SlideShare a Scribd company logo
Space and Cyber: Roles
and Issues in Deterrence
Cross-Domain Deterrence Seminar
Lawrence Livermore National Laboratory
Livermore, California
November 18, 2014
Bruce W. MacDonald
United States Institute of Peace
Johns Hopkins University,
School of Advanced International Studies
2
Serious Risks of Future
Space/Cyber Instability
Technical challenge/cost for China and Russia to
develop credible space offense/cyber attack capa-
bilities are reasonable for military benefits provided
There is thus an inherent risk of strategic instability
when relatively modest defense investments can
create disproportionate danger to an adversary
For peer/near-peer powers, a disabling space/cyber
first strike against an adversary seems far preferable
to, and easier to execute than, retaliating
This is the essence of crisis instability, when pre-
empting pays far greater benefits than retaliating
Future depends on how architectures and
perceptions will shape the strategic landscape
Space/Cyber Domains Different, Less
Predictable Than Nuclear/Conventional
Monitoring adversary capabilities and damage
assessment much more difficult, especially for cyber
Capability costs are modest for potential benefits, <<
nuclear/conventional costs
Larger the scope of use, larger the uncertainty of
impact level, given levels of interconnection
For space, no equivalent to SSBN/SLBM force to
provide assured retaliation; cyber situation more
mixed but hardly reassuring
Strategic level attacks potentially devastating but
limited attacks often tactically useful
3
Escalation
At tactical level, very easy to breach threshold into space
and cyber use
– Often tactically useful, EW/jamming precedents, “bloodless”
For near future, other than as a signaling device, not
much to be gained from gradual escalation in space or
cyber in a deep crisis
Once an uncertain threshold breached, potential is great
for rapid escalation, especially if breach substantial
– Ephemeral nature of cyberweapons, gives adversary less time to
button up/retaliate, inexperience w/space-cyber conflict
A de minimis threshold below which escalation risks are
minimal? How far can one go before instability occurs?
Major strategic/economic attacks very risky, likely to lead
to all-out strategic conflict, even if non-nuclear
Tactical use of space/cyber has long history, could be a
“gateway drug” to escalation, even strategic use
4
5
Uncertainty and Risk Aversion
Hard to know adversary weaponry numbers or capability
Space and cyber experiencing rapid technological
change; in cyber, architectures/software constantly
changing, so weapon effectiveness changing as well
Advanced country cross-domain interconnectedness
growing exponentially, so even more effects uncertainty
U.S. alliances add a major caution to our adversaries
Worst case assessments of crippling capabilities could
be self-deterring, hence …
Possible firebreak: Risk Aversion
– Attacker uncertain of both attack effectiveness, adversary
retaliation, and vice versa
– “Hysteresis effect” may provide limited stability in a crisis, help
discourage significant first use, and escalation in conflict
– Effect probably becomes more pronounced the more “strategic”
the level of attack considered
Can Deterrence/Hysteresis Last Until
Space/Cyber Resilience Is Achieved?
Impact of hysteresis likely becomes more pronounced
the more “strategic” the level of attack being considered
What are key thresholds? Are they robust?
– Any use of space/cyber offense No
– Isolated use No
– Tactical use Likely No
– Regional use Maybe
– Strategic use Probably Yes
Resilience is great space/cyber goal, but no silver bullet
Is it achievable? If achieved, can it be maintained?
Adversaries will seek countermeasures, as we likely would
against, e.g., Chinese/Russian resiliency measures
Measure/countermeasure competition seems likely
If resilience is too effective, would there be “moral
hazard” problems, i.e., becomes easier to escalate? 7
Contact Information
Bruce W. MacDonald
Adjunct Professor, Johns Hopkins University/SAIS
Special Advisor
Arms Control and Nonproliferation Project
United States Institute of Peace
2301 Constitution Avenue, NW
Washington, D.C. 20036
(202) 429-3832
bmacdonald@usip.org
Adjunct Professor
Johns Hopkins University
School of Advanced International Studies
9
Space Deterrence and Extended Deterrence
Collateral effects are a serious drawback when targeted
space assets also serve commercial customers
– Will carriers hesitate to provide services in conflict?
But mixing military and commercial, U.S. and friendly
foreign, payloads probably strengthens space deterrence
– Other countries have greater stake in space stability, raises the
price for adversaries (and U.S.) to initiate space attacks
Extended deterrence operates in space and cyber
domains: explicit alliance security guarantees raise
stakes of attacking any alliance member
Probably a lower threshold to this effect – but where is it?
For a change, extended deterrence appears to be more
of a two-way street in space, with allies making a
concrete contribution: attacking mixed use space assets
is an attack on all the users of the assets, not just U.S.
Challenge to Space Stability:
No Clear SLBM Analogue
Most stabilizing aspect of strategic nuclear balance is the
SSBN/SLBM element – assures devastating 2nd strike: is a
secure second strike OCS capability possible?
Invisible Arsenals – Space, and especially cyber, are
“murky to invisible”
Worst case capability assessments could be self-deterring
Also, arsenal effectiveness has lower confidence from
dynamic technological environment, especially for cyber
Highly uncertain collateral/unintended effects of
countervalue space/cyber attacks also could be self-
deterring – like virulent bioweapons
But how do you deter without making public your
capabilities? 10

