Cyber Warfare Needs Rules Of Engagement

'I think all of us would agree that cyber space is the new battle space'

OpenWorld Former intelligence leaders have called for international terms of engagement in cyber warfare and greater collaboration between the public and private sectors to defend critical infrastructure.

The comments came at a security-focused keynote at this year's Oracle OpenWorld conference in San Francisco, where, instead of the usual parade of enthusiastic customers, co-CEO Mark Hurd took to the stage with three former spies.

John Scarlett, who led the UK's MI6 between 2004 and 2009, said that when it came to cyber-attacks, there was “no sense of the rules of the game” and no international or legal structure. 

This lack of terms of engagement was central to the reemergence of the great tension and rivalry between different actors, he told the audience today.

However, he conceded that it is “hard to see how they [rules of engagement] can be developed and agreed on,” and questionable whether any state would trust the various sides to implement them honestly.

“We have to get our brains thinking differently,” Scarlett said, arguing that the old way of thinking about attacks and defense didn’t translate into cyber threats.

The long-expected Cyber Pearl Harbor

His comments came in response to Hurd’s opening question, which asked what a “9/11 cyber-attack” would look like, a term that the Brit spy said that he was “wary” of using.

Similarly, former head of US homeland security Jeh Johnson said that the term was “rather provocative”, while pointing out that it could sometimes take years to assess the full impact of a cyber-attack.

That said, he did suggest that the impact that Russian interference in the 2016 US elections had on democracy could be as significant as the terrorist attacks in New York.

Johnson said that the open, free society in the US, and the access to it via the Internet, was both the nation’s greatest strength and a major vulnerability.

“I think all of us would agree that cyber space is the new battle space,” he said, adding that the best form of defense in this respect was a good offense, and that this should be a national and international priority for both governments and industry.

“We need to do a better job of public-private partnerships on defense of cyber space and our critical infrastructure,” he said.

Meanwhile, Michael Hayden, who has led both the National Security Agency and the Central Intelligence Agency, said that the answers will not be obvious, and that the rapid pace of technological development can lead to changing definitions on what constitutes security.

For instance, Hayden said that he had come down on the side of Apple in the battle between it and the feds seeking to break the encryption on the San Bernadino killer’s iPhone.

This was not on privacy grounds, or on commercial grounds, he said, but “on a broader definition of security”. Law enforcement’s requests were legitimate, he said, but “the costs of conceding exception access outweighed the benefits” in this case.

Flexibility and Possible Fixes

Hayden emphasised that this wasn’t about setting one hard and fast rule, as different factors might warrant a different decision; rather he urged a discussion of the balance of privacy, security, freedom and liberty.

Oracle has spent its annual gabfest touting the security credentials of its autonomous database and “second-generation” cloud infrastructure, and the decision to bring the three former intelligence bosses on stage also comes as it is eyeing up the Pentagon’s $10bn JEDI cloud contract.

And so it could hardly miss the opportunity to give its technology a plug, no matter how painfully orchestrated it was to have Big Red’s chief corporate architect Edward Screven sitting alongside the former spies, ready to big-up his firm’s new tech.

The session ended with the more cynical members of the audience rolling their eyes as Screven opined that there was “no such thing as a civilian” in cyber warfare now, all IT professionals are on the “cyber battlefield”, but, with the technology Oracle has developed, “we can be much more effective at defending that threat”. 

The Register:

You Might Also Read:

Why Has The US Not Been Hit With A Devastating Cyber Attack?

« Australia And NZ Announce Joint Pacific Cyber Cooperation
Stuxnet 2.0 - Iran Says Israel Has Launched New Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

StepStone

StepStone

StepStone is one of the leading online job platforms in Germany, and other countries, covering all industry sectors including IT and cybersecurity.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.