- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Simon Hansen on April 1, 2014 @ 13:00
[1]First up, a haiku on the Internet from the New York Times haiku generator [2]:
The Internet is // emotionally a very // flat experience.
Many Turkish citizens would agree with that sentiment this week as they found YouTube access blocked for reasons of ‘national security’ [3]—after Twitter had been blocked the week before. Prime Minister Recep Tayyip Erdoğan ordered a clamp down [4] on the social media sites after a leaked audio file [5] showed Turkish government and military leaders discussing a military strike on Syria. The PM has also been fighting off corruption charges that surfaced on those platforms. The ban on YouTube was made days before municipal elections, which Erdoğan’s party won comfortably [6].
China’s no stranger to Internet censorship and surveillance of its netizens. It’s also an exporter of technologies that assist other governments control opinion among their domestic populations. Human Rights Watch have released a report [7] pointing a finger at China’s role in facilitating the development of Ethiopia’s surveillance networks. The report claims [8] that ‘the technologies used to monitor telecom activity in Ethiopia have been provided by the Chinese telecom giant ZTE.’ ZTE is a major player in the African telecom industry, playing a key role in the development of fledgling telecom networks. Mark Clayton over at the CS Monitor has an article [9] on the issue.
There has been a lot of discussion in the past week about the future of US cyber policy. At the retirement ceremony for CYBERCOM commander General Keith Alexander, US Secretary of Defense Chuck Hagel said [10] that the US ‘will maintain an approach of restraint to any cyber operations outside of U.S. government networks.’ Framing future American cyberespionage and attack operations as ‘limited’ could be seen as a response to new Snowden revelations [11] about alleged NSA hacking of Huawei’s networks. It also comes on the eve of Hagel’s first visit to China. Chinese Defence Ministry spokesman Geng Yansheng has rebuked [12] the US about the recent NSA cyberespionage disclosures. China has vowed [13] to boost its cybersecurity efforts.
Hagel also flagged a boost in the recruitment of cybersecurity professionals during General Alexander’s retirement ceremony. He said [14] that ‘US reliance on cyberspace outpaces our cybersecurity’, and that the Pentagon will boost its numbers of cyber professionals to 6000 by 2016—a more than threefold increase of current levels. Japan has also announced [15] its own increases to its military cyber forces this week, launching a 90-person strong cybersecurity unit last Thursday.
For more on the future of US cyber policy, Ian Wallace and Peter Singer at the Brookings Institution have a podcast [16] with Richard Bejtlich and Ralph Langner, two fellows at the ‘Brookings’s Center for 21st Century Security and Intelligence’. The interview has a number of key highlights including challenges for the next CYBERCOM-NSA commander and the risk of SCADA systems—centralised systems which monitor and control entire sites, such as a water distribution system—being seized by organised groups. For another perspective on the future of US cyber policy, Spiegel has spoken [17] to former NSA director Michael Hayden on the future of the Internet.
According to The Guardian, Labor’s deputy leader Tanya Plibersek has signalled [18] that she is open to giving intelligence agencies more tools to deal with domestic security threats. In a Sky News interview on Sunday, Plibersek said she ‘wants to give [intelligence] agencies the maximum ability to do their job well, within the bounds that people would expect.’ This may include the mandatory collection of metadata currently being pushed [19] by the Australian Crime Commission, state and federal police, and intelligence agencies at the Senate committee review of the Telecommunications (Interception and Access) Act 1979 [20]. On interception and storage of metadata, Plibersek stated [21] ‘it has been an important tool in disrupting some very serious terrorist plots in Australia’.
Moving now to cybercrime, the RAND Corporation has released a report entitled ‘Markets for cybercrime tools and stolen data’ [22]. One of the report’s main findings is that ‘the cyber black market has evolved from a varied landscape of discrete, ad hoc individuals into a network of highly organized groups, often connected with traditional crime groups’.
Finally, the Cyber Dialogue conference in Canada [23] concluded yesterday, with discussion focusing on the Internet after Snowden. The conference’s official website and blog can be found here [23]. An interesting development happened last night when whistleblower Thomas Drake challenged Joel Brenner—former senior counsel at the NSA—on the legality of access to individuals’ data.
Simon Hansen is an intern at ASPI.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-22/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg
[2] haiku generator: http://haiku.nytimes.com/
[3] reasons of ‘national security’: http://www.theguardian.com/world/2014/mar/27/google-youtube-ban-turkey-erdogan
[4] Erdoğan ordered a clamp down: http://www.theaustralian.com.au/news/world/turkish-leader-bans-youtube-after-leak/story-fnb64oi6-1226868069257
[5] leaked audio file: http://www.zerohedge.com/news/2014-03-27/here-youtube-false-flag-attack-syria-clip-erdogan-wanted-banned
[6] which Erdoğan’s party won comfortably: http://www.bbc.com/news/world-europe-26807067
[7] report: http://www.hrw.org/node/123977
[8] claims: http://www.hrw.org/node/124078
[9] article: http://www.csmonitor.com/World/Security-Watch/Cyber-Conflict-Monitor/2014/0325/With-new-Chinese-cyber-tools-Ethiopia-more-easily-spies-on-its-people
[10] said: http://online.wsj.com/article/BT-CO-20140328-710838.html?mod=wsj_share_twitter
[11] revelations: http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html
[12] rebuked: http://www.ft.com/intl/cms/s/0/9b1bedae-b59e-11e3-a1bd-00144feabdc0.html
[13] vowed: http://www.trust.org/item/20140327082416-7nwgf/?source=hptop
[14] said: http://bigstory.ap.org/article/pentagon-triple-cyber-staff-thwart-attacks
[15] announced: http://newsonjapan.com/html/newsdesk/article/107026.php
[16] podcast: http://www.brookings.edu/blogs/up-front/posts/2014/03/25-whats-next-for-us-cyber-policy-singer-wallace-bejtlich-langner
[17] spoken: http://www.spiegel.de/international/world/spiegel-interview-with-former-nsa-director-michael-hayden-a-960389.html
[18] has signalled: http://www.theguardian.com/world/2014/mar/30/labor-spies-tools-terror-plibersek
[19] pushed: http://www.theaustralian.com.au/business/latest/mandatory-data-retention-back-on-the-radar/story-e6frg90f-1226857968853
[20] Senate committee review of the Telecommunications (Interception and Access) Act 1979: http://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Legal_and_Constitutional_Affairs/Comprehensive_revision_of_TIA_Act
[21] stated: http://www.theaustralian.com.au/business/latest/labor-comfortable-with-mandatory-metadata-retention/story-e6frg90f-1226869649656
[22] ‘Markets for cybercrime tools and stolen data’: http://www.rand.org/pubs/research_reports/RR610.html?utm_campaign=rand_socialflow_twitter&utm_source=rand_socialflow_twitter&utm_medium=socialflow
[23] Cyber Dialogue conference in Canada: http://www.cyberdialogue.ca/
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.