An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Hillary’s People Bracing For Impact

For months and months we have been hearing snippets of the Hillary Clinton server/email saga. We cant begin to put it all in chronological order yet much less can we know all the players involved. We do know there are countless investigations and the most recent State Department Inspector General report is the most damning of all summaries so far. Curiously, Hillary and some in her inner circle refused to be interviewed or cooperate with the IG.

Furthermore, there are more testimonies yet to be recorded where Judicial Watch has been granted judge’s authority to move forward with key Hillary people as the judge is experienced with the Hillary email matter, going back to 1998 Filegate.

   

So, personally, I would like to see some questioned posed to Hillary and her entire team and they include:

  1. If Hillary did not send or receive classified material in her only email address and server, since she never had a dot gov email address, then exactly where did she received or interact on classified material? As noted by this particular email, she asked that items be printed out and delivered to her in hardcopy.
  2. So, we have hardcopies, okay then, well, where is that paper and did she shred the hardcopies? Remember in the case of David Petraeus, he had a hardcopy bound note book, a personal journal that Paula Broadwell got access to.
  3. Two part question: So, now we know that Hillary did not have any password protected mobile device. Did anyone tell her to apply password protections to her Blackberry, iPad or iPhone? When Hillary was asked if she wiped the server and her response was you mean with a cloth? I stood alone responding she does not know how any of this works. Appears to now be quite accurate and further, did not one person in her inner circle teach her the fundamentals?
  4. Did Hillary ever get any briefings in a classified setting like a SCIF? Hillary has never mentioned using a SCIF much less has there been reference to having access to a SCIF in any emails that have been published.
  5. Has anyone asked Hillary or her team if she had other email addresses outside of those listed on her server like at any time like Lavabit or Silent Circle or even Reagan dot com, not that the last one she would even consider? Hillary was using a Blackberry going back to when she was a senator, and Lavabit was the encrypted service of choice at the time.
  6. Barack Obama issued an Executive Order #13526 which further tightened regulations of classified material and interaction of classified material, did Hillary and her team bother to take this seriously and if so how? Did they make the mandated adjustments in this regard?
  7. Did Hillary or any on her team sign a separation document upon leaving the State Department? The answer is not that anyone can find. So, what is the procedure on that with regard further turning over all government material and correspondence?
  8. A top Hillary aid said he wanted to avoid FOIA (Freedom of Information Act Requests) and this is curious as he would likely not care unless it was an edict put out by Hillary herself? So, is this a criminal act in and of itself?

So, Judicial Watch is still busy interviewing the Hillary team. The testimony of Ambassador Lukens is here. Cheryl Mills along with her attorney Beth Wilkinson filed a recent motion to block the public release of the video tape of her testimony with Judicial Watch.

There is still the matter of the investigation of the Bill, Hillary and Chelsea Foundation. My buddy Charles Ortel has given up all other matters to take the deep dive and continue the investigation. He has uncovered some remarkable facts that are beyond dispute. On May 19, 2016, I interviewed Charles. He gave a chilling summary of facts to date.

Really, They are Working for Bernie’s Campaign?

Another Radical Islamist in the Sanders Camp

IPT: As Democratic Party leaders struggle to end their increasingly vitriolic presidential primary campaign, Vermont Sen. Bernie Sanders is winning concessions in hopes he’ll tone down the rhetoric.

Earlier this week, Sanders secured five seats on the party’s platform committee, with one immediately going to James Zogby, a staunch Palestinian advocate and critic of Israel.

Last month, we focused on Sanders’ reliance on Linda Sarsour as a campaign surrogate. Sarsour also is a Palestinian activist with a history of vitriolic anti-Israel statements. “Nothing is creepier than Zionism,” she wrote on Twitter about the idea that Jews can return to their ancestral homeland as a refuge from global anti-Semitism. To Sarsour, that ideal is racist.

Memorial Day weekend’s approach brings to mind another prominent Sanders supporter, Zahra Billoo, who has repeatedly expressed discomfort with the holiday. “Many of our troops are engaged in terrorism,” she wrote in June 2012.

Billoo heads the Council on American-Islamic Relations’ (CAIR) San Francisco office. CAIR has roots in a Hamas-support network created by the Muslim Brotherhood in American, internal documents and eyewitness accounts show.