More Related Content

What's hot

Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
Clifford Stone
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
Joey Hernandez
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
Talwant Singh
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
Technology and changing nature of warfare
Technology and changing nature of warfareTechnology and changing nature of warfare
Technology and changing nature of warfare
andeedalal
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
David Sweigert
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
Luis Borges Gouveia
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
Dibyendu Paul
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share
104016032
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern War
Stanford University
 
Introduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk AnalysisIntroduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk Analysis
"Apolonio \"Apps\"" Garcia
 
Innovation In Military Technology
Innovation In Military TechnologyInnovation In Military Technology
Innovation In Military Technology
Christopher Chong
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information Warfare
Jeffrey Malone
 
Sea Watch H4D 2020 Lessons Learned
Sea Watch H4D 2020 Lessons LearnedSea Watch H4D 2020 Lessons Learned
Sea Watch H4D 2020 Lessons Learned
Stanford University
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
Love Steven
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
AFCEA International
 
Security managment risks, controls and incidents
Security managment   risks, controls and incidentsSecurity managment   risks, controls and incidents
Security managment risks, controls and incidents
Edinburgh Napier University
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
Government
 
4GW
4GW4GW
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptxSentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
ssuser951f851
 

What's hot (20)

Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Technology and changing nature of warfare
Technology and changing nature of warfareTechnology and changing nature of warfare
Technology and changing nature of warfare
 
Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern War
 
Introduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk AnalysisIntroduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk Analysis
 
Innovation In Military Technology
Innovation In Military TechnologyInnovation In Military Technology
Innovation In Military Technology
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information Warfare
 
Sea Watch H4D 2020 Lessons Learned
Sea Watch H4D 2020 Lessons LearnedSea Watch H4D 2020 Lessons Learned
Sea Watch H4D 2020 Lessons Learned
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
 
Security managment risks, controls and incidents
Security managment   risks, controls and incidentsSecurity managment   risks, controls and incidents
Security managment risks, controls and incidents
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
4GW
4GW4GW
4GW
 
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptxSentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
SentinelOne-Connector-For-Fortinet-Launch-Deck-Final (1).pptx
 

Viewers also liked

The Cyber Pearl Harbor
The Cyber Pearl HarborThe Cyber Pearl Harbor
Target Fabrication Capabilities
Target Fabrication CapabilitiesTarget Fabrication Capabilities
Target Fabrication Capabilities
Lawrence Livermore National Laboratory
 
