Fighting cyber attacks with nuclear weapons  - nuke - Fighting cyber attacks with nuclear weapons

The New York Times reports that a new strategy could see the United States deploying nuclear in the event of an enemy launching a crippling attack against key infrastructure:

A newly drafted United States nuclear strategy that has been sent to President Trump for approval would permit the use of nuclear weapons to respond to a wide range of devastating but non-nuclear attacks on American infrastructure, including what current and former government officials described as the most crippling kind of cyberattacks.

For decades, American presidents have threatened 20;first use21; of nuclear weapons against enemies in only very narrow and limited circumstances, such as in response to the use of biological weapons against the United States. But the new document is the first to expand that to include attempts to destroy wide-reaching infrastructure, like a country’s power grid or communications, that would be most vulnerable to cyberweapons.

There’s a fundamental between meatspace attacks against your country and cyberspace attacks.

It’s much easier with an internet-based attack to hide where the attack originated. Reliable attribution can be a nightmare.

If countries are going to start opening the possibility of launching nuclear counter-attacks if hit by a cyber attack they better be pretty darn sure that they’ve reliably identified who the true culprits are.

Mind you, if we ever come to a time when one country is using nukes to fight internet attacks maybe it doesn’t matter if they blow up the wrong country.

We’ll all be pretty much doomed anyway.

Let’s hope such a strategy never has to be put into action, and that those proposing it are doing so more in an attempt to warn the United States’ enemies against state-sponsored cyber attacks.

- aa9ea0686c5d1aa9086d4b12c3aa05f2 s 80 d mm r g - Fighting cyber attacks with nuclear weapons

About the author, Graham Cluley

Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and gives presentations on the topic of computer security and online .

Follow him on Twitter at @gcluley, Google Plus, Facebook, or drop him an email.

Follow @gcluley

Source link


Please enter your comment!
Please enter your name here