A Cyber Attack On NATO Could Trigger Article 5

Few nations have sophisticated cyber capabilities and for operational security reasons, they are closely guarded, rarely shared, and carefully used.

The US Senate Intelligence Committee Chair Mark Warner warned Russian President  that waging a cyber attack against a NATO country could risk embroiling Moscow in a war against multiple Western governments, including the United States. 

In 2019 NATO Secretary General Jens Stoltenberg said all 29 member countries would respond to a serious cyber-attack on one of them.

Recently a NATO official told Reuters that a cyber attack could be considered an armed attack and trigger "Article 5," it was a significant moment. How significant is harder to judge. "Article 5" is NATO's holy grail, the core of what NATO is about. It is part of the Washington Treaty, signed in 1949, that set up the North Atlantic Treaty Organisation, which started with 12 members and now has 30.

Article 5 states, "The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all."

Mircea Geoană, Deputy Secretary General of NATO, says that when the alliance decided that cyber should be considered an “operational domain,” the bloc also made the call that a “massive cyber attack” on one member state could trigger Article 5 of NATO’s Washington Treaty. This strikes at the heart of the alliance’s defense clause, which states that an attack on one country is considered an attack on all allies.

So, for instance an attack on Poland is effectively the same as an attack on the United States, a powerful deterrent to a potential aggressor, but of course life is never that simple.

For decades it seemed simpler, as an armed attack would be obvious and NATO nations would respond with tanks, artillery, and warplanes. Now, in our new world, nations can be undermined through information warfare and infrastructure crippled by cyber attacks, often difficult to trace.

How NATO should respond to such attacks created much debate, first on the principles of whether a cyber attack could be considered an "armed attack," and secondly if it is, what to do about it.

So, if for instance Poland was attacked with tanks, individual nations are not obliged to respond with military force. Article 5 is powerful but how nations individually respond, with a lot or a little, is still up to them. Nevertheless, a conventional military attack on a NATO nation would get a massive response. Deterrence has worked.

But when we move into the grey zone of "hybrid warfare" that response is harder to predict.

This is one of the aims of Russian strategy towards NATO, to achieve its goals while operating below the threshold that will trigger Article 5. On cyber, those waters will be even muddier given how deniable activity is within cyberspace. In 2014, NATO's leaders made cyber defence a core part of collective defence but policy and activities to implement that decision are still evolving. To that end, for instance, it has a technical agreement with the European Union and a NATO Industry Cyber Partnership. At SHAPE, NATO's military headquarters, there is also a Cyberspace Operations Centre.

Currently, NATO is far more focused on defensive cyber, to secure its systems from attack, and the nature of that is a point of debate.

Some commentators say that passive cyber defence, where you simply build up your virtual walls, leaves the initiative with your adversary, enabling him to probe without consequence until he finds your weak point. Effective defence means also going after the attacker and forcing him onto the back foot, so-called offensive cyber. That is also what would be needed if NATO's responding to an Article 5 breach.

 NATO as an institution does not possess significant cyber capabilities. When it comes to activities, NATO is a command and control organisation using hardware and personnel loaned by members.

Few nations have sophisticated cyber capabilities and for operational security reasons, they are closely guarded, rarely shared, and carefully used. That means if a cyber attack did trigger NATO Article 5, then the actual use of cyber weapons would be outsourced to nations for use on behalf of the Alliance in a coordinated manner. However, as the NATO source told Reuters, a response does not have to be symmetrical, and could theoretically escalate to include a military one.

Persuading 30 nations to agree on this will be hard, and a further possibility is if NATO cannot agree there could be a so-called "coalition of the willing" operating separately. NATO has previously agreed cyber attacks could trigger Article 5, and that itself was a major decision and something of a deterrent to hostile actors. But the reality of having to act on it is now closer than ever before.

Reuters:      BBC:      Cyber Security Dive:     Daily Mail:       C-Span:      GZero

You Might Also Read: 

NATO & Ukraine Agree Deeper Cyber Co-operation:

 

« Making Sense Of The Edge
Twitter Joins Ukraine’s War Effort »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Verlingue

Verlingue

Verlingue (formerly ICB Group) is a leading corporate insurance broker providing Insurance, Risk Management and related advice to businesses and private clients.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

Careerjet

Careerjet

Careerjet is a leading online job search engine with a large presence worldwide, sourcing millions of job ads from thousands of websites from all over the world in areas including Cybersecurity.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Interos

Interos

Interos is the operational resilience company — reinventing how companies manage their supply chains and business relationships — through a breakthrough AI SaaS platform.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.