Monday, February 24, 2014

How do you appropriate funds for Cyber Warfare?

The New York Times last night reported that the U.S. Defense Department is proposing significant cuts across the services. Funding for special operations and cyber warfare will be preserved as it is deemed the way of the future. Warfare in the digital space would be significantly different that the kinetic use of force we are familiar with.  Also, raising and maintaining these offensive cyber forces will be different.  This post focuses on the issues appropriations and oversight of offensive cyber capability, and makes the point that this seriously challenges the constitutional prerogatives of the Congress.

The ability to measure the strength of land and naval forces has for centuries been an inexact art and science, but one that could be roughly measured.  Technological advancements like transitioning from arrows to single-bullet guns, and single-bullet guns to machine guns initially challenge war planners. But empirical evidence over time allows for mathematical planning.  During World War I, Frederick Lanchester came up with equations to dynamically measure infantry units, in traditional formation, and game out their relative strength over the course of a battle.[i] More advanced models were used to predict outcomes for air forces, and weapons with uncontrollable effects like nuclear weapons (and their radiation).[ii]

In the Defense Department, units are formed, trained, and equipped based on systemic programming, which in turn is based on needed capabilities.  Knowing the strength of an armored division, or a carrier battle group, or a nuclear missile is needed to allocate money to meet the goals of policymakers.[iii] The U.S. Congress ultimately passes legislation annually authorizing these programs, and separately, appropriates the money for them.  Furthermore, Congress oversees the spending and operations of the Department.

What the U.S. Government might have done offensively is classified, but it is believed by this writer that there have not been hostilities with another country in the cyber realm.  This does not include intelligence and counterintelligence.  Cyber warfare is profoundly different than warfare in the physical space.  Software is exponentially scalable, and even regenerates for free.[iv]  Damage can be done to an adversary’s physical infrastructure or IT systems.  As for IT systems, the damage can also be undone, if the software self-destructs.

As math and physics equations can guide military war gamers, and the politicians who provide long term resources, we really have no algorithm to plan, program, and budget for offensive cyber attacking.  How many personnel are needed?  What types of equipment are needed?  That confounds budgeting at a very elemental level.   A more legalistic concern is the “color” of the money.  Appropriations legislation mandates certain amounts of money to be titled for things like Operations & Maintenance, Research, Development, Testing & Evaluation, Personnel, and so forth.  Malicious software might be created by a defense contractor during a Development phase with those funds, or even an Operations and Maintenance phase with O&M funds.  Or a botnet’s code might be copied and pasted for free off the internet.  A free fighter plane has never been found.

The business community has a saying, “what cannot be measured, cannot be managed.”  The same is true in Washington, DC where overseeing the development of programs will be as challenging as determining the existence of, and progress of a cyber conflict.  We have fairly detailed knowledge of enemy airfields, ports, and factories.  We do not have a clear picture of the designs of other IT systems, ongoing defensive software improvements, or the discipline of their personnel, the latter being the crucial variable to cyber defense.[v]  As difficult as it will be for the Pentagon’s intelligence to guess, it will be nearly impossible with Congress’ meager resources.

Needless to say, raising this force in the executive branch will require Congressional committee/agency staff who can tackle legal issues like proportionality in an information war, the use of private contractors in offensive, military cyber attacks, technological breakthroughs, and putting an economic measurement on the capability of Cyber Command.

Ultimately, this will be another example of technology forcing the government to adapt to fulfill Constitutional duties.



[i] O’Hanlon, Michael. The Science of War. 2009 Princeton University Press.
[ii] Ibid
[iii] Feltes, Lorentz, A.   Planning, Programming, and Budgeting, a search for a management philosopher’s stone. 2003. http://www.airpower.maxwell.af.mil/airchronicles/aureview/1976/jan-feb/feltes.html
[iv] Singer, P.W. and Friedman, Allan. Cybersecurity and Cyberwars, what everyone needs t know.  Oxford University Press. 2014.
[v] Ibid

No comments:

Post a Comment