Story image

Waikato Uni researcher travels to NATO's cybersecurity hub

10 May 2018

University of Waikato senior lecturer Dr Joe Burton has now only published a new book about NATO this year, he also flew to Estonia to get a first-hand look at NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE).

The CCDCOE, located in Tallinn, is funded by NATO nations and focuses on cyber technology, law, strategy, training, and education.

Burton spent several months at the CoE at the end of last year, where he posed the question: ‘how do you deter cyber attacks in an increasingly complex world?’

His research explored this topic as well as action with norms, laws, and resilience.

“I saw a little bit of my role in doing this research as challenging some of the assumptions people have about cyber security. Militaries can be very closed bubbles, so that’s why I think having a centre for research excellence is a good thing, so they have academics come in to offer different perspectives on security,” Burton says.

Burton’s report will also be distributed to staff at NATO’s Brussels headquarters.

 “It’s good for Waikato, and developing New Zealand’s links with a significant international organisation. It may also lead to further opportunities including for some of our students, and other academics to go over and work with them.”

Dr Joe Burton

He says countries may have to use offensive cyber attack strategies to respond to severe, strategic cyber attacks, but those offensive capabilities should only be used ‘under exceptional circumstances’.

He notes that cyber attacks could include targeting critical infrastructure such as power grids, nuclear facilities, or even causing loss of life.

“Our response to deterring cyber attacks is often caught up in a military mindset. You can’t just deter a cyber-attack by threatening to launch a missile at someone,” Burton says.

“You need to deter through international and domestic laws, norms and cyber resilience, which means having the ability to get computer systems and the societal services they provide back up and running in the event of an attack.”

Burton also believes people need to think about civil and criminal responses.

“You have to move away from thinking you can have a militaristic response, or retaliate against a cyber attack with another cyber attack. That just opens a Pandora’s Box, and perpetuates the cycle of disruptive and damaging activity that no-one wants to see.”

Most attacks don’t reach such a high level of severity, but even general cybercrime could end up being a $6 trillion black market by 2025.

On top of that, recent scandals include the Cambridge Analytica saga and its role in the Trump administration, as well as Brexit.

Burton says it demonstrates how cybersecurity is now militarised, while data and social media are now ‘weaponised’.

“Look at Cambridge Analytica, and Mark Zuckerberg being called to testify in the US. It was the Facebook platform that was manipulated to spread Russian propaganda, so how are you going to deter that kind of activity?”

“How are you going to deter countries from weaponising information on Facebook? You’re not going to do that by having a military approach, you're going to do that by having Zuckerberg sitting in front of Congress and putting pressure on him to regulate the activity so that the Russian state can’t buy US election advertising.”

Dr Burton’s new book, ‘NATO’s Durability in a Post Cold War World’ was published in March 2018 by SUNY Press, New York.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.