NATO Cyber Command Fully Operational In 2023

A new NATO military command centre to deter computer hackers should be fully staffed in 2023 and able to mount its own cyber-attacks but the alliance is still grappling with ground rules for doing so, a senior general said on Tuesday 16th Oct.

While NATO does not have its own cyber weapons, the US-led alliance established an operations centre on Aug. 31 at its military hub in Belgium. The United States, Britain, Estonia and other allies have since offered their cyber capabilities. 

“This is an emerging domain and the threat is growing,” said Major General Wolfgang Renner, a German air force commander who oversees the new cyber operations centre, or CYOC, in Mons. 

“We have to be prepared, to be able to execute operations in cyberspace. We have already gone beyond protection and prevention,” he told Reuters during a NATO cyber conference. 

NATO communication and computer networks face hundreds of significant hacking attempts every month, according to the NATO Communication and Information Agency, while experts say Russia, North Korea and China are constantly deploying sophisticated computer hacking weapons and surveillance software. 

Accusations by Western governments this month that Russia waged a global hacking campaign have raised the profile of NATO’s evolving strategy as allied governments look for a response. The European Union on Monday discussed its options, including a special economic sanctions regime to target cyber attackers. 

“Our ultimate aim is to be completely aware of our cyberspace, to understand minute-by-minute the state of our networks so that commanders can rely on them,” said Ian West, chief of cyber security at the NATO communication agency.

When fully operational, the cyber centre aims to coordinate NATO’s cyber deterrent through a 70-strong team of experts fed with military intelligence and real-time information about hackers ranging from Islamist militants to organised crime groups operating on behalf of hostile governments. 

Article 5 Debate

NATO has formally recognised cyberspace as a new frontier in defence, along with land, air and sea, meaning battles could henceforth be waged on computer networks. 

The centre could potentially use cyber weapons that can knock out enemy missiles or air defences, or destroy foes’ computer networks if commanders judge such a cyber-attack is less harmful to human life than a traditional offensive with live weaponry. 

That is now the subject of intense debate at NATO, with alliance commanders saying publicly that cyber will be an integral part of future warfare but allies unclear what would trigger NATO’s Article 5 (collective defence) clause. 

“Our concept of operations, a toolbox for short-notice decisions about how to respond, is not in place yet. This is one of the challenges we face,” Renner said. 

If NATO can agree cyber warfare principles, the alliance hopes to integrate individual nations’ cyber capabilities into alliance operations, coordinated through the Mons cyber operations centre and under the command of NATO’s top general, the Supreme Allied Commander Europe, or SACEUR. 

That could allow the top general to take quick decisions on whether to use cyber weapons, similar to existing agreements for NATO’s air defences and its ballistic missile shield, where a commander has only minutes to decide what action to take. 

“From my point of view, this is basically possible, but it has to be arranged,” Renner said.

Reuters:

You Might Also Read:

US Offers Its Cyber Secrets To NATO:

NATO & EU Form Cybersecurity Partnership

« Intel And Rolls-Royce To Develop Autonomous Cargo Ships
In Blockchain There’s No Checkmate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

Global Cyber Risk (GCR)

Global Cyber Risk (GCR)

Global Cyber Risk is a technology and advisory services firm that provides first tier cybersecurity services to both large corporations and small and mid-sized businesses.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.