UN Chief Urges Global Rules For Cyber Warfare

UN Secretary General Antonio Guterres (pictured) has called for global rules to minimise the impact of electronic warfare on civilians as massive cyber-attacks look likely to become the first salvoes in future wars.

Computer hackers, many of them believed to be state-sponsored groups, last year disrupted multinational firms, ports and public services on an unprecedented scale around the world, raising awareness of the issue. 

Recently, US Special Counsel Robert Mueller indicted 13 Russians and three Russian companies on charges of conducting a criminal and espionage conspiracy using social media to interfere in the 2016 US election. 

“Episodes of cyber warfare between states already exist. What is worse is that there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it,” Guterres said in a speech to his alma mater, the University of Lisbon. 

“I am absolutely convinced that, differently from the great battles of the past, which opened with a barrage of artillery or aerial bombardment, the next war will begin with a massive cyber-attack to destroy military capacity... and paralyse basic infrastructure such as the electric networks.” 

He offered the United Nations as a platform where various players from scientists to governments could meet and work out such rules “to guarantee a more humane character” of any conflict involving information technology and, more broadly, to keep the internet as “an instrument in the service of good”. 

Addressing professors and engineers after receiving the university’s honorary degree, Guterres urged them to contribute to the process, which had to run much faster than before. Traditional ways of working out such rules could take decades, too slow for the rapidly changing technology scene. 

A group of NATO allies said last year they were drawing up cyber warfare principles to guide their militaries on what justifies deploying cyber-attack weapons more broadly, aiming for agreement by early 2019. 

Some NATO allies believe shutting down an enemy power plant through a cyber-attack could be more effective than air strikes.

Ein News

You Might Also Read: 

NATO Cyberwar: Establishing Rules Of Engagement:

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks:

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles:


 

 

« AI Will Boost Cybercrime & Security Threats
Corporate Defence Plan Against Cyberattacks »

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

United Nations Office on Drugs & Crime (UNODC)

United Nations Office on Drugs & Crime (UNODC)

UNODC promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.