- The Strategist - https://aspistrategist.ru -

Cyber wrap

Posted By on June 25, 2014 @ 12:15

Jason Healey [1]

It’s a grim picture in this week’s cyber wrap as news of attacks and vulnerabilities pile up. According to the Australian Signals Directorate (ASD), foreign-state sponsored cyberattacks on Australian targets have surged [2] by 21%, with thousands more likely unreported. The ASD Cyber Security Picture 2013 [3] is chock-full of interesting statistics, explores how adversaries have diversified their tradecraft, and offers a critical warning that supply chain, contractor and third party vulnerability could compromise individuals’ personal information security.

This uptick of cyber malfeasance was certainly on show last week, with the New York Times exploring [4] the increased popularity of cyber extortion schemes like those that hit Feedly and Evernote in recent days. Meanwhile, Hong Kong’s unofficial referendum [5] on chief executive nominations was hit by ‘one of the largest and most persistent’ distributed-denial-of-service (DDoS) attacks ever, while news broke of state-sponsored attacks targeting 75 US airports, two falling to the advanced persistent threat (APT) operation.

Increasingly public cyber incidents have spurred the business community into action. Unfortunately, the legal scope for the kind of action [6] businesses can take remains muddled, with questions surrounding honey-pot liability and the right to retaliate. With the default Department of Justice response to corporate retaliation—‘Oh wow, now I have two crimes’—many companies are turning to insurance to limit the cyber damage to their tangible bottom-lines. Although cyber insurance is hyped as a booming market, the reality is that the cyberinsurance industry is a mess [7]. Even in the vaunted critical infrastructure sector, underwriters cite a lack of data points as a major hindrance to cyber insurance. For instance, Carter Schoenberg [8] points out that ‘Flo’ (a well-known character on US insurance ads) certainly doesn’t know her way around cyber insurance, however he does offer a few helpful hints.

Although countries like India are scrambling to boost their cybermaturity [9], the booming private sector demand for skilled cybersecurity professionals has left governments struggling to secure their own systems. Despite a title sourced from the turn of the millennium, RAND’s report H4CKER5 WANTED [10], has pertinent, contemporary findings. The report finds scarcity, high competition, and even crisis in the cybersecurity labour market. However, with educational initiatives already in-place ‘the best steps may already have been taken’ and it’ll simply be a matter of time before the labour lag catches up with market demand.

The French Ministère de la Défense has instituted its own response:  France is circumventing the cyber labour market altogether by looking to train its own cadre of cyber defence experts [11]. While other governments could easily adopt this measure, in the US a skilled workforce isn’t the only government challenge in cyberspace. The Federal Bureau of Investigations [12] has been proverbially caught NIFOC with an FOI release of its official glossary of ‘Twitter shorthand’ which has left many questioning, AYFKMWTS?

Of course, it’s not all doom and gloom. With cyber experts worldwide working to improve cyber security, policy, education, and awareness, there’s always hope for the future of cyberspace. The ASPI International Cyber Policy Centre hosted [13] one such thought leader last week when it welcomed Jason Healey [14] (pictured above), Director of the Cyberstatecraft Initiative at the Atlantic Council in Washington, DC.

Jason’s presentation looked to the history of cyber conflict [15] to draw lessons for today’s cyber cohort. Three key lessons included 1) the constant dynamics of cyber conflict, despite changing technology levels, 2) the consistent overestimation of the impact of cyber attacks, which has led to a focus on disruptive attacks at the expense of more prevalent issues such as cyber espionage, and 3) that the more strategically significant a cyber conflict, the more similar it is to conflicts in the air, on land, and on the sea.

Following the short presentation, Jason was joined by Andrew Bewick, General Manager, Defence at IBM and Justin Bassi, National Security Advisor at the Office of the Attorney-General for an engaging discussion moderated by ICPC Director Tobias Feakin. The conversation touched on the need to convince senior policymakers of the importance of cyber issues, the critical role for education and awareness raising, as well as the need for the private sector to drive the issue forward. Live tweets from the event can be found @ASPI_ICPC [16].

Lastly, ICANN50 wraps up in London tomorrow. Keep your eyes on London50 [17] for releases from the event and on the Strategist next week for a special edition Governing the Net [18] overview of what went down.

Klée Aiken is an analyst in ASPI’s International Cyber Policy Centre [19].



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /cyber-wrap-32/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2014/06/IMG_6730.jpg

[2] surged: http://www.afr.com/p/technology/cyber_attacks_surge_thousands_unreported_j6byQKrJlVLIdzSQjsTqLI

[3] Cyber Security Picture 2013: http://www.asd.gov.au/publications/csocprotect/cyber-security-picture-2013.htm

[4] exploring: http://bits.blogs.nytimes.com/2014/06/19/tally-of-cyber-extortion-attacks-on-tech-companies-grows/?smid=tw-nytimesbits

[5] unofficial referendum: http://sinosphere.blogs.nytimes.com/2014/06/21/cyberattack-on-hong-kong-vote-was-among-largest-ever-security-chief-says/?smid=tw-share

[6] legal scope for the kind of action: http://www.nytimes.com/2014/06/22/sunday-review/hackers-find-new-ways-to-breach-computer-security.html?smid=tw-share&_r=1

[7] cyberinsurance industry is a mess: http://www.slate.com/articles/technology/future_tense/2014/06/target_breach_cyberinsurance_is_a_mess.html

[8] Carter Schoenberg: http://www.tripwire.com/state-of-security/featured/cyber-insurance-for-critical-infrastructure-does-flo-even-know/#.U6Ip7UUedo4.twitter

[9] scrambling to boost their cybermaturity: http://thediplomat.com/2014/06/india-scrambles-on-cyber-security/

[10] H4CKER5 WANTED: http://www.rand.org/pubs/research_reports/RR430.html

[11] cadre of cyber defence experts: http://www.defensenews.com/article/20140618/DEFREG01/306180038

[12] Federal Bureau of Investigations: http://www.washingtonpost.com/news/the-intersect/wp/2014/06/17/the-fbi-maintains-an-83-page-glossary-of-internet-slang-and-it-is-hilariously-frighteningly-out-of-touch/

[13] hosted: https://www.aspistrategist.ru/icpc/home/events/the-global-interconnections-of-cyber-risk

[14] Jason Healey: http://www.atlanticcouncil.org/about/experts/list/jason-healey#fullbio

[15] history of cyber conflict: http://www.amazon.com/Fierce-Domain-Conflict-Cyberspace-1986/dp/098932740X/ref=la_B00DDW21Y0_1_1?s=books&ie=UTF8&qid=1402362833&sr=1-1

[16] @ASPI_ICPC: https://twitter.com/ASPI_ICPC

[17] London50: https://london50.icann.org/en/

[18] Governing the Net: https://aspistrategist.ru/?s=%22Governing+the+Net%22

[19] International Cyber Policy Centre: http://cyberpolicy.aspistrategist.ru/

Copyright © 2024 The Strategist. All rights reserved.