COMMENTARY

Defining war

It was simpler in the old days to recognize an attack: The enemy fired on your shores, burned your capital, and shot at soldiers and civilians. No one questioned we were at war in 1812 or 1941.

In the years since, the nature of war and aggression has changed rather dramatically. The guerrilla war in Vietnam made it difficult to distinguish between enemy soldier and civilian because both were enmeshed in a shadowy war in which everyone and everything was fair game. More recently, the spread of terrorism has ratcheted up the potential enemies and the potential costs.

As Amber Corrin discusses in her article on new developments in cyber warfare, governments are trying to define how and when to use the tools that have grown from the advanced software and the interconnected infrastructure that supports everything from the electrical grid to water purification plants and nuclear power plants. Last year, President Barack Obama signed executive orders that begin to define the rules of engagement in the cyber world. But much remains undefined. A preemptive strike takes on a very different meaning when the military inserts a virus into the workings of a computer belonging to a perceived rogue or enemy state.

And if the activities David Sanger describes in his book “Confront and Conceal” are true, then the United States has already initiated a cyberattack on a nuclear facility of what we see as a rogue state — in this case, Iran. The goal was to prove that a facility could be disabled without risking airplanes, pilots or innocent civilians on the ground. It certainly gives new meaning to the way we think about war.

About the Author

Anne Armstrong is President & Chief Content Officer of 1105 Public Sector Media Group.

 

 


Featured

  • Cybersecurity
    malware detection (Alexander Yakimov/Shutterstock.com)

    Microsoft targets copycat influence websites

    Microsoft went to court to take down websites it believes to be part of a foreign intelligence operation targeting conservative think tanks and the U.S. Senate.

  • Cybersecurity
    secure network

    FAA explores shifting its network to FISMA high

    The Federal Aviation Administration is exploring an upgrade to the information security categorization of IT systems as part of air traffic control modernization.

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.