- The Strategist - https://aspistrategist.ru -

Cyber wrap

Posted By on January 28, 2015 @ 14:56

[1]

The use of social media by extremist groups continues to trouble policymakers and police forces across the globe. The sophisticated use of online platforms by groups such as ISIS have spurred governments in Europe to call on US tech companies to pre-emptively filter [2] terrorist-related material. ‘Online jihad 3.0’ has drawn serious government concern about freedom of speech, as well as liability, and more creative solutions [3] might be prudent. For instance, social media users in Japan [4] have taken to mocking ISIS’ attempt to hijack Japanese hashtags following the kidnapping of two Japanese citizens.

Although its links to ISIS remain dubious, the self-proclaimed Cyber Caliphate has made Malaysia Airlines [5] its latest high-profile victim by hacking the company’s website. While such attacks can be brushed off as a cosmetic inconvenience, the hacks can have serious consequences for a company’s bottom line and reputation, as well as for consumer confidence. More serious cases have included hacks of CENTCOM [6], the Tennessee Valley Authority, and the White House [7]. And although directed at third or fourth party platforms [8], those attacks fed at fear of cyber vulnerability in the military and energy infrastructure. It’s critical that supply-chain and third-party cyber security is considered when assessing cyber risk and such high profile attacks highlight the tricky cost–benefit balance of trusting one’s public face to external platforms.

While the controversial NETmundial Initiative [9] launch was scrapped from this year’s World Economic Forum meeting in Davos, Internet Governance [10] and cyber policy [11] remained prominently on the agenda. With last year’s string of hacks against major corporations, that top-level executives now take notice of cyber issues is an expected, and much needed [12], development. However the rights and responsibilities of businesses in regards to security in cyberspace remain murky. In response, major banks [13] represented at Davos called for free reign to actively defend themselves against cyber criminals—a tactic with questionable merits [14].

Some remain sceptical about North Korea’s culpability [15] in the Sony hack, but Dennis Rodman’s defensive prowess might not extend to cyberspace. Regardless of attribution, state reactions should be watched closely: each escalation of tension could set a dangerous precedent [16] for future cyber activities.

Speaking of which, the United States is certainly watching the cyber policy space closely, with Chairman of the Joint Chiefs of Staff General Martin Dempsey [17] highlighting cybersecurity among his highest priorities and calling for information-sharing legislation. This echoed the calls made by his Commander-in-Chief the previous evening during the annual State of the Union Address [18]. The President urged lawmakers to ‘finally pass legislation we need to better meet the evolving threat of cyber attacks’ and integrate ‘intelligence to combat cyber threats, just as we have done to combat terrorism.’ With the US continuing the push for major cyber initiatives, it’s prudent to ask whether Australia is keeping up…

At a recent event at the Brookings Institute, Foreign Minister Julie Bishop [19] spoke of cyber as a shared challenge for the US and Australia. At the same event US Undersecretary for Defense for Policy Christine Wormuth [20] praised the US–Australia alliance, including cooperation including ‘a variety of initiatives in the cyber domain.’ On Australia’s cyber activism, a recent article [21] went so far as to suggest that Australia has launched ‘cyber-weapons in global counter-terrorist operations.’ Although this allegation isn’t fully fleshed out, there’re plenty of signs [22] that Australia is highly capable on the technical front.

However, on thE policy-side ICPC analyst Jessica Woodall [23] suggests ‘we are falling behind our ­allies.’ Although the launch of a cybersecurity review is a solid first step [24], she argues that ‘not having an updated strategy inhibits us from forward planning’ and under-defined roles and responsibilities create confusion both within government and for the private sector and international partners.

Klée Aiken [25] is an analyst in ASPI’s International Cyber Policy Centre [26]. Image courtesy of Twitter user @JulieBishopMP [27].



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /cyber-wrap-59/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/01/B75mtBSCUAE5RvQ.jpg

[2] pre-emptively filter: http://www.homelandsecuritynewswire.com/dr20150122-european-govts-urge-u-s-tech-companies-to-remove-terroristrelated-postings-from-sites

[3] creative solutions: http://www.theaustralian.com.au/opinion/savvy-islamists-launch-jihad-30/story-e6frg6zo-1227068275940

[4] social media users in Japan: http://www.japantimes.co.jp/news/2015/01/21/national/islamic-states-twitter-tactics-mocked-by-japanese-internet-users/#.VMcP9y4YOhy

[5] Malaysia Airlines: http://www.usatoday.com/story/tech/2015/01/25/malaysia-airlines-hack/22332867/

[6] CENTCOM: http://www.washingtonpost.com/news/checkpoint/wp/2015/01/12/centcom-twitter-account-apparently-hacked-by-islamic-state-sympathizers/

[7] White House: http://www.businessinsider.com.au/obama-twitter-hacked-syrian-electronic-army-2013-10

[8] third or fourth party platforms: http://www.nextgov.com/cybersecurity/2015/01/what-do-godaddy-and-centcoms-twitter-have-common/103635/?oref=ng-HPtopstory

[9] NETmundial Initiative: http://blogs.lse.ac.uk/mediapolicyproject/2015/01/15/multistakeholderism-unmasked-how-the-netmundial-initiative-shifts-battlegrounds-in-internet-governance/

[10] Internet Governance: http://www.theregister.co.uk/2015/01/24/hibernating_netmundial_continues_to_rattle_internet_governance_world/

[11] cyber policy: https://agenda.weforum.org/topic/global-issues/future-of-the-internet/

[12] much needed: http://www.usnews.com/opinion/blogs/world-report/2014/05/05/warren-buffett-is-the-key-to-selling-the-white-houses-cybersecurity-plan

[13] major banks: http://www.ft.com/intl/cms/s/0/d94e855c-a209-11e4-bbb8-00144feab7de.html#axzz3PzY57Oif

[14] questionable merits: https://aspistrategist.ru/vigilantism-on-the-cyber-frontier/

[15] North Korea’s culpability: http://thehill.com/policy/cybersecurity/230681-dennis-rodmans-not-buying-that-north-korea-hacked-sony

[16] set a dangerous precedent: http://www.eastasiaforum.org/2015/01/24/unregulated-cyberspace-a-cause-for-concern/

[17] Martin Dempsey: http://t.co/doberF0mfH

[18] State of the Union Address: http://www.whitehouse.gov/the-press-office/2014/01/28/president-barack-obamas-state-union-address

[19] Julie Bishop: http://www.foreignminister.gov.au/speeches/Pages/2015/jb_sp_150121.aspx

[20] Christine Wormuth: http://www.defense.gov/news/newsarticle.aspx?id=128005

[21] article: http://www.afr.com/p/technology/australia_launches_cyber_weapons_hR1B30qv3c6bYKJvquVzoO

[22] plenty of signs: https://www.aspistrategist.ru/publications/cyber-maturity-in-the-asia-pacific-region-2014/ASPI_cyber_maturity_2014.pdf#page=16

[23] Jessica Woodall: http://t.co/dXFWbGEvKV

[24] solid first step: https://aspistrategist.ru/australia-the-coming-cyber-review-and-beyond/

[25] Klée Aiken: https://www.aspistrategist.ru/about-aspi/aspi-staff/analysts/klee-aiken

[26] International Cyber Policy Centre: http://cyberpolicy.aspistrategist.ru/

[27] @JulieBishopMP: https://twitter.com/JulieBishopMP/

Copyright © 2024 The Strategist. All rights reserved.