{"id":16844,"date":"2018-10-24T23:50:01","date_gmt":"2018-10-24T23:50:01","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/"},"modified":"2018-10-24T23:50:01","modified_gmt":"2018-10-24T23:50:01","slug":"ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/","title":{"rendered":"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore"},"content":{"rendered":"<p><strong class=\"trailer\">OpenWorld<\/strong> Former intelligence leaders have called for international terms of engagement in cyber warfare and greater collaboration between the public and private sectors to defend critical infrastructure.<\/p>\n<p>The comments came at a security-focused keynote at this year&#8217;s Oracle OpenWorld conference in San Francisco, where \u2013 instead of the usual parade of enthusiastic customers \u2013 co-CEO Mark Hurd took to the stage with three former spies.<\/p>\n<p>John Scarlett, who led the UK&#8217;s MI6 between 2004 and 2009, said that when it came to cyber attacks, there was \u201cno sense of the rules of the game\u201d and no international or legal structure. This lack of terms of engagement was central to the reemergence of the great tension and rivalry between different actors, he told the audience today.<\/p>\n<p>However, he conceded that it is \u201chard to see how they [rules of engagement] can be developed and agreed on,\u201d and questionable whether any state would trust the various sides to implement them honestly.<\/p>\n<p>\u201cWe have to get our brains thinking differently,\u201d Scarlett said, arguing that the old way of thinking about attacks and defense didn\u2019t translate into cyber threats.<\/p>\n<h3 class=\"crosshead\"><span>The long-expected cyber Pearl Harbor<\/span><\/h3>\n<p>His comments came in response to Hurd\u2019s opening question, which asked what a \u201c9\/11 cyber attack\u201d would look like \u2013\u00a0a term that the Brit spy said that he was \u201cwary\u201d of using.<\/p>\n<p>Similarly, former head of US homeland security Jeh Johnson said that the term was \u201crather provocative\u201d, while pointing out that it could sometimes take years to assess the full impact of a cyber attack.<\/p>\n<p>That said, he did suggest that the impact that Russian interference in the <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/10\/24\/facebook_political_ads\/\">2016 US elections<\/a> had on democracy could be as significant as the terrorist attacks in New York.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/09\/19\/oracle_chatbot.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Oracle's Chatbot\"\/><\/p>\n<h2 title=\"Does he mean some farm boy with just womp rat experience can destroy the whole thing?\">Well, it is the Empire of enterprise IT&#8230; Oracle&#8217;s Ellison plans &#8216;Star Wars cyber defense&#8217; for his second-generation cloud<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/10\/23\/oracle_openworld_ellison_keynote\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Johnson said that the open, free society in the US, and the access to it via the internet, was both the nation\u2019s greatest strength and a major vulnerability.<\/p>\n<p>\u201cI think all of us would agree that cyber space is the new battle space,\u201d he said, adding that the best form of defense in this respect was a good offense \u2013 and that this should be a national and international priority for both governments and industry.<\/p>\n<p>\u201cWe need to do a better job of public-private partnerships on defense of cyber space and our critical infrastructure,\u201d he said.<\/p>\n<p>Meanwhile, Michael Hayden, who has led both the National Security Agency and the Central Intelligence Agency, said that the answers will not be obvious, and that the rapid pace of technological development can lead to changing definitions on what constitutes security.<\/p>\n<p>For instance, Hayden said that he had come down on the side of Apple in the battle between it and the feds seeking to break the encryption on the <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/04\/21\/fbi_comey_iphone\/\">San Bernadino killer\u2019s iPhone<\/a>.<\/p>\n<p>This was not on privacy grounds, or on commercial grounds, he said, but \u201con a broader definition of security\u201d. Law enforcement\u2019s requests were legitimate, he said, but \u201cthe costs of conceding exception access outweighed the benefits\u201d in this case.<\/p>\n<h3 class=\"crosshead\"><span>Flexibility and possible fixes<\/span><\/h3>\n<p>Hayden emphasized that this wasn\u2019t about setting one hard and fast rule, as different factors might warrant a different decision; rather he urged a discussion of the balance of privacy, security, freedom and liberty.<\/p>\n<p>Oracle has spent its annual gabfest touting the security credentials of its autonomous database and \u201csecond-generation\u201d cloud infrastructure, and the decision to bring the three former intelligence bosses on stage also comes as it is eyeing up the Pentagon\u2019s $10bn <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/10\/23\/oracle_openworld_ellison_keynote\/\">JEDI<\/a> cloud contract.<\/p>\n<p>And so it could hardly miss the opportunity to give its technology a plug, no matter how painfully orchestrated it was to have Big Red\u2019s chief corporate architect Edward Screven sitting alongside the former spies, ready to big up his firm\u2019s new tech.<\/p>\n<p>The session ended with the more cynical members of the audience rolling their eyes as Screven opined that there was \u201cno such thing as a civilian\u201d in cyber warfare now \u2013 all IT professionals are on the \u201ccyber battlefield\u201d \u2013 but, with the technology Oracle has developed, \u201cwe can be much more effective at defending that threat\u201d. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/10\/24\/cyber_warfare_oracle\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8216;I think all of us would agree that cyber space is the new battle space&#8217; OpenWorld\u00a0 Former intelligence leaders have called for international terms of engagement in cyber warfare and greater collaboration between the public and private sectors to defend critical infrastructure.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":16845,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-16844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-24T23:50:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore\",\"datePublished\":\"2018-10-24T23:50:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/\"},\"wordCount\":725,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/\",\"name\":\"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg\",\"datePublished\":\"2018-10-24T23:50:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/","og_locale":"en_US","og_type":"article","og_title":"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-24T23:50:01+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore","datePublished":"2018-10-24T23:50:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/"},"wordCount":725,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/","url":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/","name":"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg","datePublished":"2018-10-24T23:50:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ex-spy-bosses-cyber-warfare-needs-rules-of-engagement-for-nations-to-promptly-ignore\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Ex spy bosses: Cyber-warfare needs rules of engagement for nations to promptly ignore"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=16844"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16844\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/16845"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=16844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=16844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=16844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}