icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm

Pentagon could bomb enemy hackers

Pentagon could bomb enemy hackers
A US Department of Defense report has outlined how the American military plans to respond to foreign hacker attacks. We’re talking all-out retaliation, both in cyberspace, and in real life.

The 12-page document sent to Congress was made public on Tuesday. Legislators had wanted the Pentagon to deliver the report on new cyber-warfare policy by March 1 this year, but the top brass were a few months late."When warranted, we will respond to hostile attacks in cyberspace as we would to any other threat to our country," the report said as cited by Reuters. "We reserve the right to use all necessary means – diplomatic, informational, military and economic – to defend our nation, our allies, our partners and our interests."The warrant for such an operation would come from the President, and he will decide what “use of force” in cyberspace will constitute. Stand-alone operations would not trigger a Congressional notification requirement under the War Powers Resolution, reports the Washington Post.The biggest problem with reacting to a hacker attack is identifying the guilty. A number of security experts and intelligence have pointed to Chinese and Russians as the key perpetrators of cyber-attacks on American computers. However no accusations have been officially pressed against those governments. The Pentagon plans to tackle the issue by employing behavior and cyber forensics experts, who would point to the individuals responsible.The report also points out the need for an automated response to internet hostilities, which raised the alarm with some cyber security experts. “The question is, how, and to what extent, are they thinking about automated responses?” Herbert Lin, a cyber expert at the US National Academy of Sciences, told the Washington Post. Such responses, he said, “are fraught with danger. Without people in the loop, you’re much more likely to do unintended stuff.”One can only wonder what US officials would say if, say, Iran authorized its Revolutionary Guard to strike in retaliation to a Stuxnet worm cyber-attack. The virus crippled Iranian uranium enrichment facilities last year and is believed to have been created by highly skilled hackers. Some reports pointed to Israel and the US as being behind the malware.

Dear readers and commenters,

We have implemented a new engine for our comment section. We hope the transition goes smoothly for all of you. Unfortunately, the comments made before the change have been lost due to a technical problem. We are working on restoring them, and hoping to see you fill up the comment section with new ones. You should still be able to log in to comment using your social-media profiles, but if you signed up under an RT profile before, you are invited to create a new profile with the new commenting system.

Sorry for the inconvenience, and looking forward to your future comments,

RT Team.