Feathers ruffled over yesterday’s post on WikiLeaks-inspired attacks and whether they signal the big cyber war we’ve been warned about.I noted that we can argue until we’re blue in the face about whether it’s appropriate to call this a war, but that it’s pretty clear we’ve seen something unprecedented.Not true, some readers told me.Marc Sachs, executive director, national security and cyber policy at Verizon Communications, posted the following on my Facebook wall: “Oh for crying out loud. This is not new. Where was the reporter during the 1999/2000 Israel vs Palestine or the 2001 China vs USA “hacker wars”? Engaging civilians in a game of click-and-DoS is not a cyber war. It’s vandalism, protesting, whatever…but not a war.”Fair point. I’ve known Marc for a long time and respect him greatly. And his rebuke of the “cyber war” notion captures the other side of this story quite well. He’s not the first one to compare massive DDoS attacks to vandalism and bullying as opposed to war.Gadi Evron, a Tel Aviv-based security researcher who was brought in to help Estonia recover from a massive attack a few years ago, has called this sort of DDoS wave a cyber riot more than a cyber war.But he also noted that opposing governments can make political hay out of attacks they may have nothing to do with. In this case, Russia.Evron made the point in this exchange:CSO: You’ve described the Estonian incident as a cyber riot rather than a case of nation-sponsored cyber terrorism. Do you think all the speculation about nation-sponsored attacks was overblown? Evron: It was a riot because the online populace was energized to be the foot soldier. It was an organized attack, but whether by some ad-hoc group of individuals or not, I cannot say based on the technical data alone. Whether it was Russia or not, [the country] knew how to play the political game afterwards and achieved a high level of deterrence against the former Eastern-block countries at virtually no cost.In the final analysis, it doesn’t really matter what we call this thing. The bottom line is that DDoS attacks have become stupidly easy for anyone to launch and companies need a better strategy to deal with it. So do the governments of the world. Estonia is actually a good case study in how a country can successfully bounce back.–Bill Brenner Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe