Pentagon warns that cyber-attacks will be seen as íacts of warí
2011-06-04 0:00

By David Usborne | Independent.co.uk


Deliberate cyber-attacks by any foreign nation on vital computer networks in the United States may be considered an "act of war" that could be met by a full-blown military response, say officials in Washington.

The stern warning comes as the Pentagon hurries to complete a new policy blueprint on defending Americaís transport, power and defence systems against enemies digitally insinuating themselves, with malicious intent, into the countryís cyber-nervous system.

"A response to a cyber-incident or attack on the US would not necessarily be a cyber-response. All appropriate options would be on the table," said Pentagon spokesman Colonel Dave Lapan. A defence official told The Wall Street Journal: "If you shut down our power grid, maybe we will put a missile down one of your smokestacks."

The US Defense Department said that more than 100 foreign intelligence organisations have been trying to break into US networks. Some "already have the capacity to disrupt the countryís information infrastructure," Deputy Defense Secretary William Lynn wrote last year in the journal Foreign Affairs.

The review is tied directly to a strategy statement on cyber-security issued by the White House last month. It said the US would "respond to hostile acts in cyberspace as we would to any other threat to our country." It added: "We reserve the right to use all necessary means Ė diplomatic, informational, military, and economic."

Awareness of the issue has spiked in recent weeks in the US, because of the high-profile problems suffered by Sony Corporation which last month briefly had to close down its PlayStation network after an intrusion by yet-to-be-identified hackers that put at risk the credit card information of about 70 million users.

Last week, public broadcasting body PBS revealed that its widely trusted news web page had been penetrated by hackers who left behind a false news story suggesting the late hip-hop entrepreneur, Tupac Shakur, whose murder in Los Angeles still mystifies detectives, is alive in New Zealand. The hackers said the attack was in retaliation for a PBS documentary that was mainly negative about WikiLeaks.

Then came the revelation a week ago that the computer brains of defence contractor Lockheed Martin had suffered a "tenacious" cyber-attack.

Lockheed said damage has been contained and it is working to restore access to its systems for employees. That Lockheed, which supplies weapons like the F-16 jet fighter to the US military, should be compromised rang alarm bells. But while there may be new urgency in Washington to confront cyber-threats, scepticism will linger over what solutions can be found. In the 1950s, the US could develop a credible nuclear deterrence framework because there would have been no doubt about the origin of incoming warheads. In cyber warfare, identifying the enemy is likely to be far more difficult.

When intruders briefly accessed a cyber network at US Central Command in 2008, the Pentagon scrambled to identify the culprits, though they suspected Russia. Investigators knew only that malicious software was introduced by a mobile flash-drive.

Who introduced the destructive Stuxnet software worm into Iranís nuclear centrifuge facilities last year has never been confirmed, though Tehran accused the US and Israel. At a conference yesterday, Michael Rake, the chief executive of British Telecom, advocated the negotiation of an international ínon-proliferationí treaty to counter a new cyber-arms race between nations.

The Pentagon policy document, parts of which will be made public, will not offer options for retaliation in the event that a cyber-attack comes from groups other than governments. It will make clear, meanwhile, that any move by the US to initiate the sabotage of systems of foreign governments will require prior presidential authorization.

Article from: independent.co.uk





Ed Note: What does the Pentagon call it when they themselves target, surveil, and íhackí foreign governments, or even their own citizens?
If WikiLeaks continues to reveal sensitive documents from military and government sources, can they expect to be declared íenemy combatantsí? Can citizens who access ícontroversialí information on the internet be labeled ítraitorsí?

"In cyber warfare, identifying the enemy is likely to be far more difficult."

Because there is very little transparency or oversight over the Pentagon, this leaves the door wide open for rogue elements within the military and/or government to initiate a false flag íhacking attackí, which can be blamed on any number of countries, and lead to the next war theatre. Or it can simply be used to expand the current, ongoing wars.
The mainstream media will easily sell the idea and the blame to people, as itís been shown recently that many are willing to believe anything these days based on íthe wordí of the government alone - no photos or documents or actual íproofí necessary.

A cyber ínon proliferation treatyí seems like e a means of legitimizing any actions, mild or excessive, by the military or government when attacking those they declare to be breaking the treaty - or even sanctioning those who refuse to be part of the íagreementí, crippling softer targets economically.

Perhaps, now, they donít need a dirty nuclear bomb or demolished towers to meet their goals. How more simple and cost-effective way can you fabricate an enemy and convince people that theyíre under attack than by suggesting a phantom menace that we cannot see, touch, or defend against is haunting our internet and hating our freedom?

~E

Image: Getty




Related Articles
Hackers post phony Tupac story on PBS website
Hackers infiltrate 150 computers at French Finance Ministry, targeting information on G-20
Hacker group Anonymous infiltrates Westboro Baptist Church website
"Anonymous" Hackers Take Down Koch Brothers-Backed Americans For Prosperity Website
Mark Zuckerbergís Facebook page hacked, suspected íinside jobí
McDonalds hacked, customer database stolen, your burger preference now in the wild!
Dutch Police Arrest Suspect in Pro-WikiLeaks Hacking
Who Are the "Anonymous" Hackers Supporting WikiLeaks?
Cyberwar: Hackers target Paypal, VISA, Master Card - Swedish Government Website Hacked Earlier Today
MasterCard, Visa Hacked in Support of WikiLeaks
McKinnon or Assange - which of these men is the REAL threat to America?
UFO Hacker McKinnon "Wikileaked"
Project Camelot interviews Gary McKinnon (Video)
Failing McKinnon and failing us too: "Inequality of our relationship with the US"
Pentagon Drafts Limits on When it Can Hack Foreign Governments
The Pentagonís Cyber Command: Civilian Infrastructure is a "Legitimate" Target


Latest News from our Front Page

Better Identification of Viking Corpses Reveals: Half of the Warriors Were Female
2015-04-25 4:52
Shieldmaidens are not a myth! A recent archaeological discovery has shattered the stereotype of exclusively male Viking warriors sailing out to war while their long-suffering wives wait at home with baby Vikings. (We knew it! We always knew it.) Plus, some other findings are challenging that whole ‚Äúrape and pillage‚ÄĚ thing, too. Researchers at the University of Western Australia decided ...
Off Your Knees, Germany! Ernst Zundel 1983 - 2003
2015-04-25 1:15
For more information on the holocaust, how the war was forced upon Germany, and the REAL victims of the second world war see: http://gblt.webs.com/Real_Holocaust.htm http://web.archive.org/web/20130806074314/http://www.666blacksun.org/ http://www.zundelsite.org/
IRS Drops Attack For Six Years ‚Äď No Evidence of Jurisdiction
2015-04-24 20:29
A big congrats to a friend I‚Äôve been working with for several years, he stood up to the predators commonly called the ‚ÄúIRS‚ÄĚ and they dropped their attack. Thanks also for providing me with the proof below. The criminals called the ‚ÄúIRS‚ÄĚ initiated an attack claiming my friend was required to file six tax returns, or explain how he made ...
Into Eternity - Finland's 100,000 Year Massive Underground Spent Nuclear Fuel Program
2015-04-24 20:49
Into Eternity is a documentary about a deep geological repository for nuclear waste. The concept of long-term underground storage for radioactive waste has been explored since the 1950s. The inner part of the Russian doll-like storage canisters is to be composed of copper. Hence in the case of Onkalo it is tightly linked to experiments on copper corrosion in running ...
SPLC Accuses Oath Keepers of Inciting ‚ÄúArmed Confrontation‚ÄĚ Over Sugar Pine Mine
2015-04-24 20:22
The Southern Poverty Law Center has accused Oath Keepers of inciting an armed confrontation with BLM authorities over the Sugar Pine Mine dispute in Oregon, despite the fact that the organization has explicitly stated that it is not promoting armed confrontation with the feds. In an article provocatively posted on the organization‚Äôs ‚ÄėHatewatch‚Äô section entitled Oath Keepers Descend Upon Oregon with ...
More News »