Feeds

back to article World leaders meet to discuss cyberwar rules of engagement

Rules of engagement for the deployment of cyber-weapons need to be developed, an international security conference is due to be told later today. The influential EastWest Institute is due to present proposals for the cyberspace equivalent of the Geneva convention at the Munich Security Conference, which has included a debate on …

COMMENTS

This topic is closed for new posts.
FAIL

Hmmm...

I thought Mubarak had found the answer. Just switch off the internet.

No Internet = No Cyber War.

But I guess that'd be cheating.

3
0
Silver badge

Rules of engagement

"But I guess that'd be cheating."

Yes, they'll probably make a rule to prevent that, or at least dock them points.

1
0

Cyberwar rules of engagement

You'll have to excuse me for saying so, but this Geneva convention for Cyberspace is total BS. The vast majority of security incidents such as DDOS and 'Stuxnet worm' are enabled by hijacked Windows desktops computers. Critical systems such SCADA units or hospital systems should of course be locked down on embedded hardware running on a VPN. That they are still running such systems directly connected to the Internet beggars belief.

2
0
Anonymous Coward

A title?

More rules for the Americans to ignore!!

1
1
Silver badge

Based on real world evidence, the likelihood of state organised control in virtual worlds is ZERO

I would like to posit that very few are intellectually equipped to be anywhere near qualified or effective in being able to thwart a smart cyber attack/assault/incursion/experience/call it what you will, and as for rules of engagement, well ....... good manners and the thought that there might be children reading El Reg prevents me from expressing an adult opinion on that admission of defeat even before any real virtual battles have begun. Indeed, such is the nature of the virtual theatre of operations, that all meaningful engagements are won before they are even suspected and then acknowledged as being of great concern and an attack vector being exploited. There will though be other lesser skirmishes by others into rogue mercenary campaigns of a selfish indulgent nature which can be easily blocked and countered, with prosecution and/or persecution of the perpetrators being a most popular attraction and distraction for news and views/media.

4
0
IT Angle

World leaders meet to discuss cyberwar rules

ps: Are these the same people who let 251,287 documents leak out of the Siprnet network?

http://en.wikipedia.org/wiki/United_States_diplomatic_cables_leak

1
0
Silver badge

Yep, same bunch of twits.

They also seem to believe the DCMA prevents pirating software and that outlawing guns deprives crooks the opportunity to shoot someone.

1
1
Grenade

@Tom 13

After reviewing your comments, please let me express my heartfelt hostility to you and your colleagues in that office complex in Langley, Virgina. We don't like you at all.

Please just pull the pin and wait.

0
0
Silver badge
Unhappy

Do David Cameron, Angela Merkel, Hillary Clinton & Sergei Lavrov even ...

have a clue of the technicalities involved?

The absence, seemingly, of the Chinese leaves a gaping hole in the conference.

7
0

Remember the Kosovo war

The US Air Force dropped carbon dispersing bombs into high voltage electricity distribution points. Who is pleading that critical infrastructure should be protected ? Not many die.

They also thought the civilian railway network was fair game.

1
0
Silver badge
Thumb Down

For once I agree with BritGov

"How strongly should a state respond to an attack when you do not know who did it, where they did it from or what the intention was? etc."

It'd be like fighting real war with just cluster bombs to play with. By all means soup up your defensive capabilities (or at least detection capabilities), but don't delude yourself that you can actually have a proper fight with rules and no colateral damage.

0
0
WTF?

Rules of engagement?

There will be none!

0
0
Stop

Education, Education, Education

And not just the M.B.A. blah-blah combined with some Excel beancounting is going to fix the problem.

Engineers are nowadays looked down upon, while the law types are highly respected. A lawyer will not defend your blueprints from being stolen, a capable security engineer does stand a chance. If you Mista MBA, would care to listen.

0
0

Why does no one say the obvious ?

Create and implement secure systems.

0
0
FAIL

Proceeded?

"...a conventional military assault, which is often proceeded by the gathering of troops and tanks."

I think you meant 'PRECEDED'.

0
0
This topic is closed for new posts.