Feeds

Cyberwar threat way down the agenda at NATO conference

Real war, not iWar, focus for heads of state

Boost IT visibility and business value

For all its hype the threat cyberwarfare merited less than 100 words in a summary of discussions between heads of state at NATO conference last week.

The three-day North Atlantic Treaty Organization summit in Romania last week focused on discussing NATO operations in Kosovo and Afghanistan, and plans for the further expansion of NATO, particularly in the Balkans. Cyber defense got a briefest of look-ins, as point 47 of a 50 point declaration by heads of state and government meeting at the conference. The policy statement (below), which might have been drafted by Yes Minister's Humphrey Appleby, doesn't give too much away beyond saying the NATO allies might - on request - intervene to help an ally under attack.

NATO remains committed to strengthening key Alliance information systems against cyber attacks. We have recently adopted a Policy on Cyber Defence, and are developing the structures and authorities to carry it out. Our Policy on Cyber Defence emphasises the need for NATO and nations to protect key information systems in accordance with their respective responsibilities; share best practices; and provide a capability to assist Allied nations, upon request, to counter a cyber attack. We look forward to continuing the development of NATO’s cyber defence capabilities and strengthening the linkages between NATO and national authorities.

The conference comes almost a year after the internet infrastructure of the Baltic state of Estonia, which became a NATO member in 2004, came under sustained attack. Civil unrest in Estonia over the removal of Soviet-era memorials last April was accompanied by attacks against the Baltic nation’s internet infrastructure. Several Estonian government websites remained unavailable; others such as that of the Estonian police were available only in text-only form as a result of sustained denial of service assaults, many of which were powered by networks of compromised PCs. Local banks and media outlets were also targets for the attack.

Estonian ministers pointed the finger of blame for the attacks towards the Russian government, an accusation the Kremlin denied and which remains unproven. Although technically unsophisticated, the assaults served as a wake-up to the potential damage that might be caused by DDoS attacks.

Build a business case: developing custom apps

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.