http://d.yimg.com/a/p/rids/20100324/...7nEwQnj_Xr7Q--AP - When ******* a continent away attack a military computer system, using computers belonging to unsuspecting private citizens or businesses as cover, what are the rules when the U.S. fights back?
Source