Skip to main content

Pentagon declares cyber attacks ‘acts of war’

the-pentagon-cyber-attackThe Pentagon has officially declared that cyber attacks on US computer systems, networks and infrastructures can constitute an “act of war,” reports the Wall Street Journal. This means that if another country hacks US-run digital properties, traditional military force could be used in retaliation.

The decision is part of the federal government’s first formal strategy against cyber threats. More details about the strategy will emerge sometime next month, when unclassified portions of the plan are released to the public.

Following a breach of a US military computer system in 2008, the Pentagon has been on a mission to form an official response to cyber threats, which could affect everything from subway systems to nuclear reactors. The computer network at the Pentagon itself was recently under siege. And just this weekend, defense contractor Lockheed Martin admitted that its systems had been hacked.

By making it public that cyber attacks could instigate a traditional attack by the US military, with bombs and guns, the Pentagon hopes to deter possible attackers. Or, as one military official succinctly put it: “If you shut down our power grid, maybe we will put a missile down one of your smokestacks.”

It is not yet clear, however, what type of cyber attack would justify the use of military force. One policy that is reportedly gaining popularity is that of “equivalence,” a sort of eye-for-an-eye strategy through which “use of force” would only be employed if the cyber attack also caused death, or significant damage, disruption or destruction.

The new strategy is not without its inherent complications. For instance, it can often be difficult to know for sure who waged a cyber attack, which makes the use of force far more risky, politically speaking. Among the many questions stirred by the new strategy is how the US would respond to an attack that originates from non-governmental entities, i.e. cyber-terrorists, or hackers otherwise independent of a particular government. (Of course, we all know how the US responds when an “act of war” is launched by an analog terrorist.)

Regardless of the current details, the need for a cyber attack strategy is obvious. According to the military personnel who have seen the Pentagon’s strategy in its entirety, the rules laid out will abide by the standard Laws of Armed Conflict, and mesh with the strategies of international allies.

Editors' Recommendations

Andrew Couts
Former Digital Trends Contributor
Features Editor for Digital Trends, Andrew Couts covers a wide swath of consumer technology topics, with particular focus on…
How to build your own GPT chatbot without coding
Infinix Zero 30 5G Android phone in gold color with ChatGPT virtual assistant.

For $20 per month, a ChatGPT Plus subscription unlocks far more than just access to GPT-4. With a little know-how, you’ll actually be able to use some of OpenAI’s more advanced features to build a custom GPT chatbot all your own. We did it ourselves, and the results were simply astounding! And while this may sound like an intimidating task to undertake, you won’t even need to know any coding.

Read more
How to change your MAC address on Windows and Mac
The TP-Link Archer AXE7800 tri-band Wi-Fi 6E router in a room.

Each and every web-connected component in your household has a MAC address. One can think of these 12-digit identifiers as digital name tags that computers, smartphones, tablets, and smart TVs use to say “present” on our home Wi-Fi networks. MAC addresses are also integral in maintaining a safe and reliable gateway to the internet.

Read more
How to change where screenshots are saved on a Mac
how to change where screenshots are saved on a mac apple screenshot

With the right keyboard shortcuts, taking a screenshot on a Mac is very straightforward -- although they don't always save to the right location. Fortunately, there are a number of locations you can choose from and selecting from them is as quick and easy as taking a screenshot in the first place.

Here's how to choose where screenshots are savedon a Mac.

Read more