
The first part of the Defense Triad would involve scanning traffic over the “backbone”
of the Internet. The backbone as described by the authors is the Tier 1 providers that provide
internet service [ AT&T, Verizon, Quest, Sprint. Level 3 Communications]. (Clarke and Knake
2012, 160) Clarke and Knake propose a scanning of the internet traffic entering the United
States over the backbone. They also understand that this would pose two significant issues:
technological and policy. The technological issue is overcome by current technology. The
second , which relates to civil liberties, the authors propose that the Tier 1 providers complete
deep packet inspections searching for signatures of malware in incoming traffic and that there
be oversight by a “Privacy and Civil Liberties Board” (Clarke and Knake 2012, 162) The
authors then justify this packet inspection by referencing similar technology already used by
Internet Service Providers, the Department of Homeland Security (DHS) and the Department of
Defense (DOD) (Clarke and Knake 2012, 162-167)
7
The second part of the Triad is a secure power grid. (Clarke and Knake 2012,167)
Clarke and Knake suggest that federal regulation be emplaced to mandate “disconnecting the
power generation and distribution companies from the Internet and then make access to those
networks require authentication” (Clarke and Knake 2012,167). This would entail the
government regulating private sector power companies. The authors propose strict regulations
for power companies to gain pathways from the internet to the Industrial Control Systems
(ICS), These regulations would force the companies to secure their cyber systems. (Clarke and
Knake 2012,169-170).
The third part of the Triad is the Department of Defense (DOD). (Clarke and Knake
2012,176). The authors’ premise is that if there is an attack from another nation state, then it
would occur at a time in which there is “heightened tensions” between the U.S. and the enemy
state. This requires that there be significant IT upgrades for the DOD.
The authors premise is that this Triad would mitigate the effects of any cyber-attack
from an enemy nation state. The remaining three chapters focus on how the United States
should move forward with the Triade as its foundations. Chapter six, “How Offensive” focuses
on the offensive strategy that the United States can enact against other nation states with the
Defense Triad emplace. (Clarke and Knake 2012,179-218). Chapter seven, “Cyber Peace”
reviews international laws that cover cyber war and the multilateral agreements that are of
interest to the United States in this area [rules of cyber war at an international level and
prevention of civilian cyber-attacks] (Clarke and Knake 2012,219-256).
The final chapter, “The Agenda”, sums up what needs to be done to prevent a cyber war.
Clarke and Knake state that there must be a public open talk about cyber war as a threat. (Clarke
and Knake 2012,261). They contend that such an attack will be a surprise and not foreseeable,
8
to which I concur. The second point they reference to prevent a cyber war emphasizes the
emplacement of the Defense Triad. (Clarke and Knake 2012,264). The authors state that in
order to prevent a cyber war that cyber-crime needs to be addressed and significantly reduced.
(Clarke and Knake 2012,276). The next point the authors propose is a Cyber War Limitation
Treaty (CWLT) and propose this at the United Nations (U.N.) The fifth element required to
prevent cyber war proposed is more research into the advancement of alternative network
designs that will be more secure. Finally, the authors propose that the POTUS is necessary to be
involved in the process. They propose that he review what Cyber Command has done in an
annual report and promote the Obama Doctrine of Cyber Equivalence in addresses ensuring that
it is known that a cyber-attack by an enemy state will result with a kinetic response from the
U.S. The authors also provide as a grand finale to the book, an example of a speech that the
POTUS would make to the United Nations General Assembly. (Clarke and Knake 2012,276-
279).
Analysis
The authors aimed to write the book in an “informal style that will be both clear and
occasionally entertaining” (Clarke and Knake 2012, xiii). On this effort, they are successful.
While both authors are subject matters of expertise in the area of cyber security, and although
their aim is to write “informally”, this does not exclude them from properly documenting in
some form their facts as presented in the book. There are no citations, no references and no
bibliography, there is no way to validate anything the authors state and the reader is to take what
is said as being fact without question. The reader is to consider that everything stated is valid
without skepticism. The authors’ qualifications possibly present a valid appeal to qualified
9
authority [emphasis added], but there is the possibility that the facts presented may be
inaccurately represented and subjective relative to the viewpoint of the authors. Experts can be
wrong; this is a possibility. The reason we cite sources on what we state in papers and
informational books such as this is to provide validation to our expertise, to support our
arguments. (Princeton 2011).
Without citations, there leaves the reader with a seed of doubt on whether the authors are
100% accurate in all of their factual claims. This is not to say the facts presented in Cyber War
are incorrect, but their validity can be at least questioned. No one wants to “google” parts of a
book just to ensure they are valid. Academic readers want to be certain that the data presented is
supported by validated sources. While the layperson may accept everything stated as valid, the
academic reader will read it with skepticism when no references or citations are presented.
Another issue that is presented is that the authors present a strong appeal to emotion
(argumentum ad passiones), The book is very subversive in doing so, but it does so nonetheless.
The authors appeal to the reader’s emotion by appealing to their fear on what will happen if a
cyberwar is to occur and uses this fear to aid them in selling their points on what to do about it.
Other reviews have also noticed this “chicken little-ism” (Theirer 2010) and the use of scare
tactics (Single 2010), but maybe this is appeal to emotion is necessary in order for the reader to
buy off on the Triad presented in the second half of the book.
The reasoning is sound, that if the authors want the reader to buy into their defense
strategy without any sourcing of their material, then it is probable that an appeal to the reader’s
fear of a pending cyber war would lay the foundation for the reader to accept the governmental
control of the internet. This government control is central to the authors’ Triad, whether by
10
monitoring Internet traffic or using regulation to force companies to obey the government’s
regulations on how to control. (Clarke and Knake 2012, 162-167)
This is a debatable issue, a poll in 2014 conducted by a market research firm, GfK
showed that 80% of respondents wanted the government to do more to protect the U.S. citizen’s
data. (Duncan 2014) However, a 2013 Pew Internet & American Life Project poll showed that
66% of individuals were concerned about their privacy. (Duncan 2014). The issue of privacy
versus protection is not new and there should be a balance. Clarke and Knake attempt to resolve
the qualms of government involvement by saying that there would be a “Privacy and Civil
Liberties Board” (Clarke and Knake 2012, 162), but amidst the amount of governmental control
they give in their Triad, this seems more like an appeasement effort, a red herring to the reader.
With the amount of experience and expertise the authors have, there is a nagging
question on whether the omission of references and appeal to emotion was intentional in order
for the reader to buy into their Defense Triad. It is plausible that this is their underlying intent.
The authors have had experience attempting to reason cyber war into the ears of politicians for
over a decade (Enterprise RAC 2016) and still there has not been a cyber-attack big enough for
the heads of government to react significantly. It is plausible that the authors attempt to
“exaggerate the threat “(Schneier 2013) and use their method of appealing to emotion to
convince the average American citizen of the impending threat of doom of cyberwar would
initiate the action of the voting citizen. or at least get the conversation started.
A large issue with the book is the very definition of cyber war as defined by Clarke and
Knake.) Within Clarke and Knake’s definition is a limitation that serves the purpose of their
book and support their thesis but it is insufficient outside their book. Their definition focuses
solely on the cyber operations of nation vs nation [emphasis added]. There is a reason that the
11
2015 U.S. Law of War Manual does not use the term “cyber war” but uses terms such as “cyber
operations” (DOD 2015) and this is because other activities occur besides solely for “the
purpose of causing damage or disruption” (Clarke and Knake 2012,6) This includes using