Next-Generation Optical Fiber Fabrication
Next-Generation Optical Fiber FabricationNext-Generation Optical Fiber Fabrication
Next-Generation Optical Fiber Fabrication
Lawrence Livermore National Laboratory
 
Lessons Learned from Analysis of Minimum Deterrence Proposals
Lessons Learned from Analysis of Minimum Deterrence ProposalsLessons Learned from Analysis of Minimum Deterrence Proposals
Lessons Learned from Analysis of Minimum Deterrence Proposals
Lawrence Livermore National Laboratory
 
LLNL 2015 Year in Review
LLNL 2015 Year in ReviewLLNL 2015 Year in Review
LLNL 2015 Year in Review
Lawrence Livermore National Laboratory
 
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
Lawrence Livermore National Laboratory
 
Portunus webinar: Floating port technologies could revolutionize container co...
Portunus webinar: Floating port technologies could revolutionize container co...Portunus webinar: Floating port technologies could revolutionize container co...
Portunus webinar: Floating port technologies could revolutionize container co...
Lawrence Livermore National Laboratory
 
2016 Year In Review
2016 Year In Review2016 Year In Review

Viewers also liked (8)

The Cyber Pearl Harbor
The Cyber Pearl HarborThe Cyber Pearl Harbor
The Cyber Pearl Harbor
 
Target Fabrication Capabilities
Target Fabrication CapabilitiesTarget Fabrication Capabilities
Target Fabrication Capabilities
 
Next-Generation Optical Fiber Fabrication
Next-Generation Optical Fiber FabricationNext-Generation Optical Fiber Fabrication
Next-Generation Optical Fiber Fabrication
 
Lessons Learned from Analysis of Minimum Deterrence Proposals
Lessons Learned from Analysis of Minimum Deterrence ProposalsLessons Learned from Analysis of Minimum Deterrence Proposals
Lessons Learned from Analysis of Minimum Deterrence Proposals
 
LLNL 2015 Year in Review
LLNL 2015 Year in ReviewLLNL 2015 Year in Review
LLNL 2015 Year in Review
 
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
All About that Bayes: Probability, Statistics, and the Quest to Quantify Unce...
 
Portunus webinar: Floating port technologies could revolutionize container co...
Portunus webinar: Floating port technologies could revolutionize container co...Portunus webinar: Floating port technologies could revolutionize container co...
Portunus webinar: Floating port technologies could revolutionize container co...
 
2016 Year In Review
2016 Year In Review2016 Year In Review
2016 Year In Review
 

Similar to Space and Cyber: Roles and Issues in Deterrence

CSBA Changing The Game
CSBA Changing The GameCSBA Changing The Game
CSBA Changing The Game
Dmitry Tseitlin
 
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
ijsptm
 
2010 Mad Scientist EXUM
2010 Mad Scientist EXUM2010 Mad Scientist EXUM
2010 Mad Scientist EXUM
US Army TRADOC G2
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
CODE BLUE
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
dacooil
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
dacooil
 
Pa862
Pa862Pa862
Meeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domainMeeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domain
Darwin Chimbo
 
Making Sense of Cyberwar 2014
Making Sense of Cyberwar 2014Making Sense of Cyberwar 2014
Making Sense of Cyberwar 2014
- Mark - Fullbright
 
Navy Sea Air Battle Concept May 2013
Navy Sea Air Battle Concept May 2013Navy Sea Air Battle Concept May 2013
Navy Sea Air Battle Concept May 2013
Tom "Blad" Lindblad
 
Army Futures Command Concept for Special Operations 2028
Army Futures Command Concept for Special Operations 2028Army Futures Command Concept for Special Operations 2028
Army Futures Command Concept for Special Operations 2028
Neil McDonnell
 
Defense technology writing sample
Defense technology writing sampleDefense technology writing sample
Defense technology writing sample
Bernie Adelsberger
 
Timmons NPS Thesis
Timmons NPS ThesisTimmons NPS Thesis
Timmons NPS Thesis
Ron Timmons
 
ekmektsioglou.pdf
ekmektsioglou.pdfekmektsioglou.pdf
ekmektsioglou.pdf
ssuser0a9f64
 
