- The Strategist - https://aspistrategist.ru -

Cyber wrap

Posted By on February 12, 2014 @ 14:30

[1]A belated Happy Safer Internet Day, readers! 11 February 2014 marked the 11th iteration of the event [2]. Supported by the European Commission, HSID seeks to promote safe and responsible use of internet-based technologies, with a focus on children and young people the world over. The 11th was also The Day We Fight Back [3], commemorating Aaron Swartz [4] and the Stop Online Piracy Act (SOPA) blackout as a day of activism against the NSA’s mass surveillance. It appears Australian Senators got into the groove with a stoush [5] over Snowden.

Still in Australia, a local firm has announced plans [6] to roll out Bitcoin [7] ATMs across the country. The news comes as the digital currency took a significant hit [8] after a software bug was reported by the main Bitcoin exchange in Tokyo, and as Russia’s Solicitor General concluded [9] that cryptocurrencies are illegal in the state.

Just in time to ratchet up the fear amongst Americans setting off for Sochi, NBC aired a sensationalist piece [10] on the inevitability of being hacked during the Olympic Games. The cyber security buff who loaned his services for the segment was quick to distance himself [11] from the piece as well as any flawed understanding imparted to viewers due to editing. While there was no shortage [12] of commentators [13] taking shots at the reportage, NBC have continued to stand by their man [14].

One year on from Obama’s Executive Order [15], the White House is set to announce their cyber security framework this week. Commentators [16] are keeping their expectations low, anticipating a checklist that reflects existing best-practice standards. The framework aims to improve the cyber security of critical assets and infrastructure, such as financial providers, utilities and essential services, to insulate against significant social and economic disruption. However, in the absence of a legislative fix through Congress, the standards will be entirely voluntary and will lack any of the mooted sweeteners to encourage private-sector adoption, including tax incentives and legal immunity in the wake of cyber-attacks. Keep an eye here [17] for the news in the next day or so.

Cyber issues have certainly been front-and-centre for those attending the Security Analyst Summit [18] in the Dominican Republic. Kaspersky Lab, a leading anti-virus vendor and summit sponsor, have announced the discovery of a highly sophisticated cyber espionage campaign known as Mask (or Careto, the slang Spanish found in the code). It has been reported [19] that the malware has infected more than 380 targets in 31 countries since it kicked off in 2007. Kaspersky Lab began researching [20] Mask after it was discovered hiding in older versions of their antivirus products(!). Also at the summit, Eugene Kaspersky delivered a keynote [21] address in which he labelled cyber weapons ‘the worst innovation of the twenty-first century’, warning of the boomerang-effect of malware and the inevitability of international embargos on offensive cyber capabilities.

Elsewhere, ICPC International Fellow Samir Saran put forth his views [22] on the future of internet governance in India. In response to a piece [23] calling out perceived American unilateralism on the governance issue, Saran offers cogent counterpoints. First, he warns against the tendency to corral discussions on cyber security and espionage together with those on internet governance. Second, he comments on the future of multilateralism—and India’s role—in delivering a framework of cyber governance. A similar conversation has been happening [24] this week in Brussels.

Finally, registrations have opened for teams of Australian undergraduate students interested in participating in the 2014 Cyber Security Challenge. Now in its third year, the competition puts top cyber-skilled students to the test through a 24-hour virtual computer network scenario. The winning team will head to the Black Hat Conference [25] in Las Vegas. Further details are available here [26].

David Lang is an intern at ASPI’s International Cyber Policy Centre.



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /cyber-wrap-15/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2013/07/cyber-logo.jpg

[2] 11th iteration of the event: http://www.saferinternet.org/safer-internet-day

[3] The Day We Fight Back: https://thedaywefightback.org/press/

[4] Aaron Swartz: http://en.wikipedia.org/wiki/Aaron_Swartz

[5] a stoush: http://www.zdnet.com/australian-attorney-general-accuses-snowden-of-endangering-lives-7000026188/

[6] announced plans: http://blogs.wsj.com/digits/2014/02/04/australian-firm-plans-bitcoin-atm-rollout/

[7] Bitcoin: http://en.wikipedia.org/wiki/Bitcoin

[8] took a significant hit: http://www.forbes.com/sites/leoking/2014/02/11/bitcoin-trading-technology-in-question-as-currency-dives-after-glitch/

[9] concluded: http://rt.com/business/bitcoin-russia-use-ban-942/

[10] a sensationalist piece: http://www.youtube.com/watch?v=waEeJJVZ5P8

[11] quick to distance himself: http://blog.trendmicro.com/russia-experience-part-2/

[12] shortage: http://www.politico.com/blogs/media/2014/02/cybersecurity-expert-contests-nbc-report-182947.html

[13] commentators: http://blog.erratasec.com/2014/02/that-nbc-story-100-fraudulent.html#.UvmffPmSyap

[14] stand by their man: http://www.businessinsider.com.au/nbc-richard-engel-hacking-report-cyber-attack-sochi-olympics-2014-2

[15] Executive Order: http://www.zdnet.com/obamas-cybersecurity-executive-order-what-you-need-to-know-7000011221/

[16] Commentators: http://www.politico.com/story/2014/02/cybersecurity-in-slow-lane-one-year-after-obama-order-103307.html

[17] here: http://www.nist.gov/

[18] Security Analyst Summit: http://sas.kaspersky.com/

[19] reported: http://www.reuters.com/article/2014/02/10/us-cybersecurity-espionage-mask-idUSBREA191KU20140210

[20] researching: http://www.kaspersky.com/about/news/virus/2014/Kaspersky-Lab-Uncovers-The-Mask-One-of-the-Most-Advanced-Global-Cyber-espionage-Operations-to-Date-Due-to-the-Complexity-of-the-Toolset-Used-by-the-Attackers

[21] a keynote: http://threatpost.com/governments-need-to-discuss-use-of-cyber-weapons/104097

[22] put forth his views: http://indianexpress.com/article/opinion/columns/internet-realpolitik/

[23] piece: http://indianexpress.com/article/opinion/columns/in-strategic-interest-and-for-self-respect/

[24] been happening: http://online.wsj.com/news/articles/SB10001424052702303874504579377052129964162?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702303874504579377052129964162.html

[25] Black Hat Conference: http://www.blackhat.com/us-14/

[26] here: https://www.cyberchallenge.com.au/

Copyright © 2024 The Strategist. All rights reserved.