UN Chief Urges Global Rules For Cyber Warfare

UN Secretary General Antonio Guterres (pictured) has called for global rules to minimise the impact of electronic warfare on civilians as massive cyber-attacks look likely to become the first salvoes in future wars.

Computer hackers, many of them believed to be state-sponsored groups, last year disrupted multinational firms, ports and public services on an unprecedented scale around the world, raising awareness of the issue. 

Recently, US Special Counsel Robert Mueller indicted 13 Russians and three Russian companies on charges of conducting a criminal and espionage conspiracy using social media to interfere in the 2016 US election. 

“Episodes of cyber warfare between states already exist. What is worse is that there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it,” Guterres said in a speech to his alma mater, the University of Lisbon. 

“I am absolutely convinced that, differently from the great battles of the past, which opened with a barrage of artillery or aerial bombardment, the next war will begin with a massive cyber-attack to destroy military capacity... and paralyse basic infrastructure such as the electric networks.” 

He offered the United Nations as a platform where various players from scientists to governments could meet and work out such rules “to guarantee a more humane character” of any conflict involving information technology and, more broadly, to keep the internet as “an instrument in the service of good”. 

Addressing professors and engineers after receiving the university’s honorary degree, Guterres urged them to contribute to the process, which had to run much faster than before. Traditional ways of working out such rules could take decades, too slow for the rapidly changing technology scene. 

A group of NATO allies said last year they were drawing up cyber warfare principles to guide their militaries on what justifies deploying cyber-attack weapons more broadly, aiming for agreement by early 2019. 

Some NATO allies believe shutting down an enemy power plant through a cyber-attack could be more effective than air strikes.

Ein News

You Might Also Read: 

NATO Cyberwar: Establishing Rules Of Engagement:

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks:

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles:


 

 

« AI Will Boost Cybercrime & Security Threats
Corporate Defence Plan Against Cyberattacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

SecuLetter

SecuLetter

SecuLetter is able to detect unknown attacks with hybrid approaches, static and dynamic analysis.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.