- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on November 19, 2014 @ 12:30

Panda [1]President Xi Jinping spoke of ‘a bridge of mutual trust’ and ‘a vast ocean of goodwill’ in his address to the Australian Parliament, but on the cyber front, recent headlines have painted China in a much more menacing light. Ahead of last weekend’s G20 summit in Brisbane, CrowdStrike uncovered malicious cyber activity targeting Australian media outlets that it has connected to Chinese government-linked hacking groups. Deep Panda and Vixen Panda [2], as the groups are being called, ‘typically go after very strategic interests for the Chinese government’, with CrowdStrike CEO Dmitri Alperovitch highlighting Vixen Panda as particularly focused on Australia.

Reports from the US are also pointing fingers at China after a spate of attacks on US federal systems. Following targeted attacks on the White House [3] and the United States Postal Service [4], the National Oceanic and Atmospheric Administration [5] has revealed that four of its websites have been compromised. While the resilient meteorologists are said to have ‘deflected’ the attacks, taken in concert with a breach of the State Department [6]’s unclassified email system, the trend is ringing alarm bells [7] on the Hill. State’s tight-lipped approach [8] is concerning lawmakers, but, as Steve Ward reminds us, the best course of action isn’t always ‘to rush out and inform’. With the cyber blur [9] causing trouble for America’s cyber defenders, many were surprised that cyber didn’t feature more prominently in meetings between President Obama and President Xi [10].

Of course, in this overhyped environment it’s often worth taking a step back to unpack the underlying complexity of the US–China cyber relationship. That’s precisely James A. Lewis and Simon Hansen [11]’s intent in ICPC’s latest publication. Lewis breaks down the hysteria around Chinese economic cyber warfare, warning to ‘never attribute to malice what is adequately explained by avarice’. And while a new Cold War in cyberspace makes for compelling headlines, oversimplifying and misrepresenting China’s relationship with cyber has ‘serious policy implications’. Our man in Beijing, Simon Hansen, looks to rectify that very issue, deciphering China’s elite discourse and political aspirations concerning cyberpower. For even more on the US–China cyber relationship, check out this great interview [12] with Jim from the Diplomat.

While the US–China cyber relationship is far more complex than may first appear, what’s perfectly clear is the growing need for confidence building in cyberspace. Efforts in the OSCE [13] and in the ASEAN Regional Forum [14] have shown promise, but more comprehensive and inclusive measures are needed. The latest report [15] from the Cyber Statecraft Initiative over at the Atlantic Council and the Swedish National Defense College takes a crack at addressing that need, calling for a multistakeholder approach for stability and security.

One reason a multistakeholder approach to CBMs is needed is that ‘cyberspace is predominantly dominated not by the actions of states but of nonstate actors’. That fact is no more apparent than in the UK, where Scotland Yard [16] is waging ‘war’ on 200 cybercrime gangs in London alone. Like traditional criminal activity, cybercrime’s primary driver is profit. As FBI Supervisory Special Agent Keith Mularski [17] puts it, ‘cyber criminals view themselves as businessmen. They even buy ads on underground forums’. Mularski went on to describe cyberspace as the venue for ‘organized crime for the 21st Century’, drawing comparisons with La Cosa Nostra and Joe Valachi.

Despite the increasing number of threats posed by nefarious cyber actors, Mularski did praise the ‘great strides’ made in information-sharing and law-enforcement cooperation. NIST is looking to further enhance that space, having released SP 800-150, its latest DRAFT Guide to Cyber Threat Information Sharing [18]. The document falls under NIST’s Federal Information Security Management Act responsibilities and comments on the draft are welcome until November 28.

Klée Aiken [19] is an analyst in ASPI’s International Cyber Policy Centre [20]. Image courtesy of Flickr user Eben Regls [21].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-51/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/11/Panda.jpg

[2] Deep Panda and Vixen Panda: http://www.abc.net.au/news/2014-11-13/g20-china-affliliated-hackers-breaches-australian-media/5889442

[3] White House: http://www.reuters.com/article/2014/10/28/us-usa-whitehouse-cybersecurity-idUSKBN0IH2EY20141028

[4] United States Postal Service: http://www.washingtonpost.com/blogs/federal-eye/wp/2014/11/10/china-suspected-of-breaching-u-s-postal-service-computer-networks/

[5] National Oceanic and Atmospheric Administration: http://www.networkworld.com/article/2847094/us-weather-agency-confirms-cyberattack.html

[6] State Department: http://www.reuters.com/article/2014/11/17/us-cybersecurity-statedept-idUSKCN0J11BR20141117

[7] alarm bells: http://hosted.ap.org/dynamic/stories/U/US_STATE_DEPARTMENT_COMPUTERS?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2014-11-16-15-01-30

[8] tight-lipped approach: http://www.nextgov.com/cybersecurity/2014/11/states-reluctance-disclose-hack-double-standard/99290/?oref=ng-HPtopstory

[9] cyber blur: http://www.defense.gov/news/newsarticle.aspx?id=123649

[10] President Obama and President Xi: http://fcw.com/articles/2014/11/14/why-cyber-took-a-back-seat.aspx

[11] James A. Lewis and Simon Hansen: https://www.aspi.org.au/publications/chinas-cyberpower-international-and-domestic-priorities

[12] interview: http://thediplomat.com/2014/11/cyber-espionage-and-us-china-relations/

[13] OSCE: http://www.osce.org/cio/126475

[14] ASEAN Regional Forum: http://www.aspistrategist.org.au/cyber-confidence-building-in-the-asia-pacific-three-big-take-aways-from-the-arf/

[15] latest report: http://www.atlanticcouncil.org/publications/reports/confidence-building-measures-in-cyberspace-a-multistakeholder-approach-for-stability-and-security

[16] Scotland Yard: http://www.standard.co.uk/news/crime/scotland-yard-wages-war-on-200-cyber-crime-gangs-in-london-9864993.html

[17] Keith Mularski: http://thecyberwire.com/interviews/interview_111714.html

[18] DRAFT Guide to Cyber Threat Information Sharing: http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-150

[19] Klée Aiken: https://www.aspi.org.au/about-aspi/aspi-staff/analysts/klee-aiken

[20] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

[21] Eben Regls: https://www.flickr.com/photos/[email protected]/3047351549

Copyright © 2016 The Strategist. All rights reserved.