- The Strategist - https://www.aspistrategist.org.au -

2013 review – the year in cybsecurity

Posted By on December 20, 2013 @ 11:00

International cyber policy centre logo [1]2013 was a significant year in cyberspace, both internationally and closer to home. Whilst the Edward Snowden leaks dominated the headlines, several important agreements and policy achievements were made further away from the glare of the media spotlight.

Beginning back in January, then Prime Minister Julia Gillard announced [2] the creation of the Australian Cyber Security Centre (ACSC). The centre intends to co-locate government operational cyber security assets from DIO, ASD, ASIO, CERT, AGD, the AFP and the ACC whilst working closely with the private sector. The centre still ‘intends’ to achieve these goals as it’s yet to become operational. This is due to a number of factors, not least of all that its new home, the ASIO building, isn’t ready for occupancy [3].

February saw the release of President Obama’s Cybersecurity executive order [4]. Revealed just ahead of the 2013 State of the Union address, the order set a timeline for the introduction of a framework for public/private collaboration on critical infrastructure protection. What followed was the creation of a Preliminary Cybersecurity Framework, effectively guaranteeing [5] minimum standards. It’s a plan that the Australian Government could usefully borrow from [6].

Later that same month, American Cybersecurity firm Mandiant released a report [7] exposing China’s PLA Unit 61398 [8]. The Unit, traced to Shanghai in the highly publicised report, has been linked to several advanced persistent threats reaching back to at least 2006. After a few months laying low following the release of the report, the group seems to have resumed its activities [9]. But it’s debatable [10] as to how effectively China manages to process and use this information given the haphazard domestic cyber hierarchy that exists within the country.

April saw an attempt by two of the world’s biggest cyber powers to move beyond finger-pointing and improve cooperation, with the establishment of the US-China Cyber Security Working Group. The first meeting held in July was overshadowed to an extent by the Snowden leaks, but made important [11] inroads. In June another positive agreement [12] was hatched between the US and Russia on the sidelines of the G8 Summit in Northern Ireland. The deal will see Russian and US CERT teams work closer together and the establishment of a ‘cyber hotline’ to aid in the prevention of cyber misunderstandings.

The June UN Group of Governmental Experts decision [13] (PDF) saw landmark consensus on the applicability of the UN charter to cyberspace. The decision was particularly significant given that group of 15 experts included representatives from Russia and China.  Australian Deborah Stokes, now Australia’s High Commissioner to PNG, chaired the group and has been widely praised for her efforts in helping the members reach consensus.

The leaking [14] of the existence PRISM and TEMPORA surveillance programs in June by Edward Snowden continues to grab the world’s attention. The disclosure bruised relations between allies and put those with already frosty relations into a deep freeze. While Snowden was exceptionally successful in initiating a discussion on the privacy vs. security debate, should [15] he now ease the damaging torrent of information now he’s successfully made his point?

In September online security firm Symantec released a report [16] detailing the activities of an online ‘hackers-for hire’ group it has dubbed ‘Hidden Lynx’. It described the increasing technical and operational sophistication of high profile attacks seen throughout 2013, including the alleged theft [17] of US weapons systems plans from contractors, including the F-35 Joint Strike Fighter.

On the home front, July saw the release [18] of the National Plan to Combat Cybercrime and the announcement of the Australian Cybercrime Online Reporting System (ACORN). It followed the publication of Australia’s first National Security Strategy [19] in January, which listed cyber as a key national security risk, and the Defence White Paper [20] in May, which named ‘integrated cyber policy and operations’ as a key five year priority.

Finally, in October South Korea played host to the third iteration of the international cyberspace conference process, initiated by the UK Government in 2011. The conference drew together public and private sector cyber experts from over 87 countries to discuss a range of cyber related issues. Julie Bishop became the first Australian Foreign Minister to attend to gathering. The Australian government earned praise [21] throughout the conference for its work domestically and internationally in the cyber realm and should try to build upon this image into the New Year.

Jessica Woodall is an analyst in ASPI’s International Cyber Policy Centre [22].

Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/2013-review-the-year-in-cybsecurity/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2013/07/cyber-logo.jpg

[2] announced: http://www.defence.gov.au/defencenews/stories/2013/jan/0124.htm

[3] isn’t ready for occupancy: http://www.townsvillebulletin.com.au/news/breaking-news/asio-still-waiting-to-move-into-new-hq/story-fnjbnvyi-1226762824469

[4] Cybersecurity executive order: http://www.zdnet.com/obamas-cybersecurity-executive-order-what-you-need-to-know-7000011221/

[5] effectively guaranteeing: http://www.informationweek.com/government/cybersecurity/nist-cybersecurity-framework-dont-underestimate-it/d/d-id/1112978

[6] borrow from: http://www.aspistrategist.org.au/cyber-security-for-australias-critical-infrastructure/

[7] report: http://intelreport.mandiant.com/

[8] PLA Unit 61398: http://www.smh.com.au/it-pro/security-it/unit-61398--the-featureless-12storey-building-which-houses-one-of-the-worlds-most-dangerous-and-secretive-cyberhacking-operations-20130220-2eqj4.html

[9] seems to have resumed its activities: http://www.nytimes.com/2013/05/20/world/asia/chinese-hackers-resume-attacks-on-us-targets.html?_r=0

[10] debatable: https://www.aspi.org.au/publications/special-report-enter-the-cyber-dragon-understanding-chinese-intelligence-agencies-cyber-capabilities

[11] important: http://www.reuters.com/article/2013/07/10/us-china-usa-cyber-idUSBRE96904820130710

[12] agreement: http://articles.washingtonpost.com/2013-06-17/world/40025979_1_cyber-security-pact-homeland-security

[13] decision: http://www.un.org/ga/search/view_doc.asp?symbol=A/68/156

[14] leaking: http://www.aspistrategist.org.au/looking-through-the-prism/

[15] should: http://www.theaustralian.com.au/news/world/totalitarian-states-lack-of-privacy-means-snowden-has-failed/story-e6frg6ux-1226776477069

[16] report: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf

[17] theft: http://abcnews.go.com/Politics/theft-35-fighter-jet-info-called-major-problem/story?id=19440826

[18] release: http://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Pages/default.aspx

[19] National Security Strategy: http://www.dpmc.gov.au/national_security/national-security-strategy.cfm

[20] Defence White Paper: http://www.defence.gov.au/whitepaper2013/

[21] praise: http://www.aspistrategist.org.au/putting-runs-on-the-board-australia-and-international-cyberspace/

[22] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

Copyright © 2021 The Strategist. All rights reserved.