Two weeks ago, Billoo made it clear her views about American troops have not changed, questioning the holiday’s value: “You think we should honor people who commit war crimes?” she asked an incredulous questioner. She “proudly stands by” her opinion, she also wrote.

Despite these extreme views, or perhaps because of them, Billoo appears to be playing a significant role in the Sanders campaign. Her social media accounts are filled with pro-Sanders messages – including repeated reminders about the registration deadline to be eligible for June 7 California primary. She was granted backstage access to a Sanders rally last week in San Jose where she was photographed with the candidate.

Billoo also has argued that American citizens who move to Israel and join the army are no different from those who join ISIS. “Is one genocidal group different than the other?” she asked last year.

Billoo’s extremism applies to domestic policy, too. She casts FBI counter-terror investigations as illegitimate and even corrupt. She blasted the conviction of five former officials from the Texas-based Holy Land Foundation after records showed they illegally routed millions of dollars to Hamas. And, in the wake of a Portland man’s arrest for plotting to blow up a Christmas tree lighting ceremony crowded with children, she suggested to a reporter that the FBI hyped the threat.

“The question is, are we looking to stop radicalization and stop extremism before it becomes a problem or do we want a sensational story?” Billoo asked. “And I’d really argue here that the FBI was looking for a sensational story.”

The suspect, Mohamed Mohamud, pleaded guilty and was sentenced to 30 years in prison. Among the evidence against him was a recording in which he said, “I want whoever is attending that event to be, to leave either dead or injured.”

Billoo’s opinions hold steady regardless of the facts. Maybe that’s why she’s comfortable being involved in campaign politics.


Zahra Billoo is at Sanders’ left, dressed in purple.

 

 

Fast and Furious Weapons and Mass Killings

Documents: Mexican Cartels Used Fast and Furious Guns For Mass Killings

TownHall: New documents obtained by the government watchdog Judicial Watch prove, again, that guns sold through the Obama Justice Department’s Fast and Furious Operation have been used by Mexican cartels for mass murder south of the border.

“According to the new records, over the past three years, a total of 94 Fast and Furious firearms have been recovered in Mexico City and 12 Mexican states, with the majority being seized in Sonora, Chihuahua and Sinaloa.  Of the weapons recovered, 82 were rifles and 12 were pistols identified as having been part of the Fast and Furious program.  Reports suggest the Fast and Furious guns are tied to at least 69 killings,” Judicial Watch reports. “The documents show 94 Fast and Furious firearms were seized, 20 were identified as being involved in ‘violent recoveries.’  The ‘violent recoveries’ involved several mass killings.”

The documents include locations, type of gun recovered and number of people killed:

June 30, 2014 — One 7.62mm rifle recovered in Tlatlaya, Estado de Mexico.  This is the reported date and location of a shootout in which 22 people were killed.

May 22, 2015 — Two 7.62mm rifles recovered from the site of a massive shootout in Rancho el Sol, Michoacán, that left one Mexican Federal Police officer and 42 suspected cartel members dead.

August 7, 2015 — One 7.62mm rifle was among five firearms reported as recovered from an abandoned stolen vehicle in which three dead shooting victims were found in Parral, Chihuahua.

January 29, 2013 — One 7.62mm rifle seized in Hostotipaquillo, Jalisco is reportedly related to the assassination of the town police chief, Luis Lucio Astorga and his bodyguard.

January 11, 2016 — One .50 caliber rifle seized from the Joaquin “Chapo” Guzman’s hideout in Los Mochis, Sinaloa, where he was (re)arrested.

Keep in mind these stats only relate to 94 Fast and Furious guns, most of them being AK-47s and .50 caliber rifles, that have been recovered. The Department of Justice, with help from ATF, trafficked more than 2500 of them right into the hands of violent Mexican cartels members. Fast and Furious guns are only recoverable and traceable when they are left at crime scenes, which doesn’t account for the number of times they were used in previous crimes.

Former Attorney General Eric Holder admitted during congressional testimony years ago that guns trafficked by the DOJ would be used to carry out violent crimes. In 2011, former House Oversight Committee Chairman Darrell Issa told reporters, citing Mexican Attorney General Marisela Morales, hundreds of Mexican citizens had been murdered as a result of the operation. Since then, a number of guns from the operation have been found at crime scenes in the U.S.