Medical Final Report
Medical Final ReportMedical Final Report
Medical Final Report
Mary Keith
 
Pendall Ebo National Power
Pendall Ebo National PowerPendall Ebo National Power
Pendall Ebo National Power
pendalld
 
2022 Annual Threat Assessment
2022 Annual Threat Assessment 2022 Annual Threat Assessment
2022 Annual Threat Assessment
GE 94
 
Poster for Undergraduate Research Symposium February 27th, 2014
Poster for Undergraduate Research Symposium February 27th, 2014Poster for Undergraduate Research Symposium February 27th, 2014
Poster for Undergraduate Research Symposium February 27th, 2014
Jeandona Doreste
 
Defense against Drones- Understand Challenges and Solutions.pdf
Defense against Drones- Understand Challenges and Solutions.pdfDefense against Drones- Understand Challenges and Solutions.pdf
Defense against Drones- Understand Challenges and Solutions.pdf
NovoQuad
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
ShiraPrater50
 

Similar to Space and Cyber: Roles and Issues in Deterrence (20)

CSBA Changing The Game
CSBA Changing The GameCSBA Changing The Game
CSBA Changing The Game
 
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN ...
 
2010 Mad Scientist EXUM
2010 Mad Scientist EXUM2010 Mad Scientist EXUM
2010 Mad Scientist EXUM
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
 
Evolution terriskmod woo_journalre
Evolution terriskmod woo_journalreEvolution terriskmod woo_journalre
Evolution terriskmod woo_journalre
 
Pa862
Pa862Pa862
Pa862
 
Meeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domainMeeting national security_space_needs_in_the_contested_cyberspace_domain
Meeting national security_space_needs_in_the_contested_cyberspace_domain
 
Making Sense of Cyberwar 2014
Making Sense of Cyberwar 2014Making Sense of Cyberwar 2014
Making Sense of Cyberwar 2014
 
Navy Sea Air Battle Concept May 2013
Navy Sea Air Battle Concept May 2013Navy Sea Air Battle Concept May 2013
Navy Sea Air Battle Concept May 2013
 
Army Futures Command Concept for Special Operations 2028
Army Futures Command Concept for Special Operations 2028Army Futures Command Concept for Special Operations 2028
Army Futures Command Concept for Special Operations 2028
 
Defense technology writing sample
Defense technology writing sampleDefense technology writing sample
Defense technology writing sample
 
Timmons NPS Thesis
Timmons NPS ThesisTimmons NPS Thesis
Timmons NPS Thesis
 
ekmektsioglou.pdf
ekmektsioglou.pdfekmektsioglou.pdf
ekmektsioglou.pdf
 
Medical Final Report
Medical Final ReportMedical Final Report
Medical Final Report
 
Pendall Ebo National Power
Pendall Ebo National PowerPendall Ebo National Power
Pendall Ebo National Power
 
2022 Annual Threat Assessment
2022 Annual Threat Assessment 2022 Annual Threat Assessment
2022 Annual Threat Assessment
 
Poster for Undergraduate Research Symposium February 27th, 2014
Poster for Undergraduate Research Symposium February 27th, 2014Poster for Undergraduate Research Symposium February 27th, 2014
Poster for Undergraduate Research Symposium February 27th, 2014
 
Defense against Drones- Understand Challenges and Solutions.pdf
Defense against Drones- Understand Challenges and Solutions.pdfDefense against Drones- Understand Challenges and Solutions.pdf
Defense against Drones- Understand Challenges and Solutions.pdf
 
College of Doctoral StudiesRES-845 Module 2 Problem.docx
        College of Doctoral StudiesRES-845 Module 2 Problem.docx        College of Doctoral StudiesRES-845 Module 2 Problem.docx
College of Doctoral StudiesRES-845 Module 2 Problem.docx
 

Recently uploaded

2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
JSchaus & Associates
 
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
yemqpj
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
JSchaus & Associates
 
加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样
uu1psyf6
 
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Christina Parmionova
 
How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
Aggregage
 
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
Cori Faklaris
 
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptxPUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
Marked12
 
China Politics social economic political
China Politics social economic politicalChina Politics social economic political
China Politics social economic political
ajatjamwal123
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
Partito democratico
 
Awaken new depths - World Ocean Day 2024, June 8th.
Awaken new depths - World Ocean Day 2024, June 8th.Awaken new depths - World Ocean Day 2024, June 8th.
Awaken new depths - World Ocean Day 2024, June 8th.
Christina Parmionova
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
narinav14
 
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
yemqpj
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
Scalabrini Institute for Human Mobility in Africa
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
9d5c8i83
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
JSchaus & Associates
 
Practical guide for the celebration of World Environment Day on june 5th.
Practical guide for the  celebration of World Environment Day on  june 5th.Practical guide for the  celebration of World Environment Day on  june 5th.
Practical guide for the celebration of World Environment Day on june 5th.
Christina Parmionova
 
IEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- StatisticsIEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- Statistics
Energy for One World
 
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
ii2sh2v
 
Circular Economy implementation in the EU
Circular Economy implementation in the EUCircular Economy implementation in the EU
Circular Economy implementation in the EU
HasanHamdan9
 

Recently uploaded (20)

2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
 
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
 
加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样加急办理华威大学毕业证硕士文凭证书原版一模一样
加急办理华威大学毕业证硕士文凭证书原版一模一样
 
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.
 
How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
 
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
 
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptxPUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
PUBLIC FINANCIAL MANAGEMENT SYSTEM (PFMS) and DBT.pptx
 
China Politics social economic political
China Politics social economic politicalChina Politics social economic political
China Politics social economic political
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
 
Awaken new depths - World Ocean Day 2024, June 8th.
Awaken new depths - World Ocean Day 2024, June 8th.Awaken new depths - World Ocean Day 2024, June 8th.
Awaken new depths - World Ocean Day 2024, June 8th.
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
 
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
 
Practical guide for the celebration of World Environment Day on june 5th.
Practical guide for the  celebration of World Environment Day on  june 5th.Practical guide for the  celebration of World Environment Day on  june 5th.
Practical guide for the celebration of World Environment Day on june 5th.
 
IEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- StatisticsIEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- Statistics
 
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
原版制作(Hope毕业证书)利物浦霍普大学毕业证文凭证书一模一样
 
Circular Economy implementation in the EU
Circular Economy implementation in the EUCircular Economy implementation in the EU
Circular Economy implementation in the EU
 

Space and Cyber: Roles and Issues in Deterrence

  • 1. Space and Cyber: Roles and Issues in Deterrence Cross-Domain Deterrence Seminar Lawrence Livermore National Laboratory Livermore, California November 18, 2014 Bruce W. MacDonald United States Institute of Peace Johns Hopkins University, School of Advanced International Studies
  • 2. 2 Serious Risks of Future Space/Cyber Instability Technical challenge/cost for China and Russia to develop credible space offense/cyber attack capa- bilities are reasonable for military benefits provided There is thus an inherent risk of strategic instability when relatively modest defense investments can create disproportionate danger to an adversary For peer/near-peer powers, a disabling space/cyber first strike against an adversary seems far preferable to, and easier to execute than, retaliating This is the essence of crisis instability, when pre- empting pays far greater benefits than retaliating Future depends on how architectures and perceptions will shape the strategic landscape
  • 3. Space/Cyber Domains Different, Less Predictable Than Nuclear/Conventional Monitoring adversary capabilities and damage assessment much more difficult, especially for cyber Capability costs are modest for potential benefits, << nuclear/conventional costs Larger the scope of use, larger the uncertainty of impact level, given levels of interconnection For space, no equivalent to SSBN/SLBM force to provide assured retaliation; cyber situation more mixed but hardly reassuring Strategic level attacks potentially devastating but limited attacks often tactically useful 3
  • 4. Escalation At tactical level, very easy to breach threshold into space and cyber use – Often tactically useful, EW/jamming precedents, “bloodless” For near future, other than as a signaling device, not much to be gained from gradual escalation in space or cyber in a deep crisis Once an uncertain threshold breached, potential is great for rapid escalation, especially if breach substantial – Ephemeral nature of cyberweapons, gives adversary less time to button up/retaliate, inexperience w/space-cyber conflict A de minimis threshold below which escalation risks are minimal? How far can one go before instability occurs? Major strategic/economic attacks very risky, likely to lead to all-out strategic conflict, even if non-nuclear Tactical use of space/cyber has long history, could be a “gateway drug” to escalation, even strategic use 4
  • 5. 5 Uncertainty and Risk Aversion Hard to know adversary weaponry numbers or capability Space and cyber experiencing rapid technological change; in cyber, architectures/software constantly changing, so weapon effectiveness changing as well Advanced country cross-domain interconnectedness growing exponentially, so even more effects uncertainty U.S. alliances add a major caution to our adversaries Worst case assessments of crippling capabilities could be self-deterring, hence … Possible firebreak: Risk Aversion – Attacker uncertain of both attack effectiveness, adversary retaliation, and vice versa – “Hysteresis effect” may provide limited stability in a crisis, help discourage significant first use, and escalation in conflict – Effect probably becomes more pronounced the more “strategic” the level of attack considered
  • 6.
  • 7. Can Deterrence/Hysteresis Last Until Space/Cyber Resilience Is Achieved? Impact of hysteresis likely becomes more pronounced the more “strategic” the level of attack being considered What are key thresholds? Are they robust? – Any use of space/cyber offense No – Isolated use No – Tactical use Likely No – Regional use Maybe – Strategic use Probably Yes Resilience is great space/cyber goal, but no silver bullet Is it achievable? If achieved, can it be maintained? Adversaries will seek countermeasures, as we likely would against, e.g., Chinese/Russian resiliency measures Measure/countermeasure competition seems likely If resilience is too effective, would there be “moral hazard” problems, i.e., becomes easier to escalate? 7
  • 8. Contact Information Bruce W. MacDonald Adjunct Professor, Johns Hopkins University/SAIS Special Advisor Arms Control and Nonproliferation Project United States Institute of Peace 2301 Constitution Avenue, NW Washington, D.C. 20036 (202) 429-3832 bmacdonald@usip.org Adjunct Professor Johns Hopkins University School of Advanced International Studies
  • 9. 9 Space Deterrence and Extended Deterrence Collateral effects are a serious drawback when targeted space assets also serve commercial customers – Will carriers hesitate to provide services in conflict? But mixing military and commercial, U.S. and friendly foreign, payloads probably strengthens space deterrence – Other countries have greater stake in space stability, raises the price for adversaries (and U.S.) to initiate space attacks Extended deterrence operates in space and cyber domains: explicit alliance security guarantees raise stakes of attacking any alliance member Probably a lower threshold to this effect – but where is it? For a change, extended deterrence appears to be more of a two-way street in space, with allies making a concrete contribution: attacking mixed use space assets is an attack on all the users of the assets, not just U.S.
  • 10. Challenge to Space Stability: No Clear SLBM Analogue Most stabilizing aspect of strategic nuclear balance is the SSBN/SLBM element – assures devastating 2nd strike: is a secure second strike OCS capability possible? Invisible Arsenals – Space, and especially cyber, are “murky to invisible” Worst case capability assessments could be self-deterring Also, arsenal effectiveness has lower confidence from dynamic technological environment, especially for cyber Highly uncertain collateral/unintended effects of countervalue space/cyber attacks also could be self- deterring – like virulent bioweapons But how do you deter without making public your capabilities? 10