cyberspace for logistics and funding in a war. This is referring to the purchase of weapons or
financing a war through the dark- net and it also involves non state actors, which is another
factor that is left out of Clarke and Knake’s definition.
ISIS, is a non-state actor, but they have used the internet to fund war. ISIS has used the
bitcoin as a method of transferring money to their members (Paganini and Pierluigi 2015). This
is not a direct attack causing “damage or disruption” but it is the funding of non-state actors to
build bombs, purchase weapons and commit terrorist acts. (Paganini and Pierluigi 2015)
Terrorists infiltrate the darknet and commit cybercrimes by stealing funds or acquiring them
illegally on the net via phishing or malware, convert the funds to bit coin and then transfer funds
across the ocean to another terrorist cell. A terrorist can receive funds on their cell phone in the
matter of seconds and convert the bitcoin to local currency. These cybercrimes are advance
force operations and all conducted on the dark net. (Paganini and Pierluigi 2015). These
cybercrime operations are not even considered in the definition presented in the book and they
are the cyber- operations of the non-state group the United States is currently at an “unofficial”
(Timm 2015) war with. (Paganini and Pierluigi 2015).
The definition used in the book meets the needs of the book. but it leaves out vital
points including non-state actors and how cyber operations are used besides the use of hacking.
The use of cyber operations in the DOD Law of War manual seems a more appropriate
definition required when considering all the factors within and those not mentioned.
12
16.1.2 Description of Cyber Operations. Cyberspace operations may be understood to be those operations
that involve “[t]he employment of cyberspace capabilities where the primary purpose is to achieve objectives in or
through cyberspace.”5 Cyber operations: (1) use cyber capabilities, such as computers, software tools, or networks;
and (2) have a primary purpose of achieving objectives or effects in or through cyberspace. (DOD 2015,995)
Using this when referencing cyber activities between state versus state, or state versus
non-state actors allows for all aspects of cyber to be involved. Even this definition is not
stagnant as the 2015 Law of War Manual mentions. (DOD 2015,996) This is a good thing,
cyberspace changes exponentially and the definition should be fluid and all encompassing.
Evaluation
Cyber War by Richard Clarke and Robert Knake was a pleasurable read. With Clarkes’s
experience of writing thriller fiction novels [Break Point and The Scorpion’s Gate], much of the
book read with that thriller aura about it. Clarke’s writing style is exciting and it pulls the reader
in quite efficiently.
At times it is done so well that you do not realize you are reading a nonfiction book; the
lack of citations and notations helps with this too. Clarke is able to, with the assistance of
Knake, build an emotional response from the reader and then at the climatically high point in
the book- sells their point to the reader on how to fix the cyber dilemma in the United States.
When evaluating, there is the question on whether Clarke and Knake purposefully left
out the lack of citations and included the appeal to emotion. These authors are very experienced
and educated, therefore, it is probable that the factors pointed out in the analysis were done
intentionally to draw the reader in. A layperson, with no education in cyber operations, would
be sucked into the book just like it was a thriller novel and the authors would have the reader
eating out of the palms of their hands. There are few books on cyber war and with this intent,
13
not only would it bring awareness, it would bring it with a lightning strike to a reader unfamiliar
with cyber operations.
There are negative reviews of the book by different sources throughout the Internet. A
google search of the book will pick these up. However, these reviews are unwarranted. The
critics did not review the book for what it was. What they did not see, is what the intention of
the book is and consider that the authors knew exactly what they were doing. This book is a
psychological book of persuasion to hook the reader on their solution on how to fix the Cyber
dilemma. This is how you can get past the lack of references and the appeal to emotion,
because they were intentional and they wanted to sell their solution to the reader.
However, while it may be a fun read, this type of book would not make it onto my
reading list. The reason is because while the book has many stories by the author of cyber
operations, they could be subjective in nature and they can’t be validated without picking apart
every fact and then fact checking it. It is also a book to persuade the reader to accept their
resolution through fear and walk a thin line on civil rights. It is a subjective view on cyber war
and I would develop a reading list would contain as many objective based facts as possible
which would include citations and lack appeals to emotion.
Conclusion
Cyber War: The Next Threat to National Security and What to Do About It by Clarke
and Knake is a great read if you can get past the lack of references and citations, the appeal to
emotion [fear] to the reader and the policy suggestions that walk dangerously close to civil
liberty infringements. Also, the book limits the definition on cyber war and focuses purely on
nation state versus nation state operations. Cyber Operations include so much more and to not
14
represent the non-state actor’s involvement in cyber warfare as well as all the other layers of
cyber operations is not fair to the reader. This misrepresents cyber operations for the authors’
sake of selling their solution. You can’t claim the sky is falling when you’ve only covered a
portion of the issues. Since this was written, there has been no polices that look even close to
what Clarke and Knake suggest. The newest law passed, the Cybersecurity Information Sharing
Act of 2015 focused on the sharing of information between the private sector, DHS, FBI, NSA
and other intelligence agencies. (CISA 2015) DOD is not the lead, the Triad is not implemented,
and they sky has not fallen in the 6 years since the book was published. There is still a viable
threat but it is not as apocalyptic as Cyber War envisions it.
15
Reference List
Clarke, Richard A. and Robert K Knake. Cyber War: The Next Threat to National Security and
What to Do About It. New York: HarperCollins Publishers, 2012.
Council of Foreign Relations. "Robert K. Knake." The CFR Think Tank. January 4, 2016.
Accessed March 27, 2016. http://www.cfr.org/experts/cybersecurity-homeland-security-
digital-infrastructure/robert-k-knake/b15502.
Cybersecurity Information Sharing Act of 2015. Congress.Gov. Accessed March 31, 2016.
https://www.congress.gov/bill/114th-congress/house-bill/2029/text [114th Congress (2015-
2016)].
Department of Defense. 2015 Law of War Manual. 2015.
Duncan, Geoff. "Can The Government Regulate Internet Privacy?" Web. April 21, 2014.
Accessed March 29, 2016. http://www.digitaltrends.com/web/government-warn-us-data-
breaches/.
Enterprises, RAC. "Richard A. Clarke.". 2016. Accessed March 27, 2016.
http://www.richardaclarke.net/bio.php.
Kaplan, Rebecca. "W.H. Official: ‘Absolutely, We’re at War with ISIS’.". November 22, 2015.
Accessed March 29, 2016. http://www.cbsnews.com/news/white-house-official-absolutely-
war-with-isis/.
Paganini, +Pierluigi. "The ISIS Advances in The Deepweb Among Bitcoin and Darknets."
Breaking News. May 22, 2015. Accessed March 29, 2016.
http://securityaffairs.co/wordpress/36961/intelligence/isis-in-the-deepweb.html.
Princeton. "When to Cite Sources - Academic Integrity at Princeton University.". 2011.
Accessed March 29, 2016. https://www.princeton.edu/pr/pub/integrity/pages/cite/.
Scialabba, George. "The Fate of the Earth. By Jonathan Schell. Alfred A. Knopf, $11.95.". July
15, 1982. Accessed April 1, 2016. http://www.georgescialabba.net/mtgs/1982/07/the-fate-
of-the-earth-by-jonat.html.
Singel, Ryan. "Richard Clarke’s Cyberwar: File under fiction." Security. April 22, 2010.
Accessed March 29, 2016. http://www.wired.com/2010/04/cyberwar-richard-clarke/.
Schneier, Bruce.The Threat of Cyberwar Has Been Grossly Exaggerated - Schneier On
Security. April 28, 2013. Accessed March 29, 2016.
https://www.schneier.com/blog/archives/2010/07/the_threat_of_c.html.
Thierer, Adam. "Book review: Cyber War by Clarke & Knake.". August 6, 2010. Accessed
March 29, 2016. https://techliberation.com/2010/08/06/book-review-cyber-war-by-clarke-
knake/.
16
Timm, Trevor. "Obama’s Speech Reminded Americans That the War with ISIS Is Still Illegal."
The Guardian. December 7, 2015. Accessed March 29, 2016.
http://www.theguardian.com/commentisfree/2015/dec/06/war-with-isis-illegal-obama-
speech.
Turabian, Kate L, Wayne C Booth, Gregory G. Colomb, Joseph M Williams, and University of
University of Chicago Press Staff. A Manual for Writers of Research Papers, Theses, And
Dissertations, Eighth Edition: Chicago Style for Students and Researchers. 8th ed. Chicago:
University of Chicago Press, 2013.

