back to article Here's why the Pentagon is publishing its cyber-warfare rulebook – if China hasn't already hacked in and read it

The Pentagon has published an outline of its cyber-warfare strategy for the first time, revealing the conditions under which it will hack enemy nations. And Defense Secretary Ashton Carter, speaking at Stanford University, has named China, Russia, Iran, and North Korea as the US's greatest adversaries in computer security. …

  1. h3

    China

    The response to China amounts to precisely nothing.

    It won't change anything and they will keep doing it.

  2. Anonymous Coward
    Anonymous Coward

    TLDR;

    Well the document starts off with a scanned-in letter from the Secretary of Defense, complete with coffee stains. The level of understanding of high-tech issues kind of goes downhill from there.

    Basically it says if they find anyone doing damage to US networks or trying to cause economic damage by tampering with US technology there will be unspecified retaliation.

    At the bottom it says they discovered serious economic damage being perpetrated by some large black building in Maryland, so they were going to send a lawyer over there to investigate.

    Stay tuned for progress reports.

  3. FF22

    Barking dogs...

    ... never bite.

    1. Anonymous Coward
      Anonymous Coward

      Re: Barking dogs...

      OOoohhhhhhh listen to me rattle my big scary weapon.. It's so big and scary.. Can you hear it?... Don't make me flop it out and chase you with it... Are you scared yet?.. OOoohhhhhhh it's so big and scary..

    2. Anonymous Coward
      Anonymous Coward

      Barking dogs bark...

      ...because they're frightened.

      Just like governments.

  4. Doctor Syntax Silver badge

    And which of these rules lead to this action http://www.theregister.co.uk/2015/04/24/bnd_nsa_spying_collaboration ?

  5. Arachnoid

    US Cyberwarefare ability

    Is much like the Russian nuclear ability during the cold ware lots of bravado over empty silos

    1. oldcoder

      Re: US Cyberwarefare ability

      They weren't all empty...

      And they are the only country to actually demonstrate a 50Megaton bomb.

      1. Mark 85

        Re: US Cyberwarefare ability

        I can hear the NSA Bossman now as he sits in his futuristic command center.. "Now show them the power of a fully operational battle station"...

        Reference for those who missed it: (yeah.. different movie but you get the idea) http://www.theregister.co.uk/2013/09/16/alexander_star_trek_bridge/

  6. amanfromMars 1 Silver badge

    Special Advanced IntelAIgent Research Services for Real Spooky Private Pirate Enterprise

    ..... in Public Domains/Live Operational Virtual Environments

    Who is responsible, and that is in no way the same as being accountable, .... for tradtional analogue legacy system rules and regulations supplying mentoring and monitoring channels/portals for remote ignorant third party proxy command and control of powerful and empowering programs and energies are not a base drive element or fundamental component of CyberIntelAIgent Command Centres in Creative CyberSpace Control ... for providing UKGBNI Battle Stations and Fleet AIR Arm Services supporting Perfect Attack Weapons Systems and Invisible Cloaking for Immaculate Virtual Defence?

    And who is responsible and accountable for not providing all necessary simple funding for the complex resource and assets delivery of all of the above to a Blighty with Special AIR Services? Round head Parliamentarians and cavalier SpAds trailing and trialling petrified Civil Servces in the thrall of terrified central bankers and fantasy market manipulators ... for it is always a who and never a what is responsible and accountable?

    Or is IT now being stealthily provided for, and fully protected from unwarranted systems and unvetted personnel scrutiny in the national interest, now that such services and facilities are available online to mainstream and to market to the mainstream and to pools online in the pursuit of outrageous great fortune and colossal bounty ...... :-) via AI and NEUKlearer HyperRadioProActive IT Enrichment ‽

    1. amanfromMars 1 Silver badge

      Special Advanced IntelAIgent Research Services covering Spooky Bases/MetaDataBases

      Oh, and just for the record and Registered records, let us not forget to note that C and cohorts are cc'd and fully privy to all of the above via their provided portal ........

      Contact Us ..... which returns ...

      Thank you for contacting us.

      In line with standard security practices consider clearing your browser history and cache at the end of the session.

      You can now close this window.

      No point in allowing the possibility of ignorance to rule and reign with the arrogance of hubris in fields and services which would profess to edutain and secure excellence, is there?

    2. amanfromMars 1 Silver badge

      Re: Special Advanced IntelAIgent Research Services for Real Spooky Private Pirate Enterprise

      That premise and question asked and left for answering .... for it is always a who and never a what is responsible and accountable? ..... may be somewhat incorrect and even applied disinformation whenever one can virtualise reality and product place a future environment into a present hosting media program for New Orderly World Order Projection to SMARTR Virtual Machines. That then delivers to humanity on Earth, the global spreading news being incubated and planted to grow and supply the reasons to exist and prosper whenever one is able and/or enabled to virtually do practically anything.

