In: Computer Science
How should the U.S. government respond to a hacking attack by China in which the hackers shut down critical military communications for several hours?*
*This is hypothetical; such an attack has not occurred.
1). ANSWER :
GIVENTHAT :
In 1899, diplomatic representatives from the world’s leading nations, many in elegant suits adorned with gold pocket watches and sporting exquisite waxed mustaches, gathered in the Hague, Netherlands, for a grand conference. The diplomats set out to achieve nothing less than taming the destructive potential of a new military technology. The recent invention of motor-driven military aircraft had led all nations to fear man-made storms of balloons raining bombs on their cities.
The United States again confronts the grim challenge of managing technological advances and their implications for warfare (as it has several times since, from chemical weapons to missiles to drones). Today, cyberweapons are nearly as synonymous with military power as fighter jets. What’s more, as demonstrated by the recent New York Times report on the cyberattacks used to disrupt North Korean ballistic missile tests and the latest WikiLeaks claims about a CIA hacking unit, cyber capabilities are too tempting for governments to refrain from using — even in peacetime.