Cyber Persistence Theory Redefining National Security in Cyberspace Michael P Fischerkeller Download
Cyber Persistence Theory Redefining National Security in Cyberspace Michael P Fischerkeller Download
https://ebookbell.com/product/cyber-persistence-theory-
redefining-national-security-in-cyberspace-michael-p-
fischerkeller-43575986
https://ebookbell.com/product/cyber-persistence-theory-redefining-
national-security-in-cyberspace-michael-p-fischerkeller-70435394
https://ebookbell.com/product/cyber-persistence-theory-redefining-
national-security-in-cyberspace-bridging-the-gap-michael-p-
fischerkeller-43630966
https://ebookbell.com/product/attribution-of-advanced-persistent-
threats-how-to-identify-the-actors-behind-cyberespionage-timo-
steffens-56934620
https://ebookbell.com/product/cyber-security-practitioners-guide-
hamid-jahankhani-editor-44921550
Cyber Security Applications For Industry 40 R Sujatha G Prakash
https://ebookbell.com/product/cyber-security-applications-for-
industry-40-r-sujatha-g-prakash-45108124
https://ebookbell.com/product/cyberphysical-systems-ai-and-
covid19-ramesh-poonia-basant-agarwal-46110064
https://ebookbell.com/product/cyber-security-for-microgrids-subham-
sahoo-frede-blaabjerg-tomislav-dragicevi-46231338
https://ebookbell.com/product/cyber-investigations-andr-rnes-46518278
https://ebookbell.com/product/cybersecurity-threats-and-response-
models-in-power-plants-carol-smidts-46518464
Advance Praise for Cyber Persistence Theory
“Michael Fischerkeller, Emily Goldman, and Richard Harknett have once again
made an incredibly valuable contribution to the development of American
cyber policy and strategy through the writing of Cyber Persistence Theory. The
authors push its readership to think beyond classical deterrence theory to new
concepts for engaging and defeating undeterred adversaries in cyberspace. In
short, this book argues the need for change and to take more risk to close an
increasingly larger risk in our defense and national security as well as our public
safety posture as American citizens. To do so, the authors argue will require not
only persistent engagement, but a ‘whole-of-nation plus’ effort. A must-read for
both national and cyber security professionals!”
—Robert J. Butler, former Deputy Assistant Secretary of
Defense for Cyber and Space Policy
“Time will tell whether cyberspace operations can have coercive effect, but it is
unambiguously true that to date, nations have used cyberspace mostly to gain
advantage in competing with other nations. Understanding how they do so is a
new challenge that scholars of international relations would do well to take on,
and this book is a superb point of departure for them.”
—Herb Lin, Hank J. Holland Fellow in Cyber Policy and
Security, Hoover Institution, Stanford University
“This book helps to fill a crucial gap in strategic thinking about the fundamentals
of cyberspace and sets out a clear course of action for the US government. It is a
must-read for students, analysts, and policymakers.”
—Max Smeets, Senior Researcher ETH Zurich, Center for
Security Studies, and author of No Shortcuts: Why States Struggle
Develop a Military Cyber-Force
BRIDGING THE GAP
Series Editors
James Goldgeier
Bruce Jentleson
Steven Weber
The Logic of American Nuclear Strategy:
Why Strategic Superiority Matters
Matthew Kroenig
Planning to Fail:
The US Wars in Vietnam, Iraq, and Afghanistan
James H. Lebovic
War and Chance:
Assessing Uncertainty in International Politics
Jeffrey A. Friedman
Delaying Doomsday:
The Politics of Nuclear Reversal
Rupal N. Mehta
Delta Democracy:
Pathways to Incremental Civic Revolution in Egypt and Beyond
Catherine E. Herrold
Adaptation under Fire:
How Militaries Change in Wartime
David Barno and Nora Bensahel
The Long Game:
China’s Grand Strategy to Displace American Order
Rush Doshi
A Small State’s Guide to Influence in World Politics
Tom Long
Cyber Persistence Theory:
Redefining National Security in Cyberspace
Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett
Cyber Persistence Theory
Redefining National Security in Cyberspace
M I C H A E L P. F I S C H E R K E L L E R , E M I LY O. G O L D M A N,
A N D R I C H A R D J. H A R K N E T T
Oxford University Press is a department of the University of Oxford. It furthers
the University’s objective of excellence in research, scholarship, and education
by publishing worldwide. Oxford is a registered trade mark of Oxford University
Press in the UK and certain other countries.
DOI: 10.1093/oso/9780197638255.001.0001
1 3 5 7 9 8 6 4 2
Paperback printed by Marquis, Canada
Hardback printed by Bridgeport National Bindery, Inc., United States of America
FOREWORD
ix
ACKNOWLEDGMENTS
Fischerkeller—I would like to thank the senior leadership, recent past and pre-
sent, of the Institute for Defense Analyses for their unwavering support of my re-
search behind this work, with a special thank you to Dr. Margaret Myers, General
(retired) Larry Welch, Dr. David Chu, General (retired) Norty Schwartz, and
Mr. Phil Major. To the many colleagues who’ve offered expert commentary and
strong encouragement over the past four years, I’m thankful for that support
and look forward to many more engagements. To my colleagues, Emily and
Richard, it is my hope that all research professionals, no matter their field, experi-
ence such an extraordinary collaborative effort. And to Naomi, I have boundless
gratitude for creating an environment in which my contribution to this volume
was inspired, nurtured, and matured.
Goldman—I want to thank the women and men of US Cyber Command
and the National Security Agency, who increase my knowledge of cyber-
space each and every day. My deepest gratitude to Michael Warner and Steve
Peterson, whose insights, support, optimism, and faith inspire me to persevere.
Jake Bebber, Ryan Symonds, Gary Corn, and TJ White are treasured colleagues
who continually broaden and deepen my understanding. LTG Steve Fogarty’s
vision and support were crucial to these ideas taking root inside the Command.
Without the support of ADM Mike Rogers, I would not have had the oppor-
tunity or latitude to challenge conventional thinking and without GEN Paul
Nakasone I would not have been able to continue those efforts which lie be-
hind this book. A special thanks to Lou Nolan who shepherded the manuscript
through security review. To my coauthors, Michael and Richard, this has been a
remarkable intellectual journey, a destination no one of us would have reached
without the others. And finally, my deepest thanks and love to Catherine, Alex,
and JR, the lights of my life, my greatest sources of strength and resilience.
Harknett—This book does not develop as it has without the initial bridge-
builder, my coauthor Emily, who recognized the opportunity to broaden
xi
xii Ack nowl edg me nt s
perspective in the policy community and who, with the support of ADM Mike
Rogers, launched the initiative that allowed me to freely cross back and forth
between the scholarly and policy worlds, seeking new ways to map, exploit, and
eventually advance thinking about cyberspace. Along with those mentioned
above, I would add policy and academic colleagues in the United Kingdom, who
added great perspective as well as opportunity to explore how new conceptu-
alization would impact security, as I developed a new relationship with Oxford
University through the ever-important Fulbright program. I would like to thank
among many who have pushed and critiqued, Jelena Vicic, Monica Kaminska,
Florian Egloff, Lucas Kello, Mustafa Sagir, Graham Fairclough, Jim Miller, and
my colleagues at the Center for Cyber Strategy and Policy at Cincinnati, par-
ticularly Stephanie Ellis. Along the way, Michael and Emily have been the ideal
co-thinkers, persistently giving and taking. Finally, my enduring faith that things
can always get better flows from the positive unwavering support I am blessed
to receive every day from Kathryn and Margot—the two reasons for everything.
1
Cyber Persistence Theory. Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett, Oxford University Press.
© Oxford University Press 2022. DOI: 10.1093/oso/9780197638255.003.0001
2 Cyber Persistence Theory
theory and policy. Theorists have defaulted to framing State-driven cyber dy-
namics in terms of traditional notions of coercion and war. Policymakers in
many countries have defaulted to a strategy of deterrence to solve the inter-State
challenges posed by global networked computing. Our theoretical explanation
challenges the primacy of both coercion theory and deterrence strategy for un-
derstanding and mitigating the strategic impact of cyberspace on international
security.
Other scholars and analysts, for various reasons, remained skeptical of the
notion of cyber war and the argument that cyber operations or campaigns that
are not “war” could be strategically consequential. For example, the absence of
physical violence in reported cyberattacks encouraged Thomas Rid to argue that
cyber war has not and will not occur.20 According to Rid, no cyberattack meets
all three of Clausewitz’s criteria of war as “violent,” “instrumental,” and “polit-
ical.”21 Instead, Rid concluded that “all past and present political cyberattacks
are merely sophisticated versions of three activities that are as old as war-
fare itself: subversion, espionage, and sabotage.”22 Erik Gartzke shared Rid’s
The Mis appli ed Ne x us 5
schooled during or immediately after the golden years of Cold War scholarship,
which produced a trove of classics focused on coercion theory.29
Over many decades, deterrence proved to be conceptually well aligned with
the Cold War strategic environment. Nuclear deterrence was associated with
the strategic stability and absence of major war between the United States and
the Soviet Union during the unprecedented historical period from the end of
World War II through the Cold War—what John Lewis Gaddis called the “Long
Peace.”30 It attracted an enduring group of scholars and practitioners away from
examining how to fight and win war and toward how to deter war. As a result, in
the first decades of the twenty-first century, the United States and other Western
democracies assumed cyberspace was a deterrence strategic environment and
that prospective response and operational restraint would produce positive
norms and stability.
Without question, the seventy-year history of deterrence serving as the cen-
tral security strategy for the United States and its allies influenced policymakers
immediate gravitation toward the same strategy for cyberspace. However, their
inclination was further exacerbated by the fact that scholars had failed to pro-
vide policymakers with an alternative paradigm (to coercion theory) for un-
derstanding State cyber behaviors and developing strategy aligned to the cyber
strategic environment. In the end, we are not surprised that a fixation on co-
ercion, militarized crisis, and war in cyberspace led to a “high-and-right” bias
in the cyber literature. For over two decades, practitioners and academics have
been debating if, when, and how cyberwar will occur, why coercion appears in-
effective and can be made more effective, and why cyber deterrence fails and
must be fixed.31
The Structure of
Strategic Environments
The transition from a paradigm in crisis to a new one from which a
new tradition of normal science can emerge is far from a cumulative
process, one achieved by an articulation or extension of the old para-
digm. Rather it is a reconstruction of the field from new fundamentals,
a reconstruction that changes some of the field’s most elementary the-
oretical generalizations as well as many of its paradigm methods and
applications.1
Cyber Persistence Theory. Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett, Oxford University Press.
© Oxford University Press 2022. DOI: 10.1093/oso/9780197638255.003.0002
10 Cyber Persistence Theory
definition of security itself. That definition aligns with the challenge to security
that exists at its most core (structural) level and which is shaped fundamentally
by the dominant technology that can be used to challenge security.
Some may view this argument as technology deterministic; we do not
conceive it that way. Although technology anchors each of the strategic
environments, what makes them distinct is not the technology itself, but how
the technology shapes conceptions of security. While the Truman administra-
tion understood that the atom bomb was a distinctive weapon, they employed it
twice in a manner that was not significantly different from all the other strategic
bombing raids employing conventional munitions that had preceded Hiroshima
and Nagasaki. Countries could have continued the practice of using atom bombs
as weapons of war, but the unique elements of the technology enabled a different
concept of security to emerge. Once that different concept was realized, a re-
construction of theory was introduced that translated into new practice, which
was then continually reinforced over time through the emergence of a commu-
nity of strategists and practitioners trained in the theory and prescriptions of
nuclear deterrence. At its core, this change in paradigm was related to a strategic
environment characterized by the mutual possession of nuclear weapons (and
the extension of protection by means of a security commitment made by States
possessing nuclear weapons to those that did not). The ends, ways, and means
associated with the conventional war paradigm continued to be salient for secu-
rity relations conducted by States outside of or parallel to the nuclear strategic
environment (non-nuclear vs. non-nuclear, nuclear vs. non-nuclear, or nuclear
vs. nuclear via proxy).3
The thesis presented here is that the technical, tactical, and operational
features of conventional, nuclear, and cyber strategic environments are dis-
tinct enough that these environments require their own paradigms—that is,
exemplars, theories, lexicon, rules of investigation, and practice—with distinct
prescriptions for how States should organize themselves effectively to advance
their security in and through these environments. By “strategic” we mean that
actions taken within and through these environments can directly impact the
sources of national power upon which the distribution of power regionally and
globally rests.