More Related Content

Viewers also liked

Cronograma 5a semana de julio jt
Cronograma 5a semana de julio jtCronograma 5a semana de julio jt
Cronograma 5a semana de julio jtexeustum
 
Natal e dia de reis
Natal e dia de reisNatal e dia de reis
Natal e dia de reis
eb1penha4
 
Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Matthew Kurnava
 
Pumped On Property - How to replace your current annual salary through proper...
Pumped On Property - How to replace your current annual salary through proper...Pumped On Property - How to replace your current annual salary through proper...
Pumped On Property - How to replace your current annual salary through proper...
Dennis Wong
 
Movimento Hip Hop em Parauapebas
Movimento Hip Hop em ParauapebasMovimento Hip Hop em Parauapebas
Movimento Hip Hop em Parauapebas
Adilson P Motta Motta
 
Actividad 4 Deformadores
Actividad 4 DeformadoresActividad 4 Deformadores
Actividad 4 Deformadores
Jessica Meza
 
Aspectos Econômicos de Bom Jardim (Dados evolutivos)
Aspectos Econômicos de Bom Jardim   (Dados evolutivos)Aspectos Econômicos de Bom Jardim   (Dados evolutivos)
Aspectos Econômicos de Bom Jardim (Dados evolutivos)
Adilson P Motta Motta
 
Cronograma de actividades 2016 26 enero
Cronograma de actividades 2016 26 eneroCronograma de actividades 2016 26 enero
Cronograma de actividades 2016 26 enero
JUA MANUEL GONZALEZ
 
2015 Sustainable Brands Buenos Aires - Simon Mainwaring, We First
2015 Sustainable Brands Buenos Aires - Simon Mainwaring, We First2015 Sustainable Brands Buenos Aires - Simon Mainwaring, We First
2015 Sustainable Brands Buenos Aires - Simon Mainwaring, We First
Simon Mainwaring
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
How to rock the boat and stay in it: The School for Health and Care Radicals
How to rock the boat and stay in it: The School for Health and Care RadicalsHow to rock the boat and stay in it: The School for Health and Care Radicals
How to rock the boat and stay in it: The School for Health and Care Radicals
NHS Horizons
 
