Think tank in Estonia ponders war in cyberspace
During a cyberattack, the traditional rules of warfare don't quite fit
IDG News Service - When one nation launches a missile at another, it's easy to pinpoint the aggressor. But during a cyberattack, the aggressor may not be so identifiable, and the traditional rules of warfare don't quite fit.
As nations increasingly develop their cyber offenses and defenses, an international think tank in Estonia is researching a range of legal questions and concepts around clashes in cyberspace.
One of those questions is how to label these skirmishes and whether it's appropriate to call them "cyberwarfare" or "cyberconflict," said Rain Ottis, a scientist with the Cooperative Cyber Defense Center of Excellence (CCDCOE) in Tallinn, Estonia.
The CCDCOE was launched in May 2008 to help NATO countries deal with ever-growing cyberthreats by focusing on defense tactics, training, protection of critical national infrastructure, and policy and legal issues.
Although several nations have experienced significant cyberattacks, "we don't have a single good instance of real cyberwarfare," Ottis said. He believes that warfare occurs between states.
"We are trying to come up with a way to explain this in a more formal way so not everything by default is cyberwarfare," Ottis said. "Personally, I don't want to devalue the word war."
How to define a cyberincident is one of the topics on the agenda for the CCDCOE's 2010 Conference on Cyber Conflict in June, which will include a new legal and policy track.
CCDCOE researchers are also part of a working group studying the laws of armed conflict to see how cyberattacks should be interpreted. The laws of war, encompassed in international treaties -- some of which are more than 100 years old -- deal with issues such as when a nation can go to war and what is considered legal when at war, Ottis said.
It's brand-new legal territory, but one with which nations will soon have to deal. "When the first cyberwar kicks off, mostly likely in conjunction with a physical war, all of these questions will come up in a hurry," Ottis said.
The working group will eventually write a manual for how cyberconflict fits into the existing laws of war.
The CCDCOE is also looking into how Cold War-era concepts such as deterrence fit into cyberspace. Deterrence -- which is based on meeting aggression with greater aggression -- doesn't quite apply, said Kenneth Geers, a civilian with the U.S. Navy's Naval Criminal Investigative Services who is assigned to the CCDCOE.
Geers presented a paper last October in Moscow on deterrence in cyberspace. One of the problems with deterrence is attribution, or identifying the enemy.
"It's really easy to hide in cyberspace," Geers said. "You need much more than computer log files to know what happened."
The basic building blocks of deterrence are capability, communication and credibility. There's also the question of whether a physical response such as bombing is appropriate.
"You have to be able to get back at the aggressor, and in cyberspace, there's no guarantee of that," Geers said. "You may not know who is attacking you, and to get back at them, you have to hack back or do a kinetic response."
It is hard to deter an aggressor who can invest a small amount and cause the target one-hundred-fold damage, Geers said.
Geers is also writing a paper exploring how the 1997 Chemical Weapons Convention could be used as an arms control model for cyberspace, exploring concepts such as prohibitions and inspections. Again, cyberspace poses vexing questions.
"There's just not a way, given the fact there are gigs of data on something the size of a stick of gum, that you can possibly verify that no malicious code exists anywhere," Geers said.
- After Google-China dust-up, cyberwar emerges as a threat
- Targeted attacks test enterprise security controls
- Is the U.S. the nation most vulnerable to cyberattack?
- In cyberwar, who's in charge?
- Schmidt: Private sector key to stopping Google-style attacks
- Threat of cyberattacks from overseas high, federal IT execs say
- Estonia readies for the next cyberattack
- Think tank in Estonia ponders war in cyberspace
- Botnets 'the Swiss Army knife of attack tools'
- 'Cyber War' author: U.S. needs radical changes to protect against attacks
- Special report: Web giants attacked
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Agility & Scalability for Oracle EBS R12 and RAC on VMware vSphere 5
- This white paper outlines extensive performance and scalability testing of Oracle EBS applications on a Vblock™ Systems with vSphere 5.
- Oracle and VCE: The Next Step in Integrated Computing Platforms
- In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and...
- Migrate Oracle Apps from RISC/UNIX to Virtualized x86
- Ready to move Oracle to a virtualized environment? This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment...
- Step Out of the Bull's-Eye
- Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts