Analyst's note: The original concepts of Command and Control Warfare (C2W), Information Warfare (IW) or Information Operations (IO) developed and discussed at length years ago remain -- whatever we are calling it these days. Cyber Warfare & Cyber Combat seem to be the terms now in vogue.
As one who once helped create these strategies, may I also remind today's younger warriors that this form of warfare is NOT all technology. Some things just never seem to change.
"The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.
The Pentagon's first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country's military. [....]"
"Pentagon concludes sabotage from foreign computers can be act of war, [...] opening the door for the U.S. to respond with military force."
The Wall Street Journal also reports the following:
The War on Cyber Attacks
Attacks of varying severity have rattled nations in recent years.
June 2009: First version of Stuxnet virus starts spreading, eventually sabotaging Iran's nuclear program. Some experts suspect it was an Israeli attempt, possibly with American help.
November 2008: A computer virus believed to have originated in Russia succeeds in penetrating at least one classified U.S. military computer network.
August 2008: Online attack on websites of Georgian government agencies and financial institutions at start of brief war between Russia and Georgia.
May 2007: Attack on Estonian banking and government websites occurs that is similar to the later one in Georgia but has greater impact because Estonia is more dependent on online banking.
Related articles:
-
Full Coverage: National Security
-
Shariah, the Threat to America: An exercise in competitive analysis, Report of Team 'B' II
-
Mystery Surrounds StuxNet: Cyber Missile That Crippled Iran's Nuclear Weapons Ambitions
-
Roots of Islamic Terrorism: How Communists Helped Fundamentalists
-
Islamist Infiltration documented in highest levels of U.S. Gov't
-
ISAF Policy Under Gen. David Petraeus: Catch-and-Release IED-Bombers
-
As if Things Weren't Bad Enough, Russian Professor Predicts End of U.S.
-
A Balanced Strategy Reprogramming the Pentagon for a New Age