But there was no similar protocol for dealing with cyberattacks. What was the blast radius of a cyberweapon? How would you know who had deployed it? The vacuum of rules and international agreements had been as much to blame as circumstances in creating the CyberStorm.