{"id":12504,"date":"2014-02-26T14:00:56","date_gmt":"2014-02-26T03:00:56","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=12504"},"modified":"2014-03-05T11:41:59","modified_gmt":"2014-03-05T00:41:59","slug":"cyber-wrap-17","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>Let\u2019s kick things off at the RSA Conference<\/a> in San Francisco, which brings together information security professionals and business leaders to discuss emerging cybersecurity trends. This year\u2019s conference has drawn criticism<\/a> from leading security experts as RSA Security\u2014the network security company that manages the conference\u2014 has been accused of taking money from the National Security Agency to incorporate a flawed encryption algorithm into one of its security products.<\/p>\n

As with many of today\u2019s cyber conversations, the Snowden disclosures shaped the agenda at the EU-Brazil summit this week in Brussels. First up was the announcement of a new underwater communications cable<\/a> to run between Portugal and Brazil. The \u20ac134 million project seeks to reduce reliance on US cables in order to insulate against American surveillance efforts. (Brazilian President Dilma Rousseff has been less-than-successful<\/a> in building her country\u2019s cyber fortifications since it was revealed the NSA had been keeping tabs on her and her allies). Also out of the EU-Brazil summit is news<\/a> of the grouping\u2019s plan to hold a dialogue on international cyber policy. The first dialogue is set to occur on the sidelines of April\u2019s Global Multistakeholder Meeting on the Future of Internet Governance<\/a> (or NETmundial<\/i>) in Sao Paulo. The US State Department has recently released<\/a> their submission to conference organisers.<\/p>\n

The New York Times<\/i> has a piece on the role that American cyber weapons might play in Syria:<\/a><\/p>\n

The Obama administration has been engaged in a largely secret debate about whether cyberarms should be used like ordinary weapons, whether they should be rarely used covert tools or whether they ought to be reserved for extraordinarily rare use against the most sophisticated, hard-to-reach targets. And looming over the issue is the question of retaliation: whether such an attack on Syria\u2019s air power, its electric grid or its leadership would prompt Syrian, Iranian or Russian retaliation in the United States.<\/p><\/blockquote>\n

In a move that has surprised some<\/a>, South Korea has candidly announced<\/a> its plan to develop offensive cyber capabilities to disrupt the DPRK\u2019s nuclear weapons program. The South Korean Defence Ministry stated that a new Cyber Defence Command would be set up from May and name checked Stuxnet<\/a> as the type of cyberweapon it would seek to deploy. While developing cyber capabilities might well be a smart move, it mightn\u2019t be so strategic to advertise your offensive intentions to your hostile northern neighbour\u2026<\/p>\n

In light of the data breaches at major retailers Target and Neiman Marcus, US Attorney General Eric Holder has called for a data-breach notification law<\/a>, which would require businesses that have lost information in cyberattacks to notify those affected. According to Holder, this law \u2018would enable law enforcement to better investigate these crimes\u2014and hold compromised entities accountable\u2019. <\/i>The Economist has a possible pre-emptive answer for retailers and other businesses, with an interesting piece<\/a> on the role of \u2018whitehats\u2019 and the increasing demand for penetration testing of computer systems.<\/p>\n

Tokyo-based Bitcoin exchange Mt. Gox is offline with trading suspended<\/a> due to the theft of roughly US$375 million dollars worth of the virtual currency. The exchange hack and subsequent collapse in Bitcoin value brings into question yet again the currency\u2019s stability and security protocols, let alone the legitimacy of Bitcoin as a global currency.<\/p>\n

Over at The<\/i> Monkey Cage<\/i> blog, Henry Farell has continued his dispassionate exploration into the political science of cyber security. In Part III<\/a>, he looks to how international relations theory informs American cyber security doctrine. Catch up with Part I<\/a> and Part II<\/a>.<\/p>\n

In case you missed it, ICPC\u2019s Kl\u00e9e Aiken this week published his report on US cyber security efforts in which he highlights some important lessons for Australia. Cybersecurity by Executive Order <\/i>can be downloaded here<\/a> (PDF).<\/p>\n

Finally, some good news for those of us who have already binge-watched the entire second season of House of Cards (Chinese cyber espionage storyline, anyone?). CBS has ordered a pilot<\/a> of the long running CSI: Crime Scene Investigation<\/i> franchise to explore the dark world of cybercrime. The spinoff will investigate \u2018crimes that start in the mind, live on-line and play out in the real world\u2019 informed by the work of Irish cyber psychologist Mary Aiken.<\/p>\n

David Lang and Simon Hansen are interns in ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>.<\/em><\/em><\/em>
\n<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Let\u2019s kick things off at the RSA Conference in San Francisco, which brings together information security professionals and business leaders to discuss emerging cybersecurity trends. This year\u2019s conference has drawn criticism from leading security experts …<\/p>\n","protected":false},"author":207,"featured_media":7591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,169,95,647,86,649,274],"class_list":["post-12504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-cyber-crime","tag-cyber-security","tag-edward-snowden","tag-north-korea","tag-nsa","tag-syria"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s kick things off at the RSA Conference in San Francisco, which brings together information security professionals and business leaders to discuss emerging cybersecurity trends. This year\u2019s conference has drawn criticism from leading security experts ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-26T03:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-03-05T00:41:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1130\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Lang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Lang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"width\":1130,\"height\":425},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/#primaryimage\"},\"datePublished\":\"2014-02-26T03:00:56+00:00\",\"dateModified\":\"2014-03-05T00:41:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2\",\"name\":\"David Lang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g\",\"caption\":\"David Lang\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/david-lang\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Let\u2019s kick things off at the RSA Conference in San Francisco, which brings together information security professionals and business leaders to discuss emerging cybersecurity trends. This year\u2019s conference has drawn criticism from leading security experts ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-02-26T03:00:56+00:00","article_modified_time":"2014-03-05T00:41:59+00:00","og_image":[{"width":1130,"height":425,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","type":"image\/jpeg"}],"author":"David Lang","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"David Lang","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","width":1130,"height":425},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/#primaryimage"},"datePublished":"2014-02-26T03:00:56+00:00","dateModified":"2014-03-05T00:41:59+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-17\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2","name":"David Lang","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g","caption":"David Lang"},"url":"https:\/\/www.aspistrategist.ru\/author\/david-lang\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12504"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/207"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=12504"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12504\/revisions"}],"predecessor-version":[{"id":12600,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12504\/revisions\/12600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/7591"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=12504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=12504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=12504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}