“These documents show President Obama’s legacy includes one of gunrunning and violence in Fast and Furious,” Judicial Watch President Tom Fitton said in a statement.  “As the production of documents from the ATF continues, we expect to see even further confirmation of Obama’s disgraced former Attorney General Eric Holder’s prediction that Fast and Furious guns will be used in crimes for years to come.”

Last month a federal judge struck down an executive privilege claim made by President Obama in June 2012 over thousands of Fast and Furious documents. Those documents show the lengths Holder and his closest aides at DOJ went to cover-up the Operation and the scandal that followed, which became public when Border Patrol Agent Brian Terry was murdered by Mexican bandits in December 2010. They were carrying guns from Operation Fast and Furious.

Warning: Europe Terrorist Explosive Stockpiles

Terrorists likely stockpiling explosives in EU, says Europol

The threat of terrorists attacks in the EU remains the top national security concern among member states, with some 211 foiled plots last year alone, according to a top EU security official.

The threat of another attack similar in scale to the Paris attack in November last year or in Brussels this past March has national authorities on edge. Manuel Navarrete Paniagua, the head of the European Counter Terrorism Centre at the EU police agency Europol, told euro-deputies on Monday (23 May) that terrorist cells in the EU were likely stockpiling explosives for later use.

“We have some information reported by the member states that terrorists groups are trying to establish large clandestine stockpiles of explosives in the European Union to be used eventually in large scale home attacks,” he said.

Related: EU Terrorism Situation and Trend Report

Paniagua was briefing MEPs in the civil liberties committee on the yet-to-be published EU Terrorism Situation & Trend Report (TE-SAT) compiled by Europol and member states.

The report is set for publication in a few weeks’ time.

Paniagua cited figures and broader conclusions due in the report, noting that “jihadist terrorism” remains the top threat to security in the European Union.

The latest attacks in the EU suggest much better coordination among the terrorists than previously thought. He said their combined use of explosives and firearms was also a novelty and a threat that is evolving rapidly.

Authorities have yet to nail down any single profile of a home-grown terrorist or foreign fighter.

But he said many have petty criminal backgrounds. He pointed out a significant proportion of foreign fighters have also been diagnosed with mental problems.

More than 4,000 so-called foreign fighters have been identified in the EU and entered into a Europol database.

“Using the terrorist financial tracking programme, we provided last year more than 2,700 leads regarding foreign terrorist fighters to the member states,” he said.

Some 1,057 people were also arrested last year on terrorism-related offences, he said.

He said there are also unconfirmed reports that some jihadist militants have set up training camps in the Western Balkans and some EU states.

Terrorists and migration flows

Other concerns related to terrorists exploiting the migration flows from Turkey and elsewhere to enter the European Union.

“We found no evidence of the systematic of using this flow to infiltrate terrorists into the European Union. But they do, they use it, we have some cases, some of the people that perpetrated the Paris attacks were eventually disguised in this immigration flow,” he said.

Paniagua said migrants were being victimised twice as result. First they flee terrorists and then again when the same attempt to infiltrate the EU by hiding among the refugees, he said.

“Again, we have no indication that this systematic,” he said.

Earlier this month, Europol announced it would deploy some 200 counter-terrorist and other investigators to migrant arrival centres known as hotspots in Italy and Greece.

Related: Implementing the European Agenda on Security:
EU action plan against illicit trafficking in and use of firearms and explosives.

Of those, Europol said it would dispatch around 50 “at key points on the external border of the EU” to track down and help identify suspected criminals and terrorists.

A European Commission report earlier this month noted that Turkey is suspected to have around 1,300 Turkish citizens fighting alongside Islamic militant groups in Syria and Iraq.

It noted that the plan to lift visa restrictions on Turkish nationals “could potentially have an impact on the terrorist risk in the EU”.

