{"id":12599,"date":"2014-03-05T12:15:56","date_gmt":"2014-03-05T01:15:56","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=12599"},"modified":"2014-03-06T10:25:22","modified_gmt":"2014-03-05T23:25:22","slug":"cyber-wrap-18","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"\"<\/a><\/figure>\n

The Russian military occupation of Crimea headlines this week, with Moscow showing considerable restraint so far in the use of cyberattacks against Ukraine. Considering that crippling DDoS attacks have become a staple of conflicts involving Russia and its smaller neighbours such as Estonia and Georgia, one commentator has rightly asked: where are the cyberattacks?<\/a><\/p>\n

Ukrainian hackers are highly proficient (and patriotic) operators, so the fear of retaliation could have dissuaded Russia from the use of cyberattacks. If so, this highlights the value of offensive information warfare capabilities as an effective deterrent, a point that cyber operations centres around the world should note.<\/p>\n

For a look at Russia and Ukraine\u2019s cyber capabilities, as well as what has been deployed so far, check out this post on the Lawfare blog<\/a>, and this piece in Foreign Policy<\/i><\/a>. The key challenge in this crisis is to avoid mis-attribution and escalation, as the ability of both sides to inflict harm in the cyberdomain is tried and tested.<\/p>\n

A significant announcement was made in China last week as President Xi Jinping was declared head<\/a> of the new leading group on \u2018internet security and informatization\u2019. The announcement received considerable local attention, airing as one of the lead stories<\/a> on CCTV\u2019s evening news. The group\u2019s goals include drafting a national cybersecurity strategy and coordinating cybersecurity across government sectors. During the inaugural meeting, President Xi said \u2018efforts should be made to build our country into a cyberpower\u2019. See Adam Segal\u2019s commentary<\/a> for an excellent analysis of the broadcast.<\/p>\n

Activists in the Philippines are protesting against<\/a> the 2012 cyber crime protection law that makes cybersex, pornography and file-sharing illegal. Among netizens, the most contentious part<\/a> of the law seems to be a provision making online libel (defamation) a crime. A similar debate<\/a> is happening in Indonesia with regards to the Electronic Information and Transaction (ITE) law that\u2019s been in place since 2009.<\/p>\n

2013 was a year plagued by significant commercial security breaches and constant revelations about government surveillance. The recent RSA Conference 2014 was overshadowed by those events with one commentator drolly noting<\/a> that \u2018last year’s impregnably secure business looks like this year’s Swiss cheese\u2019. Another observed<\/a> that many conversations during the conference boiled down to a \u2018trust deficit\u2019 between government and business, as well as between companies and users. Tying up the conference with a keynote address<\/a> was satirist Stephen Colbert. \u2018Many of you see me as a champion of privacy,\u2019 quipped Colbert, \u2018which I know because I read your e-mails\u2019.<\/p>\n

\u00ad<\/p>\n

Organisers of TrustyCon, an information security conference that runs simultaneously to the RSA conference, have released footage from the event\u2014available here<\/a>.<\/p>\n

Finally, US Cyber Command head General Keith Alexander testified for the last time in that role to the Senate Armed Services Committee. In his statement<\/a> he acknowledged that some key capability gaps, including that some weapons systems were not as \u2018cyber robust\u2019 as they need to be, have left the US military at risk.<\/p>\n

Simon Hansen is an intern in ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>.<\/em><\/em><\/em><\/em><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

The Russian military occupation of Crimea headlines this week, with Moscow showing considerable restraint so far in the use of cyberattacks against Ukraine. Considering that crippling DDoS attacks have become a staple of conflicts involving …<\/p>\n","protected":false},"author":214,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,713,370,163,715,714,31],"class_list":["post-12599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyberattack","tag-philippines","tag-russia","tag-stephen-colbert","tag-ukraine","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The Russian military occupation of Crimea headlines this week, with Moscow showing considerable restraint so far in the use of cyberattacks against Ukraine. Considering that crippling DDoS attacks have become a staple of conflicts involving ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-05T01:15:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-03-05T23:25:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/#primaryimage\"},\"datePublished\":\"2014-03-05T01:15:56+00:00\",\"dateModified\":\"2014-03-05T23:25:22+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The Russian military occupation of Crimea headlines this week, with Moscow showing considerable restraint so far in the use of cyberattacks against Ukraine. Considering that crippling DDoS attacks have become a staple of conflicts involving ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-03-05T01:15:56+00:00","article_modified_time":"2014-03-05T23:25:22+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/#primaryimage"},"datePublished":"2014-03-05T01:15:56+00:00","dateModified":"2014-03-05T23:25:22+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-18\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12599"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=12599"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12599\/revisions"}],"predecessor-version":[{"id":12622,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12599\/revisions\/12622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=12599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=12599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=12599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}