- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on March 11, 2015 @ 12:30

CIA director John Brennan [1]

The CIA is set [2] to undertake one of its largest-ever internal restructures since its inception in 1947. The reorganisation will see a new ‘Directorate of Digital Innovation’ join the agency’s four existing directorates. CIA head John Brennan explained in a public memo:

Digital technology holds great promise for mission excellence, while posing serious threats to the security of our operations and information, as well as to U.S. interests more broadly…We must place our activities and operations in the digital domain at the very centre of all our mission endeavours.

The new directorate will play in the space between NSA’s traditional SIGINT role and Cyber Command’s warfighting remit. Jim Lewis elaborated [3], ‘If you think of NSA as a vacuum cleaner and Cyber Command as a hammer, this is a little more precise, and it’s about supporting human operations’.

The US Department of Justice has released [4] details of the criminal indictment it’s launching against those behind one of the largest reported data breaches in US history. Two Vietnamese and one Canadian have been changed in connection with the crime that saw the email addresses of over one billion people stolen from several email service providers.

Sticking with the crime fighting theme, Britain’s National Crime Agency brings word [5] that they’ve arrested one of the hackers suspected to have been behind a breach at the US Defense Department last year. The attack, which targeted Defense’s international satellite message dissemination system, resulted in the theft of the contact details of over 800 of the department’s staff.

In Beijing, the Chinese government has announced plans [6] to support its growing e-commerce industry. Premier Li Keqiang told the opening of China’s annual parliamentary meeting that the government would actively help guide e-commerce and encourage international expansion of China-based technology companies. Li also laid out China’s ‘Internet Plus’ strategy which ‘includes promoting cloud computing, online banking, mobile internet, along with logistics to help e-commerce expansion.’

But Pony Ma, the head of one of China’s largest internet companies, thinks more should be done, calling for the government to strengthen China’s notoriously lax intellectual property laws. The Tencent CEO has argued [7] that even in the rare cases where copyright infringers are apprehended, the penalties are weak and do little to dissuade further crime. But some [8] have been quick to point out the irony in the comments given Tencent itself has been accused of copying other successful products in the past. (It was successfully taken to court by AOL-owned ICQ for copyright infringement in 1998.)

IHS Jane’s Intelligence Weekly has cautioned [9] that North Korea is ‘highly likely’ to launch a barrage of online attacks against the South over the coming weeks in protest against joint exercises between the militaries of South Korea and the US. Cyberspace has played host to inter-Korean political disputes in the past, with both countries keen to avoid kinetic conflict.

The Malaysian Deputy Minister of Science, Technology and Innovation, Dr Abu Bakar Mohamad Diah, has announced [10] that the government is set to review its national cyber security policy. The process, to be led by Cybersecurity Malaysia and the National Security Council, will be completed in the next two years. Over the next five years the government plans to ‘strengthen the country’s existing defences against cyber attacks including safer access to online information, use of e-forensics, integrity systems, strengthening trust between users and providers, and creating high availability systems.’ Malaysia also plans to increase its already substantial international engagement on cyber issues.

Jessica Woodall [11] is an analyst in ASPI’s International Cyber Policy Centre [12]. Image courtesy of Flickr user CSIS | Center for Strategic & International Studies [13].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-64/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/03/3799411000_d111607b3c_z.jpg

[2] set: http://www.abc.net.au/news/2015-03-07/cia-to-boost-cyber-capability-in-sweeping-overhaul/6287862

[3] elaborated: http://www.wired.com/2015/03/cias-new-directorate-makes-cyberespionage-top-priority/

[4] released: http://www.justice.gov/usao/gan/press/2015/03-06-15.html

[5] word: http://www.businessinsider.com/r-briton-arrested-over-hack-into-us-department-of-defense-2015-3?IR=T

[6] announced plans: http://www.reuters.com/article/2015/03/05/us-china-summit-internet-logistics-idUSKBN0M10D620150305

[7] argued: http://www.warc.com/LatestNews/News/IP_mood_shifts_in_China.news?ID=34414

[8] some: http://www.scmp.com/business/companies/article/1729864/copycat-tencent-boss-calls-china-strengthen-intellectual-property

[9] cautioned: https://www.arirang.co.kr/News/News_View.asp?nseq=176756

[10] announced: http://www.futuregov.asia/articles/6253-malaysia-draws-up-cyber-security-plans-till-2050

[11] Jessica Woodall: https://www.aspi.org.au/about-aspi/aspi-staff/analysts/jessica-woodall

[12] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/

[13] CSIS | Center for Strategic & International Studies: https://www.flickr.com/photos/csis_er/3799411000/in/photolist-6MJYwd-6MJYBb-6MEMLt-6MJYGs-6MJYyS-6MEN1M-6MJYDE-6MJYs9-6MEMND-6MJYrj-6MJYvo-6MJYx5-6MEMKD-6MEN2B-6MENf6-a3gyud-a3dGaM-a3gy17-a3dG3R-a3gxAW-a3dGEk-a3dGYX-a3dGVP-a3dGUi-a3dGFK-a3dGHi-a3dGBr-a3gyvE-a3gyqL-a3gyih-a3dGMv-pNPLnh-fLs3B-a5oF29-hEKDda-6MENcR-6MJYxy-6MJYuw-4MvfP4-dKW3kg-n1hMQ-n1ko1-eGvCZ-a3gxE5-n1iHR-a3dGtD-n1t3b-n1oWc-fLrwe-4wpHzT

Copyright © 2023 The Strategist. All rights reserved.