{"id":12359,"date":"2014-02-19T13:15:16","date_gmt":"2014-02-19T02:15:16","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=12359"},"modified":"2014-02-20T09:40:39","modified_gmt":"2014-02-19T22:40:39","slug":"cyber-wrap-16","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>This week saw the long-awaited release of US President Obama\u2019s Framework for Improving Critical Infrastructure Cybersecurity<\/a> after a year of concentrated effort by the National Institute of Standards and Technology<\/a> (NIST). The document has been heralded<\/a> as a step in the right direction<\/a>; the White House is seeking to motivate private sector uptake by framing these standards as means to support profit. Despite a lack of Congress support, it may also become \u2018the de facto standard for private sector cyber security in the eyes of US lawyers and regulators<\/a>\u2019. The NIST also released an accompanying Roadmap document<\/a> that will guide the future of the framework, detailing cybersecurity development, alignment and collaboration planning.<\/p>\n

Over in Beijing, internet freedom was on the agenda when US Secretary of State John Kerry met with Chinese bloggers<\/a> over the weekend. The bloggers appealed to Secretary Kerry to help \u2018tear down the great internet firewall\u2019 in a discussion that also touched on human rights issues. In contrast, China\u2019s leadership labelled Kerry\u2019s expression of support of internet freedom \u2018naive\u2019<\/a>.<\/p>\n

The cyber capabilities and mindset of the North Korean regime have recently been occupying the time of a number<\/a> of experts<\/a>. With significant international attention on the DPRK following the release this week of the UN\u2019s Human Rights Inquiry<\/a> and some commentators<\/a> charting a cycle of provocation and charm, it remains to be seen how the North\u2019s cyber capabilities\u2014against the US and the South\u2014are intended to be used. For some background reading on the issue, ICPC Director Toby Feakin recently published a paper<\/a> (PDF) on the size and scope of the DPRK\u2019s cyber capabilities.<\/p>\n

Still in Asia, the National Institute of Information and Communications Technology (NICT) in Japan recently reported<\/a> that it\u2019s the systems of government and other organisations were subject to 12.8 billion cyber-attacks in 2013. The Japanese Defense Ministry has also announced 90 person force that will take shape in late-March to strengthen the Ministry\u2019s capacity to manage cyberattacks. Drawn from across the Self-Defense Forces<\/a>, the team will monitor, analyse and respond to cyber breaches, as well as explore counterstrike capabilities.<\/p>\n

In Europe, the IT and telecommunication systems of the French Defense Ministry are set to be strengthened<\/a> against cyber threats, with the government announcing an investment of \u20ac1 billion. Having recently recommitted to cyber security cooperation<\/a> with the United States, France has set a two-year timeline in which to build capabilities to match those of its NATO allies. A centre will also be set up to develop offensive cyber weapon capabilities and to train military personnel on cyber defence issues.<\/p>\n

In her weekly podcast, German Chancellor Angela Merkel proposed<\/a> the development of a European communications network to improve data protection for EU residents. Merkel emphasised that emails and other information shouldn\u2019t have to be sent across the Atlantic where data protection standards of giants like Google and Facebook were wanting. The announcement follows the failure of Germany\u2013US talks<\/a> that were hoped would produce a bilateral no-spy agreement in the wake of the Snowden disclosures.<\/p>\n

Finally, the New York Times<\/i> has a fascinating profile<\/a> on Brian Krebs. On his blog, Krebs on Security<\/a>, he writes on a range of cyber security issues, focussing on the dark world of cybercrime (with a 12-guage shotgun by his computer, no less). Krebs was the first to uncover huge frauds at Target, Neiman Marcus and others that have made victims of what’s estimated at more than one third of Americans. His revelations, coupled with tech developments, have boosted<\/a> the priority of and spending on cyber security for many US-based merchants.<\/p>\n

David Lang is an intern at ASPI\u2019s International Cyber Policy Centre.<\/em><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

This week saw the long-awaited release of US President Obama\u2019s Framework for Improving Critical Infrastructure Cybersecurity after a year of concentrated effort by the National Institute of Standards and Technology (NIST). The document has been …<\/p>\n","protected":false},"author":207,"featured_media":7591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[695,52,391,291,694,135,328,86,31],"class_list":["post-12359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-brian-krebs","tag-china","tag-cyber","tag-france","tag-germany","tag-japan","tag-john-kerry","tag-north-korea","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This week saw the long-awaited release of US President Obama\u2019s Framework for Improving Critical Infrastructure Cybersecurity after a year of concentrated effort by the National Institute of Standards and Technology (NIST). The document has been ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-19T02:15:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-02-19T22:40:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1130\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Lang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Lang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"width\":1130,\"height\":425},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/#primaryimage\"},\"datePublished\":\"2014-02-19T02:15:16+00:00\",\"dateModified\":\"2014-02-19T22:40:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2\",\"name\":\"David Lang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g\",\"caption\":\"David Lang\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/david-lang\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"This week saw the long-awaited release of US President Obama\u2019s Framework for Improving Critical Infrastructure Cybersecurity after a year of concentrated effort by the National Institute of Standards and Technology (NIST). The document has been ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-02-19T02:15:16+00:00","article_modified_time":"2014-02-19T22:40:39+00:00","og_image":[{"width":1130,"height":425,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","type":"image\/jpeg"}],"author":"David Lang","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"David Lang","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","width":1130,"height":425},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/#primaryimage"},"datePublished":"2014-02-19T02:15:16+00:00","dateModified":"2014-02-19T22:40:39+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-16\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2","name":"David Lang","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g","caption":"David Lang"},"url":"https:\/\/www.aspistrategist.ru\/author\/david-lang\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12359"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/207"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=12359"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12359\/revisions"}],"predecessor-version":[{"id":12376,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12359\/revisions\/12376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/7591"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=12359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=12359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=12359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}