NATO Cyber Command Fully Operational In 2023

A new NATO military command centre to deter computer hackers should be fully staffed in 2023 and able to mount its own cyber-attacks but the alliance is still grappling with ground rules for doing so, a senior general said on Tuesday 16th Oct.

While NATO does not have its own cyber weapons, the US-led alliance established an operations centre on Aug. 31 at its military hub in Belgium. The United States, Britain, Estonia and other allies have since offered their cyber capabilities. 

“This is an emerging domain and the threat is growing,” said Major General Wolfgang Renner, a German air force commander who oversees the new cyber operations centre, or CYOC, in Mons. 

“We have to be prepared, to be able to execute operations in cyberspace. We have already gone beyond protection and prevention,” he told Reuters during a NATO cyber conference. 

NATO communication and computer networks face hundreds of significant hacking attempts every month, according to the NATO Communication and Information Agency, while experts say Russia, North Korea and China are constantly deploying sophisticated computer hacking weapons and surveillance software. 

Accusations by Western governments this month that Russia waged a global hacking campaign have raised the profile of NATO’s evolving strategy as allied governments look for a response. The European Union on Monday discussed its options, including a special economic sanctions regime to target cyber attackers. 

“Our ultimate aim is to be completely aware of our cyberspace, to understand minute-by-minute the state of our networks so that commanders can rely on them,” said Ian West, chief of cyber security at the NATO communication agency.

When fully operational, the cyber centre aims to coordinate NATO’s cyber deterrent through a 70-strong team of experts fed with military intelligence and real-time information about hackers ranging from Islamist militants to organised crime groups operating on behalf of hostile governments. 

Article 5 Debate

NATO has formally recognised cyberspace as a new frontier in defence, along with land, air and sea, meaning battles could henceforth be waged on computer networks. 

The centre could potentially use cyber weapons that can knock out enemy missiles or air defences, or destroy foes’ computer networks if commanders judge such a cyber-attack is less harmful to human life than a traditional offensive with live weaponry. 

That is now the subject of intense debate at NATO, with alliance commanders saying publicly that cyber will be an integral part of future warfare but allies unclear what would trigger NATO’s Article 5 (collective defence) clause. 

“Our concept of operations, a toolbox for short-notice decisions about how to respond, is not in place yet. This is one of the challenges we face,” Renner said. 

If NATO can agree cyber warfare principles, the alliance hopes to integrate individual nations’ cyber capabilities into alliance operations, coordinated through the Mons cyber operations centre and under the command of NATO’s top general, the Supreme Allied Commander Europe, or SACEUR. 

That could allow the top general to take quick decisions on whether to use cyber weapons, similar to existing agreements for NATO’s air defences and its ballistic missile shield, where a commander has only minutes to decide what action to take. 

“From my point of view, this is basically possible, but it has to be arranged,” Renner said.

Reuters:

You Might Also Read:

US Offers Its Cyber Secrets To NATO:

NATO & EU Form Cybersecurity Partnership

« Intel And Rolls-Royce To Develop Autonomous Cargo Ships
In Blockchain There’s No Checkmate »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Siscon

Siscon

Siscon delivers tailor-made compliance solutions that are based on the customer's specific wishes and reality and then supplement with many years of experience in the field.

Global Forum on Cyber Expertise (GFCE)

Global Forum on Cyber Expertise (GFCE)

GFCE is a global platform for countries, international organizations and private companies to exchange best practices and expertise on cyber capacity building.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Salvador Technologies

Salvador Technologies

Salvador Technologies provides the world’s fastest technology to recover from cyber-attacks.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.