NATO may operate in a similar approach to a traditional military assault in response to cyberattacks on member countries, says CPO Magazine.

TR_123456

Experienced member
Staff member
Administrator
Messages
4,757
Reactions
11,676
Nation of residence
Nethelands
Nation of origin
Turkey
According to NATO Secretary General Jens Stoltenberg, a cyberattack on a member may lead to an international military response.


The alliance previously said that it saw the cyber domain as a legitimate combat environment and they may use Article 5 to protect allies. Stoltenberg stated that NATO makes no distinction between cyberattacks and other types of assaults. He warned that cyber warfare is seen in the article as an act of aggression against the whole alliance, and collective military response is demanded.


“In a way, it doesn’t matter whether it’s a kinetic attack or a cyberattack, we will assess as allies whether it meets the thresholds for triggering Article 5. It sends a message that we regard cyberattacks as seriously as any other attack", he added.

To reduce the number of cyberattacks, coercive measures must be implemented​


Recent ransomware attacks on Colonial Pipeline and SolarWinds show that critical infrastructure and democratic institutions have become more frequent targets. Moreover, China has often used its aggressive behavior in which it tends to use disinformation campaigns and cyberattacks.


In addition to being more sophisticated, cyberattacks are also much more common. To combat the threat he alliance created a cyber domain center in Estonia to oversee and coordinate the reaction.


Doug Britton, the CEO of Haystack Solutions noted “This communique makes clear that the US and her allies must change the urgency and economics around finding the undiscovered cyber geniuses whose innate aptitudes make them among the potential best and brightest, and then train them at a new pace and price point, and getting them into the fight as soon as possible".


“This is a clarion call for the best talent on defense, repelling attackers at the cyber borders, and on offense, deploying cyber weapons against adversaries".

 

Follow us on social media

Top Bottom