In the computer age -- and 2008 is definitely in the computer age -- the difference between an act of war and crime is often a matter of interpretation as well as degree.
Attack a nation's highways and railroads, and you've attacked transportation infrastructure. You've also committed an obvious, recognized act of war.
An electronic attack doesn't leave craters or bleeding human casualties, at least not in the same overt sense of an assault with artillery and bombs. However, the economic costs can be much larger than a classic barrage or bombing campaign.
Cyberspace has become a much busier and more dangerous place in the last 15 years. Today, entire nations rely on computer networks for communications, economic transfers and information storage. Computers and computer networks are lucrative targets for criminals. This increased economic and information reliance means that in the 21st century targeting a nation's electronic infrastructure is an act of war.
Bankers know this. So do intelligence agencies. Diplomats and political leaders must also come to grips with that reality.
Everyone with a personal computer understands the basic concepts of cyber warfare. Link your laptop to the Internet, and you link to the great collective of the Information Age. You also connect to a digital disease pool populated by viruses that instantly erase electronic brains. That means data is destroyed -- perhaps less messily, but as thoroughly, as an attack with a high-explosive bomb.
You also enter a world where even trusted Websites may leave a "tracking cookie" on your own computer so they can know something about your Internet shopping preferences. There are, however, even more aggressive programs that allow "inquisitive geeks" to follow everything you read and write. These cyber "spyware" programs are a form of cyber spy war. Add more sophisticated digital trickery and additional levels of penetration wizardry, and programs like these could steal secrets from embassies and defense facilities.
Spies and soldiers know cyber attacks aren't new and that institutional computer systems, even large, ostensibly well-protected one like those used by banks, big businesses and government agencies, are also vulnerable. In the early 1990s, a senior National Security Agency staffer told me that individual hackers were constantly trying to penetrate "various government networks." He did not elaborate -- any elaboration would have quickly involved classified material -- but he said NSA analysts had "learned a lot watching these people." Those are cryptic words from a cryptologist in the days when computer-savvy 14 year olds were tapping into their parents' bank accounts.
Austin Bay is the author of three novels. His third novel, The Wrong Side of Brightness, was published by Putnam/Jove in June 2003. He has also co-authored four non-fiction books, to include A Quick and Dirty Guide to War: Third Edition (with James Dunnigan, Morrow, 1996).
Be the first to read Austin Bay's column. Sign up today and receive Townhall.com delivered each morning to your inbox.
Son Of Hamas Founder: My Father's Movement 'Doesn’t Care About The Lives Of Palestinians' | Matt Vespa
Hillary Clinton: Hamas Operates in Civilian Areas Because Gaza is a Small Place or Something | Katie Pavlich
Emails: Insurers Warned of Big Premium Increases, Requested and Received Expanded 'Bailout' | Guy Benson