An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News
NEWS | Nov. 29, 2012

Why Your Intuition About Cyber Warfare is Probably Wrong

By Capt. Matthew Miller, Col. Jon Brickey, and Col. Gregory Conti

Since the dawn of time, when one caveman first struck another, humans have relied on a natural understanding of their physical environment to conduct warfare.  We have an inborn ability to understand the laws of the physical world.  In order to shoot an artillery round farther, just add more powder; to provide cover for protection against bullets, hide behind a rock.  A private might accidentally shoot the wrong target, but the potential damage is limited by the maximum range of his or her rifle.  The laws of physics, however, are counterintuitive in cyberspace.  In cyberspace, our understanding of the “laws of physics” is turned on its head.  Weapons can be reproduced instantly, “bullets” travel at near the speed of light, destroyed targets can be brought back from the dead, and a seventeen year old can command an army.  As human beings we are at a distinct disadvantage when thinking intuitively about cyber warfare.  In this article we study where our intuition fails us in cyber warfare and suggest alternate ways to think about the conduct of cyber war that account for the vast differences between the kinetic and the non-kinetic fight.  A correct understanding and appreciation of these differences and common misconceptions is absolutely necessary to conduct cyber warfare and to integrate cyber effects into the kinetic battlefield.  To ground this work we need to define the term “cyber.”  There is significant and evolving debate regarding the precise definition of cyber. For purposes of this article we define cyber as a spectrum of cyberspace operations including Computer Network Attack (CNA), Computer Network Exploitation (CNE), and Computer Network Defense (CND).
PUBLICATIONS
What Does the Future Hold for Jack Voltaic Cyber Exercise?
September 25, 2024

Data Privacy and Security as a National Security Imperative
October 30, 2023

Command by intent can ensure command post survivability
August 29, 2023

The Tipping Point for Army Distributed Command and Control
August 1, 2023

Acknowledging the Realities of the Cyber Workforce
July 20, 2023

The Buzz About Electromagnetic Pulse Weapons
July 19, 2023

Book review: ‘On Disinformation’ by Lee McIntyre
July 19, 2023

IRREGULAR WARFARE PODCAST: EXPLORING CYBER POLICY IN THE DEPARTMENT OF DEFENSE
June 20, 2023

ARE WE ASKING TOO MUCH OF CYBER?
May 3, 2023

West Point hosts Joint Service Academy Cybersecurity Summit as industry, government collaborate to defend against cyber threats
April 13, 2023