Think tank in Estonia ponders war in cyberspace
During a cyberattack, the traditional rules of warfare don't quite fit
IDG News Service - When one nation launches a missile at another, it's easy to pinpoint the aggressor. But during a cyberattack, the aggressor may not be so identifiable, and the traditional rules of warfare don't quite fit.
As nations increasingly develop their cyber offenses and defenses, an international think tank in Estonia is researching a range of legal questions and concepts around clashes in cyberspace.
One of those questions is how to label these skirmishes and whether it's appropriate to call them "cyberwarfare" or "cyberconflict," said Rain Ottis, a scientist with the Cooperative Cyber Defense Center of Excellence (CCDCOE) in Tallinn, Estonia.
The CCDCOE was launched in May 2008 to help NATO countries deal with ever-growing cyberthreats by focusing on defense tactics, training, protection of critical national infrastructure, and policy and legal issues.
Although several nations have experienced significant cyberattacks, "we don't have a single good instance of real cyberwarfare," Ottis said. He believes that warfare occurs between states.
"We are trying to come up with a way to explain this in a more formal way so not everything by default is cyberwarfare," Ottis said. "Personally, I don't want to devalue the word war."
How to define a cyberincident is one of the topics on the agenda for the CCDCOE's 2010 Conference on Cyber Conflict in June, which will include a new legal and policy track.
CCDCOE researchers are also part of a working group studying the laws of armed conflict to see how cyberattacks should be interpreted. The laws of war, encompassed in international treaties -- some of which are more than 100 years old -- deal with issues such as when a nation can go to war and what is considered legal when at war, Ottis said.
It's brand-new legal territory, but one with which nations will soon have to deal. "When the first cyberwar kicks off, mostly likely in conjunction with a physical war, all of these questions will come up in a hurry," Ottis said.
The working group will eventually write a manual for how cyberconflict fits into the existing laws of war.
The CCDCOE is also looking into how Cold War-era concepts such as deterrence fit into cyberspace. Deterrence -- which is based on meeting aggression with greater aggression -- doesn't quite apply, said Kenneth Geers, a civilian with the U.S. Navy's Naval Criminal Investigative Services who is assigned to the CCDCOE.
Geers presented a paper last October in Moscow on deterrence in cyberspace. One of the problems with deterrence is attribution, or identifying the enemy.
"It's really easy to hide in cyberspace," Geers said. "You need much more than computer log files to know what happened."
The basic building blocks of deterrence are capability, communication and credibility. There's also the question of whether a physical response such as bombing is appropriate.
"You have to be able to get back at the aggressor, and in cyberspace, there's no guarantee of that," Geers said. "You may not know who is attacking you, and to get back at them, you have to hack back or do a kinetic response."
It is hard to deter an aggressor who can invest a small amount and cause the target one-hundred-fold damage, Geers said.
Geers is also writing a paper exploring how the 1997 Chemical Weapons Convention could be used as an arms control model for cyberspace, exploring concepts such as prohibitions and inspections. Again, cyberspace poses vexing questions.
"There's just not a way, given the fact there are gigs of data on something the size of a stick of gum, that you can possibly verify that no malicious code exists anywhere," Geers said.
- After Google-China dust-up, cyberwar emerges as a threat
- Targeted attacks test enterprise security controls
- Is the U.S. the nation most vulnerable to cyberattack?
- In cyberwar, who's in charge?
- Schmidt: Private sector key to stopping Google-style attacks
- Threat of cyberattacks from overseas high, federal IT execs say
- Estonia readies for the next cyberattack
- Think tank in Estonia ponders war in cyberspace
- Botnets 'the Swiss Army knife of attack tools'
- 'Cyber War' author: U.S. needs radical changes to protect against attacks
- Special report: Web giants attacked
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Why Projects Fail
- CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings
- This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools
- The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution
- In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence... All Government IT White Papers
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts