Unleashing the cyber warriors

Washington Post:
The Pentagon has proposed that military cyber-specialists be given permission to take action outside its computer networks to defend critical U.S. computer systems — a move that officials say would set a significant precedent. 
The proposal is part of a pending revision of the military’s standing rules of engagement. The secretary of defense has not decided whether to approve the proposal, but officials said adopting the new rules would be within his authority. 
“Without a doubt it would be a very big and significant step forward,” said a senior defense official, speaking on the condition of anonymity to discuss a sensitive topic. “It would account for changes in technology that will give more flexibility in defending the nation from cyberattack.” 
Currently, the military is permitted to take defensive actions or to block malicious software — such as code that can sabotage another computer — only inside or at the boundaries of its own networks. But advances in technology and mounting concern about the potential for a cyberattack to damage power stations, water-treatment plants and other critical systems have prompted senior officials to seek a more robust role for the department’s Cyber Command. 
The proposed rules would open the door for U.S. defense officials to act outside the confines of military-related computer networks to try to combat cyberattacks on private computers, including those in foreign countries. 
In establishing the new regulations, officials have sought to overcome concerns that action in another country’s networks could violate international law, upset allies or result in unintended consequences, such as the disruption of civilian networks. 
The Pentagon, in consultation with the White House and other agencies, has developed strict conditions governing when military cyber-specialists could take action outside U.S. networks. Some officials said these conditions are so stringent that the new capability to go outside military boundaries might never be used.
... 
The cyber wars don't have clear boundaries and our resistance to them should not either.  We already have strong reason to believe that China has been steal secrets from US company computer systems including defense industries.  They are creating stealth fighters that appear to be duplicates of US fighters.  We should be able to attack those who are attacking su and to spoof their computers with bad data to make their thefts less productive and potentially fatal to their systems.

Comments

Popular posts from this blog

Should Republicans go ahead and add Supreme Court Justices to head off Democrats

29 % of companies say they are unlikely to keep insurance after Obamacare

Bin Laden's concern about Zarqawi's remains