- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Klée Aiken and Jessica Woodall on March 25, 2015 @ 12:35
In news that won’t shock anyone, word [2] came this week that China has established extensive offensive hacking units within its military and civilian government set-ups. But it’s the source of these reports that makes this story interesting: The PLA. In the organisation’s latest version of The Science of Military Strategy, China, for the first time, has acknowledged the presence of its cyber espionage and net warfare capabilities.
The disclosure is curious given one of the government’s favourite responses to challenges of online malfeasance is often to plead ignorance. As Joe McReynolds explained in the Daily Beast article, ‘it means that the Chinese have discarded their fig leaf of quasi-plausible deniability’. ‘As recently as 2013, official PLA publications have issued blanket denials such as, “The Chinese military has never supported any hacker attack or hacking activities.” They can’t make that claim anymore’.
It will be interesting to see how—if at all—the admission will impact Chinese language on international state based and corporate espionage claims.
Researchers from the University of Melbourne and University of Michigan uncovered [3] a vulnerability this week in the NSW state election’s online voting system. The researchers discovered the hole when assessing the security of the iVote system’s practice voting site, which is identical to the real website. The pair discovered that whilst the iVote website used a server with safe SSL configuration, it included JavaScript from an external server that was vulnerable to man-in-the middle attacks.
After informing CERT Australia of the security flaw, the issue has now been rectified, but not before 66,000 votes were cast. The researchers still hold ongoing [4] fears surrounding the websites security and have called on the NSW government to ‘back away from voting online at least until there are fundamental advances in computer security’.
The Japanese government is bolstering [5] its impressive cyber engagement program with ASEAN countries. The government is now targeting capacity building and end user education, with a particular focus on boosting mobile cyber hygiene via TV campaigns. The large uptick in mobile based internet users based in ASEAN countries and the broader Asia-Pacific has created a new generation of cyber users – ones that are not necessarily schooled in the finer details of cyber security. Japanese universities and private companies have also agreed to train interns from ASEAN countries, with the aim of building capacity for future generations.
Since January, Washington has seen growing Congressional momentum on cybersecurity legislation. The most promising push is coming from the Senate Intelligence Committee which has recently passed the Cybersecurity Information Sharing Act [6]. In many ways this bill is a rehash of previous cybersecurity bills that have been stalled by privacy advocates. Democratic leadership in the House Intelligence Committee [7], set to release its counterpart to the Senate bill, has suggested that both chambers have addressed many of these privacy concerns and expressed optimism over the potential for Congress to take much needed action on cybersecurity.
In a less controversial space, two congressmen are planning on introducing the Student Digital Privacy and Parental Rights Act [8], to prohibit companies that operate school services from using or disclosing student data for advertisements. This effort incorporates principles from President Obama’s January push for cyber legislation, suggesting that there is hope for the White House and Congress to work together on cyber issues.
Speaking of the United States, the much maligned F-35 Lightning [9] program is looking to develop a pod-mounted cyber-attack system. Although only in the prototyping phase, this news adds an exciting (airborne) addition to ever present tumult over #cyberwar [10].
Of course we should be wary of feeding the hype machine, as Alex Grigsby [11] reminds us that unrealistic expectations and fears lead to unreasonable demands on policy makers and law enforcement. Looking into the inconceivably popular CSI:Cyber, Grisby joins the chorus [12] of experts suggesting that hype hinders intelligent discussion.
On the opposite end of the spectrum, a recent report [13] suggests that poor awareness and lack of government initiative has left Bangladesh vulnerable to cyberattacks. Pointing at a string of high-profile security breaches in the country, the report recommends enactment of appropriate cyber law to legalise and regulate the country’s internet. The ability to strike the proper balance to spur policy movement and increase awareness—whilst avoiding hype—will continue to be a critical challenge for those pushing for a mature cyber discussion domestically and internationally.
Jessica Woodall and Klee Aiken are analysts in ASPI’s International Cyber Policy Centre [14]. Image courtesy of Flickr user Luther Bailey [15].
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-66/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/03/4045464430_66414b9042_z.jpg
[2] word: http://www.thedailybeast.com/articles/2015/03/18/china-reveals-its-cyber-war-secrets.html
[3] uncovered: http://www.abc.net.au/news/2015-03-23/ivote-security-hack-allowed-change-of-vote-security-expert-says/6340168
[4] ongoing: https://freedom-to-tinker.com/blog/teaguehalderman/ivote-vulnerability/
[5] bolstering: http://www.nikkei.com/article/DGXLASFS22H1P_S5A320C1PE8000/
[6] Cybersecurity Information Sharing Act: http://www.nationaljournal.com/tech/here-s-what-is-in-the-senate-s-cybersecurity-bill-20150318
[7] House Intelligence Committee: http://thehill.com/policy/cybersecurity/236606-top-house-dem-cyber-bills-privacy-concerns-have-been-met
[8] Student Digital Privacy and Parental Rights Act: http://www.nytimes.com/2015/03/23/technology/bill-would-limit-use-of-student-data.html?ref=technology&_r=0
[9] F-35 Lightning: http://www.janes.com/article/50036/f-35-programme-begins-developing-cyber-attack-capability
[10] #cyberwar: https://twitter.com/search?q=%23cyberwar&src=typd
[11] Alex Grigsby: http://blogs.cfr.org/cyber/2015/03/09/csi-cyber-is-more-cyber-hype-we-dont-need/
[12] chorus: http://www.wsj.com/articles/is-the-prefix-cyber-overused-1425427767
[13] report: http://www.thedailystar.net/business/bangladesh-vulnerable-cyber-attacks-73048
[14] International Cyber Policy Centre: http://cyberpolicy.aspistrategist.ru/
[15] Luther Bailey: https://www.flickr.com/photos/lutherbailey_photos/4045464430
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.