To support our claim that the cyber strategic environment requires its
own paradigm consisting of distinct theory and practice, the first part of this
chapter discusses the more familiar environments organized around con-
ventional and nuclear weapons. It then turns to an explanation of the cyber
strategic environment and its impact on core security dynamics, which, we
argue, requires reorienting the ways and means used in the pursuit of na-
tional interests and redefining what it means to be secure in and through
cyberspace.
The Str uc t ure o f Strateg i c Env ironme nt s 11
Thinking Structurally
Debates over different approaches to theorizing are rich and vigorous, but we
will not justify one approach over another in this chapter.4 Rather, our purpose
is to show how organizing our thinking around structure can help illuminate fun-
damental aspects of security as pursued primarily by States. Thus, our starting
point adopts the organizing concept of the strategic environment and uses that
to explore how fundamental elements are organized in the pursuit of security.
We define a strategic environment as a concept that describes core features of
a technology or composite of technologies capable of independently maintaining
or altering the international distribution of power that generate distinct systemic
conditions, and thus distinct security logics, influencing the full spectrum of in-
terstate strategic competition from competition short of armed conflict through
militarized crisis and war. The adjective “strategic” is meant to distinguish this
set of conditions as driven by an intentional focus on the contest over relative
power. Although international relations are generally shaped through an overall
structure characterized by an absence of centralized power (anarchy) and self-
reliance that applies across all strategic environments, that recognition only tells
us that a contest over power is possible. It does not tell us much about how States
organize themselves to pursue security in the specific conditions to which they
are subject at any given time in history. Those specific conditions, based on the
interplay of technical, tactical, and operational features, ultimately drive security
thinking, organization, and behavior. That is the consequence of the strategic
environment’s inherent structure.
Although the complexity of these conditions is significant, we adopt the most
parsimonious starting point to explain how States think about security, organize
for it, and act to achieve it in and through cyberspace. Our contention is that the
core features of networked computing and the digital interfaces that have devel-
oped around it combine to produce a set of conditions distinguishable from the
two other strategic environments that States must navigate to achieve security.
Before we discuss the cyber strategic environment, it is important to outline the
core logics associated with the two other coexisting strategic environments that
shape the pursuit of security.
or Kaiser Wilhelm speculating about a blocking action against the French, the
conclusion, as articulated succinctly by German Chief of the General Staff
Helmut Von Moltke, was that it could not be done.12 Importantly, the view that
the offense was advantaged was so pervasive among leaders that the conduct of
the war persisted with a commitment to offensive assaults despite the mounting
evidence that the conventional strategic environment of the time was defense-
advantaged. Being misaligned to the structural conditions of the strategic en-
vironment at the time meant a catastrophic loss of life and very little shift of
territory on the battlefield.
Our intent is not to analyze the history of world wars, but rather to make the
conceptual point that security in a conventional military environment rests on
how well one aligns to the relative advantages of the moment between defense
and offense. At its most basic, the security of the State depends on being able to
fight and win military engagements in a relative struggle between offense and
defense.
August 6 and 9, 1945, changed this equation. The technical achievement of
the atomic bomb, creating the practical outcome of one bomb, one plane, one
city, so overshot the destructive potential of even industrial warfare that in short
order, the State possessing the new weapon and those that followed fundamen-
tally reoriented their thinking, organizing, and acting in the pursuit of security.
In 1946, Bernard Brodie captured the distinction between the conventional and
nuclear strategic environments almost immediately when he concluded, “Thus
far the chief purpose of our military establishment has been to win wars. From
now on its chief purpose must be to avert them. It can have almost no other
useful purpose.”13
The emergence of this second strategic environment, one in which the pur-
suit of security no longer rested on the range of offense to defense advantage,
was remarkable in its comprehensive introduction of not only new technolog-
ical developments but also new bureaucracies, authorities, and even lexicon. In
military strategy terms, the recognition of the nuclear strategic environment fits
Thomas Kuhn’s notion of a paradigm change.14 What is noteworthy is that the
United States pivoted so rapidly to recognizing this new strategic environment
despite just completing a war in which the relative advantage it had in bringing
to bear offensive operations on two fronts had produced significant victory that
transformed its position in global politics. We have become so accustomed to
the logic and approach of nuclear deterrence that we have perhaps forgotten
what a radical departure it was to organize principally around deterrence from
the several millennia of human history that preceded, particularly in the context
of just winning a war.
Imagine for a moment that, upon the unconditional surrender of Germany on
May 8, 1945, Congress held a hearing on how the United States should organize
The Str uc t ure o f Strateg i c Env ironme nt s 15
itself to pursue its security (making the assumption that victory over Japan
would also occur in due time). Imagine that an academic strategist proposed
that Congress should prepare to spend trillions of dollars over decades to build
a military capability whose main purpose would be not to be used. Note this ad-
vice would have been provided in the context of a war just won in which military
capability was produced, moved, and used on the battlefield as fast as possible.
The scale, scope, and speed of that production and use was in large measure why
the United States won. How quickly would that strategist have been thrown
out of the hearing room? The mushroom clouds over Hiroshima and Nagasaki
so totally refocused thinking that, what would have been dismissed as illogical
months before, became a necessity from that moment forward. In contrast to
the extreme mismatch between thinking and strategic environment that existed
in 1914, the post-1945 pursuit of security in the nuclear strategic environment
stands out for its significant and logical alignment.
The conventional strategic environment is structurally conditioned around
a shifting range of offense to defense advantage. The structural condition of the
nuclear strategic environment rests on the dominance of the offense. Here we
insist on a greater precision in the use of the term “dominance” than has here-
tofore been used in security studies literature. There is an extensive literature
that examines the balance between what has been called offense-or defense-
dominant conditions. The logic and debate associated with that balance is
best understood as a balance (what we call a shifting range) been offense-and
defense-advantaged environments. The term “dominance,” we argue, as an ana-
lytical term for theoretical development should be reserved for a condition in
which the outcome between offense and defense is not contestable but assured.
To suggest that the offense is dominant is to assert that the consequences that
flow from the offense will always overwhelm the mitigation that can flow from
defense. Anything short of that should be understood as an offense-advantaged
environment in which mitigation is still possible at some level (denoting the ad-
vantage is to imply that ultimate success will follow if you are aligned with the
capacity that is advantaged at the time of contest, but leaves room for the contest
to still play out in which relative skill and other factors can impact the outcome).
The conventional strategic environment, in fact throughout most of history, has
been fluid between the offense and the defense. If there are periods of conven-
tional structural advantage in either the offense or defense direction, they tend
to be relatively short and open to shift between conflicts as well as shift even
during a conflict. Thus, offense dominance is, in fact, rare and found currently
only as a structural condition of the nuclear strategic environment.
In the conventional strategic environment, one’s planning revolves around
having the right alignment with offense or defense advantage. The security ques-
tion boils down to “Can I attack or defend in order to win?” To say that the
16 Cyber Persistence Theory
Deterrence
Although “deterrence” as a term is commonplace in the academic field of
strategic studies and in the policy community, specific variations of the term
abound.15 Our purpose here is to discuss it in its most commonplace under-
standing in the policy space and leave the academic nuance to the volumes al-
ready published.16
We start from the perspective that one only needs to consider the national
security form of deterrence (as opposed to criminal forms of deterrence) or, for
that matter, offense and defense in a setting in which opposing decision makers
are considering how to pursue actions that will directly harm the national
sources of power of a country through aggressive action. In this context, deter-
rence involves delineating the range of actions an opponent may contemplate so
that the cost associated with action that directly undermines national security
outweighs the benefit the opponent may wish to achieve.17
Deterrence is successful when the challenger is convinced that attacking is
not a cost-effective option. Success rests on several variables, but most critical
are the following elements:18 the country attempting deterrence must commit
The Str uc t ure o f Strateg i c Env ironme nt s 17
employed not at the front as a tool of the infantry, but as a supplement to heavy
artillery, thus significantly lowering its military capability.29
Aside from the necessity of proper employment and use, military capability
is also affected by war itself. Carl von Clausewitz, in his classic military treatise
On War, begins to broach this broader appraisal of military capability during
his discussion of the inherent elements of war that work against the application
of force:
escalation control, arms control, coercive diplomacy, and sanctions all took on
prominence. The new logic and lexicon associated with the nuclear strategic en-
vironment became so pervasive that its terms and concepts have been exported
to the conventional environment. We must, however, not lose sight of the unique
conditions they were originally developed to address.
This does not mean that tactics and operational approaches are not applicable
across strategic environments; far from it. What we have learned from managing
the nuclear challenge has indeed shaped and impacted how conventional forces
are conceived and used. However, the distinctiveness of the thought, organi-
zation, and action that emerged after fission and then fusion were weaponized
is profound. Nuclear States fundamentally think, organize, and behave differ-
ently when confronting each other than when States are only conventionally
armed (or when nuclear States confront non-nuclear States or non-nuclear al-
lied States). The fact remains that the only two times the weapon has been used
were against a State that did not have them and when they were in short supply.
The exponential growth in numbers and lethality as well as the increase in the
number of States in possession of them has not led to a third use.
This is a fundamental departure from the behavior we see of States (and some
of the same States) in the conventional strategic environment. This absence of
use reflects States operating in a distinctly recognized and structured strategic
environment with its own organizing principle, logic, and dynamics. Nuclear
weapons altered the manner and practice of coercion and the use of force. The
focus of coercion and force became the threat to use them, rather than their
actual application. The coercive (deterrent) power of nuclear weapons comes
from their possession, not their use. Ultimately, conventional security rests in
the presence of war; nuclear security in the absence of war.
homeland and the use of conventional forces globally (France and the United
Kingdom). Although there is a relationship between the two environments, the
thinking, organization, and behavior within the nuclear strategic environment
remain recognizably distinct from the conventional strategic environment. The
environments are distinct in logic, but States must also understand how those
logics intersect if they are to secure themselves. This intersection-distinction di-
chotomy is important to keep in mind as we examine the emergence of a third
strategic environment.
It is our contention that the fundamental logics of the nuclear and conven-
tional strategic environments do not capture what we are seeing behaviorally in
and through cyberspace. At first blush, one might look at the empirical record of
cyber operations to date and contend that this is explained through the logic of
the conventional strategic environment. National interests are being advanced
through a contest of offensive and defensive capabilities designed and executed
with the recognition that use of force and the cyber equivalence to armed attack
are viable options. Networked computing technology is the same as the milita-
rization of the airplane—a new means to conduct war. This view has certainly
dominated the lexicon of the past twenty years, where the term “cyber war” has
been used to describe all manners of cyber operations.
And yet, there is an empirical problem with this view—despite millions of ex-
ecuted cyber operations, few States have treated and reacted to these operations
as a use of force or armed attack. There are three plausible explanations for this
remarkable absence of war in the presence of so much activity: (1) the tech-
nology only enhances “subversion, espionage, and sabotage”;33 (2) deterrence
of war, armed attack, and use of force is stable, so States are choosing to just
rely on cyber means to subvert, spy, and occasionally (and in limited degrees)
destroy, but if deterrence could be designed around, cyber war would occur;34
or (3) there is a fundamentally different strategic logic driving the behavior not
captured by the logics of coercion and warfighting, and it is of a strategic, rather
than tactical, subversive or only intelligence-gathering nature.35
Many in the academic and policy communities have applied the logic of the
nuclear strategic environment to explain cyber activity. Almost as prevalent as
cyber war, the term “cyber deterrence” has been a default for many arguments
and policy documents during the 1990s through 2020s.36 The empirical reality
of ubiquitous cyber activity, however, challenges the notion that we should think
about, organize, and use cyber means based on the logic that security rests on
the avoidance of action. Using nuclear logic to explain cyber behavior relies on
a related set of plausible explanations parallel to those stated above: (1) cyber
activity is traditional statecraft below war and thus deterrence does not apply, as
the activity is not strategic in nature;37(2) cyber activity is potentially war-ena-
bling, but such use for coercive purposes is avoided due to fears of escalation to
The Str uc t ure o f Strateg i c Env ironme nt s 23
war; or (3) States are deterred from war generally, but the activity we are seeing
is a strategic response to opportunity, rather than an acceptance of a limitation.
The reality of continuous cyber operations and campaigns on a massive scale
strains the logic associated with existing security studies theory and policy (in-
telligence, coercion, escalation, deterrence, and war). We must be open to the
possibility that, from a scholarly explanatory perspective and from a policy
development and execution standpoint, something fundamentally different is
occurring and it requires a new explanation and policy prescriptions. Getting this
wrong could have dire consequences for international security, as we witnessed
in 1914 and 1939.
In the chapters that follow we provide direct challenges to the notion that
the cyber strategic environment is old wine in new bottles—that it is just espio-
nage or coercion by other means and/or ways. Here, we introduce the theoret-
ical basis for the standalone argument that the extraordinary amount of cyber
activity we are seeing follows a distinct logic. To develop the parameters of a
theory of cyber persistence, we must first explain the structure of a third strategic
environment.
(software-hardware-processes that connect them and humans that use them) that
combines with speed of play to make this a fundamentally different game. The
complexity of this environment and its engagement dynamic are not captured in
a simple offense versus defense conceptual frame. Neither offense nor defense
is dominant or inherently advantaged. If I track an active breach of my network
and simultaneously protect aspects of that network, but allow access to other
sectors of the network to understand the techniques, tactics, and procedures of
the opponent and then use information gained to enhance a prepositioned set of
code and execute my own exploitation of the opponent’s systems all in a simulta-
neous set of maneuvers that take effect in a matter of minutes, if not seconds, at
what point am I playing defense and at what point offense?
We assert that the better way to conceptualize this environment is to rec-
ognize that what is occurring is grappling over initiative, something initially
lost at the breach moment, regained at the detection moment, reversed at the
tracking moment, and sustained at the moment the opponent’s systems are
exploited. These are not episodic linear actions of attack and protect, as many
have conceptualized. Rather, it is a fluid set of engagements driven by who has
the initiative at any given moment.
Understanding this third strategic environment as an initiative-persistent
space captures the essence of the primary cyber behavior of the past twenty
years: cyber faits accomplis (a concept we develop in Chapter 3). Much of what is
happening in cyberspace consists of parallel attempts to gain enough initiative to
be able to set the conditions of security and insecurity within and across devices,
systems, and networks. Although direct cyber engagement (another concept de-
veloped in Chapter 3) can occur between an attacker and a defender, most of
what is occurring consists of continuously flowing parallel operations that do
not start with any expectation of shaping the other side’s calculus, but rather
focus on exploiting inherent vulnerability. We contend, therefore, that the cyber
strategic environment is a space of exploitation, not principally one of coercion.
What is shared by both the conventional and nuclear strategic environments
is a logic associated with war (or war avoidance) and coercion to achieve po-
litical ends in which there is direct exchange or expected exchange between
protagonists. In these environments, attack or the prospect of attack that shapes
behavior and the advancement of strategic ends is transactional. It flows from
the exchange (or expected exchange) between mutually engaged and identifi-
able protagonists.
In the cyber strategic environment, States can advance strategic-level cumu-
lative effects without direct exchange, without coercive shaping of behavior, and
without war because they can directly change the virtualscape in which they
seek to advance their security through exploitation of vulnerabilities that allow
them to access, maneuver, fire, and—at the highest point—control without
26 Cyber Persistence Theory
directly interacting with other States. Even when the actions are not covert or
become discovered, the exploitation of vulnerability is not wholly dependent on
the target’s actions. A security patch can certainly shut down one vector of ex-
ploitation, but it does not fundamentally alter a capacity to exploit in general. In
some circumstances, patching can send an attacker back to the drawing board for
some time, but it does not negate the capacity of an attacker persisting to regain
initiative through some alternative exploitative option.
To update the comparative summation provided earlier, conventional secu-
rity rests in the presence of war, nuclear security rests in the absence of war, and
cyber security rests in the alternative to war.
An Alternative Theory
The remainder of this book turns to the construction of a comprehensive theory
of cyber persistence to explain a strategic environment based on initiative per-
sistence (rather than offense dominance) that requires States to understand a
logic of exploitation (rather than coercion).
Here we discuss the core tenets of this theory and then turn in Chapter 3 to a
deeper analysis of new concepts and their prescriptive implications.
The cyber strategic environment’s initiative persistence rests on the features of
the technology itself and the construct that organizes those features. Specifically,
we are referring to recursive simplicity and interconnectedness.
The most fundamental components of computing technology, both the hard-
ware circuit board and the software code, rest on an overall default of iteratively
building from a simple starting point, essentially building on simpler versions of
the version we have. Although not all hardware and software is specifically built
in such a fashion, the inherent nature of computing technology has sought and
leveraged recursive simplicity.40
Recursion can be defined as self-similarity in structure where symmetry runs
across scale—in essence, “pattern inside pattern.”41 Put another way, a recur-
sive structure is one in which the whole is structurally identical to its parts.42
Although recursive structures exist in nature (e.g., snowflakes and ferns), they
were originally discovered as mathematically based constructions. By identifying
the principle of self-similarity across scale, mathematicians Helge von Koch and
Benoit Mandelbrot showed that fractal patterns could lead to infinite length in
a finite space.43 These observations laid the foundation upon which early soft-
ware developers constructed large programs out of existing smaller ones. The
recursiveness of software tremendously simplifies its development. Instead of
regarding each independent part of a design separately, base commands can be
reused in similar but broader commands. Thus, one need only know a fraction
The Str uc t ure o f Strateg i c Env ironme nt s 27
of computing power, the median-income family in the United States has more
computing power in its home in 2020 than many countries could afford or de-
ploy only a few decades ago. The nature of the technology itself also lowers cost
in terms of skill development. There has been an inverse relationship between
increases in the complexity of the technology and what it can do, and the ease
at which the technology can be used. The time, energy, and cost necessary to
effectively use increasing complex platforms has continually declined. ICT is af-
fordable in the broad sense of that term. Training, possession, and use require
less time, less money, and fewer resources.
Due to its recursive simplicity, accessibility, availability, speed, and afforda-
bility, networked computing creates a profoundly different organizing principle
on which the relationship between people, platforms, and place rests. The den-
sity at the global scale is truly remarkable. It took fourteen years to reach one
billion users of the Internet, but only three years to add the last billion (2020
estimates suggest 4.5 billion users, or about 60 percent of the world’s popula-
tion).52 It took approximately twenty years to create 250 million websites (dis-
tinct hostnames). It took fewer than two years to double that and less time still
to double it again. In 2019, the estimate was about 1.75 billion publicly acces-
sible websites.53 As with Koch’s snowflake, the growth in these features is driving
the creation of a vast and ever-expanding virtualscape even though the principal
device we use—the computer—represents a finite space inhabiting a finite ter-
restrial globe.
Thus, interconnectedness, as we present it here, is not simply the technical
feature that follows from the Internet’s backbone; it is not synonymous with net-
working. Rather, understanding interconnectedness conceptually as a structural
feature of the cyber strategic environment requires us to see it as the sum of
the four variables discussed above that, in combination, creates a virtualscape of
continuous flux and sustained linkage.
In cyberspace, one can “be” anywhere at any time, in which “be” means “suffi-
cient presence to take meaningful action.” In terms of State relations, to be inter-
connected means to be in constant contact with one another at a level in which
the potential to influence or affect sources of national power exists. This condi-
tion within the cyber strategic environment is different from that found in the
conventional and nuclear environments, in which contact is episodic, potential,
or imminent, but not constant. This is because terrestrial space is organization-
ally segmented (vice interconnected)—defined geographically and reinforced
through international law’s principle of sovereignty.
From the perspective of structural theory, constant contact must be under-
stood as a condition, not a choice. It is a circumstance that follows logically
from being in an environment organized by interconnectedness. If the system is
not interconnected—that is, it is segmented—then the base condition is not a
The Str uc t ure o f Strateg i c Env ironme nt s 31
connection that is constant. The two are inextricably linked, and that linkage is
profoundly significant.
One would be hard-pressed to find a State strategy document, policy state-
ment, or corporate report that does not refer to cyberspace as “global” and “in-
terconnected.”54 However, what mostly follows in those documents does not
treat interconnectedness as a distinctive structural feature that drives an inher-
ently different logic from segmentation. Particularly when it comes to State re-
lations over security, the working assumptions of most State strategy relative to
cyberspace have been grounded for decades in a logic that assumes security is
to be found in barriers and separation (firewall thinking, for example). To be
interconnected is to be in constant contact, which cannot be solved by denying
this fundamental feature. Yes, I can disconnect from the network, but that does
not achieve security within a cyber strategic environment. Removing oneself
from the situation is not a sustainable solution because it precludes one from
leveraging the beneficial outcomes of networked computing. National cyber
security must solve the challenge of interconnectedness and constant contact
working within, not outside or in spite of, the unique features of cyberspace.
Digital life is a reality; securing it requires we accept that reality.
The implications of this combination alone raise some distinct security
concerns. One must, as a planning principle, allow for the prospect that it is pos-
sible for an adversary to persist on the networks of critical infrastructure (elec-
tricity, water treatment, transportation, healthcare), the networks of leading
industries, the networks of government agencies, and the core communication
networks within society. This constant contact may position the adversary for
exfiltration or manipulation of data resident on or traversing those systems in
such a manner as to create adverse effects cumulatively over time. This can occur
without some overt crossing of a terrestrial boundary that, in the past, had been
the demarcation between peace and war.
Interconnectedness and constant contact, however, only create the potential.
Unfortunately, the nature of the technology itself makes that potential a contin-
uous reality. At its most fundamental starting point, the notion of the network
was meant to replace the vulnerability of a single point failure that existed in
the communication bureaucratic hierarchy. Specifically, as it related to solving
the threat of a surprise nuclear attack that might decapitate the top of a hier-
archically based decision-making system of communication, the ARPANET’s
innovation was to create centralized control without a center. The magnificence
of the Internet is that its recursive structure created systemic wide redundancy
at a level of efficiency out of reach of industrial age technology. It did this essen-
tially through a portal system, where there is always a route around closed doors.
It was not built to deny access, an essential ethos behind security, but rather to
expedite it.
32 Cyber Persistence Theory
This base default to access is exacerbated by the way cyberspace has ex-
panded. Although there have been many benefits from releasing software
version updates—constantly evolving code builds on previous configurations—
the sheer size of software packages alone is staggering. It is estimated that
the Windows 10 operating system stands on 50 million lines of code, while
the Google platform leverages nearly 40 times that number, at 2 billion lines.
Regardless of system, a basic reality is that this accessible terrain is of such vast-
ness that any mistake, unanticipated use, or truly novel application can enable an
unauthorized user (or insider threat) to create terrain, which they can configure,
and thus control, to advance their interests.55
Within the conventional and nuclear strategic environments, the tech-
nology of war is effectively distinct from the terrain in which war is conducted.
The plane is different from the air in which it flies, the ship from the water
it sails, and the tank from the land it traverses. In the cyber strategic envi-
ronment, computer code is simultaneously the means to maneuver and the
space through which one maneuvers. Although cyber physical systems—the
integrated circuit, for example—reside physically in some device and are
thus distinct from code, the processing that it accomplishes is all driven by
the code that not only activates programmed action through the integrated
circuit, but can add functions previously not present for that integrated cir-
cuit to process. Those new functions effectively become an addition to the
virtualscape—new terrain that is being traversed by the new code that has
created it. In this sense, every new software update, new hardware version,
and new process that links them together reconfigures the space that had
existed previously. The scale, scope, and form of maneuver is ever shifting in
cyberspace.
At the tactical level, you indeed can defend in cyberspace, but you only de-
fend in the moment—in the configuration of software, hardware, and processing
that existed at the time you deployed a configuration you thought was secure.
As noted earlier in the discussion of deterrence by denial, the effects of that de-
fensive mitigation are not sufficient to attrite capacity to the point of denying an
adversary another way around. This highlights the mismatch between the struc-
tural conditions of the cyber strategic environment and what is necessary for de-
terrence by denial to succeed. It is one reason deterrence by denial should not be
relied on as the primary strategy to achieve security in cyberspace. Deterrence
by denial relies on a calculus on the part of the prospective attacker that it will
expend more force in attacking than can be sustained to achieve or hold a gain.
