We generally say this approach is the same as a sucking chest wound…..
Cyberwar Plan Has New Focus on Deterrence
By JULIAN E. BARNES and SIOBHAN GORMAN
Wall Street Journal, 15 July 2011
The military must move from defending against major cyberattacks to deterring assaults by letting enemies know the U.S. is willing to retaliate with its own virtual weapons or military force, a top general said Thursday.
The Pentagon's new strategy for threats from computer hackers primarily deals with enhancing the defense of its computer systems and those of its military contractors. But Marine Gen. James Cartwright, vice chairman of the Joint Chiefs of Staff, said that policy is just a start. He said that over the next decade the military would move beyond building better firewalls and make clear to adversaries that they will pay a price for serious cyberattacks.
“There is no penalty to attacking us now. We have to figure out a way to change that,” Gen. Cartwright said.
Phi Beta Iota: Never mind ignoring sound advice in the early 1990's [1994 Sounding the Alarm on Cyber-Security]; never mind DoD following the secret world into the technology rabbit-hole, sacrificing all human productivity on the altar of out-sourced incoherent contracting. What the above really says is that Cyber-Command realizes it has no hope at all of defending the rat's nest it has inherited, and it is now going to do a theatrical exit toward “counter-strike.” This is absurd in various ways. First off, only 20% of what we are calling secret actually is secret. Second off, we are so far out of touch with reality that the best way to retard adversary countries is to give them our acquisition system and our incoherent technology gameplan. Third off, the denial service of attacks are now coming from angry individuals, not nations, and London is one of the hubs. Last but not least, GAO has made it clear that the DoD Global Grid is dead in the water and will never breathe–ever. Bottom line: these folks not only don't understand the new game, they cannot even find the ball.
See Also:
2011 Cyber-Command or IO 21 + IO Roots
Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)
Reference: Bruce Schneier on Cyber War & Cyber Crime