Verified Document

Wall Street Journal Responses Student Term Paper

S. To respond using traditional military force. The Pentagon's first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country's military.

In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S. In this way. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said a military official.

Recent attacks on the Pentagon's own systems -- as well as the sabotaging of Iran's nuclear program via the Stuxnet computer worm -- have given new urgency to U.S. efforts to develop a more formalized approach to cyber attacks. A key moment occurred in 2008, when at least one U.S. military computer system was penetrated. This weekend Lockheed Martin, a major military contractor, acknowledged that it had been the victim of an infiltration, while playing down its impact.

The report will also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the U.S. can ever be certain about an attack's origin, and how to define when computer sabotage is serious enough to constitute an act of war. These questions have already been a topic of dispute within the military.

One idea gaining momentum at the Pentagon is the notion of "equivalence." If a cyber attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for a "use of force" consideration, which could merit retaliation.

Some experts suspect it was an Israeli attempt, possibly with American help.
November 2008: A computer virus believed to have originated in Russia succeeds in penetrating at least one classified U.S. military computer network.

August 2008: Online attack on websites of Georgian government agencies and financial institutions at start of brief war between Russia and Georgia.

May 2007: Attack on Estonian banking and government websites occurs that is similar to the later one in Georgia but has greater impact because Estonia is more dependent on online banking.

The Pentagon's document runs about 30 pages in its classified version and 12 pages in the unclassified one. It concludes that the Laws of Armed Conflict -- derived from various treaties and customs that, over the years, have come to guide the conduct of war and proportionality of response -- apply in cyberspace as in traditional warfare, according to three defense officials who have read the document. The document goes on to describe the Defense Department's dependence on information technology and why it must forge partnerships with other nations and private industry to protect infrastructure.

The strategy will also state the importance of synchronizing U.S. cyber-war doctrine with that of its allies, and will set out principles for new security policies. The North Atlantic Treaty Organization took an initial step last year when it decided that, in the event of a cyber attack on an ally, it would

Sources used in this document:
May 2007: Attack on Estonian banking and government websites occurs that is similar to the later one in Georgia but has greater impact because Estonia is more dependent on online banking.

The Pentagon's document runs about 30 pages in its classified version and 12 pages in the unclassified one. It concludes that the Laws of Armed Conflict -- derived from various treaties and customs that, over the years, have come to guide the conduct of war and proportionality of response -- apply in cyberspace as in traditional warfare, according to three defense officials who have read the document. The document goes on to describe the Defense Department's dependence on information technology and why it must forge partnerships with other nations and private industry to protect infrastructure.

The strategy will also state the importance of synchronizing U.S. cyber-war doctrine with that of its allies, and will set out principles for new security policies. The North Atlantic Treaty Organization took an initial step last year when it decided that, in the event of a cyber attack on an ally, it would
Cite this Document:
Copy Bibliography Citation

Related Documents

Occupy Wall Street Movement and Its Implications
Words: 2847 Length: 8 Document Type: Essay

Occupy Wall Street Movement and its Implications as a New Form of Protest "We are what democracy looks like!" that is a major theme that is represented through the Occupy Wall Street movement (Benjamin 1). Essentially, the movement is a new adaptation to older nonviolent protests styles. It encompasses elements of older traditions, like the use of nonviolent sit ins and marches; however, it proves much different from more traditional

Government Subsidized Student Loans Have Economic Costs
Words: 17149 Length: 55 Document Type: Dissertation or Thesis complete

Government Subsidized Student Loans Have Economic Costs but Political Benefits Higher education has become increasingly important in the contemporary world scenario today where globalization has led to a higher need for a skilled labor force that is mobile and that is well-versed in the academic disciplines followed all over the world. In fact university education is starting to be seen as a hallmark for success, even though there are college drop

Context of Saudi Street Art
Words: 3679 Length: 13 Document Type: Research Paper

Indeed, the national flag was the British Union Jack with a swastika in the middle of it. The story is that V, a prior victim of the plague, seeks to usurp the government through a combined effort of eliciting the people's help (which happens at the end of the movie), the assassination of the leader (known as the Chancellor) and the destruction of the Parliament building by using a

Hog Harley Davidson Has Traditionally Targeted Middle-Aged
Words: 943 Length: 3 Document Type: Case Study

HOG Harley Davidson has traditionally targeted middle-aged white men. This target arises out of a couple of factors. The first is that most users do not rely on their Harley Davidson as their primary means of transport, so the purchase is discretionary. This skews the target demographic older because younger demographics do not have thousands of discretionary dollars to spend. The bikes are also priced at a premium, which further pushes

Outsourcing Among the List of Controversial Issues
Words: 2499 Length: 8 Document Type: Essay

Outsourcing Among the list of controversial issues relating to jobs and the economy in the United States, outsourcing is right up there near the top. Politicians frequently attack each other using the phrase, "sending our jobs overseas…" and many a politician has been stung by this accusation. Thesis: While there are clearly benefits to be realized by companies that engage in outsourcing, there are also difficulties, drawbacks, and unanticipated expenses associated

Should Same Sex Marriages Be Legally Sanctioned
Words: 918 Length: 3 Document Type: Term Paper

Same Sex Marriages Should Be Legally Sanctioned Some of the most pervasive problems that exist within American society today are the problems of prejudice, stemming from fear of what is different and seems to be alien. Only by making what is alien seem to wear a more familiar, human face, can such deep-seated hatred be uprooted and destroyed. Prejudice, and the violence that is the result of such hatred, is particularly

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now