- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on February 19, 2014 @ 13:15

[1]This week saw the long-awaited release of US President Obama’s Framework for Improving Critical Infrastructure Cybersecurity [2] after a year of concentrated effort by the National Institute of Standards and Technology [3] (NIST). The document has been heralded [4] as a step in the right direction [5]; the White House is seeking to motivate private sector uptake by framing these standards as means to support profit. Despite a lack of Congress support, it may also become ‘the de facto standard for private sector cyber security in the eyes of US lawyers and regulators [6]’. The NIST also released an accompanying Roadmap document [7] that will guide the future of the framework, detailing cybersecurity development, alignment and collaboration planning.

Over in Beijing, internet freedom was on the agenda when US Secretary of State John Kerry met with Chinese bloggers [8] over the weekend. The bloggers appealed to Secretary Kerry to help ‘tear down the great internet firewall’ in a discussion that also touched on human rights issues. In contrast, China’s leadership labelled Kerry’s expression of support of internet freedom ‘naive’ [9].

The cyber capabilities and mindset of the North Korean regime have recently been occupying the time of a number [10] of experts [11]. With significant international attention on the DPRK following the release this week of the UN’s Human Rights Inquiry [12] and some commentators [13] charting a cycle of provocation and charm, it remains to be seen how the North’s cyber capabilities—against the US and the South—are intended to be used. For some background reading on the issue, ICPC Director Toby Feakin recently published a paper [14] (PDF) on the size and scope of the DPRK’s cyber capabilities.

Still in Asia, the National Institute of Information and Communications Technology (NICT) in Japan recently reported [15] that it’s the systems of government and other organisations were subject to 12.8 billion cyber-attacks in 2013. The Japanese Defense Ministry has also announced 90 person force that will take shape in late-March to strengthen the Ministry’s capacity to manage cyberattacks. Drawn from across the Self-Defense Forces [16], the team will monitor, analyse and respond to cyber breaches, as well as explore counterstrike capabilities.

In Europe, the IT and telecommunication systems of the French Defense Ministry are set to be strengthened [17] against cyber threats, with the government announcing an investment of €1 billion. Having recently recommitted to cyber security cooperation [18] with the United States, France has set a two-year timeline in which to build capabilities to match those of its NATO allies. A centre will also be set up to develop offensive cyber weapon capabilities and to train military personnel on cyber defence issues.

In her weekly podcast, German Chancellor Angela Merkel proposed [19] the development of a European communications network to improve data protection for EU residents. Merkel emphasised that emails and other information shouldn’t have to be sent across the Atlantic where data protection standards of giants like Google and Facebook were wanting. The announcement follows the failure of Germany–US talks [20] that were hoped would produce a bilateral no-spy agreement in the wake of the Snowden disclosures.

Finally, the New York Times has a fascinating profile [21] on Brian Krebs. On his blog, Krebs on Security [22], he writes on a range of cyber security issues, focussing on the dark world of cybercrime (with a 12-guage shotgun by his computer, no less). Krebs was the first to uncover huge frauds at Target, Neiman Marcus and others that have made victims of what’s estimated at more than one third of Americans. His revelations, coupled with tech developments, have boosted [23] the priority of and spending on cyber security for many US-based merchants.

David Lang is an intern at ASPI’s International Cyber Policy Centre.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-16/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2013/07/cyber-logo.jpg

[2] Framework for Improving Critical Infrastructure Cybersecurity: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf

[3] National Institute of Standards and Technology: http://www.nist.gov/

[4] heralded: http://www.cio.com/article/748244/NIST_Framework_Released_to_Widespread_Praise_But_What_Happens_Next_?page=1&taxonomyId=3089

[5] step in the right direction: http://www.cio.com.au/article/538506/tech_industry_praises_cybersecurity_framework_from_white_house/

[6] the de facto standard for private sector cyber security in the eyes of US lawyers and regulators: http://www.informationweek.com/government/cybersecurity/nist-cybersecurity-framework-dont-underestimate-it/d/d-id/1112978

[7] Roadmap document: http://www.nist.gov/cyberframework/upload/roadmap-021214.pdf

[8] met with Chinese bloggers: http://www.afr.com/p/technology/kerry_offers_support_for_internet_7x34eJjoPYQMAzEDmi5cCJ

[9] ‘naive’: http://www.businessspectator.com.au/news/2014/2/18/technology/china-labels-kerrys-call-internet-freedom-naive

[10] number: http://www.washingtontimes.com/news/2014/feb/14/rep-mike-rogers-we-should-never-underestimate-pyon/

[11] experts: http://www.foxnews.com/tech/2014/02/14/cyberwar-experts-question-north-korea-cyber-capabilities/

[12] UN’s Human Rights Inquiry: http://www.ohchr.org/EN/HRBodies/HRC/CoIDPRK/Pages/ReportoftheCommissionofInquiryDPRK.aspx

[13] some commentators: http://thediplomat.com/2014/02/dont-be-fooled-north-korea-is-getting-ready-to-provoke/

[14] recently published a paper: http://www.kinu.or.kr/servlet/Download?num=907&fno=947&bid=DATA03&callback=

[15] reported: http://www.japantimes.co.jp/news/2014/02/11/business/record-12-8-billion-cyberattacks-detected-in-japan-last-year/#.UwKSY_mSyar

[16] Self-Defense Forces: http://en.wikipedia.org/wiki/Japan_Self-Defense_Forces

[17] set to be strengthened: http://www.reuters.com/article/2014/02/07/france-cyberdefence-idUSL5N0LC21G20140207

[18] recommitted to cyber security cooperation: http://www.whitehouse.gov/the-press-office/2014/02/11/fact-sheet-us-france-security-cooperation

[19] proposed: http://www.bbc.co.uk/news/world-europe-26210053

[20] failure of Germany–US talks: http://www.ft.com/intl/cms/s/0/678c54de-949b-11e3-9146-00144feab7de.html#axzz2tePG89Fe

[21] fascinating profile: http://www.nytimes.com/2014/02/17/technology/reporting-from-the-webs-underbelly.html?hp&utm_content=buffer8bd11&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer&_r=0

[22] Krebs on Security: http://krebsonsecurity.com/

[23] boosted: http://www.reuters.com/article/2014/02/05/us-usa-retailers-cybersecurity-idUSBREA1409H20140205

Copyright © 2016 The Strategist. All rights reserved.