Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Pentagon: All options on table in cyber-attack
by Staff Writers
Washington (AFP) May 31, 2011


The Pentagon said Tuesday that it would consider all options if the United States were hit by a cyber-attack as it develops the first military guidelines for the age of Internet warfare.

President Barack Obama's administration has been formalizing rules on cyberspace amid growing concern about the reach of hackers. Defense contractor Lockheed Martin said it repelled a major cyber-assault a week ago.

The White House on May 16 unveiled an international strategy statement on cyber-security which said the United States "will respond to hostile acts in cyberspace as we would to any other threat to our country."

"We reserve the right to use all necessary means -- diplomatic, informational, military, and economic -- as appropriate and consistent with applicable international law, in order to defend our nation, our allies, our partners and our interests," the strategy statement said.

Pentagon spokesman Colonel Dave Lapan said Tuesday that the White House policy did not rule out a military response to a cyber-attack.

"A response to a cyber incident or attack on the US would not necessarily be a cyber-response," Lapan told reporters. "All appropriate options would be on the table if we were attacked, be it cyber."

Lapan said that the Pentagon was drawing up an accompanying cyber defense strategy which would be ready in two to three weeks.

The Wall Street Journal, citing three officials who said they had seen the document, reported Tuesday that the strategy would classify major cyber-attacks as acts of war, paving the way for possible military retaliation.

The newspaper said that the strategy was intended in part as a warning to foes that may try to sabotage the US electricity grid, subways or pipelines.

"If you shut down our power grid, maybe we will put a missile down one of your smokestacks," it quoted a military official as saying.

The newspaper said the Pentagon would likely decide whether to respond militarily to cyber-attacks based on "equivalence" -- whether the attack was comparable in damage to a conventional military strike.

Such a decision would also depend on whether the precise source of the attack could be determined.

The US military suffered its worst cyber-attack in 2008. Deputy Secretary of Defense William Lynn said that a malicious flash drive -- likely from a foreign spy agency -- spread and commandeered computers at US Central Command, which runs the war in Afghanistan.

The attack served as a wakeup call, with the Pentagon setting up a Cyber Command and working up the doctrine for a new type of conflict.

In cyber-warfare, aggressors are often mysterious and hence would not fear immediate retaliation -- a key difference from traditional warfare, in which the fear of one's own destruction is considered a deterrent.

While stepping up defenses, some believe the United States may also be pursuing cyber war. Iran has accused the United States and Israel of last year launching Stuxnet, a worm that reportedly wreaked havoc on computers in the Islamic republic's controversial nuclear program.

The United States and Israel both declined to comment on Stuxnet.

A study released Tuesday by the Center for a New American Society identified the United States, Britain, France, Israel, Russia and China as the leaders in cyber-offense, with Moscow and Beijing viewing cyber-attacks as an attractive option in the event of a major conflict.

But while sophisticated attacks take resources, the study noted that the barriers to entering cyberspace are "extraordinarily low."

"To launch a cyber-attack today, all a person needs is a computer, which costs less than $400 in the United States, an Internet connection and limited technical knowhow," it said.

Joseph Nye, the Harvard University professor and theoretician of power, said in a paper for the report that "it makes little sense to speak of dominance in cyberspace as in sea power or air power."

"If anything, dependence on complex cyber systems for support of military and economic activities creates new vulnerabilities in large states that can be exploited by non-state actors," he wrote.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Pentagon: All options on table in cyber-attack
Washington (AFP) May 31, 2011
The Pentagon said Tuesday that it would consider all options if the United States were hit by a cyber-attack as it develops the first military guidelines for the age of Internet warfare. President Barack Obama's administration has been formalizing rules on cyberspace amid growing concern about the reach of hackers. Major defense contractor Lockheed Martin said it repelled a major cyber-assau ... read more


CYBER WARS
Looking at the volatile side of the Moon

Parts of moon interior as wet as Earth's upper mantle

NASA-Funded Scientists Make Watershed Lunar Discovery

Moon may have more water than believed: study

CYBER WARS
Materials for Mars

Camera Duo on Mars Rover Mast Will Shoot Color Views

NC State Students Look To Support Manned Mission To Mars

Opportunity Spies Outcrop Ahead

CYBER WARS
Astronauts and Students Connect at UA Lunar and Planetary Lab

Keeping the power on in space

NASA and Hawaii Partner for Space Exploration

NASA is Making Hot, Way Cool

CYBER WARS
China's Fengyun-3B satellite goes into official operation

Venezuela, China to launch satellite next year

Top Chinese scientists honored with naming of minor planets

China sees smooth preparation for launch of unmanned module

CYBER WARS
Thales delivers First Cygnus PCM to Orbital

On-Orbit Orion MPCV Navigation System Tested During STS-134 Shuttle Mission

Final Endeavour spacewalk marks 1,000 hours of station EVAs

Fourth and Final Shuttle Astronaut Spacewalk Set

CYBER WARS
Boeing Opens Exploration Launch Systems Office in Florida

Payload processing underway for ASTRA 1N

Cosmica Spacelines And XCOR Aerospace Tout Suborbital Payload Flight Opportunties

Should India Go Suborbital

CYBER WARS
Second Rocky World Makes Kepler-10 a Multi-Planet System

Kepler's Astounding Haul of Multiple-Planet Systems Just Keeps Growing

Bennett team discovers new class of extrasolar planets

Climate scientists reveal new candidate for first habitable exoplanet

CYBER WARS
Researchers develop environmentally friendly plastics

Google given more time to reach book settlement

A flexible virtual system makes any reality possible

iPad challenge looms large at Asia IT show




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement