NATO Could Go To War In Response To A Cyber Attack

The North Atlantic Treaty Organisation would consider a large enough cyber attack against one member an attack on them all, according to NATO officials.

A persistent and devastating attack could trigger what is known as Article 5, NATO’s collective defense measure, the officials told delegates at the International Conference on Cyber Conflict (CyCon) in Estonia.

The invocation of Article 5 could theoretically cause the alliance to go to war in defense of a member state.
“Although many of the cyber-attacks that we see fall below a level in their seriousness that could trigger NATO’s Article 5, it is plausible that a cyber-space event of great magnitude could take place that might lead to the triggering of Article 5 in special circumstances,” said Catherine Lotrionte, director of Georgetown University’s CyberProject.

The attack would have to be much more dangerous than propaganda or social media activities, she added, but invoking Article 5 is still a “real possibility.”

Estonia fell victim to one of the most destructive cyber-attacks in modern history in 2007. The coordinated distributed denial of service, or “DDoS,” attacks caused massive outages in infrastructure, banks and military computer networks. Estonian officials blamed Russia for the attacks. The two countries were engaged in a disagreement over the relocation of a Soviet-era statue at the time. NATO created a new manual on how international laws apply to cyber warfare in response to the attacks.

NATO’s response today would be much more offensive, according to Brig. Gen. Christos Athanasiadis, the assistant chief of staff cyber at NATO’s Supreme Headquarters Allied Power Europe. He acknowledged that Article 5 could be invoked in the event of a cyber warfare against a member state.
“We would have rules of engagement. There would be a strong cyber or conventional response if what happened to Estonia were to take place now,” he said.  “We want to develop a strong early-warning capability. We must develop capacities that also serve as a deterrent to aggressors out there.”

Athanasiadis’ comments come at a time when policymakers in the West are attempting to both secure themselves in the cyber domain and update existing policies to address it. Russian cyber-attacks have been a chief concern in recent months, specifically regarding potential meddling in the US presidential election last year. That said, China, Iran and several non-state actors have also posed a cyber threat to NATO members in recent years.

Daily Caller:

You Might Also Read:

E-stonia: Antithesis of Russia:

Russia - NATO Cyber War Heats Up:

NATO’s role in the cyber domain is unclear:

 

« Putin Applauds Patriotic Russian Hackers
SMEs And Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.