NATO Could Go To War In Response To A Cyber Attack

The North Atlantic Treaty Organisation would consider a large enough cyber attack against one member an attack on them all, according to NATO officials.

A persistent and devastating attack could trigger what is known as Article 5, NATO’s collective defense measure, the officials told delegates at the International Conference on Cyber Conflict (CyCon) in Estonia.

The invocation of Article 5 could theoretically cause the alliance to go to war in defense of a member state.
“Although many of the cyber-attacks that we see fall below a level in their seriousness that could trigger NATO’s Article 5, it is plausible that a cyber-space event of great magnitude could take place that might lead to the triggering of Article 5 in special circumstances,” said Catherine Lotrionte, director of Georgetown University’s CyberProject.

The attack would have to be much more dangerous than propaganda or social media activities, she added, but invoking Article 5 is still a “real possibility.”

Estonia fell victim to one of the most destructive cyber-attacks in modern history in 2007. The coordinated distributed denial of service, or “DDoS,” attacks caused massive outages in infrastructure, banks and military computer networks. Estonian officials blamed Russia for the attacks. The two countries were engaged in a disagreement over the relocation of a Soviet-era statue at the time. NATO created a new manual on how international laws apply to cyber warfare in response to the attacks.

NATO’s response today would be much more offensive, according to Brig. Gen. Christos Athanasiadis, the assistant chief of staff cyber at NATO’s Supreme Headquarters Allied Power Europe. He acknowledged that Article 5 could be invoked in the event of a cyber warfare against a member state.
“We would have rules of engagement. There would be a strong cyber or conventional response if what happened to Estonia were to take place now,” he said.  “We want to develop a strong early-warning capability. We must develop capacities that also serve as a deterrent to aggressors out there.”

Athanasiadis’ comments come at a time when policymakers in the West are attempting to both secure themselves in the cyber domain and update existing policies to address it. Russian cyber-attacks have been a chief concern in recent months, specifically regarding potential meddling in the US presidential election last year. That said, China, Iran and several non-state actors have also posed a cyber threat to NATO members in recent years.

Daily Caller:

You Might Also Read:

E-stonia: Antithesis of Russia:

Russia - NATO Cyber War Heats Up:

NATO’s role in the cyber domain is unclear:

 

« Putin Applauds Patriotic Russian Hackers
SMEs And Cyber Insurance »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Firebrand Training

Firebrand Training

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

KingsGuard Solutions

KingsGuard Solutions

KingsGuard Solutions is a San Diego Cybersecurity company that specializes in complex and innovative security solutions for companies throughout Southern California.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.