Rocking the boat and staying in it: how to be a great change agent
Rocking the boat and staying in it: how to be a great change agentRocking the boat and staying in it: how to be a great change agent
Rocking the boat and staying in it: how to be a great change agent
Helen Bevan
 
Striking the balance: approaches to accountability and quality improvement to...
Striking the balance: approaches to accountability and quality improvement to...Striking the balance: approaches to accountability and quality improvement to...
Striking the balance: approaches to accountability and quality improvement to...
Helen Bevan
 
Profesiografia electricidad y electronica
Profesiografia electricidad y electronicaProfesiografia electricidad y electronica
Profesiografia electricidad y electronica
Enedina Briceño Astuvilca
 
ProFAX - Implementation (Short version)
ProFAX - Implementation (Short version)ProFAX - Implementation (Short version)
ProFAX - Implementation (Short version)
ProFAX
 

Viewers also liked (15)

Cronograma 5a semana de julio jt
Cronograma 5a semana de julio jtCronograma 5a semana de julio jt
Cronograma 5a semana de julio jt
 
Natal e dia de reis
Natal e dia de reisNatal e dia de reis
Natal e dia de reis
 
Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16Kurnava_Matthew_Research Paper_NSEC506_SPR16
Kurnava_Matthew_Research Paper_NSEC506_SPR16
 
Pumped On Property - How to replace your current annual salary through proper...
Pumped On Property - How to replace your current annual salary through proper...Pumped On Property - How to replace your current annual salary through proper...
Pumped On Property - How to replace your current annual salary through proper...
 
Movimento Hip Hop em Parauapebas
Movimento Hip Hop em ParauapebasMovimento Hip Hop em Parauapebas
Movimento Hip Hop em Parauapebas
 
Actividad 4 Deformadores
Actividad 4 DeformadoresActividad 4 Deformadores
Actividad 4 Deformadores
 
Aspectos Econômicos de Bom Jardim (Dados evolutivos)
Aspectos Econômicos de Bom Jardim   (Dados evolutivos)Aspectos Econômicos de Bom Jardim   (Dados evolutivos)
Aspectos Econômicos de Bom Jardim (Dados evolutivos)
 
Cronograma de actividades 2016 26 enero
Cronograma de actividades 2016 26 eneroCronograma de actividades 2016 26 enero
Cronograma de actividades 2016 26 enero
 
2015 Sustainable Brands Buenos Aires - Simon Mainwaring, We First
2015 Sustainable Brands Buenos Aires - Simon Mainwaring, We First2015 Sustainable Brands Buenos Aires - Simon Mainwaring, We First
2015 Sustainable Brands Buenos Aires - Simon Mainwaring, We First
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
How to rock the boat and stay in it: The School for Health and Care Radicals
How to rock the boat and stay in it: The School for Health and Care RadicalsHow to rock the boat and stay in it: The School for Health and Care Radicals
How to rock the boat and stay in it: The School for Health and Care Radicals
 
Rocking the boat and staying in it: how to be a great change agent
Rocking the boat and staying in it: how to be a great change agentRocking the boat and staying in it: how to be a great change agent
Rocking the boat and staying in it: how to be a great change agent
 
Striking the balance: approaches to accountability and quality improvement to...
Striking the balance: approaches to accountability and quality improvement to...Striking the balance: approaches to accountability and quality improvement to...
Striking the balance: approaches to accountability and quality improvement to...
 
Profesiografia electricidad y electronica
Profesiografia electricidad y electronicaProfesiografia electricidad y electronica
Profesiografia electricidad y electronica
 
ProFAX - Implementation (Short version)
ProFAX - Implementation (Short version)ProFAX - Implementation (Short version)
ProFAX - Implementation (Short version)
 

Similar to Kurnava+Book+Review (1)

Cyberpower and National SecurityRelated titles.docx
  Cyberpower and     National SecurityRelated titles.docx  Cyberpower and     National SecurityRelated titles.docx
Cyberpower and National SecurityRelated titles.docx
aryan532920
 
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationCyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationBill Ross
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Mark Raduenzel
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseRepentSinner
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
simisterchristen
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
ShiraPrater50
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
adkinspaige22
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
dondiw
 
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
rhetttrevannion
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docx
charlottej5
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
Lexume1
 
Cyberwar
CyberwarCyberwar
Cyberwar
zapp0
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYAndrew Bichlmeier
 
2 pgapa format 3 sourcesThe threat posed by cyber acto
2 pgapa format 3 sourcesThe threat posed by cyber acto2 pgapa format 3 sourcesThe threat posed by cyber acto
2 pgapa format 3 sourcesThe threat posed by cyber acto
mitziesmith74
 
Raytheon Research Paper
Raytheon Research PaperRaytheon Research Paper
Raytheon Research Paper
Angela Williams
 
s4c.paper2010
s4c.paper2010s4c.paper2010
s4c.paper2010
www.study4cyberwar.com
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
ambersalomon88660
 

Similar to Kurnava+Book+Review (1) (20)

Cyberpower and National SecurityRelated titles.docx
  Cyberpower and     National SecurityRelated titles.docx  Cyberpower and     National SecurityRelated titles.docx
Cyberpower and National SecurityRelated titles.docx
 
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationCyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docxCollege of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
 
Final Paper Draft Outline – Week 7 For the second to last.docx
Final Paper Draft Outline – Week 7  For the second to last.docxFinal Paper Draft Outline – Week 7  For the second to last.docx
Final Paper Draft Outline – Week 7 For the second to last.docx
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Cybersecurity - Cooperation or Proliferation
Cybersecurity -  Cooperation or ProliferationCybersecurity -  Cooperation or Proliferation
Cybersecurity - Cooperation or Proliferation
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
INTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITYINTRODUCTION TO MARITIME CYBERSECURITY
INTRODUCTION TO MARITIME CYBERSECURITY
 
