Defense Bill Approves Offensive Cyber Warfare. Offensive CyberSecurity Action. National Defense Authorization Act Gives the military the right to perform cybersecurity attacks These attack must be carried out under presidential supervision and abide by the laws of warfare
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Gives the military the right to perform cybersecurity attacks
These attack must be carried out under presidential supervision and abide by the laws of warfare
The act also requires that the DoD and DHS to report on Chinese military capabilities
Some of this spying is conducted on worldwide networksOverview
Should the military have the right to conduct offensive cyber attacks on other countries?
The parties are both the U.S. government and the rest of the world’s civilian population.
The government wants to have the ability to protect its people(through offensive cyber attacks).
The people want to be safe from inaccurate attacks and keep their privacy.8-step decision-making process
-One solution would be for the military to keep the power to use offensive action
-Another would be for the military to give up this power
-A compromise would be for this new power to be closely monitored and limited
-I would chose the last option, since military needs to possess the ability to attack on all fronts8-step decision-making process (cont.)
A) Yes! B)Yes again! use offensive action
I believe this solution coincides with nature and does not violate any laws of nature.
I believe this solution would be the most accepted and widely agreed upon.
Yes, of my own free will.
Pragmatism8-step decision-making process (cont.)
2.3 Know and respect existing laws pertaining to professional work.
2.8 Access computing and communication resources only when authorized to do so.
3.5 Articulate and support policies that protect the dignity of users and others affected by a computing system.Applying the ACM code of ethics
Hoover, Nicholas J. "InformationWeek: The Business Value of Technology." Defense Bill Approves Offensive Cyber Warfare. Web. 11 Apr. 2012. <http://www.informationweek.com/news/government/security/232301351>.
"Association for Computing Machinery." Code of Ethics â. Web. 11 Apr. 2012. <http://www.acm.org/about/code-of-ethics>.Citations