Are there cyber warfare rules of engagement? New techniques, but the old rules may still apply