*****

For the United States, the Warning from DHS in 2011

(U//FOUO) DHS Warning: Terrorists Making Explosives With Commercial Products

Terrorist Acquisition of Commercial Products for Improvised Explosive Device Production(U//FOUO) Recent plots and attacks in the Homeland and overseas demonstrate a continuing terrorist focus on acquiring commercially available materials and components that can be used in constructing improvised explosive devices (IEDs). Heightened public and state and local official awareness, as well as tightened legal controls, have made it more difficult to purchase certain products that contain explosive precursors in bulk quantities or concentrated forms. Operatives are now more likely to use surreptitious, though legal, methods—such as multiple purchases in smaller quantities—to acquire sufficient amounts to create explosives.

— (U) On 27 July 2011, investigators found precursor chemicals and other IED components, including smokeless powder, clocks, batteries, wires, and other items commonly used to make IEDs in the hotel room of a US Army soldier who allegedly sought to target military personnel.
— (U) The admitted perpetrator of the 22 July 2011 attacks in Oslo, Norway avoided law enforcement suspicion by acquiring through legal means the ammonium nitrate, aluminum powder, nitromethane, and blenders he used in constructing IEDs.

(U//FOUO) Commercial products containing precursor materials may include:
— (U//FOUO) Fertilizer and first aid cold packs (ammonium nitrate).
— (U//FOUO) Swimming pool chemicals (calcium hypochlorite/hydrogen peroxide).
— (U//FOUO) Some types of water filtration/treatment systems (potassium permanganate).
— (U//FOUO) Beauty supply products (hydrogen peroxide and acetone).
— (U//FOUO) Industrial cleaning supplies (hydrochloric acid or sulfuric acid).

(U) Potential Indicators of suspicious purchases: Most commercial products suitable for constructing IEDs serve legitimate purposes. Consequently, it is often difficult to identify purchases or other activities that may be associated with terrorist intent to create explosives. No single indicator is likely to divulge suspicious purchases, but, depending on specific circumstances, a combination of the behaviors listed below may warrant reporting and investigation:

— (U) Attempts to purchase all available stock or materials in bulk, especially by individuals with no previous history of bulk purchases.
— (U) Payment or insistence on payment in cash for bulk purchases, or using a credit card in another person’s name.
— (U) Insistence on in-store pickup instead of store delivery of bulk purchase.
— (U) Use of rented or out-of-state vehicle to transport bulk purchases.
— (U) Smaller purchases of the same products at different locations within a short period of time.
— (U) Displays of nervous or suspicious behavior and evasive or vague responses to questions about intended use of products.

(U//FOUO) For additional information, please see DHS-FBI Joint Homeland Security Assessment “(U//FOUO) Use of Common Precursor Chemicals to Make Homemade Explosives,” 10 August 2010; and Roll Call Release “(U//FOUO) Indicators of Suspicious Acquisition of Beauty Supply Products,” 26 February 2010.

How the Military is Defeating Hackers

Here’s how the US military is beating hackers at their own game

US Soldiers IraqStaff Sgt. Stacy L. Pearsall/USAF

TechInsiders: There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.

But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.

It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.

“It’s like an operational domain: Sea, land, air, space, and cyber,” Charlie Stadtlander, chief spokesperson for US Army Cyber Command, told Tech Insider. “It’s a place where our presence exists. Cyber is a normal part of military operations and needs to be considered as such.”

As US military leaders warn of the growing progress of Russia, China, and North Korea in cyberspace, the Pentagon has ramped up its own efforts in what it calls the “cyber domain” after the release of a new cyber strategy in April 2015.

“This ephemeral space that’s all around us, literally, is a space where operations can be performed against us,” Frank Pound, a program manager who leads DARPA’s “Plan X” cyber warfare platform, told Tech Insider. “And how do we defend against that? How do we detect that?”

Building a cyber army

In its cyber strategy, the military proposed 133 teams for its “cyber mission force” by 2018, 27 of which were directed to support combat missions by “generating integrated cyberspace effects in support of … operations.” (Effects is a common military term used for artillery and aircraft targeting, and soldiers proclaim “good effect on target” to communicate a direct hit).

The cyber mission force will comprise some 4,300 personnel. But only about 1,600 of those would be on a “combat mission team” that would likely be considered to be taking an offensive hacking role. They are up against China’s own “specialized military network warfare forces,” North Korea’s secretive Bureau 121 hacker unit, other nation-states, hacktivists like Anonymous, and criminal enterprises alike.

