{"id":12735,"date":"2014-03-12T12:30:45","date_gmt":"2014-03-12T01:30:45","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=12735"},"modified":"2014-03-13T10:09:31","modified_gmt":"2014-03-12T23:09:31","slug":"cyber-wrap-19","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-19\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a>Russia has tightened its physical grip on Crimea this week, though \u00a0offensive operations have largely been taking place online. Apart from the anticipated DDoS attacks, analysts from security firm BAE have disclosed<\/a> the nature of an active and potent cyber espionage tool kit dubbed \u2018Snake\u2019 that has infiltrated Ukrainian government computer systems. The malware gives full remote access to compromised systems, allowing the attacker to siphon data and manipulate networks. G Data has a post<\/a> exploring its technical aspects. For an analysis of Russia\u2019s political intentions behind the cyberattacks (assuming the Russian government is the source), see these articles in the New York Times<\/i> <\/a>and Washington Post<\/i> <\/i><\/a>. Cybersecurity expert Jeffrey Carr has said<\/a> that current operations may be only the tip of the iceberg, as \u2018Russia has the ability to completely shut down Ukraine\u2019s infrastructure\u2019. If so, is the relative quiet a result of precise and sophisticated Russian cyberinstruments, or restraint in using them?<\/p>\n Increasingly effective cyber espionage operations like those used against Ukraine raise questions about the use of cyber capabilities during conflict. How do governments define cyber attacks and cyber war? One commentator suggests<\/a> that there will be a \u2018declaration of an act of cyber war before there is agreement on what it is\u2019. Ben Schreer and Tobias Feakin \u00a0<\/i>argue<\/a> here on The Strategist<\/i> that \u2018cyber war\u2019 should be understood in the traditional sense of what constitutes war: \u2018the use or threat of the use of force to deter or compel an adversary\u2019. And Bruce Schneier argues<\/a> that any offensive computer networked operation\u2014including espionage\u2014is a cyber attack, and should be \u2018subject to the same international law standards that govern acts of war in the offline\u00a0world\u2019.<\/p>\n Big data\u2014a group of statistical techniques that uncovers patterns\u2014is a popular topic this week with Harvard Magazine<\/i> releasing an interesting feature<\/a> on using big data to revolutionise health, social media and science. Aljazeera<\/i> further explores<\/a> the importance of interpreting big data, not just collecting it.<\/p>\n Vietnam\u2019s Government has given cybersecurity a high priority for 2014, signing<\/a> a Memorandum of Understanding with Microsoft to address large-scale issues such as commercial espionage and government\u00a0information security.<\/p>\n The latest US Quadrennial Defense Review has emphasised<\/a> (PDF) the need for \u2018new and expanded cyber capabilities and forces to enhance our ability to conduct cyberspace operations\u2019. The Pentagon wants an easy US$5.1 billion<\/a> to make it happen. Some novel approaches that the US government might take are outlined in this piece<\/a>, including the establishment of a \u2018Federal Cyber Campus\u2019.<\/p>\n