too tired at the moment to respond properly to this article. (i get to fly home, from .no via .de leaving at like 4 AM or something, cut me some slack.)
for god's sake... why do people equate "cyber attacks" with actual, physical incursions?!? there aren't hordes of hostiles advancing on a position when a "cyber attack" is carried out. there's some guy sending packets through various nodes that makes him hard to trace to begin with.
but nevermind all that, the DoD is totall prepared to drop bombs on the house of some idiot with a compromised computer, according to this fucktard article.
for god's sake... why do people equate "cyber attacks" with actual, physical incursions?!? there aren't hordes of hostiles advancing on a position when a "cyber attack" is carried out. there's some guy sending packets through various nodes that makes him hard to trace to begin with.
but nevermind all that, the DoD is totall prepared to drop bombs on the house of some idiot with a compromised computer, according to this fucktard article.
If the United States found itself under a major cyberattack aimed at undermining the nation’s critical information infrastructure, the Department of Defense is prepared, based on the authority of the president, to launch a cyber counterattack or an actual bombing of an attack source.
The primary group responsible for analyzing the need for any cyber counterstrike is the National Cyber Response Coordination Group (NCRCG). The three key members of the NCRCG, who hail from the US-CERT computer-readiness team, the Department of Justice and the Defense Department, this week described how they would seek to coordinate a national response in the event of a major cyber-event from a known attacker.
The primary group responsible for analyzing the need for any cyber counterstrike is the National Cyber Response Coordination Group (NCRCG). The three key members of the NCRCG, who hail from the US-CERT computer-readiness team, the Department of Justice and the Defense Department, this week described how they would seek to coordinate a national response in the event of a major cyber-event from a known attacker.
Comment