attacks are Because many civil infrastructure is mostly controlled by the remote computer in the future cyberspace operations, could not dodge injuring civilians. Therefore, what kind of network wind war ground rules and tactics of war, the network to reduce the negative effects of war in mandate to avoid damaging United States seeks to
Recently, the U.S. strategic pushes around the network continuously. May 16, the White House coordination State, Justice, Commerce, Homeland Security and Defense published a paper entitled The document said the U.S. will be created via multilateral and bilateral cooperation in the new international code of conduct, strengthening the capacity of network defense, reducing the U.S. administration, companies, principally for the military invasion of the network. In this document, the United States correlated to Internet freedom and Network Security, said that if the cyber attack threat to U.S. citizen security, will not hesitate to use military coerce. Response to the United States reserves always major network attacks all the necessary means, including diplomatic, information technology, military and economic means. The United States will construct and reinforce ties with NATO allies and other military cooperation among the evolution of a prevalent network of ways and means of self-defense to respond to state and non state performers from the chief potential threats to network security.
According apt reports, the Pentagon announced in the upcoming warfare ashore the network's new strategy file alleged namely the network onset is one deed of warfare. This will have a profound impact of multinational statute, international statute and space actions because the network did not set clear But how to meter network attacks, which would threaten the territorial honesty of his nation is currently not explicit standards.
Comments
developed The strategy of the last centenary the mind of U.S. officials revealed that the forthcoming new strategy that any threat to the civilian casualties of network attacks, such as mowing off electricity supply to hospitals and other emergency rejoinder agencies operating deadlock, etc., will be thought an act of raid. U.S. President may declare the characteristic circumstances, according to economic sanctions and even military strikes against other measures.
Every year a large number of recondite hackers rush to Las Vegas to heed the world's largest hacker event. The picture shows the 2009 hacker session site.
(WASHINGTON, June 2 Xinhua)
learned that the Pentagon will presently introduce a new strategy of war on the network document. According to this new strategy, the U.S. computer systems from foreign attacks that would be considered an act of war, the United States will carry out such attacks, including accustomed military attack, including retaliate. This situation another shows that the fast development of the Internet today, the United States is attempting to monopolize a series of strategic initiatives worldwide network of space majesty and the basic rules of the game to develop cyber warfare, cyber warfare to collar the lofty ground of the future.
Some analysts here said the U.S. attacks as acts of war will move,
Cheap WOMENS MBT SHOES For Sale, production the network the United States toward an important step in the militarization of space, the present system of international law has a profound impact. United Nations publishing That will give American civilians a solemn misadventure.
a U.S. military lawful said the Pentagon's new strategy method that the forthcoming If a hacker on the U.S. nuclear reactors, subway, or a menace to the fuel pipeline, the United States as an enemy legion to the menace posed by these facilities. With this new strategy, the Pentagon hitu potential deterrent to the enemy, let it attack the United States via the Internet to comprehend what will happen.
However, if the computer network of a foreign military aggression of a number of other activities, you do not need credential by the president, these activities include research attacks on rival's network capability,
coach outlet, power stations or retard the operation of other agencies . U.S. Wangluo forces also can not authorized by the president to do for the future below the label virus attacks. In fact, the United States has put into use a arms of war part of the network. It is reported that Iran's nuclear facilities last year to a pause, the United States related to computer systems to Iran implanted Although the U.S. officials were not recognized, yet numerous experts are convinced the message.
media reports said here, the U.S. weapon gigantic Lockheed - Martin Information Systems May 21 attack by hackers. As the response period, corporate buyers, project and worker information has not underwent premonitory losses. Obama heard to the Pentagon on this memorandum.
meantime some network experts advise that this new strategy will be difficult to implement, but will mushroom the militarization of the Internet. Attacks impalpable, difficult to detect out the origin, it constantly can not determine who instigated behind the scenes.
newspaper that the Pentagon has amplified an online account of weapons and tools, including the major networks can demolish competitors computer viruses, this list of how the United States provides the root to carry out cyber war. Network list of weapons in a few months ago has been put into use,
To spend 140 million of central government authority to buy genuine software, and has been recognized at the U.S. Central Intelligence Agency and additional agencies. This list will be the use of weapons into the universal network, regional and class of hostile areas 3. Global operation is the highest level of action, the consequences of actions with the most tough to portend. Outside the district alternatively the United States in hostilities is not at war with weapons of anyone network, are referred to for The list shows that the chancellor authorized the military need to invade a foreign computer network, leaving the hereafter to stimulate the virus.
Washington, Wen Xian
the United States introduced a sequence of Internet plan paper highlights the esteem to
development of network weapons
Lam Yuan (Chinese Academy of Military Sciences Research Fellow, World Military): The United States in recent years not merely cyberspace to the national security,
supra TK society shoes, economic security level, will be in cyberspace as a new military field, tried to establish and maintain U.S. military superiority.