Pentagon: All options on table in cyber-attack

Advertisement
By Agence France-Presse | Updated: 15 June 2012 15:52 IST
Highlights
  • The Pentagon would consider all options if the US were hit by a cyber-attack
Pentagon: All options on table in cyber-attack
The Pentagon said that it would consider all options if the United States were hit by a cyber-attack as it develops the first military guidelines for the age of Internet warfare.

President Barack Obama's administration has been formalizing rules on cyberspace amid growing concern about the reach of hackers. Defense contractor Lockheed Martin said it repelled a major cyber-assault a week ago.

The White House on May 16 unveiled an international strategy statement on cyber-security which said the United States "will respond to hostile acts in cyberspace as we would to any other threat to our country."

"We reserve the right to use all necessary means -- diplomatic, informational, military, and economic -- as appropriate and consistent with applicable international law, in order to defend our nation, our allies, our partners and our interests," the strategy statement said.

Pentagon spokesman Colonel Dave Lapan said Tuesday that the White House policy did not rule out a military response to a cyber-attack.

"A response to a cyber incident or attack on the US would not necessarily be a cyber-response," Lapan told reporters. "All appropriate options would be on the table if we were attacked, be it cyber."

Lapan said that the Pentagon was drawing up an accompanying cyber defense strategy which would be ready in two to three weeks.

The Wall Street Journal, citing three officials who said they had seen the document, reported Tuesday that the strategy would classify major cyber-attacks as acts of war, paving the way for possible military retaliation.

The newspaper said that the strategy was intended in part as a warning to foes that may try to sabotage the US electricity grid, subways or pipelines.

"If you shut down our power grid, maybe we will put a missile down one of your smokestacks," it quoted a military official as saying.

The newspaper said the Pentagon would likely decide whether to respond militarily to cyber-attacks based on "equivalence" -- whether the attack was comparable in damage to a conventional military strike.

Such a decision would also depend on whether the precise source of the attack could be determined.

The US military suffered its worst cyber-attack in 2008. Deputy Secretary of Defense William Lynn said that a malicious flash drive -- likely from a foreign spy agency -- spread and commandeered computers at US Central Command, which runs the war in Afghanistan.

The attack served as a wakeup call, with the Pentagon setting up a Cyber Command and working up the doctrine for a new type of conflict.

In cyber-warfare, aggressors are often mysterious and hence would not fear immediate retaliation -- a key difference from traditional warfare, in which the fear of one's own destruction is considered a deterrent.

While stepping up defenses, some believe the United States may also be pursuing cyber war. Iran has accused the United States and Israel of last year launching Stuxnet, a worm that reportedly wreaked havoc on computers in the Islamic republic's controversial nuclear program.

The United States and Israel both declined to comment on Stuxnet.

A study released Tuesday by the Center for a New American Society identified the United States, Britain, France, Israel, Russia and China as the leaders in cyber-offense, with Moscow and Beijing viewing cyber-attacks as an attractive option in the event of a major conflict.

But while sophisticated attacks take resources, the study noted that the barriers to entering cyberspace are "extraordinarily low."

"To launch a cyber-attack today, all a person needs is a computer, which costs less than $400 in the United States, an Internet connection and limited technical knowhow," it said.

Joseph Nye, the Harvard University professor and theoretician of power, said in a paper for the report that "it makes little sense to speak of dominance in cyberspace as in sea power or air power."

"If anything, dependence on complex cyber systems for support of military and economic activities creates new vulnerabilities in large states that can be exploited by non-state actors," he wrote.

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. iPhone 17 Air Battery Specifications, Weight and Other Details Leaked
  2. Apple to Announce iOS 26 at WWDC 2025 Instead of iOS 19: Report
  3. Airtel's 10-Day Postpaid International Roaming Pack Now Offers More Data
  4. Xiaomi Crosses Rs. 1.2 Lakh Crore in Revenue for Second Time in Q1 2025
  5. Nothing Phone 3 Design Teaser Shows Textured Button
  1. Pixel 9, Pixel Watch 3 Now Directly Available for Purchase from Google Store in India; Offers Announced
  2. Apple May Unveil iOS 26 at WWDC 2025 Instead of iOS 19; Said to Adopt Year-Based Naming Strategy
  3. OpenAI’s Viral Ghibli Trend Might Be a Privacy Minefield, Experts Say
  4. Astronomers Spot Nearly Perfect Supernova Remnant of Unknown Size and Distance
  5. Strange Planet Confirmed in Binary Star System Nu Octantis
  6. Clair Obscur: Expedition 33 Has Fittingly Sold 3.3 Million Copies in 33 Days
  7. Luxembourg Labels Crypto Firms as High-Risk Entities for Money Laundering 
  8. Opera Neon Agentic Browser Unveiled, Uses AI Agents to Plan Trips and Build Websites
  9. Samsung Galaxy Z Fold 7 Spotted on Geekbench Again; Key Specifications Listed
  10. Nothing Phone 3 Design Officially Teased; Appears With Textured Button
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.