When one nation launches a missile at another, it's easy to pinpoint the aggressor. But during a cyber attack, the aggressor may not be so identifiable, and the traditional rules of warfare don't quite fit. When one nation launches a missile at another, it’s easy to pinpoint the aggressor. But during a cyber attack, the aggressor may not be so identifiable, and the traditional rules of warfare don’t quite fit.As nations increasingly develop their cyber offenses and defenses, an international think tank in Estonia is researching a range of legal questions and concepts around clashes in cyberspace. One of those questions is how to label these skirmishes and whether it’s appropriate to call them “cyber warfare” or “cyber conflict,” said Rain Ottis, a scientist with the Cooperative Cyber Defense Center of Excellence in Tallinn (CCDCOE).The CCDCOE was launched in May 2008 to help NATO countries deal with ever-growing cyberthreats by focusing on defense tactics, training, protection of critical national infrastructure, and policy and legal issues. Although several nations have experienced significant cyberattacks, “we don’t have a single good instance of real cyber warfare,” Ottis said. He believes that warfare occurs between states.“We are trying to come up with a way to explain this in a more formal way so not everything by default is cyber warfare,” Ottis said. “Personally, I don’t want to devalue the word ‘war.'” How to define a cyber incident is one of the topics on the agenda for the CCDCOE’s 2010 Conference on Cyber Conflict in June, which will include a new legal and policy track.CCDCOE researchers are also part of a working group studying the laws of armed conflict to see how cyber attacks should be interpreted. The laws of war, encompassed in international treaties — some of which are more than 100 years old — deal with issues such as when a nation can go to war and what is considered legal when at war, Ottis said.It’s brand-new legal territory, but one with which nations will soon have to deal. “When the first cyber war kicks off, mostly likely in conjunction with a physical war, all of these questions will come up in a hurry,” Ottis said.The working group will eventually write a manual for how cyber conflict fits into the existing laws of war. The CCDCOE is also looking into how Cold War-era concepts such as deterrence fit into cyberspace. Deterrence — which is based on meeting aggression with greater aggression — doesn’t quite apply, said Kenneth Geers, a civilian with the U.S. Navy’s Naval Criminal Investigative Services who is assigned to the CCDCOE.Geers presented a paper last October in Moscow on deterrence in cyberspace. One of the problems with deterrence is attribution, or identifying the enemy. “It’s really easy to hide in cyberspace,” Geers said. “You need much more than computer log files to know what happened.”The basic building blocks of deterrence are capability, communication and credibility. There’s also the question of whether a physical response such as bombing is appropriate.“You have to be able to get back at the aggressor, and in cyberspace, there’s no guarantee of that,” Geers said. “You may not know who is attacking you, and to get back at them, you have to hack back or do a kinetic response.” It is hard to deter an aggressor who can invest a small amount and cause the target 100-fold damage, Geers said. Geers is also writing a paper exploring how the 1997 Chemical Weapons Convention (CWC) could be used as an arms control model for cyberspace, exploring concepts such as prohibitions and inspections. Again, cyberspace poses vexing questions.“There’s just not a way, given the fact there are gigs of data on something the size of a stick of gum, that you can possibly verify that no malicious code exists anywhere,” Geers said. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe