NATO Cyber Command Fully Operational In 2023

A new NATO military command centre to deter computer hackers should be fully staffed in 2023 and able to mount its own cyber-attacks but the alliance is still grappling with ground rules for doing so, a senior general said on Tuesday 16th Oct.

While NATO does not have its own cyber weapons, the US-led alliance established an operations centre on Aug. 31 at its military hub in Belgium. The United States, Britain, Estonia and other allies have since offered their cyber capabilities. 

“This is an emerging domain and the threat is growing,” said Major General Wolfgang Renner, a German air force commander who oversees the new cyber operations centre, or CYOC, in Mons. 

“We have to be prepared, to be able to execute operations in cyberspace. We have already gone beyond protection and prevention,” he told Reuters during a NATO cyber conference. 

NATO communication and computer networks face hundreds of significant hacking attempts every month, according to the NATO Communication and Information Agency, while experts say Russia, North Korea and China are constantly deploying sophisticated computer hacking weapons and surveillance software. 

Accusations by Western governments this month that Russia waged a global hacking campaign have raised the profile of NATO’s evolving strategy as allied governments look for a response. The European Union on Monday discussed its options, including a special economic sanctions regime to target cyber attackers. 

“Our ultimate aim is to be completely aware of our cyberspace, to understand minute-by-minute the state of our networks so that commanders can rely on them,” said Ian West, chief of cyber security at the NATO communication agency.

When fully operational, the cyber centre aims to coordinate NATO’s cyber deterrent through a 70-strong team of experts fed with military intelligence and real-time information about hackers ranging from Islamist militants to organised crime groups operating on behalf of hostile governments. 

Article 5 Debate

NATO has formally recognised cyberspace as a new frontier in defence, along with land, air and sea, meaning battles could henceforth be waged on computer networks. 

The centre could potentially use cyber weapons that can knock out enemy missiles or air defences, or destroy foes’ computer networks if commanders judge such a cyber-attack is less harmful to human life than a traditional offensive with live weaponry. 

That is now the subject of intense debate at NATO, with alliance commanders saying publicly that cyber will be an integral part of future warfare but allies unclear what would trigger NATO’s Article 5 (collective defence) clause. 

“Our concept of operations, a toolbox for short-notice decisions about how to respond, is not in place yet. This is one of the challenges we face,” Renner said. 

If NATO can agree cyber warfare principles, the alliance hopes to integrate individual nations’ cyber capabilities into alliance operations, coordinated through the Mons cyber operations centre and under the command of NATO’s top general, the Supreme Allied Commander Europe, or SACEUR. 

That could allow the top general to take quick decisions on whether to use cyber weapons, similar to existing agreements for NATO’s air defences and its ballistic missile shield, where a commander has only minutes to decide what action to take. 

“From my point of view, this is basically possible, but it has to be arranged,” Renner said.

Reuters:

You Might Also Read:

US Offers Its Cyber Secrets To NATO:

NATO & EU Form Cybersecurity Partnership

« Intel And Rolls-Royce To Develop Autonomous Cargo Ships
In Blockchain There’s No Checkmate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

Cyber Husky

Cyber Husky

Cyber Husky is an agile technology company that specializes in cloud solutions, cybersecurity, and managed IT services.