Explorations in Cyber International Relations (ECIR)

advertisement
Explorations in
Cyber International Relations (ECIR)
Dialectics of Cyber International Relations
and Cyber Defense:
Towards a Strategic Research Program
John C. Mallery (jcma@mit.edu)
Computer Science & Artificial Intelligence Laboratory
Massachusetts Institute of Technology
Presentation at the ECIR Workshop on Cyber International Relations: Emergent Realities
of Conflict and Cooperation, MIT, Cambridge, October 14, 2010.
Explorations in Cyber International Relations
OSD Minerva Research Project at Harvard & MIT
Overview








Activities Under ECIR
Strategic IR Research Program
Cyber Defense Strategy
Meta-power As IR Leverage Criteria
High-leverage Research Areas
Dialectics
Computational Politics
Selected Leverage Vignettes
Explorations in Cyber International Relations
2
OSD Minerva Research Project at Harvard & MIT
Activities Under ECIR

Stanley Cyber Monitoring & Analysis System



Cross-organization Cyber Data Study




5 themes: international interactions, crime,
economics, defensive coordination, long-term
transformations
Recommendations for cyber data collection
Over a dozen organizations
Cyber Defense Strategy



5 document streams
Over 4k documents
Work factor concept
Technology strategy
Today: Linking IR to Cyber Defense
Explorations in Cyber International Relations
3
OSD Minerva Research Project at Harvard & MIT
Strategic Research Program

How can we prioritize research on cyber
international relations to focus on the
highest leverage problems?



Exhaustive enumeration is slow
Recycling pre-existing disciplinary concepts
may lack relevance or leverage
Approach
Link to cyber defense strategy
Identify cyber fueled processes that drive
strategy-relevant reallocations power,
wealth, knowledge, cultural attractiveness,
welfare
 Elucidate those processes


Explorations in Cyber International Relations
4
OSD Minerva Research Project at Harvard & MIT
What is cyberspace?

Interdependent network of information
technology infrastructures (NSPD54/HSPD23)







Virtual environment of information and
interactions between people (NSPD54/HSPD23)
US Military:




Internet
Telecommunications networks
Computer systems
Embedded processors
Controllers in critical industries
Electro-magnetic spectrum
Information operations
C4ISR, space
Supply chains for IT

Computers, networks, software, crypto, id mgt., etc.
Explorations in Cyber International Relations
5
OSD Minerva Research Project at Harvard & MIT
Big Elephant:
High Cognitive Difficulty
Due Vast Cross-Cuts

Cyber insecurity has manifestations across the range of human
activities where there is value




Technological basis of crisis is difficult to apprehend




Cyber spans most traditional policy domains
Received legal concepts and categories are blurred
Best organizational modes unclear
Responses often reflect disjointed incrementalism



Current COTs failures
40 years of traditional computer security
Future: transformational computing & networking
Policy and legal responses are difficult




Business
Defense
Society
Analytical reductions based on received disciplinary lenses
(analogies)
Proposed solutions based on repurposed concepts
Creation of integrative frameworks) is essential

Enables cumulation across disciplines and knowledge areas
Explorations in Cyber International Relations
6
OSD Minerva Research Project at Harvard & MIT
DoD Cyber Strategy

William J. Lynn, Deputy Secretary, DoD




Vast vulnerabilities & critical reliance




Foreign Affairs, August, 2010
NATO, September, 15
CFR, September 30
Military/Intel
Critical infrastructure
Private sector
Five pillars
1
2
3
4
5
Domain of warfare
Active & timely defense
Protection of critical infrastructure
Collective defense with allies
Technological leverage
Explorations in Cyber International Relations
7
OSD Minerva Research Project at Harvard & MIT
Strategic Approach
Transform US cyber-infrastructures to:
 Resist attacks and continue to function under adversity
 Enhance confidence in computation and communications
 Enable rapid adoption of new technological advances
 Strength competiveness via improved agility, effectiveness, and learning

Vision




Integrative Framework





Effective application of resources
Coordinated division of labor
Common language
Dynamic refinement
Objectives




Trustworthy systems and resilient society
Articulation of roles and responsibilities
Alignment of guiding images
Prioritized
Risk adjusted
Time horizons
Implementing strategies


High leverage
Synergistic moves
Explorations in Cyber International Relations
8
OSD Minerva Research Project at Harvard & MIT
Defensive Complexity Analysis

Response to cyber asymmetries requires high leverage solutions



Security meta-metrics focus on difficulty of attacker or defender tasks




Application to the entire attack value cycle (financial, political-military)
Time frames: Short-term (0-2 yrs), medium-term (2-5 yrs), long-term (5-10 yrs)
Work factor (WF) is the difficulty of executing tasks
Analogous to computational difficulty in cryptography
Extends beyond the technical designs to domain embeddings (cyber operations research)
Dimensions of work factors
 Resources
 Computational complexity (mathematical leverage)
 Cost (often related to complexity)
 Expertise and Knowledge (technical specialties, domain knowledge)

Planning, execution and information management
 Cognitive difficulty (model as formulation of non-linear plans and counter plans)
 Learning difficulty (reversing obfuscation, devising new tactics or approaches)
 Organizational effectiveness/dysfunction (integration, learning, structure,
psychology)

Risk
 Uncertainty (confidence, incomplete information)
 Culture (risk acceptance or aversion)
 Information differential gain/loss (innovation, leakage by insider, espionage,
diffusion)

Make technical or policy moves that cumulatively


Impose hard problems on attackers (prefer geometric impact)
Facilitate coordinated defense (eliminate multipliers)
Explorations in Cyber International Relations
9
OSD Minerva Research Project at Harvard & MIT
Defensive Strategy Decomposition:
Planes of Action

Leadership organization




Policy community
Technology visionaries
Domain architects






IT capital goods industry
Telecommunications
operators
Identity management &
crypto sectors
Standards bodies and
certification/accreditation
authorities




Military & intelligence
systems
Government systems
Defense industrial base
Explorations in Cyber International Relations
Allies
Trading partners
Regional or issue groups
Global
International competition



10
Critical infrastructure
Research and education
infrastructure
Supply chain
Major enterprise
Smaller enterprise
Consumer
International cooperation




Public sector domains

Private sector domains


Cyber technology base




Mutual understandings
Declaratory policies
Norms
OSD Minerva Research Project at Harvard & MIT
Solutions vs. Mitigations

Solution Domains (10-30 years)






Science, technology, engineering
R&D infrastructure
Human capital
IT capital goods industrial organization
Critical infrastructures
Threat mitigation domains





Information assurance management
International cyber crime law enforcement
Cooperative engagement (like minded)
International norms (agreements 10+ yrs)
Deterrence (cross domain responses)
Explorations in Cyber International Relations
11
OSD Minerva Research Project at Harvard & MIT
Meta-power (BBB) As
Leverage Framework

Power: Set of action possibilities and payoffs
for actors within an interaction framework

Meta-power: Action possibilities that change
the distribution of power resources among
actors (Deutsch: Nth order power)

Strategic Competition: Contention over metapower resources

Leverage: Impact of cyber-fueled international
processes on national strategies
Explorations in Cyber International Relations
12
OSD Minerva Research Project at Harvard & MIT
High-leverage Research Areas

Information Diffusion


Globalization


Modeling, mechanism design, precedent reasoning, game theory,
grammars of action
Cultural interpenetration


Race for more effective organizations as a basis for national
advantage
Computational support for cyber decision-making and
understanding


National location of key industries (and spread effects) more difficult
Cyber-enabled organizational learning => higher adaptive
capacities


Economic strategy based on knowledge activities becomes
problematic
Global digital ecumene -> clash of civilizations or transcendence?
Empowerment of small groups

Ability of “terrorists” to organize and cause trouble
Explorations in Cyber International Relations
13
OSD Minerva Research Project at Harvard & MIT
Dialectics

Information assurance is slippery with
many potentially self-defeating moves
Centralization -> aggregation of threat
Standardization -> low diversity -> scale
economies of attack
 Conservation of threat -> attacks move to
weaker surfaces



Two definitions of dialectics:


Process and complement process
Action and reaction
Explorations in Cyber International Relations
14
OSD Minerva Research Project at Harvard & MIT
Examples of Cyber Dialectics

Ready access to S&T knowledge



Empowers global business operations (e.g., IT sector)



Critical mass to articulate knowledge interests
Critical mass to organize insurgencies or nihilistic actions
Informationalized militaries (e.g., GIG)



More efficient resource utilization
More conflict over loci of production
Virtual concentration of dispersed groups



Faster research cycle within countries
Unprecedented rates of global knowledge diffusion
Global power projection (Gulf War 1 forward)
Asymmetric power projection (cyber war)
More effective bureaucracy


Improved domestic operations, law enforcement, transparency
Reduced autonomy of the state (via network
interpenetration, higher scrutiny)
Explorations in Cyber International Relations
15
OSD Minerva Research Project at Harvard & MIT
Computational Theories of
Politics and IR

Karl Deutsch



Hayward Alker






AI and political science (search paradigm)
Computational search in organizations (“bounded rationality”)
Lloyd Etheredge


Mathematical politics (limits – degrees of freedom, structural
change)
Systems dynamics (limits – structural transformation)
Generative grammars (limits – descriptive)
AI and text-interpretive theories of IR (learning, meaning)
Dialectics of world order
Herbert Simon



Political cybernetics and systems dynamics
Integration theory
Government learning (1985) (psychology and structure)
John Mallery


Computational politics (1988)
Application of computational models of cognition to IR
Explorations in Cyber International Relations
16
OSD Minerva Research Project at Harvard & MIT
CyberSocial Systems

Networking and computation spread
ubiquitously 1992-2010


Now:



Computers provide cognitive prosthetics
Networks link human-computer cognitive systems
Speed -> gain in systems




Cyberphysical systems
Faster rates of interaction
Global immediacy
Co-evolution and interpenetration of cyber systems
and biological cognition
Computational analytical frameworks needed

Individual => social network => organization
Explorations in Cyber International Relations
17
OSD Minerva Research Project at Harvard & MIT
Digital Noosphere
(Tailard Desjardins)

Collective knowledge of humanity


Culture becomes digital


Expectation of increasing cultural gain
Organizational adaptation requires increased
rates of learning




Under active assembly on the Web today
Faster interactions (digital diplomacy)
More information marshaled
Better knowledge: Conflict vs. homogenization
Major challenge of modernity



Networked global ecumene
Opportunities for broader international integration
Clash of cultures: West, Islam, South Asia, East
Asia
Explorations in Cyber International Relations
18
OSD Minerva Research Project at Harvard & MIT
Globalization
(World System Analysis)

Reinforces and extends ability of transnational
firms to coordinate global production



New Neo-mercantilism (world order threat)




Increases centripal impact on loci of production
Reduces state sovereignty, but some states can
influence firms’ locational calculi (e.g., China)
Competition for future industries
Lock-in of raw materials and new markets (e.g.,
Africa)
“Currency wars”
Refocus on developmental economics




“Conditioned development” (Cardoso)
“Spread effects” (Myrdal), “staple theory” (Innis)
Industrial policy helps understand emerging powers
Necessary strategy for national economic renewal
Explorations in Cyber International Relations
19
OSD Minerva Research Project at Harvard & MIT
Strategic Research Program

How can we prioritize research on cyber
international relations to focus on the
highest leverage problems?



Exhaustive enumeration is slow
Recycling pre-existing disciplinary concepts
may lack relevance or leverage
Approach
Link to cyber defense strategy
Identify cyber fueled processes that drive
strategy-relevant reallocations power,
wealth, knowledge, cultural attractiveness,
welfare
 Elucidate those processes


Explorations in Cyber International Relations
20
OSD Minerva Research Project at Harvard & MIT
Download