Friday, April 5, 2013

CYBER-WARFARE: A Military Response Capability
  April 5th, 2013 | Author: Dr. Ross Riggs


A short time ago, I presented a lecture series on Cyber-Warfare on ICTOA Radio as part of a Lecture Series: Counter Terrorism in the United States 2013
The following is an update to that lecture:

Cyber-Warfare has become the tool of our enemies; particularly, the Chinese have used this capability to go beyond nuisance hacking to espionage and the deliberate shutting down of resources necessary for the daily functioning of services with a goal of adversely effecting the United State’s economy and its dollar’s showing on world markets. In the recent lecture, SCI took the position that certain of these acts are acts of war against the United States and companies continuing to do business with avowed enemies of the U.S. were committing nothing less than treason. SCI has also held that until recently, the strongest response from those in the ‘IT world’ was to provide counter-measures for attacks after they happen and do very little to track down the perpetrators of the attacks to force them to cease any further attacks by eliminating their capability to do so.


A report released by the Pentagon today has changed the playing field quite a bit. Although much of the report is classified so not all parts can be shared in this venue, SCI can report what has been released on the expanded capabilities of the U.S. military to seek out and destroy those who are engaged in acts of war against the U.S.

The first step was to delineate what, in cyber-technology, constitutes an act of war. There must be a way to articulate what that line is and how it has been crossed to permit a military response in retaliation for the attack. There is a distinction made between cyber attacks that are espionage and/or theft and cyber acts of war. General Keith Alexander, head of the Cyber-Command was quoted as saying, “If the intent is to disrupt or destroy our infrastructure, I think you’ve crossed a line.”[1] Lt. Col. Damien Pickart a Pentagon spokesman confirmed that there have been developed rules of engagement that “provide a defined framework for how best to respond to the plethora off cyber-threats we face.”[2] `

Perhaps the primary effectiveness of the new development in cyber-warfare from the military standpoint is the wisdom the Pentagon has shown in implementing a solid strategy. First, they defined for their commanders what constitutes an act of war in the cyber-world. Secondly, and most encouraging is that they have given military commanders both the clear guidance they need in such instances but also the authority to take retaliatory action without seeking a presidential clearance to act. The military response can be swift, sure and definitive. That is a combination that creates a solid deterrence to those who seek to harm the interests of the United States. 


One CSO of a major security company was quoted as saying, “This is putting the world on notice, particularly the Chinese, that we’re tired of them breaking into private companies.”[3]

In a time when the world has been receiving mixed messages from the Administration about our willingness to protect our own, the Pentagon should be applauded for stepping up to the task of sending a clear message that the line has been drawn and to cross it will bring a definitive response.

_________________________________
 
[1] Pentagon Develops Rules of Engagement for Cyberwar USA Today 5 April 2013 5A
[2] Ibid.
[3] Ibid.