- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on July 16, 2014 @ 14:30

[1]Ahead of the UK’s upcoming election, the British Prime Minister is looking towards the cyber-security horizon. Along with a major cabinet reshuffle, David Cameron has announced a £1.1 billion package [2] ‘to equip [the UK] armed forces for the conflicts of this century, not the last.’ This includes a £800 million boost to British intelligence, surveillance, and cyber capabilities. Welcome news for sure for NATO allies, who’ll travel to Wales in September for the 2014 NATO Summit. Building on last month [3]’s Defence Ministerial, alliance leaders will work to create a ‘clarity of policy’ [4] on cyber issues. For what it’s worth, UK Permanent Representative to NATO, Adam Thomson, is optimistic: ‘there is a large amount of common ground. I’m sure we will all hotly debate the finer points of policy…but I’m not worried about coming to some good, strong clear conclusions.’

Doing some horizon scanning of its own, the Australian Army’s Directorate of Future Land Warfare [5] has similarly found cyber to be a critical part of this century’s strategic environment. Stating that offensive cyber capabilities can be ‘as effective as precision-guided munitions’, the new study concludes that ‘the army must develop an ability to defend critical networks against cyber-attack, while also being prepared to operate in a degraded network environment.’

Unsurprisingly, the United States also recognises the critical role of cyber. Despite steep cuts to its military personnel overall, the US is looking to boost its cyber cadre by as many as 4,000 [6] personnel to meet the challenge. That move has raised some critical questions [7] about the ‘dangerous concentration’ of people and assets at Fort Meade (which houses too the Defense Information School, the headquarters of United States Cyber Command, the National Security Agency, and the Defense Information Systems Agency), the state of cyber training, and, of course, the impact of the ramp-up on parking and traffic. To pre-empt those issues, the Pentagon could learn from North Korea [8]’s experience, where cyber staff have doubled over the last two years!

A fair warning to anyone thinking of applying for any of those new positions—or to any US government agency for that matter—Chinese hackers are targeting Federal employee personal data [9]. In March, the Office of Personnel Management’s databases were infiltrated, with the perpetrators targeting files on federal employees who have applied for top-secret security clearances. While most experts suggest that this move falls ‘well within the bounds of modern spycraft’ and is ‘OK’ under US rules [10], don’t expect anything other than denials [11] from the Chinese government. After all ‘Chinese laws prohibit cyber crimes of all forms, and Chinese government has done whatever it can to combat such activities.’

The US Senate is also getting into the action, with the Senate Intelligence Committee [12] approving a bill to boost public–private information sharing. With Congressional inaction a major impediment to US governance cybermaturity [13] in 2014, this move will hopefully help boost the public–private partnership efforts outlined back in the 2013 cybersecurity Executive Order issued by President Obama. (More from ICPC on the Executive Order here [14])

While the week’s news demonstrates increased government efforts on the cyber front, with The Economist [15] finding that ‘cyber-attackers have multiplied and become far more professional’, the private sector isn’t holding its breath. Microsoft, for one, has been particularly gung-ho on the matter, announcing that it successfully freed 4.7 million infected PCs. Having identified millions more infected machines, the Microsoft Digital Crimes Unit is keen to continue its recent spate of cyber policing. But the company has been taking flak since a ‘technical error’ shut out 1.8 million legitimate Vitalwerks users during a sting operation. That isn’t stopping Facebook testing the vigilante waters by taking down the small Lecpetex botnet [16] operation that has used the social media platform to spread spam and malware. Meanwhile Google has revealed Project Zero [17], its own elite team of hackers ‘with the sole mission of tracking down and neutering the most insidious security flaws in the world’s software.’ While this type of corporate vigilatism mightn’t be the cyber heroism the Internet deserves, as governments continue to struggle with cybercrime, it might just be what it needs to stem the tide.

Klée Aiken is an analyst in ASPI’s International Cyber Policy Centre [18].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-35/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg

[2] £1.1 billion package: http://www.telegraph.co.uk/news/uknews/defence/10965217/Huge-investment-in-Armed-Forces-means-a-more-secure-future-for-Britain.html

[3] last month: http://www.zdnet.com/nato-updates-cyber-defence-policy-as-digital-attacks-become-a-standard-part-of-conflict-7000031064/

[4] ‘clarity of policy’: http://www.ft.com/intl/cms/s/0208cd24-0aa0-11e4-be06-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F0208cd24-0aa0-11e4-be06-00144feabdc0.html%3Fsiteedition%3Dintl&siteedition=intl&_i_referer=

[5] Directorate of Future Land Warfare: http://www.smh.com.au/federal-politics/political-news/australian-army-plans-for-future-hightech-combat-in-asia8217s-megacities-20140713-zt5qw.html

[6] 4,000: http://www.c4isrnet.com/article/20140710/C4ISRNET07/307100011

[7] critical questions: https://twitter.com/ASPI_ICPC/status/488448348848803840

[8] North Korea: http://www.stasiareport.com/the-big-story/asia-report/north-korea/story/north-korea-doubles-cyber-war-personnel-sets-overseas-ba

[9] Federal employee personal data: http://www.nytimes.com/2014/07/10/world/asia/chinese-hackers-pursue-key-data-on-us-workers.html?smid=tw-share&_r=1

[10] OK’ under US rules: http://www.politico.com/story/2014/07/latest-china-hack-cybersecurity-108782.html#.U7_xltLXq-Q.twitter

[11] denials: http://www.smh.com.au/it-pro/security-it/china-denies-deep-panda-hacker-links-20140709-zt138.html

[12] Senate Intelligence Committee: http://www.itnews.com.au/News/389437,us-intelligence-committee-approves-cybersecurity-bill.aspx?utm_source=feed&utm_medium=rss&utm_campaign=iTnews

[13] cybermaturity: https://www.aspi.org.au/publications/cyber-maturity-in-the-asia-pacific-region-2014

[14] here: https://www.aspi.org.au/publications/cybersecurity-by-executive-order

[15] The Economist: http://www.economist.com/news/special-report/21606421-cyber-attackers-have-multiplied-and-become-far-more-professional-hackers-inc?fsrc=scn/tw/te/pe/hackersinc

[16] Lecpetex botnet: http://threatpost.com/facebook-carries-out-lecpetex-botnet-takedown/107096

[17] Project Zero: https://mail.aspi.org.au/owa/redir.aspx?C=LI8sibxY6E2UERt2VT2uhQfUlm46dNEIu280sRh2LkxLyVT43wqkwxV0DNZeLcpE4XvND15eJqY.&URL=http%3a%2f%2fwww.wired.com%2f2014%2f07%2fgoogle-project-zero%2f

[18] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

Copyright © 2016 The Strategist. All rights reserved.