- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on November 5, 2014 @ 14:30

President Barack Obama enters the South Portico of the White House [1]Another big week in cyberspace kicked off with news [2] that ‘suspicious activity’ had been detected on an unclassified network at the White House. The activity, which caused some disruption to IT services within the Executive Office of the President, was contained quickly and was prevented from spreading to more sensitive classified networks.

Given the nature of the target and the type of activity, the infiltration attempt bears the hallmarks of a state-backed attack, with some news outlets going so far as to point the finger at a specific country [3].

Cybersecurity rock-star Bruce Schneier [4] gave an interview [5] on the attack to Bloomberg Politics. In a conversation his fans are sure to enjoy, he effectively cuts through the media hype surrounding the incident.

Chairman of the Joint Chiefs General Martin Dempsey was dropping some hard truths of his own at Syracuse University. During a speech [6] addressing ‘Strategy in the Open’ Dempsey pinpointed cyberspace as an increasingly dangerous domain for the military and the country, and one that isn’t currently being adequately addressed. He also spoke [7] about the unique problems cyber brings to his role.

(The) conversation about cyber can become emotional faster than almost anything else I deal with, because of issues related to privacy, to standards, to information sharing between corporate America and the government. We’re not dealing with cyber very effectively…We’ve got to find a way to collaborate on standards and information sharing and what is the role of the government in the cyber domain.

Moving across the Atlantic, the European Union conducted its largest-ever critical national infrastructure cybersecurity exercise last week. The drill [8] involved 29 countries and over 200 agencies and was designed to test and help improve coordination between the EU member countries’ national security bodies. EU Commission vice president Neelie Kroes stressed the importance of collaboration in a press release: ‘The sophistication and volume of cyber-attacks are increasing every day…They cannot be countered if individual states work alone or just a handful of them act together’.

Staying in Europe, the Dutch Government has released [9] the fourth edition of its yearly Cyber Security Assessment. The comprehensive paper, which is produced by the National Cyber Security Center, explains in detail the cyber trends witnessed in the previous year, including threat-based analysis against a wide range of targets including government, business and private citizens.

Closer to home, the South Korean government played host to the Seoul Defence Dialogue last week [10]. The forum, attended by senior defence officials from 24 countries across the region, saw one of its four sub-sessions dedicated to cybersecurity cooperation and international norms. Of particular note, the Chinese government agreed to send a delegation to the dialogue for the first time, in what’s being seen as an attempt to boost bilateral relations with the South Korean government.

Jumping on the bilateral band wagon, the Japanese government has announced a working-level cyber dialogue with a far-flung friend. Japanese Defense Minister Akinori Eto and his Finnish colleague Carl Haglund announced the new national-level discussions that will include a component on cyber defence.

Wrapping up this week, a rare collaboration between some of the internet’s heaviest hitters has resulted in another report [11] uncovering a Chinese-government-linked hacking organisation. The group dubbed ‘Axiom’ by the report has been linked to targeted hacking attempts against various governments, NGOs, media organisations, pro-democracy groups and several Fortune 500 companies. The research [12], led by Novetta was supported by Cisco and FireEye among others, with additional cooperation from Microsoft and Symantec, who all pooled information, tools and capability to help uncover the group’s online web.

Jessica Woodall [13] is an analyst in ASPI’s International Cyber Policy Centre [14]. Image courtesy of Flickr user The White House [15].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-49/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/11/7051355897_27148c4f93_z.jpg

[2] news: http://www.reuters.com/article/2014/10/28/us-usa-whitehouse-cybersecurity-idUSKBN0IH2EY20141028

[3] country: http://www.washingtonpost.com/world/national-security/hackers-breach-some-white-house-computers/2014/10/28/2ddf2fa0-5ef7-11e4-91f7-5d89b5e8c251_story.html?hpid=z2

[4] Bruce Schneier: https://www.schneier.com/about.html

[5] interview: http://www.bloomberg.com/politics/articles/2014-10-29/five-questions-for-cybersecurity-expert-bruce-schneier-after-the-latest-white-house-hacking

[6] speech: http://www.defense.gov/news/newsarticle.aspx?id=123546

[7] spoke: http://www.syracuse.com/news/index.ssf/2014/10/gen_martin_dempsey_chairman_of_the_us_joint_chiefs_of_staff_on_leadership_and_se.html

[8] drill: http://abcnews.go.com/International/wireStory/eu-holds-largest-cyber-security-exercise-26574352

[9] released: https://www.ncsc.nl/english/current-topics/news/cyber-securty-assessment-netherlands-4-cybercrime-and-digital-espionage-remain-the-biggest-threat.html

[10] week: http://www.globalpost.com/dispatch/news/yonhap-news-agency/141028/security-forum-trust-building-asia-pacific-opens-seoul

[11] report: http://www.novetta.com/files/9714/1446/8199/Executive_Summary-Final_1.pdf

[12] research: http://thediplomat.com/2014/10/report-highly-sophisticated-cyber-espionage-group-linked-to-chinese-intelligence/

[13] Jessica Woodall: https://www.aspi.org.au/about-aspi/aspi-staff/analysts/jessica-woodall

[14] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

[15] The White House: https://www.flickr.com/photos/whitehouse/7051355897

Copyright © 2023 The Strategist. All rights reserved.