- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By David Lang on April 22, 2014 @ 12:15
[1]‘Catastrophic is the right word. On the scale of 1 to 10, this is an 11’, says Bruce Schneier [2] of the Heartbleed [3] bug that emerged since our last cyberwrap. Heartbleed has been revealed as a flaw in the OpenSSL code that, under normal conditions, encrypts and protects Internet traffic, like usernames, passwords, digital certificates, cookies and credit card numbers. The faulty code has been in place since March 2012 [4] and affects a huge swathe of the Internet including big names like Facebook, Google, Instagram, YouTube, Dropbox and Twitter. The bottom line seems to be change your passwords [5] now and then again once the websites you use have patched the flaw. Mashable have put together a list of popular sites [6] where password changes might be necessary. You can do your own searches here [7].
While Heartbleed has been kicking around for over two years, the fallout is as yet —and could remain— unknown. Aside from spurring fear and a flurry of password changes, the discovery shines a light on areas of the web that aren’t usually given much thought. OpenSSL code isn’t maintained by an esoteric tech business in Silicon Valley, but rather, by a handful of volunteers [8] scattered across the globe. Recriminations have started as to the Australian government’s response to Heartbleed, with fingerpointing directed [9] at the Attorney General’s Department for not equipping CERT Australia with a solid public response.
Over to the US, and the Pulitzer Prize for Public Service was awarded [10] last week to The Guardian and The Washington Post for their stories on NSA surveillance. Peter W. Singer of Brookings believes [11] that the accolade amounts to the first ‘cyber Pulitzer’, recognising that all issues are ‘being reshaped by the cyber realm, whether it’s communications, commerce, critical infrastructure, or conflict…’. As the scandal du jour, the NSA revelations have provided a backdrop for seemingly any public conversation on intelligence or surveillance since June 2013. On Heartbleed, for example, it wasn’t long before some outlets [12] were reporting that the NSA knew about— and exploited— the vulnerability for intelligence collection purposes. While the NSA [13] and the White House [14] both issued denials, it may be difficult for some to accept the official line in a post-Snowden era.
On the Aussie cyber front, the Defence Science and Technology Organisation (DSTO) has released a consultation paper [15], the responses from which will inform the development of a national security science and technology (S&T) policy. The program will focus on ‘aiding, enhancing and future-proofing the Australian Cyber Security Centre (ACSC) capability; advanced tools and techniques particularly for ACSC transition of technology and processes to national networks; and establishing national S&T workforce and skills that are relevant and responsive to operational cyber security needs’. Consultations will conclude 1 May. Take a look at the paper here [16] (PDF).
There’s been some interesting research out in the past week. The prowess of the Syrian Electronic Army, Iran’s role as an increasingly potent cyber player and China’s expansive data theft campaigns were all key elements of the evolving cyber threat landscape identified in the Mandiant’s M-Threats paper [17]. Pew Research Centre polls [18] show that 18% of American adults have had important personal information stolen online, up from 11% in July 2013. While we can look to increasing technical sophistication or malware proliferation to explain that jump, the only way to turn the tide is by replacing inaction with ownership when it comes to personal cyber security.
Finally, Minister for Communications Malcolm Turnbull was on hand last Tuesday to help ASPI’s International Cyber Policy Centre [19] launch its inaugural Cyber Maturity in the Asia-Pacific 2014 report [20] and interactive map [21]. The report looks beyond rhetoric of cyberwar and cybercrime, using the rubric of maturity to study the presence, implementation and operation of cyber-related structures, policies, legislation and organisations. The report looks at a spectrum of issue areas to build a more comprehensive understanding of the field and spur discussion and debate around how the region can constructively engage in cyberspace.
With the hope that the report will be ‘suitably controversial [22]’, the International Cyber Policy Centre team welcomes your input, comments, and criticisms. Join the discussion @ASPI_ICPC [23] using #cybermaturity.
David Lang is an intern in ASPI’s International Cyber Policy Centre.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-24/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg
[2] says Bruce Schneier: https://www.schneier.com/blog/archives/2014/04/heartbleed.html
[3] Heartbleed: http://heartbleed.com/
[4] since March 2012: http://www.npr.org/blogs/alltechconsidered/2014/04/08/300602785/the-security-bug-that-affects-most-of-the-internet-explained?utm_campaign=storyshare&utm_source=share&utm_medium=twitter
[5] change your passwords: http://www.nytimes.com/2014/04/10/technology/flaw-calls-for-altering-passwords-experts-say.html
[6] put together a list of popular sites: http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/?utm_cid=mash-com-Tw-main-link
[7] here: https://filippo.io/Heartbleed/
[8] handful of volunteers: http://www.newyorker.com/online/blogs/elements/2014/04/the-internets-telltale-heartbleed.html
[9] fingerpointing directed: http://www.zdnet.com/heartbleed-heartache-this-was-not-a-drill-people-and-you-failed-7000028434/
[10] awarded: http://www.theguardian.com/media/2014/apr/14/guardian-washington-post-pulitzer-nsa-revelations
[11] believes: http://www.csmonitor.com/USA/2014/0414/First-cyber-Pulitzer-honors-publishers-of-NSA-leaks-for-public-service-video
[12] some outlets: http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html.
[13] NSA: http://www.washingtonpost.com/blogs/the-switch/wp/2014/04/11/the-nsa-denies-it-knew-of-the-heartbleed-bug/
[14] White House: https://twitter.com/stuartmillar159/status/454738423946153985/photo/1
[15] released a consultation paper: http://www.zdnet.com/australia-depending-on-vulnerable-cyber-environment-dsto-7000028379/
[16] here: http://www.dsto.defence.gov.au/attachments/Policy-and-Program-consultation%20paper-April%202014.pdf
[17] M-Threats paper: https://www.mandiant.com/blog/mtrends-2014-threat-report-revealed/
[18] Pew Research Centre polls: http://www.pewresearch.org/fact-tank/2014/04/14/more-online-americans-say-theyve-experienced-a-personal-data-breach/
[19] International Cyber Policy Centre: http://cyberpolicy.aspistrategist.ru/
[20] report: https://www.aspistrategist.ru/publications/cyber-maturity-in-the-asia-pacific-region-2014
[21] interactive map: http://cybermap.aspistrategist.ru/
[22] suitably controversial: https://twitter.com/ASPI_ICPC/status/455976364491800576
[23] @ASPI_ICPC: https://twitter.com/ASPI_ICPC/status/451887352751722496/photo/1
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.