COMMENTARY

Defining war

It was simpler in the old days to recognize an attack: The enemy fired on your shores, burned your capital, and shot at soldiers and civilians. No one questioned we were at war in 1812 or 1941.

In the years since, the nature of war and aggression has changed rather dramatically. The guerrilla war in Vietnam made it difficult to distinguish between enemy soldier and civilian because both were enmeshed in a shadowy war in which everyone and everything was fair game. More recently, the spread of terrorism has ratcheted up the potential enemies and the potential costs.

As Amber Corrin discusses in her article on new developments in cyber warfare, governments are trying to define how and when to use the tools that have grown from the advanced software and the interconnected infrastructure that supports everything from the electrical grid to water purification plants and nuclear power plants. Last year, President Barack Obama signed executive orders that begin to define the rules of engagement in the cyber world. But much remains undefined. A preemptive strike takes on a very different meaning when the military inserts a virus into the workings of a computer belonging to a perceived rogue or enemy state.

And if the activities David Sanger describes in his book “Confront and Conceal” are true, then the United States has already initiated a cyberattack on a nuclear facility of what we see as a rogue state — in this case, Iran. The goal was to prove that a facility could be disabled without risking airplanes, pilots or innocent civilians on the ground. It certainly gives new meaning to the way we think about war.

About the Author

Anne Armstrong is Co-President & Chief Content Officer of 1105 Public Sector Media Group.

 

 


Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Tue, Jul 10, 2012

The politicians must still define a set of obtainable goals. If they cannot do that, Vietnam all over again.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group