They have been further tasked with breaking into the networks of adversaries like ISIS, disrupting communications channels, stopping improvised explosive devices from being triggered through cellphones, or even, as one Marine general put it, just “trying to get inside the enemy’s [head].”

Online hacks can lead to offline outcomes, and the military has become keenly aware of that power. In 2009, the US and Israel reportedly infected Iranian computers with the Stuxnet malware that destroyed roughly one-fifth of the country’s nuclear centrifuges. And as recently as February, hackers were used against ISIS as others fought on the ground, quite possibly for the first time ever.

“These are strikes that are conducted in the war zone using cyber essentially as a weapon of war,” Defense Secretary Ash Carter told NPR. “Just like we drop bombs, we’re dropping cyber bombs.”

As one Army officer said during a 2015 training exercise, the cyber war seems to just be getting started: “Future fights aren’t going to be guns and bullets. They’re going to be ones and zeroes.”

soldiers cyber commandBrian Rodan/US ArmySoldiers work together during a training exercise in 2011.

‘Prepping the battlefield’

That the Pentagon would employ specialists to defend itself in cyberspace is not surprising, since government and military systems are attacked regularly by nations trying to read soldier’s email, or others who want to uncover personal details on millions who undergo background checks for security clearances.

But the defense of networks — while still an important function — has been supplanted in some cases by an offensive strategy. That is, soldiers hacking into computers overseas for intelligence or to disrupt the enemy on the battlefield — a kind of digital tit-for-tat.

“If there’s something that you can do to prep the battlefield before a kinetic attack or to disrupt defenses during kinetic attacks, why wouldn’t a combatant commander turn to that?” Stadtlander said.

Stadtlander couldn’t talk about ongoing operations that Army Cyber Command is involved in, mainly due to the unique nature of cyber warfare. An enemy who knows the US is developing a next-generation fighter jet might develop something in response that could take years, but with a cyberattack, a fix can be developed sometimes within days.

“The unique thing about cyber activity and defense is you’re talking about building a couple thousand lines of code or having a certain electronic device, or some sort of cyber capability. And just based on the nature of this space, a lot of times it can only be used once,” he said. “Once it’s known … it’s no longer a viable tool.”

Still, some insight into what the US military is capable of can be found within its own training manuals, presentations, and the few news stories by the military’s own writers. And it’s likely that hackers with Army Cyber Command, subordinate to US Cyber Command and NSA, benefit from top secret initiatives to infect “millions” of computers with malware in an effort aimed at “owning the net.”

“Denying the ability to coordinate, communicate, and assess,” Stadtlander said. “That’s an advantage that we might be able to leverage.”

Inside the Army’s cyber warfare ‘Bible’

Perhaps one of the most important publications on cyber warfare was released with little fanfare in Feb. 2014. Known as Army Field Manual 3-38 Cyber Electromagnetic Activities, it proclaimed itself as the “first doctrinal field manual of its kind,” unifying a number of other publications on network operations, electronic warfare, and intelligence into one 96-page document.

In FM 3-38, the Army defined offensive cyberspace operations as actions “intended to project power by the application of force in or through cyberspace,” while noting they are to be carried out in support of command objectives and within legal frameworks.

But what can soldiers do in cyberspace that can affect what happens on the battlefield? Quite a bit, according to the manual.

us army cyber soldierUS Army

“A cyberspace attack may be employed in conjunction with” other methods of attack “to deceive, degrade, destroy, and disrupt a specific enemy integrated air defense system or enemy safe haven,” it says.

As an example, the manual offers an early warning radar site as a target which, if soldiers can get inside the network, could possibly be destroyed or degraded.

That’s just what students trained for during an exercise in March, according to the Fort Gordon Globe. Acting just as they would on the battlefield, cyber soldiers patrolled to their objective — a simulated enemy air defense control system — then searched for their target’s wireless network so it could be exploited or neutralized.

There’s little need for stealth coating on aircraft when a guy behind a computer can disable the radar site for you. The manual also offers other systems Army hackers may consider breaking into, such as enemy telephone networks, servers, and smartphones.

