NATO Could Go To War In Response To A Cyber Attack

The North Atlantic Treaty Organisation would consider a large enough cyber attack against one member an attack on them all, according to NATO officials.

A persistent and devastating attack could trigger what is known as Article 5, NATO’s collective defense measure, the officials told delegates at the International Conference on Cyber Conflict (CyCon) in Estonia.

The invocation of Article 5 could theoretically cause the alliance to go to war in defense of a member state.
“Although many of the cyber-attacks that we see fall below a level in their seriousness that could trigger NATO’s Article 5, it is plausible that a cyber-space event of great magnitude could take place that might lead to the triggering of Article 5 in special circumstances,” said Catherine Lotrionte, director of Georgetown University’s CyberProject.

The attack would have to be much more dangerous than propaganda or social media activities, she added, but invoking Article 5 is still a “real possibility.”

Estonia fell victim to one of the most destructive cyber-attacks in modern history in 2007. The coordinated distributed denial of service, or “DDoS,” attacks caused massive outages in infrastructure, banks and military computer networks. Estonian officials blamed Russia for the attacks. The two countries were engaged in a disagreement over the relocation of a Soviet-era statue at the time. NATO created a new manual on how international laws apply to cyber warfare in response to the attacks.

NATO’s response today would be much more offensive, according to Brig. Gen. Christos Athanasiadis, the assistant chief of staff cyber at NATO’s Supreme Headquarters Allied Power Europe. He acknowledged that Article 5 could be invoked in the event of a cyber warfare against a member state.
“We would have rules of engagement. There would be a strong cyber or conventional response if what happened to Estonia were to take place now,” he said.  “We want to develop a strong early-warning capability. We must develop capacities that also serve as a deterrent to aggressors out there.”

Athanasiadis’ comments come at a time when policymakers in the West are attempting to both secure themselves in the cyber domain and update existing policies to address it. Russian cyber-attacks have been a chief concern in recent months, specifically regarding potential meddling in the US presidential election last year. That said, China, Iran and several non-state actors have also posed a cyber threat to NATO members in recent years.

Daily Caller:

You Might Also Read:

E-stonia: Antithesis of Russia:

Russia - NATO Cyber War Heats Up:

NATO’s role in the cyber domain is unclear:

 

« Putin Applauds Patriotic Russian Hackers
SMEs And Cyber Insurance »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Hypori

Hypori

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.

Bytium

Bytium

Bytium provides top-tier IT services and solutions designed to empower everyone, from individuals to global corporations. Specializing in cybersecurity and proactive IT management.

Operant Networks

Operant Networks

Operant Networks mission is to provide Operational Technology (OT) teams with solutions that simplify their increasingly complex worlds.