An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Tech, One Extreme to Another

Does anyone remember the floppy disk? How about Windows Me or COBOL?

Sheesh….

Gov’t report: Feds spend billions to run ancient technology

In a report to be released Wednesday, nonpartisan congressional investigators say the increasing cost of maintaining museum-ready equipment devours money better spent on modernization.

Despite a White House push to replace aging workhorse systems, the budget for modernization has fallen, and will be $7 billion less in 2017 than in 2010, said the Government Accountability Office. The report was provided to The Associated Press ahead of a House oversight committee hearing.

GAO said it found problems across the government, not just in a few agencies. Among those highlighted in the report:

The Defense Department’s Strategic Automated Command and Control System, which is used to send and receive emergency action messages to U.S. nuclear forces. The system is running on a 1970s IBM computing platform, and still uses 8-inch floppy disks to store data. “Replacement parts for the system are difficult to find because they are now obsolete,” GAO said. The Pentagon is initiating a full replacement and says the floppy disks should be gone by the end of next year. The entire upgrade will take longer.

Treasury’s individual and business master files, the authoritative data sources for taxpayer information. The systems are about 56 years old, and use an outdated computer language that is difficult to write and maintain. Treasury plans to replace the systems, but has no firm dates.

Social Security systems that are used to determine eligibility and estimate benefits, about 31 years old. Some use a programming language called COBOL, dating to the late 1950s and early 1960s. “Most of the employees who developed these systems are ready to retire and the agency will lose their collective knowledge,” the report said. “Training new employees to maintain the older systems takes a lot of time.” Social Security has no plans to replace the entire system, but is eliminating and upgrading older and costlier components. It is also rehiring retirees who know the technology.

Medicare’s Appeals System, which is only 11 years old, but facing challenges keeping up with a growing number of appeals, as well as questions from congressional offices following up on constituent concerns. The report says the agency has general plans to keep updating the system, depending on the availability of funds.

The Transportation Department’s Hazardous Materials Information System, used to track incidents and keep information relied on by regulators. The system is about 41 years old, and some of its software is no longer supported by vendors, which can create security risks. The department plans to complete its modernization program in 2018.

GAO estimates that the government spent at least $80 billion on information technology, or IT, in 2015. However, the total could be significantly higher. Not counted in the report are certain Pentagon systems, as well as those run by independent agencies, among them the CIA. Major systems are known as “IT investments” in government jargon. More here from WashingtonPost.

*****

Smarter than Google?

This new search engine could be way smarter than Google

Search engines that aren’t Google rarely have much that’s interesting to offer to the average consumer. But Omnity, a new search engine aimed at researchers — or even just students doing their homework — offers some glimmers of something new that make it worth taking notice.

Search, as we know it, is ripe for some sort of change, after all. Google is certainly working to bake search more fully into our cars, phones and other devices. Specialized search engines — for flights, places to stay, even .gifs — are going strong.  And then there are those AI bots being promised by Google, Facebook, Microsoft and others. What are they but high-powered, repackaged search engines?

Omnity stands out by offering results that best match for any given search term and also how those results relate to each other. So if you’re about to start a research project on a topic you know little about, you can quickly see who is getting cited the most, whose research is the most influential or which university is leading the pack on that subject. It draws from a number of data sets, including SEC filings, public news organization reports, scientific journals, financial reports and legal histories.

You can also drag and drop documents into the search engine to get an analysis of the “rare words” in it — Omnity obviously strips out the little words like “he,” “she,” “it” and “but,” yet also looks for words that are more unique to any given document to get a better idea of what it’s about. For example, I dragged in a legal filing from a case I’m researching for another article. Omnity turned up links to other cases that were relevant but not directly cited in the filing, as well as the names of some experts that I may now end up calling. More from WashingtonPost.

 

Obama Concession to Iran: Russian Arms?

Obama Admin Considers Permitting Advanced Russian Arms Sales to Iran

White House might not invoke laws triggering new sanctions
FreeBeacon: The Obama administration has the power to sanction key Russian arms sales to Iran, but has so far abstained from exercising this right under U.S. law, prompting some in Congress to question whether the administration is “acquiescing” to the arms sales in order to appease Iran, according to conversations with sources and recent congressional correspondence to the White House exclusively obtained by the Washington Free Beacon.

President Barack Obama has the authority under U.S. law to designate as illegal Russia’s contested sale to Iran of the S-300 missile system, an advanced long-range weapon that would boost the Islamic Republic’s regional military might.

However, the administration has declined for weeks to clarify its stance on new sanctions, despite expressing opposition to the sale. Administration officials have further declined to answer questions from the Free Beacon and other outlets about whether the president will consider taking action in the future.

The administration’s hesitance to act has prompted a new congressional inquiry, the Free Beacon has learned, and has sparked accusations that the White House is not exercising its sanction authority in order to prevent Iran from walking away from last summer’s nuclear deal.

Rep. Steve Chabot (R., Ohio) sent an inquiry to the White House about the matter more than a month ago. The White House has not responded.

“Given the series implications for the United States and our allies in the region, I respectfully request that you quickly determine that Russia’s transfer of S-300 surface-to-air missile systems advance Iran’s efforts to acquire ‘destabilizing numbers and types of advances conventional weapons’ and impose the necessary U.S. sanctions once the Russian delivery takes place,” Chabot wrote to the White House on April 7, according to a copy of the letter obtained by the Free Beacon.

Chabot outlined concern “that without such a determination the United States may be viewed as acquiescing to this transfer” of a major defensive weapons system to Iran.

Chabot told the Free Beacon on Thursday the administration has not responded to multiple inquiries about the potential designation.

“Despite multiple inquires to the U.S. Department of State, I still have not received a response on Russia’s S300 surface-to-air missile system transfer to Iran,” Chabot said. “This apparent dismissal leaves me wondering what exactly the Administration is hiding. I am really asking a simple question – is the introduction of a sophisticated weapon system into Iran, that has not been there previously, going to illicit the appropriate U.S. sanctions response? I am not sure why the Administration has found it so hard to come to a determination. The S300 is one of the most advanced anti-aircraft missile system’s in the world and significantly bolsters Iran’s offensive capabilities and stands as a serious hurdle to our efforts to prevent Iran from becoming a nuclear armed state. This is absolutely a destabilizing conventional weapon system.”

When contacted for comment, a State Department official told the Free Beacon that the administration has not made a final determination about whether the S-300 sale would trigger additional U.S. sanctions.

“We’re continuing to closely follow reports concerning the delivery of the S-300 defensive missile system from Russia to Iran‎,” the official said. “We have not made a determination as to whether this delivery, if and when complete, would trigger any actions under U.S. authorities.”

“These systems would significantly bolster Iran’s offensive capabilities and introduce new obstacles to our efforts to eliminate the threat of an Iranian nuclear weapon. I believe existing U.S. sanctions should be used to deter Russia from transferring this or other dangerous weapons systems to Iran,” Chabot said.

The sale is technically permitted under current United Nations resolutions governing weapons sales. However, the Obama administration has the right to veto the sale at the U.N. Security Council. The administration has not committed to doing so.

U.S. law also grants the president the right to designate such sales as illicit and therefore open to sanctions.

The Iran-Iraq Arms Nonproliferation Act of 1992 grants the president authority to sanction the sale of “advanced conventional weapons” to Iran by any nation.

“U.S. law provides your administration with the authority to apply U.S. sanctions in response” to the sale, Chabot explains in his letter. “For example, the Iran-Iraq Arms Nonproliferation Act and the Iran Sanctions Act provide authority for you to sanction individuals or countries that you determine are aiding Iran’s efforts to acquire or develop ‘destabilizing numbers and types of advanced conventional weapons.’”

Sanctions would kick in if the president decides that such a sale would destabilize the Middle East and shift regional balance.

“Iran’s acquisition of these systems would embolden Tehran to adopt a more threatening regional posture and to pursue offensive activities detrimental to regional stability in the belief that the systems would deter retaliation,” according to Chabot.

Reporters as well as lawmakers have attempted for weeks to get an answer from the administration about whether the president would make such a determination.

One foreign policy adviser who works closely with Congress on the Iran issue told the Free Beacon that the administration can no longer waffle on the issue.

