CYBER-WARFARE: A Military Response Capability
April 5th, 2013 | Author: Dr. Ross Riggs
A short time ago, I presented a lecture series on Cyber-Warfare on ICTOA Radio as part of a Lecture Series:
Counter Terrorism in the United States 2013
The following is an update to that
lecture:
Cyber-Warfare
has become the tool of our enemies; particularly, the Chinese have
used this capability to go beyond nuisance
hacking to espionage
and the deliberate shutting down of resources necessary for the daily
functioning of services with a goal of adversely effecting the United
State’s economy and its dollar’s showing on world markets. In the
recent lecture, SCI took the position that certain of these acts are
acts of war against the United States and companies continuing to do
business with avowed enemies of the U.S. were committing nothing less
than treason. SCI has also held that until recently, the strongest
response from those in the ‘IT world’ was to provide
counter-measures for attacks after
they happen and do very little to track down the perpetrators of the
attacks to force them to cease any further attacks by eliminating
their capability to do so.
A
report released by the Pentagon today has changed the playing field
quite a bit. Although much of the report is classified so not all
parts can be shared in this venue, SCI can report what has been
released on the expanded capabilities of the U.S. military to seek
out and destroy those who are engaged in acts of war against the U.S.
The
first step was to delineate what, in cyber-technology, constitutes an
act of war. There must be a way to articulate what that line is and
how it has been crossed to permit a military response in retaliation
for the attack. There is a distinction made between cyber attacks
that are espionage and/or theft and cyber acts of war. General Keith
Alexander, head of the Cyber-Command was quoted as saying, “If the
intent is to disrupt or destroy our infrastructure, I think you’ve
crossed a line.”[1]
Lt. Col. Damien Pickart a Pentagon spokesman confirmed that there
have been developed rules of engagement that “provide a defined
framework for how best to respond to the plethora off cyber-threats we
face.”[2]
`
Perhaps
the primary effectiveness of the new development in cyber-warfare from
the military standpoint is the wisdom the Pentagon has shown in
implementing a solid strategy. First, they defined for their
commanders what constitutes an act of war in the cyber-world.
Secondly, and most encouraging is that they have given military
commanders both the clear guidance they need in such instances but
also the authority to take retaliatory action without seeking a
presidential clearance to act. The military response can be swift,
sure and definitive. That is a combination that creates a solid
deterrence to those who seek to harm the interests of the United
States.
In
a time when the world has been receiving mixed messages from the
Administration about our willingness to protect our own, the Pentagon
should be applauded for stepping up to the task of sending a clear
message that the line has been drawn and to cross it will bring a
definitive response.
One
CSO of a major security company was quoted as saying, “This is
putting the world on notice, particularly the Chinese, that we’re
tired of them breaking into private companies.”[3]
_________________________________
[1] Pentagon Develops Rules of Engagement for Cyberwar USA
Today 5 April 2013 5A
[2] Ibid.
[3] Ibid.
[3] Ibid.