Research Portfolio Post #8: Qualitative Data Sources for Interpretivist Research

I am studying the ever-changing cyberstrategy of the United States from 1990 to present because I want to find out what explains the changing public discourses regarding the usage of cyber weaponry and tactics. The goal is to explain to my reader how the modern iteration of cyberwarfare being conducted by the United States has come to fruition.[1]

The discourse surrounding cyberwarfare has always been directly tied to that of the conversation surrounding the rights of man and the just war doctrine.[2] The NSA’s General Counsel, Glenn Gerstell, revealed that the United States relies on the fact that an offensive action must connotate imminent danger, and Cyber Command can only respond if this condition is met.[3] Within the military apparatus, this theory is unpopular as it permanently places the United States on the defensive which Paul Nakasone, Commander of US Cyber Command, says is a route to defeat.[4] By ignoring the Just War Doctrine, Nakasone argues that the United States must defend forward through offensive cyber action in order to maintain supremacy.[5] These interviews directly tie into each other and show the discourse existing within the military and United States cyber infrastructure.

This same discourse exists in the political realm with Representative Mike Rogers arguing that the cyber infrastructure of the United States is too separated and focused on defensive action.[6] He argues that while the role of independent cybersecurity departments are critical, they need to all be branched under the United States Cybercommand in order to triangulate targets for elimination.[7] Conversely, Representative Jim Langevin argues that the power of the United States Cyber infrastructure should be split across multiple institutions in order to promote stability and oversight.[8] Similarly, the United States must not resort to offensive action in cyberspace as that will create a precedence of instability.[9]

[1]Wayne C. Booth, Gregory G. Colomb, Joseph M. Williams, Joseph Bizup, and William T. Fitzgerald, The Craft of Research (4th ed.), Chicago: University of Chicago Press, (2016): 54.

[2]Colonel James Cook, “‘Cyberation’ and Just War Doctrine: A Response to Randall Dipert,” Journal of Military Ethics 9, no. 4 (December 2010): 413.

[3]Glenn Gerstell, “Confronting the Cybersecurity Challenge” Duke Law School: Law, Ethics and National Security Conference 2017, (2017): 2-3.

[4]Col William T Eliason, “An Interview with Paul Nakasone,” Joint Force Quarterly 92, no. 1 (January 2019): 6.

[5]Ibid

[6]Representative Mike Rogers, “Stovepiped Cybersecurity,” Keynote at Scoops News Group Cybersecurity Conference, (2017): 1-5.

[7]Ibid

[8]Representative Jim Langevin, “Langevin Statement on Trump Administration’s Refusal to Provide Congress with Cyberspace Operations Directive,” Media Office of Jim Langevin, (July 2017).

[9]Ibid