- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on October 21, 2015 @ 12:39

[1]Last week, attendees at the Australian Information Security Association [2] conference were given a preview [3] of the Australian cyber security strategy by PM&C official Lynwen Connick. Connick noted the importance of cybersecurity to future prosperity and innovation in Australia, and the key role the private sector should play in achieving a more cyber secure country. Australian small businesses remain woefully unprepared for cyber security threats. According to research [4] from the Department of Communications and the Arts, only 25% believe they are at risk from hacking and less than half kept anti-virus programs up to date. One proposal for the strategy appears to be a set of guidelines that any organisation can adopt to improve their cybersecurity practice. However there’s still no news on when the strategy will be released, and it will likely be delayed due to the change in leadership to the tech-focused Malcolm Turnbull.

The Dutch Scientific Council for Government Policy have released [5] the English text of their report on the public core of the internet. The report recommends that the international community establish a norm protecting the main protocols and infrastructure that supports the internet from interference by governments. The report characterises the internet as an ‘extended national interest’ that, due to its value to states with open economies, should be considered a global public good. That’s a slightly different approach to the one advocated by Joseph Nye [6], who has focused on declaration of vulnerabilities to achieve simultaneous disarmament in cyberspace.

Despite the agreement between Presidents Obama and Xi on cyber theft of intellectual property, Stratfor has reported [7] the unsurprising news that Chinese hacking attempts of commercial entities have continued unabated. The Netherlands Institute for International Relations has suggested [8] new norms that limit national security intelligence collection to reduce the risk of ill-considered retaliation for cyber espionage by the US. The Institute calls on US allies, including Australia, to encourage the US to refrain from any retaliation that would more than likely destabilise the international system and instead work towards a new normative framework on the limits of espionage.

The US Army is reportedly conducting [9] a series of experiments during field training exercises to better integrate cyber operations into its operational activities. Brigade level teams rotating through national training centres will take part in several tests run by US Army Cyber to inform US Army doctrine, organization and training. What isn’t known is whether the recently demonstrated ‘tactical cyber rifle’ [10] has been used. Developed by US Army Cyber Institute at West Point, the device uses US$150 of components, including ‘a Raspberry Pi, WiFi radio, and antenna to take advantage of a known exploit in Parrot quadcopters’, causing it to crash. It was also used to open a bunker door and turn on the lights. While its inventor, Captain Brent Chapman, believes in future small units, leaders will be able to quickly fabricate equipment to take advantage of cyber vulnerabilities in the field, this may be wishful thinking until the US Army can recruit more infantry officers with computer science degrees.

The Indian Army this week announced the establishment of a Defence Cyber Agency [11] as an interim body until a tri-service [12] Cyber Command can be created. India has a keen awareness of cyber threats, with the Deputy Chief of Operations at Indian Defence HQ Vice Admiral Girish Luthra noting at the CyFy [13] conference in New Delhi last week that ‘cyber attacks on critical ICT networks can provide significantly higher military advantages than physical attacks.’ However the Indian military has been slow to respond to this threat. India has just two integrated commands, which exhibits the fragmentation that characterises much of its approach to security issues.

Concerns about cyber war and espionage aren’t new, but continue to grab the attention of commentators around the world. For example, this week at The Washington Post Robert Samuelson [14] warns of the potential effects of a cyber arms race and offensive capabilities that could undermines society by harming vital infrastructure like power grids. However Laura Bate at the Centre for the National Interest believes much of this discussion is carried on using terminology [15] that’s so outdated or vague that meaningful discussion is made difficult, if not impossible. Bate quite rightly points out that words such as cyberattack, cybersecurity and cybercrime can mean different things to different governments, undermining confidence in discussion of agreements and developing international norms. The Australian Cyber Security Centre’s most recent threat report provided a useful glossary [16] that differentiates carefully between actions like cyberattack, espionage, intrusions and incidents.

And finally, for some audible cyber security and policy discussion, check out this Foreign Policy [17] podcast on a few of the challenges facing the US in cyberspace with Rosa Brooks, Kori Schake and David Sanger.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-94/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/10/20772328793_296e6f97c4_z.jpg

[2] Australian Information Security Association: https://www.aisa.org.au/aisa-conferences/

[3] preview: http://www.itnews.com.au/news/turnbull-advisor-gives-peek-into-cybersecurity-strategy-410450

[4] research: http://www.ibtimes.com.au/only-2-small-australian-businesses-bother-about-online-security-1474251

[5] released: http://www.wrr.nl/en/publicaties/publicatie/article/de-publieke-kern-van-het-internet-1/

[6] Joseph Nye: https://www.washingtonpost.com/opinions/the-world-needs-an-arms-control-treaty-for-cybersecurity/2015/10/01/20c3e970-66dd-11e5-9223-70cb36460919_story.html

[7] reported: http://stratfor.us4.list-manage.com/track/click?u=74786417f9554984d314d06bd&id=6a9b619c23&e=7ea2c3c88c

[8] suggested: http://www.clingendael.nl/publication/deterring-cyber-espionage-requires-more-intelligent-us-approach

[9] conducting: http://www.c4isrnet.com/story/military-tech/show-reporter/ausa-2015/2015/10/15/ausa-army-wades-into-experimental-cyber-warfare/73990730/

[10] ‘tactical cyber rifle’: http://www.popularmechanics.com/military/weapons/a17802/cyber-capability-rifle-ausa-2015-demo/

[11] Defence Cyber Agency: http://timesofindia.indiatimes.com/india/India-may-get-three-unified-commands-for-special-operations-battles-in-space-on-web/articleshow/49399708.cms?

[12] tri-service: http://timesofindia.indiatimes.com/india/Govt-gets-cracking-on-three-new-tri-Service-commands/articleshow/48550424.cms

[13] CyFy: http://cyfy.org/event/october-14-16-cyfy-2015-the-india-conference-on-cyber-security-and-cyber-governance-new-delhi/

[14] Robert Samuelson: https://www.washingtonpost.com/opinions/the-coming-cyberwars/2015/10/14/bd8bb3fc-7284-11e5-8d93-0af317ed58c9_story.html

[15] terminology: http://www.nationalinterest.org/feature/stop-calling-everything-cyber-14070

[16] glossary: http://www.lifehacker.com.au/2015/10/what-is-a-cyberattack-definitions-for-it-security-terms-according-to-acsc/

[17] Foreign Policy: http://foreignpolicy.com/2015/10/12/the-e-r-cyberoffense-deterrence-and-the-dawn-of-a-new-era-of-war/

Copyright © 2022 The Strategist. All rights reserved.