“The administration tried to look the other way, but got called out for it by Congress. Then they spent a month and a half hoping that the whole thing would go away,” the source said. “Now I don’t know what they’re going to do, since it’s obvious that they’re letting Iran import advanced weapons in violation of U.S. law just to preserve the nuclear deal.”

Really, They are Working for Bernie’s Campaign?

Another Radical Islamist in the Sanders Camp

IPT: As Democratic Party leaders struggle to end their increasingly vitriolic presidential primary campaign, Vermont Sen. Bernie Sanders is winning concessions in hopes he’ll tone down the rhetoric.

Earlier this week, Sanders secured five seats on the party’s platform committee, with one immediately going to James Zogby, a staunch Palestinian advocate and critic of Israel.

Last month, we focused on Sanders’ reliance on Linda Sarsour as a campaign surrogate. Sarsour also is a Palestinian activist with a history of vitriolic anti-Israel statements. “Nothing is creepier than Zionism,” she wrote on Twitter about the idea that Jews can return to their ancestral homeland as a refuge from global anti-Semitism. To Sarsour, that ideal is racist.

Memorial Day weekend’s approach brings to mind another prominent Sanders supporter, Zahra Billoo, who has repeatedly expressed discomfort with the holiday. “Many of our troops are engaged in terrorism,” she wrote in June 2012.

Billoo heads the Council on American-Islamic Relations’ (CAIR) San Francisco office. CAIR has roots in a Hamas-support network created by the Muslim Brotherhood in American, internal documents and eyewitness accounts show.

Two weeks ago, Billoo made it clear her views about American troops have not changed, questioning the holiday’s value: “You think we should honor people who commit war crimes?” she asked an incredulous questioner. She “proudly stands by” her opinion, she also wrote.

Despite these extreme views, or perhaps because of them, Billoo appears to be playing a significant role in the Sanders campaign. Her social media accounts are filled with pro-Sanders messages – including repeated reminders about the registration deadline to be eligible for June 7 California primary. She was granted backstage access to a Sanders rally last week in San Jose where she was photographed with the candidate.

Billoo also has argued that American citizens who move to Israel and join the army are no different from those who join ISIS. “Is one genocidal group different than the other?” she asked last year.

Billoo’s extremism applies to domestic policy, too. She casts FBI counter-terror investigations as illegitimate and even corrupt. She blasted the conviction of five former officials from the Texas-based Holy Land Foundation after records showed they illegally routed millions of dollars to Hamas. And, in the wake of a Portland man’s arrest for plotting to blow up a Christmas tree lighting ceremony crowded with children, she suggested to a reporter that the FBI hyped the threat.

“The question is, are we looking to stop radicalization and stop extremism before it becomes a problem or do we want a sensational story?” Billoo asked. “And I’d really argue here that the FBI was looking for a sensational story.”

The suspect, Mohamed Mohamud, pleaded guilty and was sentenced to 30 years in prison. Among the evidence against him was a recording in which he said, “I want whoever is attending that event to be, to leave either dead or injured.”

Billoo’s opinions hold steady regardless of the facts. Maybe that’s why she’s comfortable being involved in campaign politics.


Zahra Billoo is at Sanders’ left, dressed in purple.

 

 

Fast and Furious Weapons and Mass Killings

Documents: Mexican Cartels Used Fast and Furious Guns For Mass Killings

TownHall: New documents obtained by the government watchdog Judicial Watch prove, again, that guns sold through the Obama Justice Department’s Fast and Furious Operation have been used by Mexican cartels for mass murder south of the border.

“According to the new records, over the past three years, a total of 94 Fast and Furious firearms have been recovered in Mexico City and 12 Mexican states, with the majority being seized in Sonora, Chihuahua and Sinaloa.  Of the weapons recovered, 82 were rifles and 12 were pistols identified as having been part of the Fast and Furious program.  Reports suggest the Fast and Furious guns are tied to at least 69 killings,” Judicial Watch reports. “The documents show 94 Fast and Furious firearms were seized, 20 were identified as being involved in ‘violent recoveries.’  The ‘violent recoveries’ involved several mass killings.”

The documents include locations, type of gun recovered and number of people killed:

June 30, 2014 — One 7.62mm rifle recovered in Tlatlaya, Estado de Mexico.  This is the reported date and location of a shootout in which 22 people were killed.

May 22, 2015 — Two 7.62mm rifles recovered from the site of a massive shootout in Rancho el Sol, Michoacán, that left one Mexican Federal Police officer and 42 suspected cartel members dead.

August 7, 2015 — One 7.62mm rifle was among five firearms reported as recovered from an abandoned stolen vehicle in which three dead shooting victims were found in Parral, Chihuahua.

January 29, 2013 — One 7.62mm rifle seized in Hostotipaquillo, Jalisco is reportedly related to the assassination of the town police chief, Luis Lucio Astorga and his bodyguard.

January 11, 2016 — One .50 caliber rifle seized from the Joaquin “Chapo” Guzman’s hideout in Los Mochis, Sinaloa, where he was (re)arrested.

Keep in mind these stats only relate to 94 Fast and Furious guns, most of them being AK-47s and .50 caliber rifles, that have been recovered. The Department of Justice, with help from ATF, trafficked more than 2500 of them right into the hands of violent Mexican cartels members. Fast and Furious guns are only recoverable and traceable when they are left at crime scenes, which doesn’t account for the number of times they were used in previous crimes.

Former Attorney General Eric Holder admitted during congressional testimony years ago that guns trafficked by the DOJ would be used to carry out violent crimes. In 2011, former House Oversight Committee Chairman Darrell Issa told reporters, citing Mexican Attorney General Marisela Morales, hundreds of Mexican citizens had been murdered as a result of the operation. Since then, a number of guns from the operation have been found at crime scenes in the U.S.

“These documents show President Obama’s legacy includes one of gunrunning and violence in Fast and Furious,” Judicial Watch President Tom Fitton said in a statement.  “As the production of documents from the ATF continues, we expect to see even further confirmation of Obama’s disgraced former Attorney General Eric Holder’s prediction that Fast and Furious guns will be used in crimes for years to come.”

Last month a federal judge struck down an executive privilege claim made by President Obama in June 2012 over thousands of Fast and Furious documents. Those documents show the lengths Holder and his closest aides at DOJ went to cover-up the Operation and the scandal that followed, which became public when Border Patrol Agent Brian Terry was murdered by Mexican bandits in December 2010. They were carrying guns from Operation Fast and Furious.

How the Military is Defeating Hackers

Here’s how the US military is beating hackers at their own game

US Soldiers IraqStaff Sgt. Stacy L. Pearsall/USAF

TechInsiders: There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.

But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.

It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.

“It’s like an operational domain: Sea, land, air, space, and cyber,” Charlie Stadtlander, chief spokesperson for US Army Cyber Command, told Tech Insider. “It’s a place where our presence exists. Cyber is a normal part of military operations and needs to be considered as such.”

As US military leaders warn of the growing progress of Russia, China, and North Korea in cyberspace, the Pentagon has ramped up its own efforts in what it calls the “cyber domain” after the release of a new cyber strategy in April 2015.

“This ephemeral space that’s all around us, literally, is a space where operations can be performed against us,” Frank Pound, a program manager who leads DARPA’s “Plan X” cyber warfare platform, told Tech Insider. “And how do we defend against that? How do we detect that?”

Building a cyber army

In its cyber strategy, the military proposed 133 teams for its “cyber mission force” by 2018, 27 of which were directed to support combat missions by “generating integrated cyberspace effects in support of … operations.” (Effects is a common military term used for artillery and aircraft targeting, and soldiers proclaim “good effect on target” to communicate a direct hit).

The cyber mission force will comprise some 4,300 personnel. But only about 1,600 of those would be on a “combat mission team” that would likely be considered to be taking an offensive hacking role. They are up against China’s own “specialized military network warfare forces,” North Korea’s secretive Bureau 121 hacker unit, other nation-states, hacktivists like Anonymous, and criminal enterprises alike.

They have been further tasked with breaking into the networks of adversaries like ISIS, disrupting communications channels, stopping improvised explosive devices from being triggered through cellphones, or even, as one Marine general put it, just “trying to get inside the enemy’s [head].”

Online hacks can lead to offline outcomes, and the military has become keenly aware of that power. In 2009, the US and Israel reportedly infected Iranian computers with the Stuxnet malware that destroyed roughly one-fifth of the country’s nuclear centrifuges. And as recently as February, hackers were used against ISIS as others fought on the ground, quite possibly for the first time ever.

“These are strikes that are conducted in the war zone using cyber essentially as a weapon of war,” Defense Secretary Ash Carter told NPR. “Just like we drop bombs, we’re dropping cyber bombs.”

As one Army officer said during a 2015 training exercise, the cyber war seems to just be getting started: “Future fights aren’t going to be guns and bullets. They’re going to be ones and zeroes.”

soldiers cyber commandBrian Rodan/US ArmySoldiers work together during a training exercise in 2011.

‘Prepping the battlefield’

That the Pentagon would employ specialists to defend itself in cyberspace is not surprising, since government and military systems are attacked regularly by nations trying to read soldier’s email, or others who want to uncover personal details on millions who undergo background checks for security clearances.

But the defense of networks — while still an important function — has been supplanted in some cases by an offensive strategy. That is, soldiers hacking into computers overseas for intelligence or to disrupt the enemy on the battlefield — a kind of digital tit-for-tat.

“If there’s something that you can do to prep the battlefield before a kinetic attack or to disrupt defenses during kinetic attacks, why wouldn’t a combatant commander turn to that?” Stadtlander said.

Stadtlander couldn’t talk about ongoing operations that Army Cyber Command is involved in, mainly due to the unique nature of cyber warfare. An enemy who knows the US is developing a next-generation fighter jet might develop something in response that could take years, but with a cyberattack, a fix can be developed sometimes within days.

“The unique thing about cyber activity and defense is you’re talking about building a couple thousand lines of code or having a certain electronic device, or some sort of cyber capability. And just based on the nature of this space, a lot of times it can only be used once,” he said. “Once it’s known … it’s no longer a viable tool.”

Still, some insight into what the US military is capable of can be found within its own training manuals, presentations, and the few news stories by the military’s own writers. And it’s likely that hackers with Army Cyber Command, subordinate to US Cyber Command and NSA, benefit from top secret initiatives to infect “millions” of computers with malware in an effort aimed at “owning the net.”

“Denying the ability to coordinate, communicate, and assess,” Stadtlander said. “That’s an advantage that we might be able to leverage.”

Inside the Army’s cyber warfare ‘Bible’

Perhaps one of the most important publications on cyber warfare was released with little fanfare in Feb. 2014. Known as Army Field Manual 3-38 Cyber Electromagnetic Activities, it proclaimed itself as the “first doctrinal field manual of its kind,” unifying a number of other publications on network operations, electronic warfare, and intelligence into one 96-page document.

In FM 3-38, the Army defined offensive cyberspace operations as actions “intended to project power by the application of force in or through cyberspace,” while noting they are to be carried out in support of command objectives and within legal frameworks.

But what can soldiers do in cyberspace that can affect what happens on the battlefield? Quite a bit, according to the manual.

us army cyber soldierUS Army

“A cyberspace attack may be employed in conjunction with” other methods of attack “to deceive, degrade, destroy, and disrupt a specific enemy integrated air defense system or enemy safe haven,” it says.

As an example, the manual offers an early warning radar site as a target which, if soldiers can get inside the network, could possibly be destroyed or degraded.

That’s just what students trained for during an exercise in March, according to the Fort Gordon Globe. Acting just as they would on the battlefield, cyber soldiers patrolled to their objective — a simulated enemy air defense control system — then searched for their target’s wireless network so it could be exploited or neutralized.

There’s little need for stealth coating on aircraft when a guy behind a computer can disable the radar site for you. The manual also offers other systems Army hackers may consider breaking into, such as enemy telephone networks, servers, and smartphones.

“Even if you think about the way that IEDs are triggered,” Stadtlander said, using the acronym for improvised explosive devices. “Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”

Getting into the Army’s ‘hacker university’

Located just southwest of Augusta, Georgia is Fort Gordon, an Army installation that brings together most of the service’s cyber warriors under one roof. In 2013, the Army chose the site as the home base of its Cyber Command after the unit was established in 2010.

Also home to a 604,000 square foot operations center for the National Security Agency, Gordon is where cyber warriors are taught their craft at what the Army calls its Cyber Center of Excellence. But before they get to the military’s “hacker university,” enlisted soldiers need to score high technical scores on the military entrance exam, and sign on for five years of service, instead of the normal four-year tour.

army cyber commandUS ArmyInsider Fort Gordon’s Cyber Operations Center.

Due to the classified nature of their work, cyber training is often conducted in secure compartmented information facilities (SCIFs) where cell phones and other outside recording devices are not allowed, and all soldiers will have to obtain a Top Secret clearance prior to being assigned to their unit.

Soldiers go through a lengthy period of training after basic training: Six months spent at the Navy’s Center for Information Dominance in Pensacola, Florida followed by six months at Fort Gordon.

Army officers go through their own training program at the Georgia base, called Cyber Basic Officer Leader Course. The course takes nearly nine months to complete and is the longest officer training program in the Army.

Enlisted soldiers train with members of all military branches over six months at the Navy’s Cyber Analysis Course, according to Bloomberg. Since students can come from a variety of skill sets and backgrounds, the first two-thirds of classroom time focuses on basic programming, mathematics, and how networks and operating systems function. But later on they learn the steps to research and infiltrate targets, defend networks, and even hack a simulated network with Metasploit, a common tool hackers have used since its release in 2004.

Meanwhile, officers receive similar training, though their position merits other coursework in leading operations as opposed to carrying them out. Though a cyber officer can likely step in and be more than capable, given the certifications they obtain, to include Cisco’s Certified Network Associate (CCNA) and the independent Certified Information Systems Security Professional (CISSP) credential.

“They are really valuably trained after that [schooling],” Stadtlander said.

So valuable in fact that the Army is seeing a challenge in retaining its talent from heavyweights in Silicon Valley.

Is hacking considered an ‘act of war’?

Chinese Army Hackersvia Flickr

“There is no international standing or framework that is binding over any one nation-state in terms of offensive cyber operations,” Bradley P. Moss, a national security lawyer, told Tech Insider. “It’s whatever rules we put in place for ourselves.”

In essence, the US, China, Russia, and others are operating in a sort-of “digital Wild West” with few overarching guidelines outside of the Law of War that predates our interconnected world.

Cyber warfare continues unabated because there is no governing body such as the United Nations telling nations not to hack one another. Not that that would necessarily make a difference, as a 2014 UN report criticized mass surveillance programs employed by NSA and others as violating privacy rights “guaranteed by multiple treaties and conventions,” The Intercept reported.

Still, Moss explained that nations are less concerned with the legalities of hacking each other, and instead, worry about the potential diplomatic and political fallout should they be exposed.

“More or less, we all engage in some manner of warfare these days, we just don’t go to ‘war’ over it,” Moss said.

How foreign nations would likely respond to being hacked by the US is something that is considered before any offensive operation, according to a top secret presidential policy directive leaked by ex-NSA contractor Edward Snowden.

The document, made public in 2013, listed cyber attacks resulting in “loss of life, significant responsive actions against the United States, significant damage to property, serious adverse US foreign policy consequences, or serious economic impact” as requiring presidential approval.

And for US military hackers who may be on a battlefield in Iraq, Syria, or elsewhere, their self-imposed rules for cyber attacks are clear:

“Military attacks will be directed only at military targets,” reads the Pentagon’s cyberspace operations document.

us army cyber commandUS Army

But what of cyber attacks that have potentially devastating effects on foreign nations, such as US-made worms that cause nuclear centrifuges to fall apart, or alleged Russian-made malware that knocks out power and heat to people in the dead of winter?

Are these “acts of war”?

“From a strictly legal matter, you could designate the US Army hacking the Russian Army’s [computer] system as an act of war,” Moss said. “Just as much as if we were to have infiltrated and damaged a Russian bomber, that would be an act of war.”

But, he added: “There’s nothing that necessarily stops us, except the political and diplomatic ramifications.”