- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on March 5, 2014 @ 12:15

[1]

The Russian military occupation of Crimea headlines this week, with Moscow showing considerable restraint so far in the use of cyberattacks against Ukraine. Considering that crippling DDoS attacks have become a staple of conflicts involving Russia and its smaller neighbours such as Estonia and Georgia, one commentator has rightly asked: where are the cyberattacks? [2]

Ukrainian hackers are highly proficient (and patriotic) operators, so the fear of retaliation could have dissuaded Russia from the use of cyberattacks. If so, this highlights the value of offensive information warfare capabilities as an effective deterrent, a point that cyber operations centres around the world should note.

For a look at Russia and Ukraine’s cyber capabilities, as well as what has been deployed so far, check out this post on the Lawfare blog [3], and this piece in Foreign Policy [4]. The key challenge in this crisis is to avoid mis-attribution and escalation, as the ability of both sides to inflict harm in the cyberdomain is tried and tested.

A significant announcement was made in China last week as President Xi Jinping was declared head [5] of the new leading group on ‘internet security and informatization’. The announcement received considerable local attention, airing as one of the lead stories [6] on CCTV’s evening news. The group’s goals include drafting a national cybersecurity strategy and coordinating cybersecurity across government sectors. During the inaugural meeting, President Xi said ‘efforts should be made to build our country into a cyberpower’. See Adam Segal’s commentary [7] for an excellent analysis of the broadcast.

Activists in the Philippines are protesting against [8] the 2012 cyber crime protection law that makes cybersex, pornography and file-sharing illegal. Among netizens, the most contentious part [9] of the law seems to be a provision making online libel (defamation) a crime. A similar debate [10] is happening in Indonesia with regards to the Electronic Information and Transaction (ITE) law that’s been in place since 2009.

2013 was a year plagued by significant commercial security breaches and constant revelations about government surveillance. The recent RSA Conference 2014 was overshadowed by those events with one commentator drolly noting [11] that ‘last year’s impregnably secure business looks like this year’s Swiss cheese’. Another observed [12] that many conversations during the conference boiled down to a ‘trust deficit’ between government and business, as well as between companies and users. Tying up the conference with a keynote address [13] was satirist Stephen Colbert. ‘Many of you see me as a champion of privacy,’ quipped Colbert, ‘which I know because I read your e-mails’.

­

Organisers of TrustyCon, an information security conference that runs simultaneously to the RSA conference, have released footage from the event—available here [14].

Finally, US Cyber Command head General Keith Alexander testified for the last time in that role to the Senate Armed Services Committee. In his statement [15] he acknowledged that some key capability gaps, including that some weapons systems were not as ‘cyber robust’ as they need to be, have left the US military at risk.

Simon Hansen is an intern in ASPI’s International Cyber Policy Centre [16].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-18/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg

[2] where are the cyberattacks?: http://www.csmonitor.com/World/Security-Watch/2014/0303/Where-are-the-cyberattacks-Russia-s-curious-forbearance-in-Ukraine

[3] Lawfare blog: http://www.lawfareblog.com/2014/03/the-russian-ukranian-cyber-conflict/

[4] this piece in Foreign Policy: http://www.foreignpolicy.com/articles/2014/03/03/hack_attackhttp:/www.foreignpolicy.com/articles/2014/03/03/hack_attack

[5] was declared head: http://news.xinhuanet.com/english/china/2014-02/27/c_133148273.htm?utm_source=The+Sinocism+China+Newsletter&utm_campaign=d96724e196-Sinocism02_27_14&utm_medium=email&utm_term=0_171f237867-d96724e196-3627837

[6] airing as one of the lead stories: http://news.cntv.cn/2014/02/27/VIDE1393500060002469.shtml?utm_source=The+Sinocism+China+Newsletter&utm_campaign=d96724e196-Sinocism02_27_14&utm_medium=email&utm_term=0_171f237867-d96724e196-3627837

[7] commentary: http://www.forbes.com/sites/adamsegal/2014/02/27/chinas-new-small-leading-group-on-cybersecurity-and-internet-management/

[8] protesting against: http://stream.aljazeera.com/story/201402252104-0023508

[9] the most contentious part: http://stream.aljazeera.com/story/201210030035-0022359

[10] similar debate: http://www.techinasia.com/cyber-law-twitter-libel-indonesia-guilty/

[11] drolly noting: http://www.eweek.com/security/rsa-2014-10-takeaways-from-a-show-overshadowed-by-fractured-trust.html#sthash.5WUoO4N6.dpuf

[12] observed: http://blogs.wsj.com/cio/2014/03/03/cybersecurity-and-the-trust-deficit/

[13] keynote address: http://www.youtube.com/watch?v=XrZYBNtZW4o

[14] available here: http://www.net-security.org/secworld.php?id=16466

[15] his statement: http://www.armed-services.senate.gov/imo/media/doc/Alexander_02-27-14.pdf

[16] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

Copyright © 2021 The Strategist. All rights reserved.