Skip to main content

Pentagon declares cyber attacks ‘acts of war’

the-pentagon-cyber-attackThe Pentagon has officially declared that cyber attacks on US computer systems, networks and infrastructures can constitute an “act of war,” reports the Wall Street Journal. This means that if another country hacks US-run digital properties, traditional military force could be used in retaliation.

The decision is part of the federal government’s first formal strategy against cyber threats. More details about the strategy will emerge sometime next month, when unclassified portions of the plan are released to the public.

Following a breach of a US military computer system in 2008, the Pentagon has been on a mission to form an official response to cyber threats, which could affect everything from subway systems to nuclear reactors. The computer network at the Pentagon itself was recently under siege. And just this weekend, defense contractor Lockheed Martin admitted that its systems had been hacked.

By making it public that cyber attacks could instigate a traditional attack by the US military, with bombs and guns, the Pentagon hopes to deter possible attackers. Or, as one military official succinctly put it: “If you shut down our power grid, maybe we will put a missile down one of your smokestacks.”

It is not yet clear, however, what type of cyber attack would justify the use of military force. One policy that is reportedly gaining popularity is that of “equivalence,” a sort of eye-for-an-eye strategy through which “use of force” would only be employed if the cyber attack also caused death, or significant damage, disruption or destruction.

The new strategy is not without its inherent complications. For instance, it can often be difficult to know for sure who waged a cyber attack, which makes the use of force far more risky, politically speaking. Among the many questions stirred by the new strategy is how the US would respond to an attack that originates from non-governmental entities, i.e. cyber-terrorists, or hackers otherwise independent of a particular government. (Of course, we all know how the US responds when an “act of war” is launched by an analog terrorist.)

Regardless of the current details, the need for a cyber attack strategy is obvious. According to the military personnel who have seen the Pentagon’s strategy in its entirety, the rules laid out will abide by the standard Laws of Armed Conflict, and mesh with the strategies of international allies.

Editors' Recommendations

Andrew Couts
Former Digital Trends Contributor
Features Editor for Digital Trends, Andrew Couts covers a wide swath of consumer technology topics, with particular focus on…
How to do hanging indent on Google Docs
Google Docs in Firefox on a MacBook.

The hanging indent is a classic staple of word processing software. One such platform is Google Docs, which is completely free to start using. Google Docs is packed with all kinds of features and settings, to the point where some of its more basic capabilities are overlooked. Sure, there are plenty of interface elements you may never use, but something as useful as the hanging indent option should receive some kind of limelight.

Read more
How to disable VBS in Windows 11 to improve gaming
Highlighting VBS is disabled in Windows 11.

Windows 11's Virtualization Based Security features have been shown to have some impact on gaming performance — even if it isn't drastic. While you will be putting your system more at risk, if you're looking to min-max your gaming PC's performance, you can always disable it. Just follow the steps below to disable VBS in a few quick clicks.

Plus, later in this guide, we discuss if disabling VBS is really worth it, what you'd be losing if you choose to disable it, and other options for boosting your PCs gaming performance that don't necessarily involve messing with VBS.

Read more
How to do a hanging indent in Microsoft Word
A person typing on a keyboard, connected to a Pixel Tablet.

Microsoft Word is one of the most feature-rich word processing tools gifted to us human beings. In fact, the very word “Word” has invaded nomenclature to the point where any discussion of this type of software, regardless of what the product is actually called, typically results in at least one person calling the software “Word.”

Read more