2 pgapa format 3 sourcesThe threat posed by cyber acto
2 pgapa format 3 sourcesThe threat posed by cyber acto2 pgapa format 3 sourcesThe threat posed by cyber acto
2 pgapa format 3 sourcesThe threat posed by cyber acto
 
Raytheon Research Paper
Raytheon Research PaperRaytheon Research Paper
Raytheon Research Paper
 
s4c.paper2010
s4c.paper2010s4c.paper2010
s4c.paper2010
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
 

Kurnava+Book+Review (1)

  • 1. American Military University Book Review Of Cyber War: The Next Threat to National Security and What to Do About It Authored by Richard Clarke and Robert Knake By CPT Matthew C. Kurnava Arlington, VA April 03, 2016
  • 2. 1 In 1982, Robert Schnell’s book The Fate of the Earth hit bookstores across the nation. This book was not like other books. This book affected the American people in its view of impending nuclear war like no other book before it. It urged the reader to act and to confront the issues of nuclear proliferation head on. (Knopff 1982) The book envisioned the world after the events of a nuclear holocaust. It spoke about what a nuclear holocaust was physically, morally, and politically. It was remarkable and it affected the way people thought about the nuclear proliferation and what needed to be done. (Knopff 1982) Authors Robert Knake and Richard Clarke face a similar problem, a war is looming in the United States and most Americans are unaware of the capabilities of the weapons of this war and the effects it could have for the future of the United States. This war does not take place on a physical battle ground, but within a virtual one. Cyberspace is the battleground, cyber warriors and hackers are the players and the weapons have the ability to shut down critical infrastructure from anywhere in the world. This war is a cyber war. Cyber War: The Next Threat to National Security and What to Do About It, is Knake and Clarke’s venture into revealing this war to its reader and then propose a solution that could help protect the United States from being shut down from cyber-attacks. Summary It is important to note on what grounds the authors have to speak with authority on their topic. Although the book was written in 2012, their current profiles reveal a vast amount of experience in cyber security. Richard A. Clarke served as a Pentagon official over several positions and as Assistant Secretary of State before moving on to work in as a White House official for three presidents.
  • 3. 2 During this time, he was “Special Assistant to the President for Global Affairs, Special Advisor to the President for Cyberspace, and National Coordinator for Security and Counter-terrorism.” (Enterprise RAC 2016) He also taught at the Harvard School of Government for five years. (Enterprise RAC 2016) Robert Knake served as the director for cybersecurity policy at the National Security Council from 2011 to 2015. (Council of Foreign Relations 2016) He has vast experience in cyber vulnerability assessment and Federal Computer Week dubbed him the ‘White House’s Cyber Wizard’ for his work on Executive Order 13636”. (Council of Foreign Relations 2016) The thesis presented by Knake and Clarke in “Cyber War” is developed into two parts. The first centralizes on the threat to the United States in cyberspace. They elaborate on how this threat is real and Cyber War is evident. Secondly, the authors provide a solution regarding the defensive and offensive strategies for the United States in cyberwar that is government centric. The book can be separated into two parts. Chapters 1-4 :(1. “Trial Runs”, 2. “Cyber Warriors”, 3. “The Battle Space” ,4. “The Defense Falls”) focus on the journey of Cyber Security, its development and progress, how it has been conducted and its struggles. The authors show through these chapters their evidence for the Cyber War that they state we are now facing. Chapters 5-8: (5. “Toward a Defensive Strategy”, 6. “How Offensive”, 7. “Cyber Peace”, 8. “The Agenda”) focus on how the authors’ vision to the solutions to our offensive and defensive strategies in cyber war. The authors define “cyber war” at the very beginning of chapter one, “Trial Runs”. They define “cyber war” as “actions by a nation state to penetrate another nation’s computers or networks for the purpose of causing damage or disruption” (Clarke and Knake 2012,6) From
  • 4. 3 this point forward, the authors go through many key incidents that they use as evidence to support the following: 1. Cyber war is real 2. Cyber war happens at the speed of light 3. Cyber war is global 4. Cyber war skips battlefields 5. Cyber war has begun (Clarke and Knake 2012, 30-31) Knake and Clarke summarize the issues with China and the building of their offensive strategy throughout chapter two, and detail how vulnerable the United States is to these attacks. Most of the chapter is focused on China and its capabilities and what they have done or can do in relation to how the United States is vulnerable. They create an aura of “impending doom” to the American way of life at the hands of the Chinese blackhat. (Clarke and Knake 2012, 54-62) The battlefield in which the war is played out is outlined in great detail throughout chapter three “Battle Space”, it provides the reader with detail on the three things that allow a cyber war to occur: “1. Flaws in the design of the internet, 2. Flaws in the hardware and software, 3. The move to put more and more critical systems online” (Clarke and Knake 2012, 73-74) The vulnerabilities of the internet are drawn out by the authors as five vulnerabilities. They detail these vulnerabilities as: 1. ISP Domain Name System 2. The Border Gateway Protocol 3. Internet is mostly open and unencrypted
  • 5. 4 4.has the ability to spread malware 5. It is one network with decentralized design. (Clarke and Knake 2012, 73-74) The authors articulate these vulnerabilities in a prose that everyone can understand and the explanations of these vulnerabilities seem to “pop” out from the rest of the chapter. They point out that the flaws in the hardware and the software is a result of being produced by many different companies and that the various software programs can be “easily tricked by hackers. (Clarke and Knake 2012, 86-96) The rest of the chapter outlines the vulnerabilities of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems that are dependent upon the Internet and how they are easily accessible. (Clarke and Knake 2012, 96-91) They provide several examples of how a hacker can attack a system and either take control of the system or destroy it. (Clarke and Knake 2012, 86-96) These critical systems control our electricity, water treatment facilities, oil refineries, transportation networks and communication networks. The authors reveal how an attack on these would prove to be critical to the infrastructure to any city within the United States. Chapter four, “The Defense Fails”, details the issues that the United States faced regarding cyber security through the turn of the century to present. The authors provide detailed accounts of DDOS attacks and the political reactions of these attacks by the three separate POTUS during this timeframe [Presidents William Clinton, George W. Bush, Barak Obama]. Salient points to take out of this chapter, other than the review of the creation cyber elements within the Department of Defense and the advancement of policies for cyber defense during this time, is the authors chart on cyber war strength. (Clarke and Knake 2012, 103-150) This chart is
  • 6. 5 important because it reveals how the authors view the United States in comparison to other nations. This chart provides the lead in to the second half of the book on how to improve the United States cyber capability. The chart is as follows. NATION CYBER OFFENSE CYBER DEPENDENCE CYBER DEFENSE TOTAL U.S. 8 2 1 11 Russia 7 5 4 16 China 5 4 6 15 Iran 4 5 3 12 North Korea 2 9 7 18 Table 1:(Clarke and Knake 2012, 148) It is important to note where the authors place the United States in relation to the other nations. According to their chart, the United States is the lowest scoring nation state in regards to the data based on their expertise. And it forms the basis of the second portion of the book in relation to these weighted factors. As the book notes: When you think about “defense” capability and “lack of dependency” together, many nations score far better than the U.S. Their ability to survive a cyber war, with lower costs, compared to what would happen in the U.S., creates a cyber war gap. The existence of that “cyber war gap” may tempt some nation to attack the United States. Closing the gap should be the highest priority of U.S. Cyber warriors. Improving our offense capability does not do that. It is impossible to reduce our dependence on networked systems at this point. Hence, the only way we can close the gap, the only way we can improve our overall Cyber War Strength is to improve our defenses. Let’s look at how we might do that. (Clarke and Knake 2012, 149)
  • 7. 6 This is where I consider the book diverges from a history and review of cyber war over the past 25-30 years to the authors’ pragmatic solution of the vulnerabilities already pointed out in the first half of the book. Clarke and Knake have built their work and poised a problem, but as any experience professional working in the strategic or operational environment can attest, if you are going to pose a problem then you must provide a solution. The second half of the book is Clarke and Knake’s magnum opus [emphasis added]and their pragmatic solution begins with a solution for a defense strategy. The key point of chapter five,” Toward a Defensive Strategy” is Clarke and Knake’s defensive solution described as “The Defensive Triad”. The main point of the Defensive Triad is “using federal regulation to create cyber security requirements.” (Clarke and Knake 2012, 160) The first part of the Defense Triad would involve scanning traffic over the “backbone” of the Internet. The backbone as described by the authors is the Tier 1 providers that provide internet service [ AT&T, Verizon, Quest, Sprint. Level 3 Communications]. (Clarke and Knake 2012, 160) Clarke and Knake propose a scanning of the internet traffic entering the United States over the backbone. They also understand that this would pose two significant issues: technological and policy. The technological issue is overcome by current technology. The second , which relates to civil liberties, the authors propose that the Tier 1 providers complete deep packet inspections searching for signatures of malware in incoming traffic and that there be oversight by a “Privacy and Civil Liberties Board” (Clarke and Knake 2012, 162) The authors then justify this packet inspection by referencing similar technology already used by Internet Service Providers, the Department of Homeland Security (DHS) and the Department of Defense (DOD) (Clarke and Knake 2012, 162-167)
  • 8. 7 The second part of the Triad is a secure power grid. (Clarke and Knake 2012,167) Clarke and Knake suggest that federal regulation be emplaced to mandate “disconnecting the power generation and distribution companies from the Internet and then make access to those networks require authentication” (Clarke and Knake 2012,167). This would entail the government regulating private sector power companies. The authors propose strict regulations for power companies to gain pathways from the internet to the Industrial Control Systems (ICS), These regulations would force the companies to secure their cyber systems. (Clarke and Knake 2012,169-170). The third part of the Triad is the Department of Defense (DOD). (Clarke and Knake 2012,176). The authors’ premise is that if there is an attack from another nation state, then it would occur at a time in which there is “heightened tensions” between the U.S. and the enemy state. This requires that there be significant IT upgrades for the DOD. The authors premise is that this Triad would mitigate the effects of any cyber-attack from an enemy nation state. The remaining three chapters focus on how the United States should move forward with the Triade as its foundations. Chapter six, “How Offensive” focuses on the offensive strategy that the United States can enact against other nation states with the Defense Triad emplace. (Clarke and Knake 2012,179-218). Chapter seven, “Cyber Peace” reviews international laws that cover cyber war and the multilateral agreements that are of interest to the United States in this area [rules of cyber war at an international level and prevention of civilian cyber-attacks] (Clarke and Knake 2012,219-256). The final chapter, “The Agenda”, sums up what needs to be done to prevent a cyber war. Clarke and Knake state that there must be a public open talk about cyber war as a threat. (Clarke and Knake 2012,261). They contend that such an attack will be a surprise and not foreseeable,
  • 9. 8 to which I concur. The second point they reference to prevent a cyber war emphasizes the emplacement of the Defense Triad. (Clarke and Knake 2012,264). The authors state that in order to prevent a cyber war that cyber-crime needs to be addressed and significantly reduced. (Clarke and Knake 2012,276). The next point the authors propose is a Cyber War Limitation Treaty (CWLT) and propose this at the United Nations (U.N.) The fifth element required to prevent cyber war proposed is more research into the advancement of alternative network designs that will be more secure. Finally, the authors propose that the POTUS is necessary to be involved in the process. They propose that he review what Cyber Command has done in an annual report and promote the Obama Doctrine of Cyber Equivalence in addresses ensuring that it is known that a cyber-attack by an enemy state will result with a kinetic response from the U.S. The authors also provide as a grand finale to the book, an example of a speech that the POTUS would make to the United Nations General Assembly. (Clarke and Knake 2012,276- 279). Analysis The authors aimed to write the book in an “informal style that will be both clear and occasionally entertaining” (Clarke and Knake 2012, xiii). On this effort, they are successful. While both authors are subject matters of expertise in the area of cyber security, and although their aim is to write “informally”, this does not exclude them from properly documenting in some form their facts as presented in the book. There are no citations, no references and no bibliography, there is no way to validate anything the authors state and the reader is to take what is said as being fact without question. The reader is to consider that everything stated is valid without skepticism. The authors’ qualifications possibly present a valid appeal to qualified
  • 10. 9 authority [emphasis added], but there is the possibility that the facts presented may be inaccurately represented and subjective relative to the viewpoint of the authors. Experts can be wrong; this is a possibility. The reason we cite sources on what we state in papers and informational books such as this is to provide validation to our expertise, to support our arguments. (Princeton 2011). Without citations, there leaves the reader with a seed of doubt on whether the authors are 100% accurate in all of their factual claims. This is not to say the facts presented in Cyber War are incorrect, but their validity can be at least questioned. No one wants to “google” parts of a book just to ensure they are valid. Academic readers want to be certain that the data presented is supported by validated sources. While the layperson may accept everything stated as valid, the academic reader will read it with skepticism when no references or citations are presented. Another issue that is presented is that the authors present a strong appeal to emotion (argumentum ad passiones), The book is very subversive in doing so, but it does so nonetheless. The authors appeal to the reader’s emotion by appealing to their fear on what will happen if a cyberwar is to occur and uses this fear to aid them in selling their points on what to do about it. Other reviews have also noticed this “chicken little-ism” (Theirer 2010) and the use of scare tactics (Single 2010), but maybe this is appeal to emotion is necessary in order for the reader to buy off on the Triad presented in the second half of the book. The reasoning is sound, that if the authors want the reader to buy into their defense strategy without any sourcing of their material, then it is probable that an appeal to the reader’s fear of a pending cyber war would lay the foundation for the reader to accept the governmental control of the internet. This government control is central to the authors’ Triad, whether by
  • 11. 10 monitoring Internet traffic or using regulation to force companies to obey the government’s regulations on how to control. (Clarke and Knake 2012, 162-167) This is a debatable issue, a poll in 2014 conducted by a market research firm, GfK showed that 80% of respondents wanted the government to do more to protect the U.S. citizen’s data. (Duncan 2014) However, a 2013 Pew Internet & American Life Project poll showed that 66% of individuals were concerned about their privacy. (Duncan 2014). The issue of privacy versus protection is not new and there should be a balance. Clarke and Knake attempt to resolve the qualms of government involvement by saying that there would be a “Privacy and Civil Liberties Board” (Clarke and Knake 2012, 162), but amidst the amount of governmental control they give in their Triad, this seems more like an appeasement effort, a red herring to the reader. With the amount of experience and expertise the authors have, there is a nagging question on whether the omission of references and appeal to emotion was intentional in order for the reader to buy into their Defense Triad. It is plausible that this is their underlying intent. The authors have had experience attempting to reason cyber war into the ears of politicians for over a decade (Enterprise RAC 2016) and still there has not been a cyber-attack big enough for the heads of government to react significantly. It is plausible that the authors attempt to “exaggerate the threat “(Schneier 2013) and use their method of appealing to emotion to convince the average American citizen of the impending threat of doom of cyberwar would initiate the action of the voting citizen. or at least get the conversation started. A large issue with the book is the very definition of cyber war as defined by Clarke and Knake.) Within Clarke and Knake’s definition is a limitation that serves the purpose of their book and support their thesis but it is insufficient outside their book. Their definition focuses solely on the cyber operations of nation vs nation [emphasis added]. There is a reason that the
  • 12. 11 2015 U.S. Law of War Manual does not use the term “cyber war” but uses terms such as “cyber operations” (DOD 2015) and this is because other activities occur besides solely for “the purpose of causing damage or disruption” (Clarke and Knake 2012,6) This includes using cyberspace for logistics and funding in a war. This is referring to the purchase of weapons or financing a war through the dark- net and it also involves non state actors, which is another factor that is left out of Clarke and Knake’s definition. ISIS, is a non-state actor, but they have used the internet to fund war. ISIS has used the bitcoin as a method of transferring money to their members (Paganini and Pierluigi 2015). This is not a direct attack causing “damage or disruption” but it is the funding of non-state actors to build bombs, purchase weapons and commit terrorist acts. (Paganini and Pierluigi 2015) Terrorists infiltrate the darknet and commit cybercrimes by stealing funds or acquiring them illegally on the net via phishing or malware, convert the funds to bit coin and then transfer funds across the ocean to another terrorist cell. A terrorist can receive funds on their cell phone in the matter of seconds and convert the bitcoin to local currency. These cybercrimes are advance force operations and all conducted on the dark net. (Paganini and Pierluigi 2015). These cybercrime operations are not even considered in the definition presented in the book and they are the cyber- operations of the non-state group the United States is currently at an “unofficial” (Timm 2015) war with. (Paganini and Pierluigi 2015). The definition used in the book meets the needs of the book. but it leaves out vital points including non-state actors and how cyber operations are used besides the use of hacking. The use of cyber operations in the DOD Law of War manual seems a more appropriate definition required when considering all the factors within and those not mentioned.
