sb-nz logo
Story image

Waikato Uni researcher travels to NATO's cybersecurity hub

10 May 2018

University of Waikato senior lecturer Dr Joe Burton has now only published a new book about NATO this year, he also flew to Estonia to get a first-hand look at NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE).

The CCDCOE, located in Tallinn, is funded by NATO nations and focuses on cyber technology, law, strategy, training, and education.

Burton spent several months at the CoE at the end of last year, where he posed the question: ‘how do you deter cyber attacks in an increasingly complex world?’

His research explored this topic as well as action with norms, laws, and resilience.

“I saw a little bit of my role in doing this research as challenging some of the assumptions people have about cyber security. Militaries can be very closed bubbles, so that’s why I think having a centre for research excellence is a good thing, so they have academics come in to offer different perspectives on security,” Burton says.

Burton’s report will also be distributed to staff at NATO’s Brussels headquarters.

 “It’s good for Waikato, and developing New Zealand’s links with a significant international organisation. It may also lead to further opportunities including for some of our students, and other academics to go over and work with them.”

Dr Joe Burton

He says countries may have to use offensive cyber attack strategies to respond to severe, strategic cyber attacks, but those offensive capabilities should only be used ‘under exceptional circumstances’.

He notes that cyber attacks could include targeting critical infrastructure such as power grids, nuclear facilities, or even causing loss of life.

“Our response to deterring cyber attacks is often caught up in a military mindset. You can’t just deter a cyber-attack by threatening to launch a missile at someone,” Burton says.

“You need to deter through international and domestic laws, norms and cyber resilience, which means having the ability to get computer systems and the societal services they provide back up and running in the event of an attack.”

Burton also believes people need to think about civil and criminal responses.

“You have to move away from thinking you can have a militaristic response, or retaliate against a cyber attack with another cyber attack. That just opens a Pandora’s Box, and perpetuates the cycle of disruptive and damaging activity that no-one wants to see.”

Most attacks don’t reach such a high level of severity, but even general cybercrime could end up being a $6 trillion black market by 2025.

On top of that, recent scandals include the Cambridge Analytica saga and its role in the Trump administration, as well as Brexit.

Burton says it demonstrates how cybersecurity is now militarised, while data and social media are now ‘weaponised’.

“Look at Cambridge Analytica, and Mark Zuckerberg being called to testify in the US. It was the Facebook platform that was manipulated to spread Russian propaganda, so how are you going to deter that kind of activity?”

“How are you going to deter countries from weaponising information on Facebook? You’re not going to do that by having a military approach, you're going to do that by having Zuckerberg sitting in front of Congress and putting pressure on him to regulate the activity so that the Russian state can’t buy US election advertising.”

Dr Burton’s new book, ‘NATO’s Durability in a Post Cold War World’ was published in March 2018 by SUNY Press, New York.

Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More
Story image
Backups as a last line of defence are under threat
Malware can incrementally overwrite and encrypt backups, rendering them inadequate as an insurance policy against ransomware.More
Story image
DDoS attacks a wake up call for complacent businesses - Imperva
When distributed denial of service attacks created mayhem around the world in August, they left many organisations scrambling to protect themselves.More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
Why organisations should wise up to the DDoS extortion trend
While it is essential to have a DDoS mitigation solution in place, it’s also important to test that it works as expected, writes NCC Group director of technical security consulting for Asia Pacific Tim Dillon.More