Cyberwar Plan New Focus on Deterrence
2011 7/15/2011 http://www.wsj.com/articles/SB10001424052702304521304576446191468181966
The military must move from defending against major cyberattacks to deterring assaults by letting enemies know the U.S. is willing to retaliate with its own virtual weapons or real military force, a top general said Thursday. The Pentagon's new strategy for threats from computer hackers primarily deals with enhancing defense of its computer systems and those of its military contractors. But Marine Gen. James Cartwright, vice chairman of the Joint Chiefs of Staff, said that policy is just a start....
If the U.S. were attacked in a way that justified a response under the laws of armed conflict... responses could begin with diplomatic efforts, then escalate to "kinetic" attack, with real-world weapons, Gen. Cartwright said...Deputy Secretary of Defense William Lynn said the laws of armed conflict apply in cyberspace, implying that the U.S., in some cases, reserves the right to use real bullets and real bombs to retaliate for virtual attacks. The Wall Street Journal reported the military's conclusion in May.
“world’s largest national research hub”
NSA targeted China's Tsinghua University in extensive hacking attacks
2013 22 June, 2013 UPDATED 13 August, 2013, http://www.scmp.com/news/china/article/1266892/exclusive-nsa-targeted-ch...
The university is home to one of the mainland’s six major backbone networks, the China Education and Research Network (CERNET) from where internet data from millions of Chinese citizens could be mined. The network was the country’s first internet backbone network and has evolved into the world’s largest national research hub.