- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on August 5, 2015 @ 11:50

Security lock console background. [1]

As we await the release of Government’s Cyber Security Strategy, the Australian Cyber Security Centre’s first unclassified threat report [2] has provided an indication of the challenges the Strategy is seeking to overcome. The high rate of incidents reported by the energy and telecommunications sector in the ACSC report correlates with a leaked [3] NSA map that shows Chinese cyber espionage attempts in the US, with notable concentrations on US electricity grid and telecommunications targets. Cisco has released [4] its submission to the Cyber Security Review calling for a national cyber strategy, stronger leadership at the CEO and Board level of cyber security issues, and the development and promotion of Australia as a safe house for digital business in the region.

Following its submission to the Cyber Security Review back in May, the Australian Industry Group has also released [5] a position paper developed as part of the B20 Coalition, calling on G20 leaders to do more to fight cybercrime and reduce international regulatory inconsistencies that prevent the growth of the global digital economy. Digital business is thriving in Israel [6], where the cyber security industry has surpassed the arms industry as the country’s biggest export earner, netting $6 billion and holding 10%of the world market. Capitalising on the opportunities that cybersecurity services provide, British PM David Cameron has been touring Southeast Asia this week with a British trade delegation seeking to drum up business for Britain, including an agreement [7] to work with Singapore on cybersecurity incident response and talent development.

While global efforts to reduce cybercrime continue unabated, even the most resolute efforts continue to be challenged by determined and skillful cyber criminals. Two weeks after being taken down in a multinational police sting, the online cybercrime marketplace Darkode has re-emerged [8] in a new and more secure format, operating through Tor and by invite only. Despite the arrest of 28 users and admins, the current administrator told the Register that the site has retained most of its staff as the international police raids mainly netted new or inactive users.

David Sangar has reported [9] in The New York Times that the US is considering options to retaliate against China for the OPM hack. Over at CFR, Adam Segal has evaluated [10] one of the options which is to undermine the Great Firewall, demonstrating to the Chinese Communist Party that its ability to control information within China is put at risk by its cyber espionage. However, Segal surmises that this is a disproportionate response with significant escalatory risks. It has been suggested [11] that the Pentagon needs to develop a ‘cyber deterrent’ equal to the nuclear deterrent, but this implies that a cyber response is the only way to respond to cyber attack.  Steve Metz considers this argument in his article [12] on the principles of cyberwar, countering that you must demonstrate the ability to respond symmetrically and asymmetrically both physically and in cyberspace to deter cyberattacks. ICPC international fellow Jim Lewis has pointed out [13] that the US already has the most sophisticated offensive cyber capability in the world but at the moment it has zero deterrent value as discussion of its capability is closely guarded.

On Sunday, the Indian Government moved to block access [14] to 857 porn sites under Rule 12 of the country’s IT Act, under which Government can force ISPs to block websites. Indian privacy advocates have been critical of the move, which they believe is unconstitutional intrusion into the private lives of Indians and part of a broader campaign by Government to enforce conservative Hindu mores. Last month, the Indian Supreme Court criticised [15] Government for inaction on preventing access to child pornography. Talking to the BBC, an unnamed Indian official said that the current blockages were temporary until a technical means to restrict access to explicit material to adults could be implemented.

And if you were waiting until the last minute to submit your suggestions for the WSIS+10 [16] review, submissions closed on 31 July. Input will be released as a non-paper in August and then evolve into the outcomes paper of the General Assembly High Level meeting in December 2015, completing the review of the 2005 Tunis Agenda for the Information Society [17].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-82/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/08/13334048894_001d3e53d1_z.jpg

[2] threat report: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CCAQFjAAahUKEwjF6v2f2Y7HAhVG5qYKHWF4D_0&url=https%3A%2F%2Facsc.gov.au%2Fpublications%2FACSC_Threat_Report_2015.pdf&ei=203AVYWREsbMmwXh8L3oDw&usg=AFQjCNGxMWbXUU7gzhxasvyce9G59SlnVA&sig2=AmgdlUP0tcG5zgtJRSBVoQ&bvm=bv.99261572,d.dGY

[3] leaked: http://www.nbcnews.com/news/us-news/exclusive-secret-nsa-map-shows-china-cyber-attacks-us-targets-n401211

[4] released: http://www.businessinsider.com.au/report-ciscos-8-cyber-security-recommendations-to-the-australian-government-2015-8

[5] released: http://www.aigroup.com.au/portal/site/aig/template.MAXIMIZE/home/?javax.portlet.tpst=6952d2b9e418957d7ce1def674c420bc_ws_MX&javax.portlet.prp_6952d2b9e418957d7ce1def674c420bc=index%3D1%26docName%3DRelease%2Bof%2BB20%2BCoalition%2BPosition%2BPaper%2Bon%2BCyber%2BSecurity%26folderPath%3D%252FLIVE_CONTENT%252FMedia%2BReleases%252F2015%252FJuly%252F%26viewID%3Dcontent&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken

[6] Israel: http://www.economist.com/news/business/21660112-internet-security-has-become-bigger-export-earner-arms-cyber-boom-or-cyber-bubble

[7] agreement: http://www.ibtimes.co.uk/david-cameron-signs-cybersecurity-pact-singapore-boosting-cooperation-1513086

[8] re-emerged: http://www.theregister.co.uk/2015/07/28/darkode_returns/

[9] reported: http://www.nytimes.com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html?_r=1

[10] evaluated: http://blogs.cfr.org/cyber/2015/08/03/retaliating-against-chinas-great-firewall/

[11] suggested: http://www.newsfactor.com/story.xhtml?story_id=0030003Q4USU

[12] article: http://www.worldpoliticsreview.com/articles/16354/it-s-time-to-begin-thinking-about-the-principles-of-cyberwar

[13] pointed out: http://www.ft.com/intl/cms/s/0/2d23d4c8-35d2-11e5-b05b-b01debd57852.html#axzz3hoEET79w

[14] block access: http://www.theaustralian.com.au/news/world/porn-block-in-india-sparks-outrage/story-e6frg6so-1227470074078

[15] criticised: http://www.bbc.com/news/world-asia-india-33754961

[16] WSIS+10: http://unpan3.un.org/wsis10/nonpapersubmissions

[17] Tunis Agenda for the Information Society: http://www.itu.int/wsis/docs2/tunis/off/6rev1.html

Copyright © 2024 The Strategist. All rights reserved.