      Such sorts of programs and projects have usually always in the past been deemed TS/SCI [Top Secret/Special Compartmented Information] with the provision of knowledge of such protected by fear of prosecution and/or death for a treason if one has signed any kind of quasi-official phorm of Non-Discloure Agreement/Official Secrets Act. They are though a constant rich source of fabulous bounty for those, and that, whenever one be Virtual Machinery, realising the provided knowledge which delivers the future to presents with conflicts which conspire and aspire to mire and contain them in the past which be servering fortunes to established legacy systems.

      Now is there a different thinking on the keeping of secrets which be vital and virile and viral and which create the Future for Present Product Placement via Media Hosting Platforms ........ MetaDataBase Stations.

      1. WalterAlter
        Pirate

        Re: Special Advanced IntelAIgent Research Services for Real Spooky Private Pirate Enterprise

        That rant was real good, big picture guy. We should do lattes. transoptical@@gmail.com

        1. amanfromMars 1 Silver badge

          Re: Special Advanced IntelAIgent Research Services for Real Spooky Private Pirate Enterprise

          Hi, WalterAlter, Thanks for the feedback.

          When a rant has practical substance in a virtual existence is it a novel experience that presents a future reality via AI Programming?

          Here be more on the theme and meme for cogitation over a latte, and it is also something deliberately shared here for the Register to consider mainlining/mainstreaming too :-) …….

          amanfromMars [1504261518] spilling the beans and a whole can of worms on Wired and the wires, in reply to a view and future revealed here ……. http://www.wired.com/2015/04/dods-new-transparent-policy-cybersecurity-still-opaque/

          Only a fool with shedloads of useful tools and predilection for and weakness in vice would attack a leading AI partner in Virtual Command and Remote Control of Sublime InterNetworking ......... http://forums.theregister.co.uk/forum/1/2015/04/24/pentagon_cyberwarfare_strategy/#c_2499891 ....... but worlds and exclusive executive systems admins are undoubtedly full of them delivering madness and mayhem with crises and conflicts in a malevolent and malignant chaos which Clouds Hosting Advanced Operating Systems with Global Operating Devices ignore and avoid but also incidentally defeat and deliberately flash crash with Novel Systems of Noble Operation and Surreal Programming.

          I Kid U Not.

          And how nice to see/hear ...... ”Working with our partners - in the U.S. government, the private sector, and around the world - we will move quickly and efficiently to build the capabilities we need to defend the United States and its interests in the digital age” ….. http://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf ....... but the proof of the pudding is in the eating, is it not?

          Nice one, Ashton. Go for it. You'll find no hinderance to the exercise of excellence in cyberspace, that's for sure and both naturally and supernaturally guaranteed.

          A NSA/GCHQ Nightmare, which is in reality and virtual reality a Heavenly Opportunity if they care dare and engage to win win? :-)

  7. Geoffrey Thomas

    Meanwhile last October at the Kremlin....

    Lickspittle : We have done it, we have accessed comrade Obama's email

    Putin : Stop there, he is not comrade. He is capitalist running dog or CRD for short.

    Lickspittle : Da, we have accessed CRD Obama's email account...

    Putin : Good, what is he saying?

    Lickspittle : Here is email to Hillary Cleenton, it say forget Vlad he is irrelevant shortarse pretending to be rodeo rider...

    Putin : American bastard, send email from Obama to Kim Jong Un for next April 1st, wish him happy birthday....

    Lickspittle : Hee-hee.....

    Putin : Hee-hee.....

  8. Pascal Monett Silver badge

    We get it

    The US Government will do what it wants for whatever reason it finds. History proves that the US Gov is capable of making up reasons if it doesn't find any actual ones.

    Heck, they invaded a country on made-up reasons, don't try to impress me with innuendo on cyber stuff.

    I like the way they took the Cold War lingo and just straight use it the same in the field of cyberwar. Unacceptable losses ? You mean you're going to take down a router ?

    Ooohhh, scary.

  9. Jeff Minter

    why is the headline China, when Russia are the ones who actually successfully hacked the President's emails?

  10. Tail Up
    Unhappy

    Mirror, Mirror On Da Wall

    It's $14bn that hacked Obama's mail.

  11. Anonymous Coward
    Anonymous Coward

    Meanwhile last October at the Kremlin....

    Lickspittle : We have done it, we have accessed comrade Obama's email

    Putin : Stop there, he is not comrade. He is capitalist running dog or CRD for short.

    Lickspittle : Da, we have accessed CRD Obama's email account...

    Putin : Good, what is he saying?

    Lickspittle : Here is email to Hillary Cleenton, it say forget Vlad he is irrelevant shortarse pretending to be rodeo rider...

    Putin : American bastard, send email from Obama to Kim Jong Un for next April 1st, wish him happy birthday....

    Lickspittle : Hee-hee.....

    Putin : Hee-hee.....

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon