This is World War Three . That USA is planning to use military force against cyber attackers .They are to roll out a INTERNATIONAL strategy to officially include military as an option in responding to cyber attacks .
A day after this announcement Chinese hackers hacked into the accounts of Gmail including those of Senior US Government officials .This compounds to the already strained relationship between Google and China .
All this happening in one week , This is very eerie. Especially when the Economy has just died officially with the numbers failing to add up .
War is the best diversion in times of Economic Black death and they are going to get every reason to go for it , a war that will change Cyber Space forever.
Watch this development , the box of war has been opened in just two days.
First Read CNN’S story on the Pentagon’s Strategy then Al Jazeera’s report on hacking that took place after the Pentagon had just made the announcement of using military force against cyber attacks.
Pentagon doesn’t rule out military force against cyberattacks
Washington (CNN) — The Pentagon is formulating a new strategy on how to respond to cyberattacks that would include using military force, a spokesman confirmed late Tuesday.
Col. David Lapan said if the attack is serious enough, “a response to a cyberincident or attack on the U.S. would not necessarily be a cyber response, so as I said all appropriate options would be on the table.”
The final public portion of the “Defense Strategy for Operating in Cyberspace” is expected to be released in two or three weeks.
But much of it has already been discussed for months by numerous administration officials, including the White House and Deputy Secretary of Defense William Lynn.
In May, the White House released the International Strategy for Cyberspace. It said in part, “We reserve the right to use all necessary means — diplomatic, informational, military, and economic — as appropriate and consistent with applicable international law, in order to defend our Nation, our allies, our partners, and our interests.”
The White House hopes this policy will act to discourage cyberattackers. “There is certainly the deterrent effect of letting our adversaries know how we would consider those actions and what steps we might take,” Lapan said.
The Defense Department’s appreciation of the serious threat posed by cyberattacks grew substantially after an incident in 2008. That’s when someone inserted an infected flash drive (what some call thumb drives) into a U.S. military laptop on a base in the Middle East.
“The flash drive’s malicious computer code, placed there by a foreign intelligence agency, uploaded itself onto a network run by the U.S. Central Command. That code spread undetected on both classified and unclassified systems,” Lynn wrote last fall in Foreign Policy magazine. “This previously classified incident was the most significant breach of U.S. military computers ever, and it served as an important wake-up call.”
According to Lynn’s article, the code on that flash drive “spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control.”
But Lynn admits one of the more difficult hurdles facing anyone trying to respond to cyberattacks is figuring out who the attacker is.
“Whereas a missile comes with a return address, a computer virus generally does not. The forensic work necessary to identify an attacker may take months, if identification is possible at all,” Lynn wrote. “And even when the attacker is identified, if it is a nonstate actor, such as a terrorist group, it may have no assets against which the United States can retaliate.”
The Pentagon policy is part of the larger White House plan, but it will not include specifics as to what responses might be triggered by certain levels of cyberattacks.
“We’re not going to necessarily lay out if this happens we will do this, because again the point is, if we are attacked we reserve the right to do any number of things in response just like we do now with kinetic attack,” Lapan said. “So it makes the idea that attacks in cyber would be viewed in a way that attacks in a kinetic form are now, the military option is always a resort.”
|‘Chinese hackers’ break into Gmail accounts|
Google says Gmail accounts of US officials and Chinese political activists were targeted in concerted hacking campaign.
Hackers likely based in China have attempted to break into hundreds of Google mail accounts, including those of senior US government officials, Chinese activists and journalists, the internet company said.
The unknown perpetrators, who appeared to originate from Jinan in Shandong province, recently tried to breach and monitor email accounts by stealing passwords, but Google detected and “disrupted” their campaign, the world’s largest web search company said on its official blog on Thursday.
A senior US military official said it was investigating the claims.
“The Department of Defense (DoD) is aware of press reports about Google’s security breach but has not been contacted directly,” the official told Al Jazeera’s Washington correspondent, Rosalind Jordan.
“However, as the breach involved Gmail, since those are not official DoD e-mail accounts, we are unaware if the targeted individuals are Defense employees. We would refer you to Google regarding details of its announcement, and to the FBI for details about any investigation,” the official said.
The revelation comes more than a year after Google disclosed a cyberattack on its systems that it said it traced to China, and could further strain an already tense relationship between the web giant and Beijing.
That incident also triggered a highly charged debate over the country’s censorship and rigid control of the internet. Google eventually all but pulled out of the world’s largest internet market by users.
“Investors would like to see Google figure out a way to operate in China, and capitalise on the growth of the country,” said Jim Friedland, a Cowen and Co analyst.
“It’s been a tough relationship. And this highlights that it continues to be a tough relationship,” he said.
“We recently uncovered a campaign to collect user passwords, likely through phishing,” Google said in a post on its corporate blog on Thursday. “The goal of this effort seems to have been to monitor the contents of these users’ emails.”
It “affected what seem to be the personal Gmail accounts of hundreds of users, including among others, senior US government officials, Chinese political activists, officials in several Asian countries [predominantly South Korea], military personnel and journalists.”
The events leading to Goggle’s withdrawal from China exacerbated an often difficult relationship between Washington and Beijing, with disputes ranging from human rights to trade.
The attacks revealed on Wednesday were also the latest computer-based invasions directed at western companies. The United States has warned that a cyberattack – presumably if it is harmful enough – could result in real-world military retaliation, although analysts say it could be difficult to detect its origin with full accuracy.
Lockheed Martin Corp, the US government’s top information technology provider, said last week it had thwarted “a significant and tenacious attack” on its information systems network, though no signs pointed to a Chinese origin.
The White House said it was looking into the incident.
“We’re looking into these reports and are seeking to gather the facts,” Tommy Vietor, the White House spokesman, said. “We have no reason to believe that any official US Government email accounts were accessed.”
Jenny Shearer, an FBI spokeswoman, said: “We are aware of Google’s announcement regarding attempts to obtain passwords and gain access to these accounts. We are working with Google to review this matter.”
Cyberattacks originating in China have become very common in recent years, said Bruce Schneier, chief security technology officer at telecommunications company BT.
“It’s not just the Chinese government. It’s independent actors within China who are working with the tacit approval of the government,” he said.
While Google said last year’s attack was aimed at its “corporate infrastructure,” the latest incident appears to have relied on tricking email users into revealing passwords, based on Google’s description in its blog post.
It said the perpetrators changed the victims’ email forwarding settings, presumably secretly sending the victims’ personal emails to other recipients.
Schneier said the details that Google had released about the email hijacking did not appear that unusual.
“For the past five years we’ve known that the Chinese conduct a lot of espionage over the internet,” he said.
The bigger question, he said, was why Google was choosing to publicise this attack now.
The company said it notified the victims and relevant governments.
“It’s important to stress that our internal systems have not been affected – these account hijackings were not the result of a security problem with Gmail itself,” Google said.
The company’s shares finished 0.7 per cent lower at $525.60.