“Even if you think about the way that IEDs are triggered,” Stadtlander said, using the acronym for improvised explosive devices. “Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”

Getting into the Army’s ‘hacker university’

Located just southwest of Augusta, Georgia is Fort Gordon, an Army installation that brings together most of the service’s cyber warriors under one roof. In 2013, the Army chose the site as the home base of its Cyber Command after the unit was established in 2010.

Also home to a 604,000 square foot operations center for the National Security Agency, Gordon is where cyber warriors are taught their craft at what the Army calls its Cyber Center of Excellence. But before they get to the military’s “hacker university,” enlisted soldiers need to score high technical scores on the military entrance exam, and sign on for five years of service, instead of the normal four-year tour.

army cyber commandUS ArmyInsider Fort Gordon’s Cyber Operations Center.

Due to the classified nature of their work, cyber training is often conducted in secure compartmented information facilities (SCIFs) where cell phones and other outside recording devices are not allowed, and all soldiers will have to obtain a Top Secret clearance prior to being assigned to their unit.

Soldiers go through a lengthy period of training after basic training: Six months spent at the Navy’s Center for Information Dominance in Pensacola, Florida followed by six months at Fort Gordon.

Army officers go through their own training program at the Georgia base, called Cyber Basic Officer Leader Course. The course takes nearly nine months to complete and is the longest officer training program in the Army.

Enlisted soldiers train with members of all military branches over six months at the Navy’s Cyber Analysis Course, according to Bloomberg. Since students can come from a variety of skill sets and backgrounds, the first two-thirds of classroom time focuses on basic programming, mathematics, and how networks and operating systems function. But later on they learn the steps to research and infiltrate targets, defend networks, and even hack a simulated network with Metasploit, a common tool hackers have used since its release in 2004.

Meanwhile, officers receive similar training, though their position merits other coursework in leading operations as opposed to carrying them out. Though a cyber officer can likely step in and be more than capable, given the certifications they obtain, to include Cisco’s Certified Network Associate (CCNA) and the independent Certified Information Systems Security Professional (CISSP) credential.

“They are really valuably trained after that [schooling],” Stadtlander said.

So valuable in fact that the Army is seeing a challenge in retaining its talent from heavyweights in Silicon Valley.

Is hacking considered an ‘act of war’?

Chinese Army Hackersvia Flickr

“There is no international standing or framework that is binding over any one nation-state in terms of offensive cyber operations,” Bradley P. Moss, a national security lawyer, told Tech Insider. “It’s whatever rules we put in place for ourselves.”

In essence, the US, China, Russia, and others are operating in a sort-of “digital Wild West” with few overarching guidelines outside of the Law of War that predates our interconnected world.

Cyber warfare continues unabated because there is no governing body such as the United Nations telling nations not to hack one another. Not that that would necessarily make a difference, as a 2014 UN report criticized mass surveillance programs employed by NSA and others as violating privacy rights “guaranteed by multiple treaties and conventions,” The Intercept reported.

Still, Moss explained that nations are less concerned with the legalities of hacking each other, and instead, worry about the potential diplomatic and political fallout should they be exposed.

“More or less, we all engage in some manner of warfare these days, we just don’t go to ‘war’ over it,” Moss said.

How foreign nations would likely respond to being hacked by the US is something that is considered before any offensive operation, according to a top secret presidential policy directive leaked by ex-NSA contractor Edward Snowden.

The document, made public in 2013, listed cyber attacks resulting in “loss of life, significant responsive actions against the United States, significant damage to property, serious adverse US foreign policy consequences, or serious economic impact” as requiring presidential approval.

And for US military hackers who may be on a battlefield in Iraq, Syria, or elsewhere, their self-imposed rules for cyber attacks are clear:

“Military attacks will be directed only at military targets,” reads the Pentagon’s cyberspace operations document.

us army cyber commandUS Army

But what of cyber attacks that have potentially devastating effects on foreign nations, such as US-made worms that cause nuclear centrifuges to fall apart, or alleged Russian-made malware that knocks out power and heat to people in the dead of winter?

Are these “acts of war”?

“From a strictly legal matter, you could designate the US Army hacking the Russian Army’s [computer] system as an act of war,” Moss said. “Just as much as if we were to have infiltrated and damaged a Russian bomber, that would be an act of war.”

But, he added: “There’s nothing that necessarily stops us, except the political and diplomatic ramifications.”