presence
03-10-2013, 08:39 AM
Post number 3,777; good luck with this one...
A new report (http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf) from the Department of Defense outlines the military's capability to deter cyber threats with some pretty heavy firepower, including nuclear weapons.
The paper written by the Defense Science Board described the best types of bombs to use on hackers to be "Global selective strike systems e.g. penetrating bomber, submarines with long range cruise missiles, Conventional Prompt Global Strike (CPGS), survivable national and combatant command," while "Nuclear weapons would remain the ultimate response and anchor the deterrence ladder" for cyber threats.
"The report ... implies that the United States might have to rely on nuclear weapons to retaliate after a large-scale cyber attack," Foreign Policy writes (http://killerapps.foreignpolicy.com/posts/2013/03/06/dod_panel_recommends_special_bomber_armed_cyber_de terrent_force).
http://www.activistpost.com/2013/03/dod-deadly-force-hackers-cyber-threats.html
A new report (http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf) from the Department of Defense outlines the military's capability to deter cyber threats with some pretty heavy firepower, including nuclear weapons.
The paper written by the Defense Science Board described the best types of bombs to use on hackers to be "Global selective strike systems e.g. penetrating bomber, submarines with long range cruise missiles, Conventional Prompt Global Strike (CPGS), survivable national and combatant command," while "Nuclear weapons would remain the ultimate response and anchor the deterrence ladder" for cyber threats.
"The report ... implies that the United States might have to rely on nuclear weapons to retaliate after a large-scale cyber attack," Foreign Policy writes (http://killerapps.foreignpolicy.com/posts/2013/03/06/dod_panel_recommends_special_bomber_armed_cyber_de terrent_force).
http://www.activistpost.com/2013/03/dod-deadly-force-hackers-cyber-threats.html