Nations, companies should prepare for cyberwar, experts say

Most governments don't have policies in place to deal with large-scale attacks, say cybersecurity experts

The world hasn't yet seen examples of true cyberwar, although governments around the world need to prepare for it, an expert in cybersecurity law from Estonia said Monday.

Many people have called the 2007 attacks on Estonian banks, media outlets and government ministries an early example of cyberwar, but using a legal definition, they were not, said Eneken Tikk, head of the legal and policy branch of the Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia. She defined cyberwar as an attack that would cause the same type of destruction as the traditional military, with military force as an appropriate response.

"That means a smoking hole in the ground," said Tikk, speaking at cybersecurity vendor ArcSight's Protect '10 conference in National Harbor, Maryland.

Tikk found some disagreement from two other cybersecurity experts speaking during the same session. While Tikk and the North Atlantic Treaty Organization (NATO) declined to define the attacks in Estonia as cyberwar, many other people saw the coordinated effort that way, said Prescott Winter, CTO for ArcSight's public sector division and a former CIO and CTO at the U.S. National Security Agency.

"If we're not at cyberwar yet, you've got me really nervous," added Blair Linville, vice president of enterprise IT at casino operator Harrah's Entertainment. "We certainly feel under attack every day, out in industry."

Tikk and Winter both called for governments and companies to better prepare for coordinated attacks, whether they come from nations or criminal groups. But preparing for cyberwar, in particular, is difficult because there's little precedence, Winter said. Governments know how to negotiate treaties and engage in diplomacy to head off conventional wars, but no one really knows how a confrontation between nations would escalate into a cyberwar, he said.

"There's a whole dance that nations go through" before a traditional war, and diplomacy can often avert conflict, Winter said. "That doesn't really exist yet in the cyberdomain."

Nations don't yet have rules of engagement for cyberwar, including how they might use private-sector networks to reroute traffic and shut down attacks, he said. "There's a lot of work to be done, and we need to get started," Winter added. "We're sitting right on the edge of a very significant problem here."

Tikk also called for governments to develop cyberwar policies. One way to better deal with cyberwar or other coordinated attacks is cooperation between nations, with governments helping each other during attacks, she said.

Many legal tools for dealing with coordinated attacks already exist, she added, but nations need to develop the policies to allow countermeasures such as mutual aid agreements and national cybersecurity policies, she said. "We spend a lot of time focusing on what we cannot do instead of what we can do," she added.

One audience member asked whether governments should take more steps to track online behavior. In the U.S., there are limits on the data the government can keep, and a more formal tracking effort would take some major changes in law, Winter said.

Another audience member asked if new cybersecurity regulations are necessary, with Internet service providers held partly responsible for the traffic that comes over their networks. Tikk suggested it was time for the U.S. to reexamine laws such as the Digital Millennium Copyright Act that exempted ISPs from lawsuits involving traffic carried on their networks. ISPs could serve as a first line of defense from cyberattacks if they were allowed to filter content, although that idea would meet stiff resistance, she said.

Winter pointed to an effort in Australia, where ISPs will begin to voluntarily filter Web content by late this year, after a series of government filtering proposals stalled. The Australian code of practice, developed by the Internet Industry Association there, would allow ISPs to cut off access to Web users who refuse to take action to secure their computers, he said.

It will be "interesting" to see how effective the filtering system is against cyberattacks, Winter said.

The U.S. may also need to reexamine its largely hands-off regulatory approach to the Internet, in the name of cybersafety, Winter added. "The Internet sort of grew up here as the Wild West," he said. "Anybody mentions the R word, regulation associated with the Internet here, and the noise levels become positively deafening. We may just have to accept some regulation if we want to have an Internet that is stable, reliable and resilient."

Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is grant_gross@idg.com.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags Prescott WintersecurityregulationEneken TikkU.S. National Security AgencygovernmentHewlett-PackardHarrah's EntertainmentarcsightBlair LinvilleNorth Atlantic Treaty Organization

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Grant Gross

IDG News Service
Show Comments

Essentials

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Michael Hargreaves

Windows 10 for Business / Dell XPS

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?