The prospect of attrition is how significant defense and resilience capabilities
might dissuade an attack. That other vectors of intrusion are likely available and
that exploitative code can be produced (or otherwise acquired), manipulated,
and repurposed with relative ease undermine that prospect. Thus the loss of an
The Str uc t ure o f Strateg i c Env ironme nt s 33
with their interests. In business activities, that is a normal and legal practice in
the competitive pursuit of profit. In the world of statecraft, it can be normal and
legal practice through regulation, such as the EU’s 2018 General Data Protection
Regulation, which required significant shifts in how data are held in and trav-
erse across cyberspace.59 Such shifts might also be direct attempts to create
conditions to enhance security in one’s favor that might have a neutral or nega-
tive effect on adversaries’ security or may be direct attempts to create conditions
of insecurity for an opponent to unbalance them or set back advantages they
may have been seeking to gain.
The structural feature of interconnectedness and the condition of constant
contact combined with the inherent capacity to reconfigure introduce a signifi-
cant incentive to be in some control of setting the conditions within and across
networked computing and the digital interfaces that knit together cyber activity
in one’s favor, rather than ceding that capacity and action to others. We are left
as a result with structurally induced persistence, defined through a continuous
willingness and capacity to seek initiative. As such, in security terms, persistence
is a structural imperative. In a strategic environment in which the conditions of
security and insecurity can be configured directly, States must persist in ensuring
as best they can that their constant contact with this vast interconnected set of
actors is configured in a way that their core sources of national power can lev-
erage the interconnectedness for growth (be it economic wealth, social cohe-
sion, improved national health, education, informed public policy, or military
might) while remaining secure.
This requires a premium to be placed on anticipating exploitation of software,
hardware, and the processes that link them together and on translating that an-
ticipation into a favorable advancement of their interests. Exploitation can take
the form of simply using the technology lawfully in unexpected ways, but from
a planning perspective one must also anticipate exploitation of vulnerabilities
through illegal and unauthorized ways. Cyberspace is littered with vulnerabilities
that leave all actors, including the most powerful States, exposed to exploitation.
In fact, the States most dependent on cyberspace are at once both very powerful
and very vulnerable cyber actors.
Systemically, we are left with the realization that cyberspace is macro-resilient
(and thus stable) and micro-vulnerable (and thus inherently exploitable). The
inherent vulnerability to exploitation is what raises the potential for cyber ac-
tivity to have strategic effect, because the opportunity exists for cumulative effect
achieved through setting and resetting the configurations of the virtualscape to
yield strategic gains in relative power over time. Blood loss from a thousand
nicks can be as devastating to capacity as the loss of blood from a single mas-
sive wound.
The Str uc t ure o f Strateg i c Env ironme nt s 35
Conclusion
Bernard Brodie, in two highly enlightening explanatory essays on the great work
of Carl von Clausewitz, On War, concluded that what makes that work endur-
ingly relevant to modern security studies was the approach that Clausewitz took
to his daunting task of explaining war. Clausewitz’s main achievement, Brodie
argued, “was to get to the fundamentals of each issue he examined beginning
with the fundamental nature of war itself.”61
Clausewitz’s own analysis was that war is “a true political instrument, a con-
tinuation of political intercourse, carried on with other means. What remains
peculiar to war is simply the peculiar nature of its means.”62 Clausewitz under-
stood war to be “different from anything else,” and thus worthy of intense study,
but also nothing more than a subset of a larger category—the core politics be-
tween international actors.63 This was his single most insistent point—that war
had to be studied and practiced as the subjugated instrument of high politics.
It was not war for war’s sake that motivated Clausewitz’s inquiry, but rather the
36 Cyber Persistence Theory
desire to understand how war is used to acquire and advance power relative to
your opponents of the day.64
The logic of cyber persistence theory suggests that it is best to reorient our
thinking about national security as it relates to cyberspace to the point of con-
sidering that a third strategic environment exists in which States pursue relative
power to secure—an environment that does not follow the logic of coercion
and war that Clausewitz and so many others that followed have illuminated. As
we address in the remainder of this book, cyber persistence both in theory and
in practice resonates through a different logic captured by a different lexicon.
Explanatory power will be gained in academic research if we recognize that the
cyber strategic environment rests on interconnectedness, not segmentation; that
constant contact is a condition, not a choice; that cyber activity of consequence
should be understood primarily as campaigns, not incidents, intrusions, or
hacks; that the inter-State dynamic is primarily one of competitive interaction,
not escalation; and that initiative rather than restraint is necessitated.
Policy prescription will strengthen if we reorient thinking toward rules of en-
gagement, not contingency planning options; seizing targets of opportunity rather
than holding targets at risk; being active and anticipatory not as aggressive or
offensive inherently but as primarily defensive in orientation; that we must ex-
ecute continuous operations, not episodic ones; that costs and benefits are cumu-
lative, not event/episode-based; that cost imposition can be considered an effect
of changing the cyberspace environment, not as a strategy to influence adversary de-
cision cost-benefit analysis or decision-making; that effective cyber operations
and campaigns are primarily exploitative, not coercive; and that competition below
the level of armed conflict is just as consequential strategically as war and territorial
aggression.
Cyber persistence theory assumes that while the conventional and nuclear
strategic environments remain essential to State politics, the “peculiar nature”
of the cyber strategic environment may support a different logic and, thus, re-
quire a different approach to competing over relative power. Whereas security
requires one to win war in the conventional environment and avoid war in the
nuclear environment, States in the cyber strategic environment may have a true
alternative through which to achieve strategically relevant outcomes. In the next
chapter we turn toward developing this theoretical reframing further.
3
State Behaviors
How a State responds to the cyber strategic environment’s structural imperative
reflects its approach to setting the conditions of security in and through cyber-
space by either seeking to avoid or engaging in exploitation.1 All theories of in-
ternational politics presume that States engage in some degree of internal-facing
security activity, such as arming or “internal balancing.”2 What is novel about
Cyber Persistence Theory. Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett, Oxford University Press.
© Oxford University Press 2022. DOI: 10.1093/oso/9780197638255.003.0003
38 Cyber Persistence Theory
Exploitation of the physical and logical layers generally occurs through direct
hacking by seeking out open ports or other external network or system access
points to exploit known vulnerabilities in software and hardware. Exploiting the
cyber persona layer relies instead on the unwitting complicity of users. Examples
include (1) social engineering and credential or spear phishing to gain access
to passwords and login information and/or to facilitate malware downloads
granting unauthorized access to a network; and (2) “water holing” or drive-by
download techniques in which attackers estimate (or note) websites visited by
organizations or individuals and implant malware that is downloaded when the
sites are visited.13
Rather than create from whole cloth new concepts embodying the primary
manifestation of exploitative inter-State cyber behavior in cyberspace, we lev-
erage those developed for conventional and nuclear strategic environments—
the fait accompli and agreed battle—but adapt them to the distinctive features
of the cyberspace environment. Both concepts in their academic heyday were
largely empirically derived, perhaps viewed as describing anomalous, less-con-
sequential, or lesser-included cases. As a result, they received far less theoretical
attention. It seems that the worm has turned, as the cyberspace environment
has elevated the importance of those concepts for describing State behavior
and, consequently, has diminished the centrality of theories like coercion and
its related concepts, which were developed for the nuclear and conventional
environments.
conditions of security in their favor vis-à-vis OPM. These credentials were sub-
sequently used to log into OPM networks and install malware that exfiltrated
sensitive data on approximately 22 million key US personnel, data China could
conceivably leverage in a strategic effort to maintain or alter the international
distribution of power.31 Additionally, beginning around 2014 Chinese cyber
operators initiated a campaign (“Cloud Hopper”) premised on compromising
managed service providers (MSPs)—companies that remotely manage their
clients’ information technology infrastructure—as a way to establish footholds
for follow-on exploitations of the MSPs’ clients.32 After compromising a MSP,
the operators mapped out the network topology to find the credentials of the
system administrator who controlled the company “jump servers,” which act as
a bridge to client networks. With that information, they then “jumped” to client
networks, mapped those topologies, and exfiltrated information that served
their strategic interests.33
With these examples in mind, we eschew George’s “quick” adverb in our cyber
fait accompli definition because, although initial gains can be realized quickly
through cyber exploitation, subsequent efforts to realize follow-on gains can ex-
tend to minutes, hours, days, months, or even years. To wit, analyses indicate
that the time from an attacker’s first action in an event chain to the initial com-
promise of an asset is typically measured in minutes.34 Crowdstrike reported
that after an initial beachhead has been established, the average “breakout time”
for the most competent State cyber actors ranges from 19 minutes to around
10 hours.35 Mandiant noted that Chinese cyber operators engaged in significant
exfiltrations of intellectual property by maintaining a persistent presence on
targeted networks for an average of 356 days.36
Within the definition of the cyber fait accompli, “unilateral” means that
the exploitative action is pursued independently of any decision made by the
targeted entity. Thus, the fait accompli is distinct in principle from coercion,
which depends on demands, commitments, and signaling expressly for the pur-
pose of influencing the target’s decisions.37 Moreover, making gains at the ex-
pense of an adversary is not the same as threatening to impose costs or actually
doing so in an effort to change an adversary’s decision calculus. It can, however,
be equally strategically consequential for international politics—an important point
we expand on later in this chapter and in Chapter 4.38 Once a benefit or gain
is realized, it may subsequently serve as a foothold for future coercive strategic
bargaining, depending on the target’s political value; however, the cyber fait ac-
compli is first and foremost about seeking unilateral operational and/or tactical
gains through exploitation.
As in the terrestrial frame, States pursuing cyber faits accomplis have a strategic
incentive to pursue their desired gains in and through cyberspace in ways that
do not invite escalatory retaliation. That said, cyber persistence theory argues
Cyber B ehav ior and D y nami c s 43
that the opportunity for reward, not fear of retaliation, is the primary incentive
driving States to engage in cyber operations short of armed-attack equivalence.
States recognize that strategic opportunities flow from cyberspace’s abun-
dant vulnerabilities and resilience to persistent, exploitative cyber operations/
campaigns with effects short of armed-attack equivalence. Given opportunities,
States are taking them.
The strategic logic behind the fait accompli in cyberspace also hinges on finding
vulnerabilities. However, unlike the terrestrial frame, those vulnerabilities do
not lie in the ambiguity of a coercive demand, but rather in the very fabric of cyber-
space itself.39 Cyberspace has been described as a vulnerable yet resilient techno-
logical system,40 organically offering an “abundance of opportunities to exploit
user trust and design oversights.”41 When considered along with a condition of
constant contact, the prevalence of vulnerabilities provides a strategic incentive
for States to pursue unilateral gains in and through cyberspace, persistently.42
This incentive is further enhanced because of cyberspace’s resilience. The fait
accompli in physical space returns a marginal, episodic gain—often a small piece
of territory. Cyberspace, by contrast, encourages the accumulation of gains to
levels of strategic significance through series and/or campaigns of faits accomplis
at scale because its resilience mitigates concerns that such campaigns might put
at risk the digital environment’s systemic functionality.43
There is a second notable way in which the cyber fait accompli diverges from
its counterpart in the conventional strategic environment. George describes the
fait accompli as a strategic bargaining concept that States use to change the status
quo in the international system. Although cyber fait accompli campaigns could
conceivably change the status quo in the international system, they are unilateral,
independent actions and thus are not indicative of strategic bargaining.44 For ex-
ample, North Korea has unilaterally pursued an aggressive campaign of cyber-
enabled theft from financial institutions and cryptocurrency exchanges and has
used the proceeds to expand its nuclear weapons program and develop intercon-
tinental ballistic missiles.45 The $2 billion Pyongyang reportedly accumulated
from 2016 to 2019 to support those programs while evading sanctions is more
than three times the amount of currency it was able to generate through coun-
terfeit activity over the four decades prior.46 Thus, pursuit of cyber faits accomplis
is more accurately described as a unilateral, independent strategic choice in the
cyberspace environment rather than as a mechanism for strategic bargaining.47
As noted earlier, an important distinction between coercion theory and cyber
persistence theory lies in the recognition that while all strategic bargaining is com-
petition, not all strategic competition is bargaining.
The cyber fait accompli is a useful concept for describing and explaining
States’ primary operational and tactical cyber behaviors—how they persist in
seizing and maintaining the initiative to set the conditions of security in and
Another Random Document on
Scribd Without Any Related Topics
28. A hét holló.
Hun vót, hun nem vót, vót a világonn ëgy asszony.
Annak az asszonnak vót hét fia.
Ëcczër csak lëbetegëdëtt, gyönyörű szép lyánygyerëkët hozott a
világra.
A gyerëkágy után, mint a hogy szokás, ő is elmënt a templomba
az avatóba. Mikor má ott elvégezte, gyövet látta, hogy a hét fia ép
akkor gyön ki a kocsmábú, mikor ő a templombú. Annyira
mëhharagudott rájok, hogy mëgátkozta őköt: »vállyatok hollóé, ha
még a kocsmába jártatok inkább, mint a templomba!«
Allyig hogy ezt kimonta, a hét holló ott szát el a feji fëlëtt, az ő
hét fija.
Ő mëg mënt hazafele.
Má a kis lyány nagyocskára nyőtt, szép lëtt, annyányi, látta, hogy
az annya mindér rí. »Mé rísz, të anyám?« kérdezte az annyát. »Në
kérdëzzé engëm, hogy mé ríjok? csak ríjok. Ússë tuccz të engëm
mëvvigasztalnyi!« »Dehonnem, écsanyám! hátha tunnék valamit én
is! Mongya csak mëg, maj mëllássa, hogy jobb lëssz!«
»Mëmmondom, fijam! ha olyan nagyon erősködöl, de tudom, hogy
hasztalan. Hát tudod-ë, mikor tégëd születtelek, oszt utánna
mëntem az avatóba, hát vót nekëd hét bátyád, a ki épenn akkor is,
mikor én a templomba vótam, a kocsmábú gyött ki. Én őköt
mëgátkoztam, hogy »vállyatok hollóé!« ők azé vátoztak, elszátak,
azóta úgy odavannak, hogy së hírik, së nyomok, nem tudok rúllok
sëmmit!«
Ezt monta az asszony, de nagyon keserves rívásba fogott.
Vigasztalta vóna azt a kis lyány, de már rosszabb bót. Anná jobban
rítt.
Egy nap rëggel, aszongya a lyány az annyának: »écsanyám!
süssék nekëm bogácsát. Én elmënëk, fëlkeresëm a bátyájajimot!«
»Hova mënné të, te! isz’ as së tudod, hun, mére keresd!«
De a lyány kötte magát, az annya së áhatott elejbe, hogy në
mënnyék. Sütött neki bogácsát, avval útnak eresztëtte.
Mënt a lyány, mëndëgét hetedhét ország ellen.
Úttyába tanákozott ëgy farkassal. A farkas mëgállott előtte az
útonn. A lyány mëg nagyon mëgihett. »Sosë iheggy mëg tüllem, jó
lyány! nem bántolak én! aggyá inkabb ëgy falat ënnyivalót, mer má
olyan ëhetném, hogy majd elveszëk!« A lyány is oszt mëbbátorodott,
kivëtt a tarisznyábú ëgy bogácsát, odatta neki. Az mëg ëgy sípot
adott neki érte, hogy ha akarmi baja lëssz is, csak fújja mëg, ő
azonnal segíccségire mëgyën.
Avval elvátak ëgymástú.
Mënt a lyány tovább. Útközben most mëg ëgy rókával tanákozik.
»Hallod-ë, jó lyány! fordí mëg engëm a másik ódalamra, má hét
esztendeji nyomorgok a fé ódalomonn. Jótét helyibe jót vársz!« A
lyány mëssajnáta azt is, adott neki ëgy bogácsát, a mé a róka
lëszakított magárú ëgy szál szőrt, azt odatta, hogyha szükségi lëssz
valamire, azt csak szakíjja ketté, ő rögtön ott terëm. Jó van, a lyány
azt is eltëtte.
Harmacczor mëg – a hogy mëgyën, ëgy galyrú szó lë neki ëgy kis
madár. Az is bogácsát kért. Adott ő annak is. A kis madár mëg hála
fejibe olyant mondott, hogy »ha a vërës tengërhë érsz, ott ëgy szép
alma esik elejbed; të azt vëdd fël, ëdd mëg, a csutáját mëg tördeld
el, oszt hajingádd a vízbe!«
A lyány megköszönte a madár jóakarattyát, oszt indút. De a kis
madár attú a përcztű fogva mindég vele mënt.
Sokszor fëlgyött a nap meg sokszor lëmënt, még ëcczërcsak
nagysokára a Dunáho ér a lyány. Próbáná, próbáná, de nem tud
rajta átjutynyi.
Benyút a zsebibe, elévëtte a sípot, oszt mëgfútta.
Rögtön ott termëtt a farkas. »Mit parancsolsz, itt vagyok!« monta
a farkas. A lyány oszt elmonta a baját. Akkor a farkas elvëtte tűle a
sípot, mëffútta ő is, hát csak úgy rezsgëtt a sok farkas, annyi gyűt
oda. Mëntek ëgënyest a Dunának. A lyány ezt nem tutta mire vélnyi.
Látta oszt, mikor má mind belemënt, hogy azé van e, hogy ő át
tudhassék mënnyi! Neki is mënt a Dunának, átsétát a sok farkas
hátán úgy, hogy még a czipéji szélyi së lëtt vizes.
Má a Dunán átment vóna, de még csak ezután gyön a sok nehez
út! Mëgy, mëndëgé, má el is fáratt, mikor a fekete tengërhë ért.
Hogy mënnyék ő most azonn át? mindënféliképenn törte a fejit rajta.
Eszibe jutott a szőrszál. Szétszakajtotta. Rögtön ott termëtt az róka.
»Mit parancsolsz, kedves gazdám!?« »Vigyé át a fekete tengërënn,
mer nagy utam van nekëm, a kinek mén nagyon soká gyöhet el a
végi!«
A róka csak neki fartolt a tengërnek, a farkát rávette a tengërre,
úgy hogy félyig átérte, akkor oszt monta a lyánnak, hogy »ereggy
no!« Mikor a tengër közepinn vót a lyány, a róka mëffordút a tengër
másik partya fele, úgy, hogy a lyány minden baj nékű átmëhetëtt a
róka farkánn. De a kis madár mindég mënt vele!
Ëcczër a vërës tengërhë ér a lyány. A partyán mingyár elejibe hút
ëgy alma. Ënnyi kezte, a csutájajit mëg a vízbe hajingáta ëgy
csëppig. A csutábú gyönyörű szép hajók lëttek. Ëgyre fëlült, a ki őt
elvitte túnat a vërës tengërënn.
Ott a parton vót ëgy nagy hëgy, annak a tetejibe mëg ëgy kis
ház.
A kis madár, a ki hűségesenn kisirtëtte, aszongya a lyánnak: »të
ideszámitol ebbe a kis házba, de të oda nem tuccz fëljutynyi
sëhossë, hacsak oda nem mégy, amott a hëgy tövibe van ëgy
hattyú, annak ülly a hátára, kapaszkoggy a farkába, në fé maj fëlvisz
a!«
Úgy is vót. A lyány ráült, a hattyú mëg fëlvitte.
Bemënt a kis házba, szétnézëtt. Elévëtte az asztalterítőt,
mëgterítëtt, kirakott rája hét bogácsát. Azután elbújt az ágy alá.
Este hazagyönnek a hollók, szétnéznek a házba, kérdezőskönnek,
tanágatózkonnak, hogy ki járt itt? de nem tutták kisütynyi. Avval
lëfeküttek, rëggel mëg mëntek hazúrú.
Másnap is igy törtint a dolog. A lyány mëgterítëtt, oszt elbújt az
ágy alá. A hollók tanágatták most is, de nem mëntek sëmmire.
Harmannap a hollók javába eszik a bogácsát, a kit ő – a lyány –
kirakott, ő mëg csak elébujik az ágy aló, aszongya nekik: »ösmertëk-
ë még engëm?« – aszongyák a hollók: »hát honnë ösmernénk mán
no! iszën të a testvérünk vagy! de tudod-ë, mit? në maragy të itt
köztünkbe, mer ha a hollók királya hazagyön, széttép! ereggy, míg
szépenn vagy!« De a lyány mëkkötte magát, hogy bizon nem gyön ő
aggyig, mig ököt ki nem szabadittya! Aszongyák a hollók, hogy »nem
lëssz abbú sëmmi së, mer ahho hét esztendőt, hét félórát mëg hét
minutát këll éhëznyi mëg az alatt az idő alatt ëgy árva szót së szónyi.
Të mëg azt nem birod ki!« »Dehonnem!« – monta a lyány, – »maj
mëppróbálom!«
Avval elbúcsúzott a hollóktú, oszt mënt, a mére látott.
Úttya ëgy nagy uradalomba vezetëtt, a hun egy nagy
szalmakazalba elbújt. Ott vót ő magányosan, së nem ëtt, së nem
szót sënkihë. Hiába hozta a kirá agara az ételt, rá së nézëtt, mécs
csak hozzá së nyút.
De ëcczërcsak a lovász eszrevëszi, hogy az agár a mi ételt kap,
mind a kazalho viszi. Rálesëtt. Mëllátta, hogy a kazalba ëgy lyukba
valami szép lyány van elrejtëzkëdve. Jelëntyi is a kirának mingyá,
hogy mit látott!
A kirá odamënt, kihítta, nem törődött avval, hogy néma, mer
annak gondolta, hogy nem szól, mëszszerette, elvëtte feleségű.
Nemsokára lëtt ëgy szép gyerëkik.
De vót az udvarba ëgy kutyaírígy vasórú bába is, az haragudott a
kiránéra szörnyenn. Mindënáron el akarta vesztenyi.
Mikor a kis gyerëkët elvëtte tűlle, azt ëgy vesszőkosárba fektette,
betëtte ëgy folyóba, az mëg vitte, vitte lëfele. A vasórú bába azután
lëölt ëgy csirkét, a kést az asszony – mán mint a kiráné – mellé
fektette, a száját mëg a kézit bekente vérrel, hogy azt higyék, hogy
ő maga ëtte mëg a gyerekit.
Akkor a vasórú bába bemënt a kiráho, aszongya neki: »mit
érdemël az az asszony, a ki a saját tulajdon gyerëkit mëgëszi?« A
kirá tutta, hogy az ő feleségire kék most szónyi valamit, de nem
szót, csak aszonta: »még várok, az igazság maj kisül!«
De születëtt ám a kiránénak másogyik, harmagyik gyerëki is,
azokot is mind elvesztëtte a vasórú bába a vízënn, mész szërëncse
vót, hogy ëgy mónár kifogta őköt, a kinek ëgy csëpp gyerëki së vót.
A gyerëkëk születésit azonba látták a hollók, mëg azt is, hogy a
mónár kifogta őköt.
A kirának mëg mit vót mit tënnyi, most má elhitte, hogy a
feleségi csakugyan maga emísztyi el a gyerëkëkët, kilenczvenkilencz
kocsi fát hordatott máglyába, hogyha az majd tiszta parázstűz lëssz,
rátëszik az asszont.
Fël is gyútották, má vinnyi akarták az asszont, ép mikor a
zsarátnakra akarták tënnyi, lëtelt a hét esztendő, a hét félóra, mëg a
hét minuta, a hét holló is, a ki ott vót az igazlátásná, csak
mërrázkódott, oszt valamënnyibű szép fiatal embër lëtt.
Azok elmonták az esetët, hogy a kiráné az ő testvérik, idáig azé
nem szóhatott, mer őköt akarta mëszszabadítanyi, a gyerëkei pegyig
ëgy mónárná van, a ki kifogta a vizbű, a kinn a vasórú bába
eleresztëtte, azóta nevelyi is szépenn.
A kiráné mësszabadút, a gyerëkeit a mónártú visszaszërzették, ő
az anyját magáho vëtte, a hét testvéri pegyig elmënt haza. Még
most is boldogann ének, ha mën nem haltak.
Besenyőtelek, Heves vármegye. Dankó Anna szakácsnőtől.
Lejegyzési idő: 1903. decz.
29. A hét daru.
Hol volt, hol nem volt, volt egyszer a világon egy özvegy asszony.
Az özvegy asszonynak volt hét fia, meg egy bölcsőben fekvő,
csecsemő kis lánya. Szegény volt az asszony, napszámra, hova járt,
míg nem volt otthon, a kis lánynak a hét gyerek viselte gondját.
Étették, itatták, s hogy elaludjék, ők is ringázták. Egyszer hogy-hogy
nem? valahogy kidőtötték a bölcsőből a kis lányt, az ríni kezdett, az
anyja meg épen akkor jött haza. Kérdezte a fiaitól:
– Mi lelte ezt a kis lányt, hogy így rí?
Azok mondtak valamit, de nem az igazat. Az asszony a hogy ölibe
vette a kis gyereket, mindjárt meglátta, hogy a feje fel van kelve,38)
ezt biztosan kidőtötték a czudarok, mikor játszottak! megátkozta
mind a hetüket, hogy váljanak darúé.39)
Nem kellett kétszer mondani, a hét fiú abban a szentben daru
lett, szép hét hamvas daru. Fel is kerekedtek mindjárt és mentek
Isten tudja: hová? – messzire.
A kis lány otthon maradt. Az anyja nevelte, gondozta, de a kis
lány mindig nagyon szomorú volt. Már lehetett vagy tizenkét
esztendős.
– Mért szomorkodol te, kis lányom – mondta neki az anyja, –
tejbe’-vajba’ fürösztelek, van mit enned-innod, gondodat is viselem,
nem tudom, mi lehet az oka szomorúságodnak?
– Hej! édes anyám! volt nekem hét testvérem, azok egyszer
engem a bölcsőből kidőtöttek, te megátkoztad őket, s most mind a
heten daru képében élnek valahol, ha élnek. Ha én csak egyszer is
megláthatnám őket, sokért nem adnám, mindjárt olyan víg volnék,
mint a fán csiperkedő kis madár.
– Sohse búsúlj azért, kis lányom! mondta neki az anyja, ha ők
olyan gonoszok tudtak lenni, hogy kidőtöttek a bölcsőből,
megérdemlik, hogy most daru képében legyenek. De azért ha
akarod, keresd fel őket, de te úgy sem tudsz a sorsukon fordítani
semmit, legfeljebb még te is odaveszel s nekem vót lányom és nem
lesz lányom.
Beszélt volna az anyja a kis lánynak, ha az hallgatta volna, de
szedelőzködött, a mi kis holmija volt, batuba kötötte, oszt ment a
világnak.
Ment, mendegélt hetedhét ország ellen. Ki tudja, hova ért volna,
ha a Széllel nem találkozik.
– Ugyan, Szél uram! legyen olyan jó, mondja meg, hol van az én
hét testvérem? az anyám megátkozta őket és most daru képében
élnek valahol!
– Nem tudom én, – mondta a Szél, – de ha nyomra akarsz jutni,
csak eredj egyenesen, a hogy elindúltál, majd találkozol a Hold
testvéremmel, az majd tud valamit mondani!
Ment a kis lány, ment, már olyan sokáig, azt hitte, hogy soha sem
ér oda. Mikor odaért, ott sem tudtak semmit a hét bátyja felől, a
Naphoz igazították, az mindent tud, hátha ezt is tudja!
Csupa vér volt már a kis lány lába, éhes is, szomjas is volt, míg
egyszer a Naphoz ért. Eléadta, hogy a hét bátyját keresi, a kik daru
képében élnek, mert az anyja megátkozta őket. Akkor a Nap fogott
egy fekete tyúkot, megkoppasztotta, megfőzte a kis lánynak és azt
mondta neki:
– No! itt van ez a fekete tyúk! edd meg, a csontjáról is jól
lerágjad a húst, de a csontot el ne hajítsd, még jó hasznát veheted!
Oszt ha megetted, eredj egyenesen, a hogy jöttél, találsz egy nagy
hegyet, szúrd a csontot az oldalába, oszt mászsz fel a tetejébe, ott
találsz egy kastélyt, abban él a te hét testvéred!
A kis lány megköszönte a Napnak jó’akaratját, a csontokat a
zsebibe tette, oszt elindúlt.
A hegy már messziről látszott, a kis lány egyenesen tartott neki.
Mikor a lábához ért, kivette a csontot, beleszúrta a hegy oldalába és
úgy ment fel-fel a tetejébe. Már majdnem odafennt volt, elkezdett
fáradni. Hát már ott is maradt volna, ha egy vándorfelleg meg nem
szánja, oszt fel nem löki a hegy tetejére. Úgy jutott el a kis lány, a
hová akart. A kastély csak pár lépésre volt már, nem hímezett-
hámozott a kis lány semmit, kapta magát, bement, leült a lóczára.
Ott volt a hét testvérének a lakása.
Azok épen nem voltak otthon, oda voltak valahol. Mindennap hét
betyáremberrel viaskodtak, tiszta vér volt minden tetemök, mikor
hazaértek. Most is viadalban voltak, azért nem talált a kis lány
otthon senkit. Mindjárt otthon érezte magát, szétnézett itt is, ott is, a
kamrában talált egy csomó véres ruhát. Fogta magát, kimosta. Mire
este lett, a hét daru hazajött, megrázkódott, szép hét legény lett
belőlük. Asztalhoz ültek és vacsoráltak. Vacsora után mentek a
kamrába, hogy majd a véres ruhát levetik, hát – uramfia! mit látnak,
a sok véres, szennyes ruha mind olyan fehér, mint a hó, mind ki van
mosva.
– No! itt valakinek kell járni! mondták egymásnak.
S addig keresgéltek, kutattak, míg a kis lányt meg nem találták.
– Hol veszed itt magad, a hol még a szálló madár sem jár? nem
féltél az úton, hogy valami bajod kerűl?
Örültek a kis lánynak nagyon, nem tudták hova tenni, egyik is
fogta volna meg, a másik is, már majd összevesztek rajta. De
egyszercsak azt mondják neki:
– Úgy ám! kis testvérünk! de itt nem sokáig maradhatsz, mert
mink hét betyáremberrel viaskodunk minden nap, ha azok minket
megölnek, idejönnek és neked is végedre járnak!
– Pedig én meg azért jöttem, – mondta a kis lány, – hogy titeket
megszabadítsalak, a hogy tudlak!
– Jaj! kis testvérünk, de nagy fába vágtad a fejszédet! nem te
való vagy ahhoz!
A kis lány erősködött, hogy akárhogy-akármint, de ő megmenti a
bátyjait.
– Jól van, ha épen annyira elhatároztad magadban, megteheted,
de hét esztendeig meg hét perczig egy szót sem szabad szólnod
senkihez. Ha csak egy kukkot is ejtenél ki a szádon, má minket nem
tudnál megszabadítani soha, míg a világ!
A kis lány felfogadta, hogy nem szól semmit. Még az estét ott
bevárta, másnap reggel indúlt hazafelé. A hogy az erdőben ballagott,
találkozott egy szép királyfival, az megszerette, hazavitte, el is vette
feleségűl. Csak az nem tudott a fejébe menni, hogy mért nem szól
ez a lány? Kuka-e,40) mi-e? de az nagyon furcsa vót előtte,
különösen eleintén. Később aztán inkább hozzászokott.
Egyszer a királyfinak háborúba kellett mennie, a feleségét boldog
állapotban hagyta otthon s rábízta egy vén asszonyra, viselje
gondját, míg ő odajár.
Alig ment el a királyfi, a felesége két gyönyörű fiút szűlt, az
egyiknek a nap, másiknak a hold volt a homlokán. A vén aszony
amúgy is ellensége volt a királyfi feleségének, most meg még jobban
ette a fene, hogy azt a szép két gyereket meglátta, rögtön levelet írt
a királyfinak, hogy jőjjön haza, mert a felesége bíbályos,41) olyan két
gyereket szűlt, a minőt rendes asszony soha nem szokott. A
királyfinak mit volt mit tenni? hazament.
Az ágyba ott feküdt a felesége, mellette a két gyönyörű gyerek.
– Hisz ezek nagyon szépek! gondolta magában, mért öljem én
meg a feleségemet?
De a vén asszony az országban is annyira áskálódott, hogy a
néma asszonyt meg a két szép kis fiát lóbőrbe varrták, kivitték a
város végire, ott meg épen már várakozott a hóhér, hogy
összetrancsírozza őket. De a hogy emelte volna a kardját, ott termett
hét daru, az asszonynak a hét bátyja, már akkorra letelt a hét
esztendő meg a hét perc, megrázkódtak, gyönyörű szép két legény
lett belőlük. Azt mondják a hóhérnak:
– Hallod-e, hóhér! ne bántsd azt az asszonyt! mert az ártatlan!
idáig is a mit tett, mi értünk tette, hogy az átoktól megválthasson.
A hóhér letette a kardját, kivette az asszonyt a bőrből, meg a két
kis gyereket, azoknak csakúgy ragyogott a homlokán a nap meg a
hold! hazavitte őket a királyfihoz.
Igen ám! má otthon azt várták, hogy meghal az asszony, oszt itt
van ni! él! a vén asszony majd megette magát mérgiben. Odament a
királyhoz, hogy ez már mégsem igazság, így-amúgy, ez meg az!…
míg azt mondták, hogy az asszonyt csakugyan el kell veszíteni, mert
csakugyan bíbályos, a kinek még a halála óráján is hét daru jön a
segítségére! Fogták, elvitték egy nagy hegyre, ott egy rettentő setét
mélységbe behajították a két kis fiával együtt. Odament a királyfi is a
meredek széléhez, hogy majd megnézi, hova hajították a feleségét?
hát látta, hogy a két gyerek homlokán kialudt a nap meg a hold, de
az asszony úgy világított, mint a fényes nap. Szaladt be mindjárt a
városba, a feleségét meg a két kis fiát kivetette onnan, a feleségével
még egyszer megesküdött, a vén asszonyt meg eltették láb alól, volt
olyan lagzi, hogy mióta élek, még olyant magam sem láttam. A hét
legény herczegséget kapott, a királyfiból király lett s oly boldogan élt
a feleségével ezután, mint egy pár gerlicze. Még most is élnek, ha
meg nem haltak.
Eger, Heves vármegye. Kaló János, mezőkövesdi legénytől. 1905.
január.
30. A libapásztorbul lëtt királyné.
Hun vót, hun nem vót, vót ëcczër a világon ëgy pár cseléd, annak
a pár cselédnek vót három lyánya.
Az apjok ëcczër vásárra készűt, a lyányainak vásárfiát akart
hoznyi, eléhivatta hát a három lyánt, oszt megkérdëzte tűllök sorba,
hogy hogy szeretyik őtet? Az első aszonta: »Úgy szeretlek, édës
apám, mint a letësletszëbb ruhát, a minőt csak a vásáron árolnak!«
A másogyik mëg úgy felelt: »Úgy szeretlek, édës apám! mint a hogy
a gyémántos ruhát. Úgy-e vëszël nekëm olyant?« Odafordút a
harmagyikho is. »Hát të hogy szeretsz, legkisebb lyányom?«
»Kedves apám! – felelte a legkisebb lyány, – én úgy szeretlek, mint a
levesbe a sót!«
»Hennye azt a kutya mindënëdët! hát hogy mersz të nekëm
ilyenëkët mondanyi? Hát mire tartasz te engëm? Ilyen keveset érëk
én të előtted? Eregy most má, a mére látsz, nekem nem këllesz!
Takarodj a házamtú!« Szörnyen mérges vót az apja, a mé a lyánya
olyan kevesre becsűte őt.
No! a kis lyány is hova fordúllyék most má? el van csappa azé az
ëgy szóé. Szëgény lyánnak mit vót mit tënnyi, összeszëtte, a mi kis
hómija vót, azzal elindút a világnak.
Mëgy, mëndëgél, maga së tuggya, mére, nagysokára végre egy
nagy uradalomra tanál, a kit azt së tutta, hogy kié. Kérdezősködött
itt is, ott is, úgy hallotta meg, hogy egy nagyon gazdag királyé.
