UN Chief Urges Global Rules For Cyber Warfare

UN Secretary General Antonio Guterres (pictured) has called for global rules to minimise the impact of electronic warfare on civilians as massive cyber-attacks look likely to become the first salvoes in future wars.

Computer hackers, many of them believed to be state-sponsored groups, last year disrupted multinational firms, ports and public services on an unprecedented scale around the world, raising awareness of the issue. 

Recently, US Special Counsel Robert Mueller indicted 13 Russians and three Russian companies on charges of conducting a criminal and espionage conspiracy using social media to interfere in the 2016 US election. 

“Episodes of cyber warfare between states already exist. What is worse is that there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it,” Guterres said in a speech to his alma mater, the University of Lisbon. 

“I am absolutely convinced that, differently from the great battles of the past, which opened with a barrage of artillery or aerial bombardment, the next war will begin with a massive cyber-attack to destroy military capacity... and paralyse basic infrastructure such as the electric networks.” 

He offered the United Nations as a platform where various players from scientists to governments could meet and work out such rules “to guarantee a more humane character” of any conflict involving information technology and, more broadly, to keep the internet as “an instrument in the service of good”. 

Addressing professors and engineers after receiving the university’s honorary degree, Guterres urged them to contribute to the process, which had to run much faster than before. Traditional ways of working out such rules could take decades, too slow for the rapidly changing technology scene. 

A group of NATO allies said last year they were drawing up cyber warfare principles to guide their militaries on what justifies deploying cyber-attack weapons more broadly, aiming for agreement by early 2019. 

Some NATO allies believe shutting down an enemy power plant through a cyber-attack could be more effective than air strikes.

Ein News

You Might Also Read: 

NATO Cyberwar: Establishing Rules Of Engagement:

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks:

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles:


 

 

« AI Will Boost Cybercrime & Security Threats
Corporate Defence Plan Against Cyberattacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Omerta

Omerta

Omerta is a global security technology and services company. We advise, consult, design, build, mitigate, protect, manage, provide and train to protect from increasing cyber threats.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.