Wall Street Journal Responses Student Term Paper

Total Length: 1160 words ( 4 double-spaced pages)

Total Sources: 4

Page 1 of 4

wsj.com/article/SB10001424052702304563104576355623135782718.html?mod=WSJ_hp_mostpop_read#printMode

WASHINGTON -- The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. To respond using traditional military force.

The Pentagon's first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country's military.

In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S. In this way. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said a military official.

Recent attacks on the Pentagon's own systems -- as well as the sabotaging of Iran's nuclear program via the Stuxnet computer worm -- have given new urgency to U.S. efforts to develop a more formalized approach to cyber attacks. A key moment occurred in 2008, when at least one U.S. military computer system was penetrated. This weekend Lockheed Martin, a major military contractor, acknowledged that it had been the victim of an infiltration, while playing down its impact.

The report will also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the U.S. can ever be certain about an attack's origin, and how to define when computer sabotage is serious enough to constitute an act of war. These questions have already been a topic of dispute within the military.

One idea gaining momentum at the Pentagon is the notion of "equivalence." If a cyber attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for a "use of force" consideration, which could merit retaliation.

Stuck Writing Your "Wall Street Journal Responses Student" Term Paper?



The War on Cyber Attacks

Attacks of varying severity have rattled nations in recent years.

June 2009: First version of Stuxnet virus starts spreading, eventually sabotaging Iran's nuclear program. Some experts suspect it was an Israeli attempt, possibly with American help.

November 2008: A computer virus believed to have originated in Russia succeeds in penetrating at least one classified U.S. military computer network.

August 2008: Online attack on websites of Georgian government agencies and financial institutions at start of brief war between Russia and Georgia.

May 2007: Attack on Estonian banking and government websites occurs that is similar to the later one in Georgia but has greater impact because Estonia is more dependent on online banking.

The Pentagon's document runs about 30 pages in its classified version and 12 pages in the unclassified one. It concludes that the Laws of Armed Conflict -- derived from various treaties and customs that, over the years, have come to guide the conduct of war and proportionality of response -- apply in cyberspace as in traditional warfare, according to three defense officials who have read the document. The document goes on to describe the Defense Department's dependence on information technology and why it must forge partnerships with other nations and private industry to protect infrastructure.

The strategy will also state the importance of synchronizing U.S. cyber-war doctrine with that of its allies, and will set out principles for new security policies. The North Atlantic Treaty Organization took an initial step last year when it decided that, in the event of a cyber attack on an ally,….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Wall Street Journal Responses Student" (2011, June 03) Retrieved May 21, 2024, from
https://www.aceyourpaper.com/essays/wall-street-journal-responses-student-42280

Latest MLA Format (8th edition)

Copy Reference
"Wall Street Journal Responses Student" 03 June 2011. Web.21 May. 2024. <
https://www.aceyourpaper.com/essays/wall-street-journal-responses-student-42280>

Latest Chicago Format (16th edition)

Copy Reference
"Wall Street Journal Responses Student", 03 June 2011, Accessed.21 May. 2024,
https://www.aceyourpaper.com/essays/wall-street-journal-responses-student-42280