{"id":11413,"date":"2013-12-20T11:00:49","date_gmt":"2013-12-20T00:00:49","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=11413"},"modified":"2013-12-23T09:24:37","modified_gmt":"2013-12-22T22:24:37","slug":"2013-review-the-year-in-cybsecurity","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/","title":{"rendered":"2013 review – the year in cybsecurity"},"content":{"rendered":"

\"International<\/a>2013 was a significant year in cyberspace, both internationally and closer to home. Whilst the Edward Snowden leaks dominated the headlines, several important agreements and policy achievements were made further away from the glare of the media spotlight.<\/p>\n

Beginning back in January, then Prime Minister Julia Gillard announced<\/a> the creation of the Australian Cyber Security Centre (ACSC). The centre intends to co-locate government operational cyber security assets from DIO, ASD, ASIO, CERT, AGD, the AFP and the ACC whilst working closely with the private sector. The centre still \u2018intends\u2019 to achieve these goals as it’s yet to become operational. This is due to a number of factors, not least of all that its new home, the ASIO building, isn\u2019t ready for occupancy<\/a>.<\/p>\n

February saw the release of President Obama\u2019s Cybersecurity executive order<\/a>. Revealed just ahead of the 2013 State of the Union address, the order set a timeline for the introduction of a framework for public\/private collaboration on critical infrastructure protection. What followed was the creation of a Preliminary Cybersecurity Framework, effectively guaranteeing<\/a> minimum standards. It\u2019s a plan that the Australian Government could usefully borrow from<\/a>.<\/p>\n

Later that same month, American Cybersecurity firm Mandiant released a report<\/a> exposing China\u2019s PLA Unit 61398<\/a>. The Unit, traced to Shanghai in the highly publicised report, has been linked to several advanced persistent threats reaching back to at least 2006. After a few months laying low following the release of the report, the group seems to have resumed its activities<\/a>. But it\u2019s debatable<\/a> as to how effectively China manages to process and use this information given the haphazard domestic cyber hierarchy that exists within the country.<\/p>\n

April saw an attempt by two of the world\u2019s biggest cyber powers to move beyond finger-pointing and improve cooperation, with the establishment of the US-China Cyber Security Working Group. The first meeting held in July was overshadowed to an extent by the Snowden leaks, but made important<\/a> inroads. In June another positive agreement<\/a> was hatched between the US and Russia on the sidelines of the G8 Summit in Northern Ireland. The deal will see Russian and US CERT teams work closer together and the establishment of a ‘cyber hotline’ to aid in the prevention of cyber misunderstandings.<\/p>\n

The June UN Group of Governmental Experts decision<\/a> (PDF) saw landmark consensus on the applicability of the UN charter to cyberspace. The decision was particularly significant given that group of 15 experts included representatives from Russia and China. \u00a0Australian Deborah Stokes, now Australia\u2019s High Commissioner to PNG, chaired the group and has been widely praised for her efforts in helping the members reach consensus.<\/p>\n

The leaking<\/a> of the existence PRISM and TEMPORA surveillance programs in June by Edward Snowden continues to grab the world\u2019s attention. The disclosure bruised relations between allies and put those with already frosty relations into a deep freeze. While Snowden was exceptionally successful in initiating a discussion on the privacy vs. security debate, should<\/a> he now ease the damaging torrent of information now he\u2019s successfully made his point?<\/p>\n

In September online security firm Symantec released a report<\/a> detailing the activities of an online \u2018hackers-for hire\u2019 group it has dubbed \u2018Hidden Lynx\u2019. It described the increasing technical and operational sophistication of high profile attacks seen throughout 2013, including the alleged theft<\/a> of US weapons systems plans from contractors, including the F-35 Joint Strike Fighter.<\/p>\n

On the home front, July saw the release<\/a> of the National Plan to Combat Cybercrime and the announcement of the Australian Cybercrime Online Reporting System (ACORN). It followed the publication of Australia\u2019s first National Security Strategy<\/a> in January, which listed cyber as a key national security risk, and the Defence White Paper<\/a> in May, which named \u2018integrated cyber policy and operations\u2019 as a key five year priority.<\/p>\n

Finally, in October South Korea played host to the third iteration of the international cyberspace conference process, initiated by the UK Government in 2011. The conference drew together public and private sector cyber experts from over 87 countries to discuss a range of cyber related issues. Julie Bishop became the first Australian Foreign Minister to attend to gathering. The Australian government earned praise<\/a> throughout the conference for its work domestically and internationally in the cyber realm and should try to build upon this image into the New Year.<\/p>\n

Jessica Woodall is an analyst in ASPI\u2019s International Cyber Policy Centre<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

2013 was a significant year in cyberspace, both internationally and closer to home. Whilst the Edward Snowden leaks dominated the headlines, several important agreements and policy achievements were made further away from the glare of …<\/p>\n","protected":false},"author":133,"featured_media":7591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,95,170],"class_list":["post-11413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-cyber-security","tag-intelligence"],"acf":[],"yoast_head":"\n2013 review - the year in cybsecurity | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2013 review - the year in cybsecurity | The Strategist\" \/>\n<meta property=\"og:description\" content=\"2013 was a significant year in cyberspace, both internationally and closer to home. Whilst the Edward Snowden leaks dominated the headlines, several important agreements and policy achievements were made further away from the glare of ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-12-20T00:00:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-12-22T22:24:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1130\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"width\":1130,\"height\":425},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/\",\"name\":\"2013 review - the year in cybsecurity | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/#primaryimage\"},\"datePublished\":\"2013-12-20T00:00:49+00:00\",\"dateModified\":\"2013-12-22T22:24:37+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2013 review – the year in cybsecurity\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2013 review - the year in cybsecurity | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/","og_locale":"en_US","og_type":"article","og_title":"2013 review - the year in cybsecurity | The Strategist","og_description":"2013 was a significant year in cyberspace, both internationally and closer to home. Whilst the Edward Snowden leaks dominated the headlines, several important agreements and policy achievements were made further away from the glare of ...","og_url":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-12-20T00:00:49+00:00","article_modified_time":"2013-12-22T22:24:37+00:00","og_image":[{"width":1130,"height":425,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","width":1130,"height":425},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/","url":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/","name":"2013 review - the year in cybsecurity | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/#primaryimage"},"datePublished":"2013-12-20T00:00:49+00:00","dateModified":"2013-12-22T22:24:37+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/2013-review-the-year-in-cybsecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"2013 review – the year in cybsecurity"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11413"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=11413"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11413\/revisions"}],"predecessor-version":[{"id":11525,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11413\/revisions\/11525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/7591"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=11413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=11413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=11413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}