  • 13. 12 16.1.2 Description of Cyber Operations. Cyberspace operations may be understood to be those operations that involve “[t]he employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace.”5 Cyber operations: (1) use cyber capabilities, such as computers, software tools, or networks; and (2) have a primary purpose of achieving objectives or effects in or through cyberspace. (DOD 2015,995) Using this when referencing cyber activities between state versus state, or state versus non-state actors allows for all aspects of cyber to be involved. Even this definition is not stagnant as the 2015 Law of War Manual mentions. (DOD 2015,996) This is a good thing, cyberspace changes exponentially and the definition should be fluid and all encompassing. Evaluation Cyber War by Richard Clarke and Robert Knake was a pleasurable read. With Clarkes’s experience of writing thriller fiction novels [Break Point and The Scorpion’s Gate], much of the book read with that thriller aura about it. Clarke’s writing style is exciting and it pulls the reader in quite efficiently. At times it is done so well that you do not realize you are reading a nonfiction book; the lack of citations and notations helps with this too. Clarke is able to, with the assistance of Knake, build an emotional response from the reader and then at the climatically high point in the book- sells their point to the reader on how to fix the cyber dilemma in the United States. When evaluating, there is the question on whether Clarke and Knake purposefully left out the lack of citations and included the appeal to emotion. These authors are very experienced and educated, therefore, it is probable that the factors pointed out in the analysis were done intentionally to draw the reader in. A layperson, with no education in cyber operations, would be sucked into the book just like it was a thriller novel and the authors would have the reader eating out of the palms of their hands. There are few books on cyber war and with this intent,
  • 14. 13 not only would it bring awareness, it would bring it with a lightning strike to a reader unfamiliar with cyber operations. There are negative reviews of the book by different sources throughout the Internet. A google search of the book will pick these up. However, these reviews are unwarranted. The critics did not review the book for what it was. What they did not see, is what the intention of the book is and consider that the authors knew exactly what they were doing. This book is a psychological book of persuasion to hook the reader on their solution on how to fix the Cyber dilemma. This is how you can get past the lack of references and the appeal to emotion, because they were intentional and they wanted to sell their solution to the reader. However, while it may be a fun read, this type of book would not make it onto my reading list. The reason is because while the book has many stories by the author of cyber operations, they could be subjective in nature and they can’t be validated without picking apart every fact and then fact checking it. It is also a book to persuade the reader to accept their resolution through fear and walk a thin line on civil rights. It is a subjective view on cyber war and I would develop a reading list would contain as many objective based facts as possible which would include citations and lack appeals to emotion. Conclusion Cyber War: The Next Threat to National Security and What to Do About It by Clarke and Knake is a great read if you can get past the lack of references and citations, the appeal to emotion [fear] to the reader and the policy suggestions that walk dangerously close to civil liberty infringements. Also, the book limits the definition on cyber war and focuses purely on nation state versus nation state operations. Cyber Operations include so much more and to not
  • 15. 14 represent the non-state actor’s involvement in cyber warfare as well as all the other layers of cyber operations is not fair to the reader. This misrepresents cyber operations for the authors’ sake of selling their solution. You can’t claim the sky is falling when you’ve only covered a portion of the issues. Since this was written, there has been no polices that look even close to what Clarke and Knake suggest. The newest law passed, the Cybersecurity Information Sharing Act of 2015 focused on the sharing of information between the private sector, DHS, FBI, NSA and other intelligence agencies. (CISA 2015) DOD is not the lead, the Triad is not implemented, and they sky has not fallen in the 6 years since the book was published. There is still a viable threat but it is not as apocalyptic as Cyber War envisions it.
  • 16. 15 Reference List Clarke, Richard A. and Robert K Knake. Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins Publishers, 2012. Council of Foreign Relations. "Robert K. Knake." The CFR Think Tank. January 4, 2016. Accessed March 27, 2016. http://www.cfr.org/experts/cybersecurity-homeland-security- digital-infrastructure/robert-k-knake/b15502. Cybersecurity Information Sharing Act of 2015. Congress.Gov. Accessed March 31, 2016. https://www.congress.gov/bill/114th-congress/house-bill/2029/text [114th Congress (2015- 2016)]. Department of Defense. 2015 Law of War Manual. 2015. Duncan, Geoff. "Can The Government Regulate Internet Privacy?" Web. April 21, 2014. Accessed March 29, 2016. http://www.digitaltrends.com/web/government-warn-us-data- breaches/. Enterprises, RAC. "Richard A. Clarke.". 2016. Accessed March 27, 2016. http://www.richardaclarke.net/bio.php. Kaplan, Rebecca. "W.H. Official: ‘Absolutely, We’re at War with ISIS’.". November 22, 2015. Accessed March 29, 2016. http://www.cbsnews.com/news/white-house-official-absolutely- war-with-isis/. Paganini, +Pierluigi. "The ISIS Advances in The Deepweb Among Bitcoin and Darknets." Breaking News. May 22, 2015. Accessed March 29, 2016. http://securityaffairs.co/wordpress/36961/intelligence/isis-in-the-deepweb.html. Princeton. "When to Cite Sources - Academic Integrity at Princeton University.". 2011. Accessed March 29, 2016. https://www.princeton.edu/pr/pub/integrity/pages/cite/. Scialabba, George. "The Fate of the Earth. By Jonathan Schell. Alfred A. Knopf, $11.95.". July 15, 1982. Accessed April 1, 2016. http://www.georgescialabba.net/mtgs/1982/07/the-fate- of-the-earth-by-jonat.html. Singel, Ryan. "Richard Clarke’s Cyberwar: File under fiction." Security. April 22, 2010. Accessed March 29, 2016. http://www.wired.com/2010/04/cyberwar-richard-clarke/. Schneier, Bruce.The Threat of Cyberwar Has Been Grossly Exaggerated - Schneier On Security. April 28, 2013. Accessed March 29, 2016. https://www.schneier.com/blog/archives/2010/07/the_threat_of_c.html. Thierer, Adam. "Book review: Cyber War by Clarke & Knake.". August 6, 2010. Accessed March 29, 2016. https://techliberation.com/2010/08/06/book-review-cyber-war-by-clarke- knake/.
  • 17. 16 Timm, Trevor. "Obama’s Speech Reminded Americans That the War with ISIS Is Still Illegal." The Guardian. December 7, 2015. Accessed March 29, 2016. http://www.theguardian.com/commentisfree/2015/dec/06/war-with-isis-illegal-obama- speech. Turabian, Kate L, Wayne C Booth, Gregory G. Colomb, Joseph M Williams, and University of University of Chicago Press Staff. A Manual for Writers of Research Papers, Theses, And Dissertations, Eighth Edition: Chicago Style for Students and Researchers. 8th ed. Chicago: University of Chicago Press, 2013.