Cyber wrap
Posted By
Klée Aiken
on January 28, 2015 @ 14:56
The use of social media by extremist groups continues to trouble policymakers and police forces across the globe. The sophisticated use of online platforms by groups such as ISIS have spurred governments in Europe to call on US tech companies to
pre-emptively filter terrorist-related material. ‘Online jihad 3.0’ has drawn serious government concern about freedom of speech, as well as liability, and more
creative solutions might be prudent. For instance,
social media users in Japan have taken to mocking ISIS’ attempt to hijack Japanese hashtags following the kidnapping of two Japanese citizens.
Although its links to ISIS remain dubious, the self-proclaimed Cyber Caliphate has made
Malaysia Airlines its latest high-profile victim by hacking the company’s website. While such attacks can be brushed off as a cosmetic inconvenience, the hacks can have serious consequences for a company’s bottom line and reputation, as well as for consumer confidence. More serious cases have included hacks of
CENTCOM, the Tennessee Valley Authority, and the
White House. And although directed at
third or fourth party platforms, those attacks fed at fear of cyber vulnerability in the military and energy infrastructure. It’s critical that supply-chain and third-party cyber security is considered when assessing cyber risk and such high profile attacks highlight the tricky cost–benefit balance of trusting one’s public face to external platforms.
While the controversial
NETmundial Initiative launch was scrapped from this year’s World Economic Forum meeting in Davos,
Internet Governance and
cyber policy remained prominently on the agenda. With last year’s string of hacks against major corporations, that top-level executives now take notice of cyber issues is an expected, and
much needed, development. However the rights and responsibilities of businesses in regards to security in cyberspace remain murky. In response,
major banks represented at Davos called for free reign to actively defend themselves against cyber criminals—a tactic with
questionable merits.
Some remain sceptical about
North Korea’s culpability in the Sony hack, but Dennis Rodman’s defensive prowess might not extend to cyberspace. Regardless of attribution, state reactions should be watched closely: each escalation of tension could
set a dangerous precedent for future cyber activities.
Speaking of which, the United States is certainly watching the cyber policy space closely, with Chairman of the Joint Chiefs of Staff General
Martin Dempsey highlighting cybersecurity among his highest priorities and calling for information-sharing legislation. This echoed the calls made by his Commander-in-Chief the previous evening during the annual
State of the Union Address. The President urged lawmakers to ‘finally pass legislation we need to better meet the evolving threat of cyber attacks’ and integrate ‘intelligence to combat cyber threats, just as we have done to combat terrorism.’ With the US continuing the push for major cyber initiatives, it’s prudent to ask whether Australia is keeping up…
At a recent event at the Brookings Institute, Foreign Minister
Julie Bishop spoke of cyber as a shared challenge for the US and Australia. At the same event US Undersecretary for Defense for Policy
Christine Wormuth praised the US–Australia alliance, including cooperation including ‘a variety of initiatives in the cyber domain.’ On Australia’s cyber activism, a recent
article went so far as to suggest that Australia has launched ‘cyber-weapons in global counter-terrorist operations.’ Although this allegation isn’t fully fleshed out, there’re
plenty of signs that Australia is highly capable on the technical front.
However, on thE policy-side ICPC analyst
Jessica Woodall suggests ‘we are falling behind our allies.’ Although the launch of a cybersecurity review is a
solid first step, she argues that ‘not having an updated strategy inhibits us from forward planning’ and under-defined roles and responsibilities create confusion both within government and for the private sector and international partners.
Klée Aiken is an analyst in ASPI’s International Cyber Policy Centre. Image courtesy of Twitter user @JulieBishopMP.
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-59/
[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/01/B75mtBSCUAE5RvQ.jpg
[2] pre-emptively filter: http://www.homelandsecuritynewswire.com/dr20150122-european-govts-urge-u-s-tech-companies-to-remove-terroristrelated-postings-from-sites
[3] creative solutions: http://www.theaustralian.com.au/opinion/savvy-islamists-launch-jihad-30/story-e6frg6zo-1227068275940
[4] social media users in Japan: http://www.japantimes.co.jp/news/2015/01/21/national/islamic-states-twitter-tactics-mocked-by-japanese-internet-users/#.VMcP9y4YOhy
[5] Malaysia Airlines: http://www.usatoday.com/story/tech/2015/01/25/malaysia-airlines-hack/22332867/
[6] CENTCOM: http://www.washingtonpost.com/news/checkpoint/wp/2015/01/12/centcom-twitter-account-apparently-hacked-by-islamic-state-sympathizers/
[7] White House: http://www.businessinsider.com.au/obama-twitter-hacked-syrian-electronic-army-2013-10
[8] third or fourth party platforms: http://www.nextgov.com/cybersecurity/2015/01/what-do-godaddy-and-centcoms-twitter-have-common/103635/?oref=ng-HPtopstory
[9] NETmundial Initiative: http://blogs.lse.ac.uk/mediapolicyproject/2015/01/15/multistakeholderism-unmasked-how-the-netmundial-initiative-shifts-battlegrounds-in-internet-governance/
[10] Internet Governance: http://www.theregister.co.uk/2015/01/24/hibernating_netmundial_continues_to_rattle_internet_governance_world/
[11] cyber policy: https://agenda.weforum.org/topic/global-issues/future-of-the-internet/
[12] much needed: http://www.usnews.com/opinion/blogs/world-report/2014/05/05/warren-buffett-is-the-key-to-selling-the-white-houses-cybersecurity-plan
[13] major banks: http://www.ft.com/intl/cms/s/0/d94e855c-a209-11e4-bbb8-00144feab7de.html#axzz3PzY57Oif
[14] questionable merits: http://www.aspistrategist.org.au/vigilantism-on-the-cyber-frontier/
[15] North Korea’s culpability: http://thehill.com/policy/cybersecurity/230681-dennis-rodmans-not-buying-that-north-korea-hacked-sony
[16] set a dangerous precedent: http://www.eastasiaforum.org/2015/01/24/unregulated-cyberspace-a-cause-for-concern/
[17] Martin Dempsey: http://t.co/doberF0mfH
[18] State of the Union Address: http://www.whitehouse.gov/the-press-office/2014/01/28/president-barack-obamas-state-union-address
[19] Julie Bishop: http://www.foreignminister.gov.au/speeches/Pages/2015/jb_sp_150121.aspx
[20] Christine Wormuth: http://www.defense.gov/news/newsarticle.aspx?id=128005
[21] article: http://www.afr.com/p/technology/australia_launches_cyber_weapons_hR1B30qv3c6bYKJvquVzoO
[22] plenty of signs: https://www.aspi.org.au/publications/cyber-maturity-in-the-asia-pacific-region-2014/ASPI_cyber_maturity_2014.pdf#page=16
[23] Jessica Woodall: http://t.co/dXFWbGEvKV
[24] solid first step: http://www.aspistrategist.org.au/australia-the-coming-cyber-review-and-beyond/
[25] Klée Aiken: https://www.aspi.org.au/about-aspi/aspi-staff/analysts/klee-aiken
[26] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/
[27] @JulieBishopMP: https://twitter.com/JulieBishopMP/