- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on November 26, 2014 @ 14:30

[1]South Korea is set to [2] absorb its Cyber Command into its military apparatus over the next two months, formalising a decision taken earlier [3] in the year to alter the focus of the organisation from the defensive protection of national infrastructure, to a more offensive, outward-focused mission. Previously, activities  of the national Cyber Command were classified as ‘administrative actions’. The government has now made the necessary alterations to the ‘Cyber Command Decree’ to transition control of the organisation to the Joint Chiefs of Staff (JCS), freeing up personnel to carry out military-like operations, primarily against the North.

South Korea isn’t the only country doing a spot of international hacking. Germany’s top domestic spy Hans Georg Maassen has told [4] a cybersecurity conference in Berlin this week that of the 3,000 attacks experienced by government networks on average each day, at least five are the handiwork of foreign governments. Those sophisticated attacks are often traced to either Russia or China and are most frequent in the lead-up to major international events and negotiations such as the G20. He also explained that hackers were often after the ‘cutting-edge’ technology produced by German firms.

Maassen’s signals-intelligence counterpart across the Atlantic, NSA Chief Admiral Michael Rogers, also spoke publicly [5] this week on the threat posed by foreign cyber attackers. Testifying to the House Intelligence Committee on threats posed to critical national infrastructures, Rogers was asked a series of questions surrounding the security of US critical national infrastructure:

There shouldn’t be any doubt in our minds that there are nation-states and groups out there that have the capability . . . to shut down, forestall our ability to operate our basic infrastructure, whether it’s generating power across this nation, whether it’s moving water and fuel.

He explained [6] that ‘reconnaissance’ missions designed to map the layout of such systems and identify vulnerabilities had already been detected. The Admiral identified China as being among those countries he suspected of possessing the capability to carry out such an attack, but he also said there were ‘probably one or two others’, without elaborating.

Expanding on the Admiral’s comments, Jonathan Pollet has a good article that puts the issue of attacks against critical national infrastructure into perspective. He explains [7] that since the US energy grid is owned and operated by hundreds of different companies with different software and security set-ups, trying to break into them all at once would be similar to ‘trying to rob a hundred different banks at the exact same time’.

The New Zealand Government is currently reviewing its National Cyber Policy Strategy, last updated in 2011. This week the head of the NZ Cyber Policy Office, Paul Ash, gave a sneak peek as to what to expect in a discussion [8] with Radio New Zealand. He said the new strategy will refine the roles of those agencies involved with cyber, encourage public agencies to work with the private sector and generally call for a ‘net lift in effort, not just from the public sector but from private sector partners and others’. It’s a lead the Australian government would do well to follow.

Staying in the region a recent report [9] has picked out Vietnam, India and Indonesia as the next big sources for DDoS attacks heading into the New Year. All three countries’ expanding but under-protected IT networks, and exploding smartphone use, coupled with lack of end-user awareness surrounding IT security, has led to the prediction of a botnet storm.

Finally Elina Noor has an excellent piece [10] up at the New Straits Times calling for ASEAN to step up and play a greater role in shaping the cyber domain through groupings such as the ASEAN Defence Ministers Meeting. She argues that it’s in the region’s best interest to establish rules for online interaction based around an international legal framework and highlights the military domain as a key starting point.

Jessica Woodall [11] is an analyst in ASPI’s International Cyber Policy Centre [12]. Image courtesy of Flickr user Alejandro Juárez [13].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-52/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/11/2568510756_c1a4620ed8_z.jpg

[2] set to: http://www.koreatimes.co.kr/www/news/nation/2014/11/116_168710.html

[3] earlier: http://thediplomat.com/2014/02/s-korea-seeks-cyber-weapons-to-target-north-koreas-nukes/

[4] told: http://www.reuters.com/article/2014/11/18/us-germany-cybersecurity-idUSKCN0J226U20141118

[5] publicly: http://www.washingtonpost.com/world/national-security/nsa-chief-foreign-powers-steal-data-on-critical-us-infrastructure/2014/11/20/ddd4392e-70cb-11e4-893f-86bd390a3340_story.html

[6] explained: http://www.reuters.com/article/2014/11/21/us-usa-security-nsa-idUSKCN0J420Q20141121

[7] explains: http://www.businessinsider.com/what-hackers-can-do-to-our-power-grid-2014-11?IR=T

[8] discussion: http://www.radionz.co.nz/national/programmes/sunday/audio/20158063/insight-for-23-november-2014-cyberwarfare-and-nz

[9] report: http://www.csoonline.com/article/2849230/business-continuity/next-years-ddos-attacks-to-come-from-vietnam-india-and-indonesia.html

[10] piece: http://www.nst.com.my/node/56216?d=1

[11] Jessica Woodall: https://www.aspi.org.au/about-aspi/aspi-staff/analysts/jessica-woodall

[12] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

[13] Alejandro Juárez: https://www.flickr.com/photos/fotopamp/2568510756

Copyright © 2022 The Strategist. All rights reserved.