- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on January 13, 2016 @ 12:30

Just before Christmas, the White House released a new strategy for greater US involvement in the development of international standards for cybersecurity. [1]

2016 has kicked off in big way with what’s been billed as the first cyber attack to actually disable a power grid [2]. SANS ICS analysis [3] indicates that the six-hour outage in western Ukraine was caused when hackers remotely switched breakers while simultaneously slowing the response by infecting utility company workstations and servers, then flooding customer call centres to prevent customers reporting blackouts. The companies affected had to switch their systems to ‘manual’ to restore power.

Unsurprisingly, media and intelligence agencies [4] are looking at Russia, although Cyber Squirrel 1 [5] could soon point its finger at another culprit. For some further reading, Net Politics has an interesting post about the use of cyber power between Russia and Ukraine [6].

China’s Defence Ministry announced [7] the activation of three new units on 1 January, including one that it’s referred to as ‘cyber war forces’. The ‘Strategic Support Force’ is likely an amalgam of existing space operations and cyber and information warfare units [8]. Its new commanding general, Gao Jin, was previously the Director of the PLA Academy of Military Science. The Academy is the source of the PLA’s Science of Military Strategy publication which included extensive discussion on Chinese concepts of cyber warfare [9]. The reorganisation is likely part of broader reforms of the PLA announced at the Third Plenum of the 18th Party Congress in 2013 [10] designed to centralise political control of the PLA which place the Central Military Commission in direct control of all military forces [11].

Also in China, authorities unveiled draft counterterrorism legislation [12] in late 2015 that would require technology companies to install back doors and hand over encryption keys and user information to government agencies. US officials were quick to criticise the draft legislation, but this disapproval was quickly deflected by the Chinese Foreign Ministry which noted that recent US legislation included similar surveillance powers.

Encryption has continued to be a point of contention. Writing at the Wall Street Journal, Christopher Mims notes [13] that ‘there is no such thing as “good enough” encryption once a backdoor has been added’. Mims states that there are already enough vulnerabilities in most personal devices that ‘lawful hacking’ by law enforcement agencies remains a better alternative than building in further vulnerabilities. Elsewhere, digital rights group Access Now have posted a letter online signed by nearly 200 experts, activists and corporations [14] urging governments globally not to ban or limit access to encryption in any form.

Just before Christmas, the White House released a new strategy [15] for greater US involvement in the development of international standards for cybersecurity. Cybersecurity Coordinator Michael Daniel announced the strategy as part of the US Government’s efforts to support a ‘consensus based, private sector driven international standards development process’ to develop internationally adopted standards for cybersecurity to help create trust in cyberspace and the growth of the digital economy.

The Israeli Ministry of Defense has announced new export permit requirements for cyber security products. [16] The list of products subject to oversight includes systems that can deceive users, operating programs or communications with penetration programs; systems adapted for protecting or monitoring communication lines at a national level; and equipment and components designed for digital forensics.

And for those of you still on holiday or already nostalgic about the year that was 2015, our friends at the Council on Foreign Relations’ Net Politics [17] blog have just finished a five-part series on the top five cyber news events of 2015 that’s well worth a read.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-103/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2016/01/170354306_d50175a20f_z.jpg

[2] actually disable a power grid: http://www.cbc.ca/news/technology/ukraine-cyberattack-1.3398492

[3] SANS ICS analysis: https://ics.sans.org/blog/2016/01/09/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid

[4] media and intelligence agencies: http://qz.com/587520/russian-hackers-are-suspected-in-a-cyber-attack-that-caused-a-huge-blackout-in-ukraine/

[5] Cyber Squirrel 1: http://cybersquirrel1.com/?dom=pscau&src=syn

[6] cyber power between Russia and Ukraine: http://blogs.cfr.org/cyber/2016/01/11/the-use-of-cyber-power-in-the-war-between-russia-and-ukraine/

[7] announced: http://sputniknews.com/asia/20160101/1032585585/china-cyberwarfare-military.html

[8] existing space operations and cyber and information warfare units: http://sinodefence.com/2016/01/01/pla-forms-rocket-force-and-strategic-support-force/

[9] extensive discussion on Chinese concepts of cyber warfare: http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=43798#.VpRV6xV97jY

[10] Third Plenum of the 18th Party Congress in 2013: http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=41936&cHash=a59f3f0ed1bc05a58fc8011fe0a84f73#.VpRThBV97jY

[11] Central Military Commission in direct control of all military forces: http://www.scmp.com/news/china/diplomacy-defence/article/1897356/chinese-military-launches-two-new-wings-space-and-cyber

[12] draft counterterrorism legislation: http://www.scmagazine.com/china-us-signal-a-cyber-policy-arms-race/article/461681/

[13] Christopher Mims notes: http://www.wsj.com/articles/why-we-dont-need-backdoors-to-move-ahead-on-cybersecurity-1452488460

[14] have posted a letter online signed by nearly 200 experts, activists and corporations: http://www.theguardian.com/world/2016/jan/11/cyber-security-open-letter-software-encryption-backdoors

[15] the White House released a new strategy: https://www.whitehouse.gov/blog/2015/12/23/engaging-international-community-cybersecurity-standards

[16] has announced new export permit requirements for cyber security products.: http://www.globes.co.il/en/article-defense-ministry-to-require-permits-for-cyber-security-exports-1001094659

[17] Net Politics: http://blogs.cfr.org/cyber/

Copyright © 2016 The Strategist. All rights reserved.