ABSTRACT
This article proposes a theoretical framework to evaluate a state's potential cyber power and cyber effectiveness. It identifies the domestic and structural variables that contribute to potential cyber power, and the attributes associated with cyber effectiveness. Translating potential cyber power into cyber effectiveness is done through technical, tactical, operational, and strategic means. Effectiveness is worthwhile only in comparison to other target states. Finally, future research questions are proposed.
Notes
1. Allan. R. Millett, Williamson Murray, and Kenneth H. Watman, “The Effectiveness of Military Organizations,” International Security 11, no. 1 (1986): 37.
2. The article is limited to consideration of a state's cyber power. While it recognizes that non-state actors, such as terrorist organizations, corporations, activist groups, and individuals act in cyberspace, that consideration is beyond this article's scope.
3. Millett et al., “The Effectiveness of Military Organizations,” 37.
4. Stephen Biddle, Military Power: Explaining Victory and Defeat in Modern Battle (Princeton: Princeton University Press, 2004), 7.
5. Risa A. Brooks, “The Impact of Culture, Society, Institutions, and International Forces of Military Effectiveness,” in Creating Military Power: The Sources of Military Effectiveness, edited by Risa A. Brooks and Elizabeth A. Stanley (Stanford: Stanford University Press, 2007), 1.
6. Colin S. Gray, Making Sense of Cyber Power: Why the Sky Is Not Falling (Carlisle, PA: Strategic Studies Institute, 2013), 9.
7. Daniel T. Kuehl, “From Cyberspace to Cyberpower: Defining the Problem,” in Cyberpower and National Security, edited by Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington, DC: Potomac Books, 2009), 38.
8. John B. Sheldon, “Deciphering Cyberpower: Strategic Purpose in Peace and War,” Journal of Strategic Studies (Summer 2011): 95, http://www.au.af.mil/au/ssq/2011/summer/sheldon.pdf.
9. Cybersecurity Capacity Portal, “Providing an Evidence-Based Framework,” Oxford University, https://www.sbs.ox.ac.uk/cybersecurity-capacity/explore/capacity_dimensions.
10. Curtis J. Milhaupt and Wentong Zheng, “Beyond Ownership: State Capitalism and the Chinese Firm,” Georgetown Law Journal 103, no. 665 (2015), http://scholarship.law.ufl.edu/facultypub/696.
11. Emily O. Goldman, “Military Diffusion and Transformation,” in The Information Revolution in Military Affairs in Asia, edited by Emily O. Goldman and Thomas G. Mahnken (New York: Palgrave MacMillan, 2004), 1–21.
12. Brooks, “The Impact of Culture.”
13. Millett et al., “The Effectiveness.”
Additional information
Notes on contributors
Robert “Jake” Bebber
LCDR Robert “Jake” Bebber USN ([email protected]) is a cryptologic warfare officer. He was assigned to U.S. Cyber Command from 2013–2017. The views expressed here do not represent those of the Department of Defense, Department of the Navy, or U.S. Cyber Command.