- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Simon Hansen on March 12, 2014 @ 12:30
[1]Russia has tightened its physical grip on Crimea this week, though offensive operations have largely been taking place online. Apart from the anticipated DDoS attacks, analysts from security firm BAE have disclosed [2] the nature of an active and potent cyber espionage tool kit dubbed ‘Snake’ that has infiltrated Ukrainian government computer systems. The malware gives full remote access to compromised systems, allowing the attacker to siphon data and manipulate networks. G Data has a post [3] exploring its technical aspects. For an analysis of Russia’s political intentions behind the cyberattacks (assuming the Russian government is the source), see these articles in the New York Times [4]and Washington Post [5]. Cybersecurity expert Jeffrey Carr has said [6] that current operations may be only the tip of the iceberg, as ‘Russia has the ability to completely shut down Ukraine’s infrastructure’. If so, is the relative quiet a result of precise and sophisticated Russian cyberinstruments, or restraint in using them?
Increasingly effective cyber espionage operations like those used against Ukraine raise questions about the use of cyber capabilities during conflict. How do governments define cyber attacks and cyber war? One commentator suggests [7] that there will be a ‘declaration of an act of cyber war before there is agreement on what it is’. Ben Schreer and Tobias Feakin argue [8] here on The Strategist that ‘cyber war’ should be understood in the traditional sense of what constitutes war: ‘the use or threat of the use of force to deter or compel an adversary’. And Bruce Schneier argues [9] that any offensive computer networked operation—including espionage—is a cyber attack, and should be ‘subject to the same international law standards that govern acts of war in the offline world’.
Big data—a group of statistical techniques that uncovers patterns—is a popular topic this week with Harvard Magazine releasing an interesting feature [10] on using big data to revolutionise health, social media and science. Aljazeera further explores [11] the importance of interpreting big data, not just collecting it.
Vietnam’s Government has given cybersecurity a high priority for 2014, signing [12] a Memorandum of Understanding with Microsoft to address large-scale issues such as commercial espionage and government information security.
The latest US Quadrennial Defense Review has emphasised [13] (PDF) the need for ‘new and expanded cyber capabilities and forces to enhance our ability to conduct cyberspace operations’. The Pentagon wants an easy US$5.1 billion [14] to make it happen. Some novel approaches that the US government might take are outlined in this piece [15], including the establishment of a ‘Federal Cyber Campus’.
Fugitive Edward Snowden spoke [16] via videoconference at the SXSW conference last week about the need to develop widely available end-to-end encryption methods for the public. This sort of encryption ensures data is readable only by the receiving party, not by intermediaries such as Internet Service Providers and intelligence agencies like the NSA.
Eric Schmidt, executive chairman at Google, and Jared Cohen, director of Google Ideas, also presented [17] at the conference. They talked about approaches authoritarian governments are taking in response to the use of the internet in popular uprisings. Schmidt said that, recognising that blocking internet access shows the government is scared, which could actually bring more people onto the streets, dictators are infiltrating and manipulating it instead. He said this was already happening in China, and Cohen also talked about people having their social media postings and interactions being analysed by military personnel at checkpoints in Syria. It’ll be interesting to see what effect this type of activity has on social and political unrest in autocratic countries.
Simon Hansen is an intern at ASPI.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-19/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg
[2] disclosed: http://www.baesystems.com/article/BAES_165734/bae-systems-applied-intelligence-unveils-extent-of-venomous-nature-of-%E2%80%98snake%E2%80%99-operation
[3] post: https://blog.gdatasoftware.com/blog/article/uroburos-deeper-travel-into-kernel-protection-mitigation.html
[4] New York Times : http://www.nytimes.com/2014/03/09/world/europe/suspicion-falls-on-russia-as-snake-cyberattacks-target-ukraines-government.html?_r=1
[5] Washington Post : http://www.washingtonpost.com/opinions/playing-by-putins-tactics/2014/03/09/b5233b90-a558-11e3-a5fa-55f0c77bf39c_story.html
[6] said: http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/russias-holding-back-cyber-capabilities-ukraine/80233/
[7] suggests: http://www.c4isrnet.com/article/M5/20140310/C4ISRNET18/303100011
[8] argue: https://aspistrategist.ru/australia-and-cyberwar-time-for-a-measured-debate/
[9] argues: http://www.defenseone.com/technology/2014/03/when-does-cyber-spying-become-cyber-attack/80206/?oref=d-skybox?oref=d-interstitial-continue
[10] feature: http://harvardmagazine.com/2014/03/why-big-data-is-a-big-deal
[11] explores: http://www.aljazeera.com/indepth/opinion/2013/11/big-data-critical-ingredient-201311182144196723.html
[12] signing: http://www.futuregov.asia/articles/2014/mar/10/vietnam-cybersecurity-agency-signs-mou-microsoft/?utm_content=buffer7732c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[13] emphasised: http://www.defense.gov/pubs/2014_Quadrennial_Defense_Review.pdf
[14] US$5.1 billion: http://fcw.com/articles/2014/03/04/budget-defense.aspx?utm_content=buffered151&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[15] piece: http://www.nextgov.com/cybersecurity/cybersecurity-report/2014/03/four-federal-cyber-escapades-follow-spring/79960/
[16] spoke: http://www.newyorker.com/online/blogs/johncassidy/2014/03/snowdens-solution-more-encryption-and-better-watchdogs.html
[17] presented: http://www.theguardian.com/technology/2014/mar/07/google-eric-schmidt-jared-cohen
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.