US to Consider Cyber Attacks 'Acts of War'
The Pentagon has announced plans to issue a new strategy that would correlate computer attacks from a foreign nation to that of an act of war.
In the event that a critical American computer system was ever compromised, the US President would reserve the right to consider a variety of responses, including retaliatory cyber-attacks, economic sanctions, and even a military strike.
Defining a Major Computer Attack
Naturally, a simple remote attack orchestrated by a single, independent hacker would not constitute a military response. However, a computer attack that could potentially result in widespread casualties would be treated as "acts of aggression."
These include attacks that serve to cut off power and supplies to US civilians and those targeted at hospitals and emergency-responder networks.
Other acts of aggression include cyber-attacks that result in one of the 4 D's -- death, damage, destruction, or a high level of disruption. (Source: wsj.com)
Cyber Attack Origin Often Unclear
The implementation of retaliatory efforts has become the basis for debate among administrators close to the situation. The problem rests in the fact that the origin of a cyber-attack is almost always unclear.
"One of the questions we have to ask is, How do we know we're at war?" posed one former Pentagon official who wished to remain anonymous. "How do we know when it's a hacker and when it's the People's Liberation Army?"
Such was the problem back in 2010, when a sophisticated attack compromised Google and its computer servers. Google concluded that the attack had originated in China, although American officials never did publicly identify its country of origin, let alone whether or not the attack was state sanctioned.
New Strategy Admittedly Ambiguous
Admittedly, administration and military officials have unanswered questions concerning retaliatory measures against foreign-led cyber-attacks, since the new strategy itself is overtly ambiguous. One administration official criticized the plan stating, "It will only work if we (The U.S.) have many more credible elements." (Source: nytimes.com)
While White House officials declined to comment extensively on the topic, more than a few contended that using the military in response to a cyber-attack would only constitute a "last resort," after all other efforts to deter an attack had failed.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.