- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By and on February 26, 2014 @ 14:00

[1]Let’s kick things off at the RSA Conference [2] in San Francisco, which brings together information security professionals and business leaders to discuss emerging cybersecurity trends. This year’s conference has drawn criticism [3] from leading security experts as RSA Security—the network security company that manages the conference— has been accused of taking money from the National Security Agency to incorporate a flawed encryption algorithm into one of its security products.

As with many of today’s cyber conversations, the Snowden disclosures shaped the agenda at the EU-Brazil summit this week in Brussels. First up was the announcement of a new underwater communications cable [4] to run between Portugal and Brazil. The €134 million project seeks to reduce reliance on US cables in order to insulate against American surveillance efforts. (Brazilian President Dilma Rousseff has been less-than-successful [5] in building her country’s cyber fortifications since it was revealed the NSA had been keeping tabs on her and her allies). Also out of the EU-Brazil summit is news [6] of the grouping’s plan to hold a dialogue on international cyber policy. The first dialogue is set to occur on the sidelines of April’s Global Multistakeholder Meeting on the Future of Internet Governance [7] (or NETmundial) in Sao Paulo. The US State Department has recently released [8] their submission to conference organisers.

The New York Times has a piece on the role that American cyber weapons might play in Syria: [9]

The Obama administration has been engaged in a largely secret debate about whether cyberarms should be used like ordinary weapons, whether they should be rarely used covert tools or whether they ought to be reserved for extraordinarily rare use against the most sophisticated, hard-to-reach targets. And looming over the issue is the question of retaliation: whether such an attack on Syria’s air power, its electric grid or its leadership would prompt Syrian, Iranian or Russian retaliation in the United States.

In a move that has surprised some [10], South Korea has candidly announced [11] its plan to develop offensive cyber capabilities to disrupt the DPRK’s nuclear weapons program. The South Korean Defence Ministry stated that a new Cyber Defence Command would be set up from May and name checked Stuxnet [12] as the type of cyberweapon it would seek to deploy. While developing cyber capabilities might well be a smart move, it mightn’t be so strategic to advertise your offensive intentions to your hostile northern neighbour…

In light of the data breaches at major retailers Target and Neiman Marcus, US Attorney General Eric Holder has called for a data-breach notification law [13], which would require businesses that have lost information in cyberattacks to notify those affected. According to Holder, this law ‘would enable law enforcement to better investigate these crimes—and hold compromised entities accountable’. The Economist has a possible pre-emptive answer for retailers and other businesses, with an interesting piece [14] on the role of ‘whitehats’ and the increasing demand for penetration testing of computer systems.

Tokyo-based Bitcoin exchange Mt. Gox is offline with trading suspended [15] due to the theft of roughly US$375 million dollars worth of the virtual currency. The exchange hack and subsequent collapse in Bitcoin value brings into question yet again the currency’s stability and security protocols, let alone the legitimacy of Bitcoin as a global currency.

Over at The Monkey Cage blog, Henry Farell has continued his dispassionate exploration into the political science of cyber security. In Part III [16], he looks to how international relations theory informs American cyber security doctrine. Catch up with Part I [17] and Part II [18].

In case you missed it, ICPC’s Klée Aiken this week published his report on US cyber security efforts in which he highlights some important lessons for Australia. Cybersecurity by Executive Order can be downloaded here [19] (PDF).

Finally, some good news for those of us who have already binge-watched the entire second season of House of Cards (Chinese cyber espionage storyline, anyone?). CBS has ordered a pilot [20] of the long running CSI: Crime Scene Investigation franchise to explore the dark world of cybercrime. The spinoff will investigate ‘crimes that start in the mind, live on-line and play out in the real world’ informed by the work of Irish cyber psychologist Mary Aiken.

David Lang and Simon Hansen are interns in ASPI’s International Cyber Policy Centre [21].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-17/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2013/07/cyber-logo.jpg

[2] RSA Conference: http://www.rsaconference.com/

[3] drawn criticism: http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/07/at-least-six-security-experts-boycott-prominent-security-conference-over-nsa-ties/

[4] the announcement of a new underwater communications cable: http://www.reuters.com/article/2014/02/24/us-eu-brazil-idUSBREA1N0PL20140224

[5] less-than-successful: http://www.zdnet.com/brazil-struggles-to-create-cybersecurity-policies-7000026701/

[6] news: http://english.cntv.cn/20140225/100553.shtml

[7] Global Multistakeholder Meeting on the Future of Internet Governance: http://netmundial.br/

[8] recently released: http://www.state.gov/e/eb/rls/prsrl/2014/221946.htm

[9] role that American cyber weapons might play in Syria:: http://www.nytimes.com/2014/02/25/world/middleeast/obama-worried-about-effects-of-waging-cyberwar-in-syria.html?_r=0

[10] surprised some: http://theconversation.com/south-koreas-cyber-war-ambitions-could-backfire-badly-23628

[11] candidly announced: http://english.yonhapnews.co.kr/national/2014/02/19/3/0301000000AEN20140219003100315F.html

[12] Stuxnet: http://en.wikipedia.org/wiki/Stuxnet

[13] called for a data-breach notification law: http://www.pcworld.com/article/2101140/us-attorney-general-calls-for-databreach-notification-law.html

[14] interesting piece: http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue

[15] offline with trading suspended: http://www.wired.com/wiredenterprise/2014/02/bitcoins-mt-gox-implodes/

[16] Part III: http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/02/20/the-political-science-of-cybersecurity-iii-how-international-relations-theory-shapes-u-s-cybersecurity-doctrine/

[17] Part I: http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/01/23/the-political-science-of-cybersecurity-i-why-people-fight-so-hard-over-cybersecurity/

[18] Part II: http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/02/12/the-political-science-of-cybersecurity-ii-why-cryptography-is-so-important/

[19] here: https://www.aspi.org.au/publications/cybersecurity-by-executive-order/SI68_Cybersecurity_EO.pdf

[20] ordered a pilot: http://www.rcsi.ie/index.jsp?n=110&p=100&a=4385

[21] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

Copyright © 2016 The Strategist. All rights reserved.