The gray zone separating "cyber attacks" by hackers on computer and communications networks from war waged with bayonet, bomb or missile attacks is narrowing, and narrowing dramatically.
Last week, the head of U.S. Strategic Command (STRATCOM), U.S. Air Force Gen. Kevin Chilton, noted that American leaders cannot rule out using "real world" military force (e.g., air strikes and ground attacks) against an enemy who attacks and disrupts critical cyber networks.
On May 8, The Stars and Stripes quoted Chilton as saying, "I don't think you take anything off the table when you provide options" to senior civilian leaders following an attack on the United States -- including cyber attacks on America.
Chilton is addressing, quite publicly and emphatically, an increasingly difficult security threat. Cyberspace is, to paraphrase a recent statement by another senior U.S. military officer, "a contested environment." "Contested environment" is Pentagonese for "there's a fight going on there, and we're in it."
A column I wrote in January 2008 sketches the thorny issue: "Attack a nation's highways and railroads, and you've attacked transportation infrastructure. You've also committed an obvious, recognized act of war. An electronic attack doesn't leave craters or bleeding human casualties -- at least, not in the same overt sense of an assault with artillery and bombs. However, the economic costs can be much larger than a classic barrage or bombing campaign."
Historians can make the argument that "hacking" as warfare isn't new. When World War I erupted, British sailors "hacked" German undersea cables in order to intercept or cut German international cable communications traffic. This gave the British an intelligence edge and the ability to deny Germany a communications asset. Likewise, eavesdropping on military radio communications and jamming radio was standard operating procedure in World War II.
In the digital age, more than military and diplomatic communications are at risk. Today, nations depend on networked computers for civilian as well as military communications, for personal and governmental economic transactions, for information storage and retrieval, and command and control of transportation and energy infrastructure. This exponentially increased reliance means that in the 21st century a nation's "cyber" infrastructure is a very attractive target. Intelligence agencies know this. So do banks, brokerage houses, freight shippers and power companies.
Austin Bay is the author of three novels. His third novel, The Wrong Side of Brightness, was published by Putnam/Jove in June 2003. He has also co-authored four non-fiction books, to include A Quick and Dirty Guide to War: Third Edition (with James Dunnigan, Morrow, 1996).
Be the first to read Austin Bay's column. Sign up today and receive Townhall.com delivered each morning to your inbox.
Palestinian Spokesman on CNN: It's Israel vs. Palestinian Civilians--Israel Violated Ceasefire and Massacred Civilians | Greg Hengler
History Professor: Convicted Cop Killer Mumia Should Be Celebrated Like Martin Luther King Jr. in Schools | Katie Pavlich