{"id":14768,"date":"2014-07-16T14:30:06","date_gmt":"2014-07-16T04:30:06","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=14768"},"modified":"2014-07-17T12:24:37","modified_gmt":"2014-07-17T02:24:37","slug":"cyber-wrap-35","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a><\/b>Ahead of the UK\u2019s upcoming election, the British Prime Minister is looking towards the cyber-security horizon. Along with a major cabinet reshuffle, David Cameron has announced a\u00a0\u00a31.1 billion package<\/a>\u00a0\u2018to equip [the UK] armed forces for the conflicts of this century, not the last.\u2019 This includes a \u00a3800 million boost to British intelligence, surveillance, and cyber capabilities. Welcome news for sure for NATO allies, who\u2019ll travel to Wales in September for the 2014 NATO Summit. Building on\u00a0last month<\/a>\u2019s Defence Ministerial, alliance leaders will work to create a \u2018clarity of policy’<\/a> on cyber issues. For what it\u2019s worth, UK Permanent Representative to NATO, Adam Thomson, is optimistic: \u2018there is a large amount of common ground. I\u2019m sure we will all hotly debate the finer points of policy…but I\u2019m not worried about coming to some good, strong clear conclusions.\u2019<\/p>\n

Doing some horizon scanning of its own, the Australian Army\u2019s\u00a0Directorate of Future Land Warfare<\/a> has similarly found cyber to be a critical part of this century\u2019s strategic environment. Stating that offensive cyber capabilities can be \u2018as effective as precision-guided munitions\u2019, the new study concludes that \u2018the army must develop an ability to defend critical networks against cyber-attack, while also being prepared to operate in a degraded network environment.\u2019<\/p>\n

Unsurprisingly, the United States also recognises the critical role of cyber. Despite steep cuts to its military personnel overall, the US is looking to boost its cyber cadre by as many as\u00a04,000<\/a>\u00a0personnel to meet the challenge. That move has raised some\u00a0critical questions<\/a>\u00a0about the \u2018dangerous concentration\u2019 of people and assets at Fort Meade (which houses too the Defense Information School, the headquarters of United States Cyber Command, the National Security Agency, and the Defense Information Systems Agency), the state of cyber training, and, of course, the impact of the ramp-up on parking and traffic. To pre-empt those issues, the Pentagon could learn from\u00a0North Korea<\/a>\u2019s experience, where cyber staff have doubled over the last two years!<\/p>\n

A fair warning to anyone thinking of applying for any of those new positions\u2014or to any US government agency for that matter\u2014Chinese hackers are targeting\u00a0Federal employee personal data<\/a>. In March, the Office of Personnel Management\u2019s databases were infiltrated, with the perpetrators targeting files on federal employees who have applied for top-secret security clearances. While most experts suggest that this move falls \u2018well within the bounds of modern spycraft\u2019 and is \u2018OK\u2019 under US rules<\/a>, don\u2019t expect anything other than\u00a0denials<\/a>\u00a0from the Chinese government. After all \u2018Chinese laws prohibit cyber crimes of all forms, and Chinese government has done whatever it can to combat such activities.\u2019<\/p>\n

The US Senate is also getting into the action, with the\u00a0Senate Intelligence Committee<\/a>\u00a0approving a bill to boost public\u2013private information sharing. With Congressional inaction a major impediment to US governance\u00a0cybermaturity<\/a>\u00a0in 2014, this move will hopefully help boost the public\u2013private partnership efforts outlined back in the 2013 cybersecurity Executive Order issued by President Obama. (More from ICPC on the Executive Order\u00a0here<\/a>)<\/p>\n

While the week\u2019s news demonstrates increased government efforts on the cyber front, with\u00a0The Economist<\/a><\/i>\u00a0finding that \u2018cyber-attackers have multiplied and become far more professional\u2019, the private sector isn\u2019t holding its breath. Microsoft, for one, has been particularly gung-ho on the matter, announcing that it successfully freed 4.7 million infected PCs. Having identified millions more infected machines, the Microsoft Digital Crimes Unit is keen to continue its recent spate of cyber policing. But the company has been taking flak since a \u2018technical error\u2019 shut out 1.8 million legitimate Vitalwerks users during a sting operation. That isn\u2019t stopping Facebook testing the vigilante waters by taking down the small\u00a0Lecpetex botnet<\/a>\u00a0operation that has used the social media platform to spread spam and malware. Meanwhile Google has revealed\u00a0Project Zero<\/a>, its own elite team of hackers \u2018with the sole mission of tracking down and neutering the most insidious security flaws in the world\u2019s software.\u2019\u00a0While this type of corporate vigilatism mightn\u2019t be the cyber heroism the Internet deserves, as governments continue to struggle with cybercrime, it might just be what it needs to stem the tide.<\/p>\n

Kl\u00e9e Aiken is an analyst in<\/em>\u00a0ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>.<\/em><\/em><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Ahead of the UK\u2019s upcoming election, the British Prime Minister is looking towards the cyber-security horizon. Along with a major cabinet reshuffle, David Cameron has announced a\u00a0\u00a31.1 billion package\u00a0\u2018to equip [the UK] armed forces for …<\/p>\n","protected":false},"author":153,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[713,811,261,484,141],"class_list":["post-14768","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyberattack","tag-microsoft","tag-nato","tag-private-sector","tag-united-kingdom"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Ahead of the UK\u2019s upcoming election, the British Prime Minister is looking towards the cyber-security horizon. Along with a major cabinet reshuffle, David Cameron has announced a\u00a0\u00a31.1 billion package\u00a0\u2018to equip [the UK] armed forces for ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-16T04:30:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-07-17T02:24:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/#primaryimage\"},\"datePublished\":\"2014-07-16T04:30:06+00:00\",\"dateModified\":\"2014-07-17T02:24:37+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Ahead of the UK\u2019s upcoming election, the British Prime Minister is looking towards the cyber-security horizon. Along with a major cabinet reshuffle, David Cameron has announced a\u00a0\u00a31.1 billion package\u00a0\u2018to equip [the UK] armed forces for ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-07-16T04:30:06+00:00","article_modified_time":"2014-07-17T02:24:37+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/#primaryimage"},"datePublished":"2014-07-16T04:30:06+00:00","dateModified":"2014-07-17T02:24:37+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-35\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14768"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=14768"}],"version-history":[{"count":7,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14768\/revisions"}],"predecessor-version":[{"id":14796,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14768\/revisions\/14796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=14768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=14768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=14768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}