NATO Could Go To War In Response To A Cyber Attack

The North Atlantic Treaty Organisation would consider a large enough cyber attack against one member an attack on them all, according to NATO officials.

A persistent and devastating attack could trigger what is known as Article 5, NATO’s collective defense measure, the officials told delegates at the International Conference on Cyber Conflict (CyCon) in Estonia.

The invocation of Article 5 could theoretically cause the alliance to go to war in defense of a member state.
“Although many of the cyber-attacks that we see fall below a level in their seriousness that could trigger NATO’s Article 5, it is plausible that a cyber-space event of great magnitude could take place that might lead to the triggering of Article 5 in special circumstances,” said Catherine Lotrionte, director of Georgetown University’s CyberProject.

The attack would have to be much more dangerous than propaganda or social media activities, she added, but invoking Article 5 is still a “real possibility.”

Estonia fell victim to one of the most destructive cyber-attacks in modern history in 2007. The coordinated distributed denial of service, or “DDoS,” attacks caused massive outages in infrastructure, banks and military computer networks. Estonian officials blamed Russia for the attacks. The two countries were engaged in a disagreement over the relocation of a Soviet-era statue at the time. NATO created a new manual on how international laws apply to cyber warfare in response to the attacks.

NATO’s response today would be much more offensive, according to Brig. Gen. Christos Athanasiadis, the assistant chief of staff cyber at NATO’s Supreme Headquarters Allied Power Europe. He acknowledged that Article 5 could be invoked in the event of a cyber warfare against a member state.
“We would have rules of engagement. There would be a strong cyber or conventional response if what happened to Estonia were to take place now,” he said.  “We want to develop a strong early-warning capability. We must develop capacities that also serve as a deterrent to aggressors out there.”

Athanasiadis’ comments come at a time when policymakers in the West are attempting to both secure themselves in the cyber domain and update existing policies to address it. Russian cyber-attacks have been a chief concern in recent months, specifically regarding potential meddling in the US presidential election last year. That said, China, Iran and several non-state actors have also posed a cyber threat to NATO members in recent years.

Daily Caller:

You Might Also Read:

E-stonia: Antithesis of Russia:

Russia - NATO Cyber War Heats Up:

NATO’s role in the cyber domain is unclear:

 

« Putin Applauds Patriotic Russian Hackers
SMEs And Cyber Insurance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

MACH37

MACH37

MACH37 is a market-centric cybersecurity accelerator program designed to facilitate the creation of the next generation of cybersecurity product companies.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.