{"id":140748,"date":"2014-09-10T04:59:01","date_gmt":"2014-09-10T08:59:01","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nato-rattles-cybersabers-but-experts-have-doubts.php"},"modified":"2014-09-10T04:59:01","modified_gmt":"2014-09-10T08:59:01","slug":"nato-rattles-cybersabers-but-experts-have-doubts","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nato-2\/nato-rattles-cybersabers-but-experts-have-doubts.php","title":{"rendered":"NATO rattles cybersabers-but experts have doubts"},"content":{"rendered":"<p><p>    But the assurances of a military response tied to Article 5 are    not easily converted to the digital world, Libicki said.  <\/p>\n<p>    \"In most categories of war, you have to defeat the other guy    shooting back, but in the cyberworld you can do a lot just by    building up your defenses,\" he said. \"When you put cyberwarfare    into the template of conventional warfare, you end up drawing a    lot of conclusions that don't make sense.\"  <\/p>\n<p>    But Dave Merkel, CTO of cybersecurity firm FireEye, said he isn't surprised by Friday's    announcement, given the severe damage that can be caused by a    cyberattack. Still, he said, governments may find it difficult    to attribute the origin of a digital offensive.  <\/p>\n<p>    Read MoreNATO: Russia 'attacking' Ukraine as rift    widens<\/p>\n<p>    While both Libicki and Merkel agreed that many NATO members    could determine the origin of an attack, those governments may    not be eager to reveal their intelligence and technological    capabilities.  <\/p>\n<p>    Yet even nongovernmental firms are sometimes able to positively    identify cyberattacks: In 2013, Mandiant (since acquired by    FireEye) released a report detailing a wide body of evidence    that a Chinese government group had conducted a widespread    cyber-espionage campaign. China denies engaging in    cyber-espionage.<\/p>\n<p>    NATO's biggest problem with enforcing a hard line against    cyberattacks may simply be the wide proliferation of such    warfare.  <\/p>\n<p>    A single hacker can launch hundreds of varied attacks in a    short period of time, meaning that governments may find it    nearly impossible to identify, attribute and respond to    cyberstrikes in a timely manner, Merkel said.  <\/p>\n<p>    By CNBC's Everett    Rosenfeld  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.cnbc.com\/id\/101980917?__source=yahoonews&par=yahoonews\/RK=0\/RS=G9l1Y0FZPdS15dN30x1Gsnqe8XM-\" title=\"NATO rattles cybersabers-but experts have doubts\">NATO rattles cybersabers-but experts have doubts<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> But the assurances of a military response tied to Article 5 are not easily converted to the digital world, Libicki said. \"In most categories of war, you have to defeat the other guy shooting back, but in the cyberworld you can do a lot just by building up your defenses,\" he said. \"When you put cyberwarfare into the template of conventional warfare, you end up drawing a lot of conclusions that don't make sense.\" But Dave Merkel, CTO of cybersecurity firm FireEye, said he isn't surprised by Friday's announcement, given the severe damage that can be caused by a cyberattack <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nato-2\/nato-rattles-cybersabers-but-experts-have-doubts.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261464],"tags":[],"class_list":["post-140748","post","type-post","status-publish","format-standard","hentry","category-nato-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/140748"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=140748"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/140748\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=140748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=140748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=140748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}