Akkor eléatta, hogy mi járatba van? kiféli? miféli? bíz ő szógálatot
gyött vóna keresnyi, ha tanána! nem bánnya ő, akárminő dógot
annak neki, csak szánják mëg! Nagyon megsajnáták a szőrruhába
őtözött rongyos lyánt, minő foglalkozást aggyanak neki? Fëlfogatták
libapásztornak.
Ott szëgénkëdëtt, nyomorkodott sokáig.
Az ételyié mindég a konyhába járt fël. Hát ëcczër is ott
süntörgött, ott forgolódott az ő rongyos szőrruhájában, nagyot kiát
rá a szakács: »Nem mégy má ki innen te, rihe-rongy! te! mindég láb
alatt vagy të! Még ëcczër a ruhájárú beleesik valami az ételbe! oszt
akkor lesz kapsz, még fël is akaszthatnak végette! Takarogy ki
mingyá!«
A szëgény lyány kimënt. A hogy kiért a pitarbú, a kiráfinak az
ablakja mëg épën nyitva vót. »Hová készű a kiráfi?« kérdëzte a
szëgény lyány, látva, hogy a kiráfi odbe őtözkögyik. »Hát mit keresëd
të azt, te szőrlyány? a hova mënëk, oda mënëk, elmënëk estére a
bálba. Sipircz az ablakomtú!«
A libapásztor fogta magát, mënt a libaólba, az ő rendës fekő
helyire. Ott kivëtte a zsebibű, a mit a konyhán kapott, oszt keserves
rívás közt hozzáfogott a vacsorájáho. A hogy ottang vacsorál,
vacsorál, hallja, hogy mellette ëgy kis eger czinczog. Odanéz, hát
csakugyan av vót. Mëgsajnáta, adott neki ëgy kis darab kenyeret.
Mikor azt az eger mëgëtte, hozott magával ëgy gyióhajat, azt lëtëtte
a libapásztor mellé, oszt visszaszalatt a lyukába.
Megnézi a szegény lyány a gyióhajat, ugyann mi lëhet abba? hát
ahogy belenéz, ëgy gyönyörű szép aranyruhát látott. Nagyon
megörűt neki. Még tapsolt is örömibe! »Mëgá, kiráfi! mëgá!
hamarabb ott lëszëk má én a báldba!« El is határozta magát, hogy
elmëgy, kimulatja magát, van má neki hozzá szép ruhája is! Avval
készűt sebësenn, mëgsimakodott, megmosdott, fëlvëtte az
aranyruhát. Akkor »köd előttem, köd utánnam! hogy sënki së
lásson!«, el a bálba.
Mikor odaért, tánczba fogott mingyá, nem árolt ő pëtrëzselymet
ëgy csëppet së. A kiráfi mindég vele vót, nem hagyott vele senkit së
tánczolnyi. Megbámúta nagyon, mulattatta is, de nem jó kedvibű,
mer má mëgszerette.
Kérdëzősködött azután tűlle, hogy kiski ő? azután hogy
honnanvaló? A szép lyány csak annyit szót, hogy
»Törűközőütővárra!« Akkor épen új nótát húztak, elmëntek mëgin
tánczolnyi, egész rëggelyig mindég aj járta.
A kiráfi karonfogta a szép aranyruhás lyánt, engedelmet kért
tűlle, hogy hazakísírhetyi-ë vagy nem? De a lyány csak hímëlt-
hámolt, hogy így mëg úgy, ëcczër csak usgyi! elszökött. A kiráfi má
csak a hűt helyit tanáta.
A lyány visszament a libaólba, az aranyruhát visszatëtte a
gyióhajba, elévëtte a szőrruhát, felőtözködött, oszt mëgint csak a
szëgény libapásztor lëtt. Aznap délyig a libákkal bajolt, azokot
hajkurászta az árokparton, de ő neki eszibe së vót, hogy ő érte most
nagyon, hej! de nagyon búsúl valaki!
Elgyött a dél, a libák is az óba vótak, a lyány megint ott
sodormánkogyik a konyhába. A szakács csak piszkollya, csak dúj-fúj.
»Ereggy má innen, te széhozta! te vízhajtotta! még ëcczër valamit
csakugyan belekavarsz az ételbe, oszt akkor jaj nekem! Ne má ë!
oszt sipirc!« Adott neki valami kis harapnyivalót, oszt kikergette.
A lyány csak odamëgyën a kiráfi ablakára. Ott benéz, láttya, hogy
a kiráfi ugyancsak fésűkögyik, készű valahova! »Hová készű, kiráfi!
hogy olyan nagyon fésűkögyik!?« kérdëzte a lyány. »Mi közöd hozzá,
akarhova mënëk, csakhogy mënëk. Elmënëk a bálba! Takaroggy az
ablakomrú!«
A lyány kiment az óba, ott ëgy szögletbe várta be az estét. Mikor
má gondolta, hogy lëhetne indúnyi, kivëtte a gyióhajbú az
ezüstruhát, fëltisztákodott, »köd előttem, köd utánnam! hogy sënki
së lásson!« ment a bálba.
Má át a báld. A kiráfi nem mulatott, csak ëgy helyën az asztalná
szomorkodott. Mikor az ezüstruhás lyánt megpillantotta, mintha
elvágták vóna, úgy mëvvátozott. Tánczoltatta, sürgette, mulattatta,
olyan jó kedvi vót, hogy csak! Megint faggatta, hogy kiski ő? mérű
való? A lyány most csak annyit mondott: »Fésűütővárra!«
Gondolkozott a kiráfi, hogy mére lëhet a, de nem tutta kitanányi
sëhossë. Avval felkérte oszt a lyánt, hogy hazakísírhesse, de a lyány
csak szabódott, csak húzódott, még ëcczër csak megint úgy eltűnt,
mint azelőtt való este.
A lyány mëgint csak hazament, az ezüstruhát szépen
összehajtogatva visszatëtte a gyióhajba, felőtözködött a
szőrruhájába, mire kivilágosodott, má a tallón vót a libával.
Défele mëgint csak fëlmënt a konyhába. De má nem
pësztërkëdëtt ott soká, mëvvárta, még adnak neki valamit, avval
mënt. De a kiráfi ablakáná újfënt mëgát. »Tán mëgint a báldba
készű a kiráfi?« »Oda hát! De hát të má mindég olyan szemtelen
vagy, hogy mindég belesekëdël az ablakomon, má mégis
csudálatos!« Avval a tyűkört hozzá vágta a lyánho. »Jó van no«,
gondolta magába a lyány, »majd hamarabb ott lëszëk én, mint të, në
fé!42)« Bevárta az estét mëgin csak úgy, fëlvëtte a gyémántruhát,
»köd előttem, köd utánnam! hogy sënki së lásson!«, ment a bálba,
de hamarabb is ott vót, mint a kiráfi. Mán ő akkor javába tánczolt,
mikor a kiráfi odaért.
A kiráfi nem tutta néznyi, hogy az, a kit ő úgy szeret, mással
tánczol, odament, mérgesen elkapta annak a legénynek a kezibű,
oszt ő tánczoltatta.
Most még jobban mulattak, mint a két azelőtt való estén. A kiráfi
má nagyon szerelmes vót, má csak a lyán vót mindën gondolattya.
Mëgint mëgkérdëzte, hogy mongya má meg, de lélekre! hogy
honnan való, mer a hogy eggyig monta, hogy hovavaló, azoknak
még a hírit së hallotta. A lyány azt felelte: »Tyűkörütővárra!« »Hun
lëhet a? nem tudhatom! A szomszédunkba van ëgy öreg embër, a ki
má sok országot bejárt, kérdëztem attú, de ezëkët a helyekët még ő
së ösmeri!« De a lyány nem világosította fël.
A kiráfi má nem tudott magának së parancsolnyi, lëhúzta az
újjárú a gyűrőt, odatta a lyánnak, hogy őrözze mëg, oszt gondollyon
rá, mer ő el akarja vënnyi! A lyány mëg is igirte, de má nem várta
mëg, hogy mëgint szóllyék a kiráfi a hazakísírtésrű, elillant, mint a
lipe, szaladt mint a firjóka haza, ëgënyest az óba. Ott lëvette ar
ruháját, fëlvëtte a hétköznapló rongyosat.
A kiráfi mëg odavót nagyon. Mindën szívi-szándéka a lyán fele
vót má fordúva. Hogy az mëg elszökött, a báldba is csak tört-vágott,
kërësztű akart mënnyi mindënkin; mikor hazamënt mëg csak a
búnak atta magát, szavát së lëhetëtt vënnyi, olyan szomorú vót.
Odamënt az anyja, apja, vigasztalta vóna, de a kiráfi csak búsút,
búsút, nem hajtott as sënkire së. Úgy fájt a szivi, hogy maj mëghalt
bele.
A hogy elgyött a dél, a lyány is behajtott má, a konyhába is
susorgott má a sok étel.
A libapásztor is bemëgyën a konyhába, ott sűdörög a szakács
körű, akarmére lëpëtt, mindég láb alatt vót. »Mit keresël të itt, te!
tisztú’ innen mingyá!« De a szakács kerűt-fordút, a lyány is aggyig
süntörgött, aggyig süntörgött, hogy valahogy a gyűrőt mégis betëtte
a tába, a mit a kiráfitú kapott.
Avval oszt kiszalatt.
Mikor beviszik az ételt, merítënek a tábú, hát csak mëgcsördű a
kanál valamibe. Kivëszik, mëgnézik, hát mi vót? a gyűrő.
Hivatták oszt a szakácsot, ki járt a konyhába?! Mëgijett a
szakács, ëgy krajczár së maratt a zsebibe. Most van má baj! Nem
merte mëgmondanyi, hogy az a szőrruhás, mer akkor őt biztosan
felakasztyák. Hát csak tagatta, hogy »senki«. »Szakács! mondd mëg,
ki járt ott, mer akkor csakugyan fëlakasztatlak! de így nem lësz
sëmmi bajod, ha bevallod!«
A szakács is, mit vót mit tënnyi! bevallotta, hogy ott más nem
járt, mint az a szőrruhás libapásztor.
»Hidd be mingyá! tiszticcsa ki magát szépen, oszt győjjön be!«
A libapásztor is mëgmosakodott, mëgfésüködött, fëlvëtte a
gyémántruhát. Bemënt.
A kiráfinak a szivi maj mëghasatt örömibe, hogy mëglátta, hogy
iszën ez az, a kivel ő tánczolt, ennek atta ő a gyűrőt! Mëgölelte,
mëgcsókolta, mëg is monta mingyá, hogy elvëszi feleségű.
Készűtek a lagzira. Tanakodtak, ugyan kit hijjonak má mëg?
mérű? hogy-mint? mi ëgymás, hát a többek közt mëghítták a lyány
apját is.
A konyhába mëg a lyány mëghagyta, hogy az apjának külöm
csinállyonak mindënt, de só nékű.
Gyön a lagzi. Az apja is ott van, jó kedvi van mindënkinek, csak a
lyány apja nem ëszik, olyan, mintha szomorú vóna.
Kérdëzik oszt, hogy mi lelte? mé nem ëszik? tán nem jó az étel?
De az embër csak himëlt-hámolt, nem akart szónyi.
Oda mëgyën a lyánya is, kérdezi az is, hogy »hát mé nem ëszik
édsapám? Në szomorkoggyék, ha má a lagziba van!«
Az apja mongya oszt, hogy »jó itt mindën, nagyon fájínú el van
készítve, csak az a baj, hogy só nincs benne!«
Akkor oszt odafordú a lyánya is. »Lássa-ë, édës apám, maga
engëm azé az ëgy szóé csapott el, a mé asz montam, hogy úgy
szeretëm magát, mint a sót az ételbe. Lássa-ë, hogy a nékű mëg
nem ér sëmmit az étel!«
Mikor ezt a lyány elmongya, az apjának csakúgy csurgott a
szëmibű a könyű. Akkor oszt összeölelkëztek, lëtt olyan vigasság,
hogy hetedhét országon së vót párja. A lyány a kiráfinak feleségi
lëtt, boldogan éltek nagyon sokáig, tán még most is élnek, hogyha
mëg nem haltak.
Besenyőtelek, Heves vármegye. Szabó Julcsa asszony szájából.
Lejegyzési idő: 1903. nov.
31. Nem akart az apja felesége
lënni.
Hun vót, hun nem vót, még a Krakónn is túnann vót, de még
azonn is túnann, vót ëgy királyi pár.
A kirának ëcczër mëhhalt a feleségi, de még halála előtt
mëghatta az urának, hogy ha ő mëhhal, aggyig në házasoggyék
mëg, míg olyant, mint ő mëg a lyánya – mer egyforma szépek vótak
– nem taná. Úgy is vót. Elindút a kirá, országot-világot bebarangolt,
de olyant, mint a feleségi, nem tanát, csak a lyányát, pegyig sok
fődet bejárt má.
A hogy hazamëgy, bántotta a gond nagyon, hogy a világon az ő
feleségihë több hasolló nincs, csak a lyánya. De fëlhagyott oszt a
gongyával, kapta magát, mëgkérette a saját tulajdon lyányát.
Az aszonta, hogy elmëgy, de csak úgy, ha az apja ëgy napszín
ruhát csinátat neki. A napszín ruha mëglëtt, »mos má gyere hozzám,
lyányom!« De a lyány nem mënt mém most së. »Csinátassék nekem
ëgy hódvilágszín ruhát, ha am mëglësz, akkor nem bánom!« Kis idő
múva kész lëtt az is. A lyány mos má ëgy csillagszín ruhät követëlt.
Az apja – kintelen-këlletlen – mëgadta neki azt is. A lyány – hot
tovább húzza-halaszsza a dolgot – mos mëm má azt kötte ki, hogy
csak úgy mëgy el az apjáho, ha ëgy tetyűbőrködmönt csinátat. »Má
csak azt nem csinállya mën neki senki!« gondolta magába. De bizon
allyig múlyik el valami kis idő, hozzák a tetyűbőrködmönt. A lyány is
micsinállyék má, a nëgyegyik kivánságát is betőtötték, mindég csak
azonn forgatta az eszit, hogy szabadúhasson mëg ő ettű az útállatos
apjátú? Ki is tanáta.
Másnap rëggel a lyány, mikor őtözkönnyi kezdëtt, hármat köpött
az asztalra. Az apja mëm má a pitarba várakozott rá. Mikor mëgúnta
várnyi, beszól: »gyere má, feleségëm!« mëszszólal az első köpés:
»mingyá, csak bóhászkodok!« De hogy a lyán nem mënt, mëgint
beszól neki. Akkor kiszól a másogyik köpés: »mingyá, csak a lámpát
fújom el!« Türelmetlenkëdëtt a kirá, harmacczor is híjja, de má
keményebben beszét. Akkor felelt a harmagyik köpés: »mingyá, csak
becsukom az ajtót!«
No, az apja mos má csakugyan azt hitte, hogy maj csak gyön,
bemënt a másik házba.
De bíz a lyány összeszëdelőczködött, oszt a kis öcscsivel
elszökött, útnak indút.
Mënnek, mënnek, mëndëgének, nagysokára beérnek ëgy nagy
erdőbe. Ott a kis gyerëk mán nagyon szomjann vót, az útonn tanát
ëgy ökörnyomot, innya akart belülle.
Mëgszólíttya a nénnyi: »në igyá belűlle, kis öcsém! mer ököré
vász!« A kis gyerëk engedëtt.
A hogy mënnek, tanának ëgy farkasnyomat, de a nénnyi abbú së
hatta innya, késübb mëgint ëgy szamárnyomat, de má a kis gyerëk
majd elveszëtt szomjann, mésse ihatott. Nëgyecczërre ëgy őznyomat
tanának, abbú hörpentëtt ëgy kicsit, a mënnyivel a szomjúságát
csillapíthatta, de abba az Istenbe ëcczërre őzecskéjé vát.
Kurholta oszt a nénnyi: »ládd-ë, mé nem hallgattá az én
szavamra, mos má őzecskének kell lënnëd, még élsz.«
Hát errű má hiába vót mindën szó, em mëgtörtint.
Mënnek tovább, árkonn-berkënn, beérnek ëgy királyi udvarba.
Ott a kérdezősködésre eléaggyák, hogy szógálatot gyöttek vóna
keresnyi. »Jó van, hát fëlfogadunk, épen pulykapásztorunk nincs!«
De a lyány aszongya: »fëlségës kirá, gráczia fejemnek, én csak úgy
állok el, ha a fëlségës kirá mëgígíri, hogy a testvérëmnek, ennek az
őzecskének sëmmi baja së lësz!« Elmonta oszt, hogy hoj járt az ő kis
öcscsi.
A kirá mëgigérte, hoj jó van, nem lësz sëmmi baja së.
A lyány pëgyig azonnal beállott a szógálatba.
Másnap mëttutta a lyány, hogy a városba valami czéczó lësz,
olyan báldfurma, a kin a kirá is ott lësz, bemënt a szakácsného
elkéreczkënnyi. Az hallanyi së akart rulla. »Micsináná të ott, abba a
tetyűbőrruhádba! nem szégyëllëd magad? takaroccz ki mingyá?« De
a lyány csak, hogy eressze el. Aggyig rimánkodott, aggyig
istenkedëtt neki, hogy eleresztëtte. »Isz úgyis csak a csáváshordó
mellett lësz a të helyed!« gondolta magába a szakácsné.
Elgyött az este, a lyány lëvette a tetyűbőrködmönt, fëlvëtte a
napszín ruhát, abba mënt el a báldba.
Hű! nem a csáváshordó mellé kerűt ám, hanem a kiráfi ëgënyest
maga mellé ültette, mulattatta, nem is eresztëtt hozzá sënkit közel
së. Örűt a lyány, hogy minő jó mulat most ő!
Másnap rëggel hazamentek, ő is fëlvëtte a tetyűruhát, oszt délyig
őrzötte a pulykát.
Débe bemëgy a szakácsného, kéreczkënnyi mëgínt. A szakácsné
csak nevette a lyánt, hogy »minő bohó e, ilyen rongyléttyire is a
báldba kivánkozik! No jó, elmëheccz, de mën në tuggyam, hogy
valami csint tëszël ott, mer akkor jaj az életëd! tudod-ë?«
Este fëlkötözkögyik a lyány a hódvilágszín ruhába. Mëgy a
báldba. Mikor belépëtt, csak őt nézte mindënki, olyan szép pót. A
kiráfi is odaugrik, karonnfogja, viszi magával, még tánczolnyi is csak
keveset tánczoltak ëgyütt, egész rëggelyig mindég beszégettek.
Hogy mit tuttak aggyig ëgymásnak rógyikányi, én nem tudom, nem
vótam ott! de biztosan jó tanáhatták magokot.
A harmagyik este is szintazonszerint folyt lë a báld. A lyány
csillagszín ruhába vót, a ki ránézëtt, majd elvëtte a szëmi
fényességit, olyan gyönyörüen át rajta a ruha.
A kiráfi má ekkor szerette a lyánt nagyon, kérdëzte is, hogy
hovavalósi? mëg hogy elkísírthetyi-ë hazáig? de a lyány nem árolta el
magát. A kiráfi akkor adott neki ëgy arangyűrőt, hogy ha valamikor
is még tanákoznának, errű ösmerjék mëg ëgymást.
Rëggel, mikor végi lëtt a báldnak, bánkódott a kiráfi nagyon,
hogy ő má bajosann láttya még ëcczër az ő szívi választottját.
Débe a lyány bemëgyën a konyhába, láttya, hogy a szakácsné
kemémmagoslevest főzött, má épen a kënyeret akarja
beleszegdelnyi, aszongya a szakácsnénak, hagy szegdellye ő a
kënyeret! De a szakácsné jó tarkón vágta, hogy »majd adok én
neked szegdelést, te tetyves! nécs csak! mit nem kiván még! ë!«
A lyány aggyig sürgött-forgott, rimánkodott, még mëg nem
engették. Lëvette a tetyűbőrködmönt, oszt hozzáfogott a
szegdeléshë. Mikor javába szegdelyi, ak közbe beleeresztyi a gyűrőt
a tába.
Viszik be a kemémmagos levest, szëd a kiráfi. Kavargattya,
kavargattya a kanával, hát csak hall benne valami zörgést. Kiveszi a
kanát, hát az a gyűrő van benne, a kit ő adott még a báldban annak
a szép lyánnak. Szól ki rögtön: »szakácsné! győjjék csak be!« Am
mëg mëgijett szörnyenn, hogy no most van má végi! Bemëgy, azt
kérdëzi a kiráfi, ki vót a konyhánn rajta kívël? A szakácsné
beösmerte, hogy az a tetyves pulykapásztorlyány! »Küggye be!«
monta a kiráfi.
Gyön a lyány, rajta mind a három őtözet ruha.
A kiráfi mëgösmerte. »Te vagy az, szívem szép szerelme? Ásó,
kapa választ el ëgymástú!« Nemsokára mëg is esküttek.
Esküvő után a kiráfi, má a kirá, hamarosan elmënt a háborúba.
Míg ő odajárt, mëg a kiráné, a feleségi mëszszaporodott.
De vót az udvarba ëgy mindënës asszony, a kinek nagyon
csesznye lyánya vót. Irigylëtte a kiráné sorát, a ki azelőtt csak
tetyűbőrruhába járt, oszt most mëg hogy fëlvitte Isten a dógát.
Bemëgy ez a mindënës asszony ëcczër a kiráného, oszt hitta
kifele jó időre, ő mëg maj néz a fejibe. A ház előtt mëg folyt ëgy
szép tiszta vizű folyóka, annak a partjára ültek. Mikor a kiránénak
javába néz a fejibe az asszony, ëcczër csak zu! be a folyókába a
kiráné! Belökte az a kutya vénasszony!
Akkor beviszi a kiráné helyire a maga retves lyányát, lëfektetyi az
ágyba, oszt laskát süttet rá, hogy ha haza gyön a kirá, hát
csörögjön, mintha a csontya csörögne, annyira lesoványodott. Az
őzecskét mëg këszűtek kivégeznyi.
Gyön is haza a kirá, oda mëgy, láttya, hogy mëgcsunyut, hallya a
csörgést is. Szomorkodott nagyon.
Aznap este az őzecske fëlfogja a kis gyerëkët, viszi a folyókáho.
Abba mëg gyönyörű szép arankacsák úszkátak. Aszongya az
őzecske: »kacsák, kacsák, arankacsák! hun van kirá kis Miklósnak az
annya? rí a kirá kis Miklós! nincs meddőné tejecske!« Aszonták a
kacsák, hogy csak várjék, ott gyön a harmagyik csapatba!
Mikor a harmagyik csapat odaért, kivát közülök ëgy arankacsa,
asszonyé vátozott, elvëtte az őzecskétű a kis gyerëkët, oszt
mëgszoptatta.
Mikor avval végezëtt, aszongya neki az őzecske: »nénikém!
nénikém! torkomnak kést fenyik, vérëmnek aranyvërënczét
mossák!« Aszonta rá az asszony: »në fé, në fé! kis öcsém, nem lësz
sëmmi bajod! kiráfinak fogadása tartya!«
Avval az asszony visszaatta a gyerëkët, az őzecske pegyig bevitte
a szobába, lëtëtte a bőcsőbe.
Látta mán a kocsis ezt vagy kécczër. Bemëgy a kirának,
mëjjelëntyi, hogy mismit látott ő. A kirá aszonta: »maj
mëvvigyázuk!«
Úgy is vót. Este kimënnek a folyóka partjára, ott valahun
elbújnak. Hát láttyák, hogy hozza az őzecske a kis gyerëkët, gyön az
arankacsa is, asszonyé vátozik, szoptat, beszégetnek. Mikor a
szoptatás mëgvót, odaugrik a kirá, mëgkapja a feleségit, össze-
vissza csókolja, oszt viszi be a házba.
A vénasszont mëg a csesznye lyányát pegyig szétdiribolták, úsz
szórták szét a határba őköt.
A kirá mëg a feleségi azután olyan boldogok lëttek, hogy mém
most is ének, ha azóta mën nem haltak.
Besenyőtelek, Heves vármegye. Szabó Julcsa (Hörcsikné)
parasztasszonytól. 1904. jan.
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
ebookbell.com