Pentagon Says Cyberattacks Constitute 'Act of War'

News comes this week that the Pentagon has designated cyberattacks acts of war. Far from being a bureaucratic moniker, the designation allows the United States to respond to these “hack attacks” with force under international law.

And administration officials are not shy about connecting the dots to draw a picture of what could happen to a state that perpetrates such an attack on the United States. “A response to a cyber-incident or attack on the U.S. would not necessarily be a cyber-response. All appropriate options would be on the table," said Pentagon spokesman Colonel Dave Lapan.

Though administration officials said they have deliberately left the policy ambiguous, it seems that force-driven responses would come only with severe attacks that focus on domestic assets such as infrastructure. “If you shut down our power grid, maybe we will put a missile down one of your smokestacks," a Defense Department official told the Wall Street Journal, which broke the story.

Such a policy would certainly act as a deterrent for these attacks. If a government knew there was a chance that its country would be bombed as a result of virtual attacks, it would likely try to figure out other means of getting what it wanted.

Furthermore, it is extremely difficult, if not impossible, to trace where these attacks are coming from. When considering military action, a government must have full confidence that it knows whom its enemy is before it presses the red button to launch that missile into someone’s smokestack.

But what if the attacker doesn’t have a smokestack? Because the resources necessary for conducting an attack are easy to procure, cyberwarfare is often asymmetrical, meaning the attacker is not a government, but an individual or group. While China doesn’t employ a coordinated hacking strategy, it does reward its citizen-hackers whenever they cause a major breach. Whom would the U.S. government target if one of these citizen-hackers were to crack part of the U.S. power grid?

I suspect that the Defense Department has thought of all these scenarios, and simply doesn’t want the whole world to know because it would spoil the deterrent effect. What do you think?

Posted by Laura Williams on Jun 02, 2011

  • Approaching the Education Market with Milestone

    Milestone’s Laurie Dickson addresses Open Architecture, new equipment and the cost of entry and upgrading VMS systems over time. She also talks about how K-12 and Higher Education campuses differ in regard to surveillance system needs. Schools have certain guidelines they must follow to protect student identities, and Laurie addresses this question as well.

Digital Edition

  • Security Today Magazine - November December 2021

    November / December 2021


    • Navigating System Integration
    • Protecting Premises and People
    • Cashing in Your VMS System
    • Encryption and Compliance
    • Security Breach at 38,000 Feet

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety