{"id":16761,"date":"2014-11-05T14:30:20","date_gmt":"2014-11-05T03:30:20","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=16761"},"modified":"2014-11-06T10:58:46","modified_gmt":"2014-11-05T23:58:46","slug":"cyber-wrap-49","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"President<\/a>Another big week in cyberspace kicked off with news<\/a> that \u2018suspicious activity\u2019 had been detected on an unclassified network at the White House. The activity, which caused some disruption to IT services within the Executive Office of the President, was contained quickly and was prevented from spreading to more sensitive classified networks.<\/p>\n

Given the nature of the target and the type of activity, the infiltration attempt bears the hallmarks of a state-backed attack, with some news outlets going so far as to point the finger at a specific country<\/a>.<\/p>\n

Cybersecurity rock-star Bruce Schneier<\/a> gave an interview<\/a> on the attack to Bloomberg Politics<\/em>. In a conversation his fans are sure to enjoy, he effectively cuts through the media hype surrounding the incident.<\/p>\n

Chairman of the Joint Chiefs General Martin Dempsey was dropping some hard truths of his own at Syracuse University. During a speech<\/a> addressing ‘Strategy in the Open’ Dempsey pinpointed cyberspace as an increasingly dangerous domain for the military and the country, and one that isn\u2019t currently being adequately addressed. He also spoke<\/a> about the unique problems cyber brings to his role.<\/p>\n

(The) conversation about cyber can become emotional faster than almost anything else I deal with, because of issues related to privacy, to standards, to information sharing between corporate America and the government. We’re not dealing with cyber very effectively\u2026We\u2019ve got to find a way to collaborate on standards and information sharing and what is the role of the government in the cyber domain.<\/p><\/blockquote>\n

Moving across the Atlantic, the European Union conducted its largest-ever critical national infrastructure cybersecurity exercise last week. The drill<\/a> involved 29 countries and over 200 agencies and was designed to test and help improve coordination between the EU member countries\u2019 national security bodies. EU Commission vice president Neelie Kroes stressed the importance of collaboration in a press release: \u2018The sophistication and volume of cyber-attacks are increasing every day\u2026They cannot be countered if individual states work alone or just a handful of them act together\u2019.<\/p>\n

Staying in Europe, the Dutch Government has released<\/a> the fourth edition of its yearly Cyber Security Assessment. The comprehensive paper, which is produced by the National Cyber Security Center, explains in detail the cyber trends witnessed in the previous year, including threat-based analysis against a wide range of targets including government, business and private citizens.<\/p>\n

Closer to home, the South Korean government played host to the Seoul Defence Dialogue last week<\/a>. The forum, attended by senior defence officials from 24 countries across the region, saw one of its four sub-sessions dedicated to cybersecurity cooperation and international norms. Of particular note, the Chinese government agreed to send a delegation to the dialogue for the first time, in what\u2019s being seen as an attempt to boost bilateral relations with the South Korean government.<\/p>\n

Jumping on the bilateral band wagon, the Japanese government has announced a working-level cyber dialogue with a far-flung friend. Japanese Defense Minister Akinori Eto and his Finnish colleague Carl Haglund announced the new national-level discussions that will include a component on cyber defence.<\/p>\n

Wrapping up this week, a rare collaboration between some of the internet\u2019s heaviest hitters has resulted in another report<\/a> uncovering a Chinese-government-linked hacking organisation. The group dubbed \u2018Axiom\u2019 by the report has been linked to targeted hacking attempts against various governments, NGOs, media organisations, pro-democracy groups and several Fortune 500 companies. The research<\/a>, led by Novetta was supported by Cisco and FireEye among others, with additional cooperation from Microsoft and Symantec, who all pooled information, tools and capability to help uncover the group\u2019s online web.<\/p>\n

Jessica Woodall<\/em><\/a> is an analyst in ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Flickr user The White House<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Another big week in cyberspace kicked off with news that \u2018suspicious activity\u2019 had been detected on an unclassified network at the White House. The activity, which caused some disruption to IT services within the Executive …<\/p>\n","protected":false},"author":133,"featured_media":16770,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[1024,713,1025,728,135,900,211,31],"class_list":["post-16761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-bruce-schneier","tag-cyberattack","tag-european-union","tag-hacking","tag-japan","tag-netherlands","tag-south-korea","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Another big week in cyberspace kicked off with news that \u2018suspicious activity\u2019 had been detected on an unclassified network at the White House. The activity, which caused some disruption to IT services within the Executive ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-05T03:30:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-11-05T23:58:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/7051355897_27148c4f93_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/7051355897_27148c4f93_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/7051355897_27148c4f93_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"President Barack Obama enters the South Portico of the White House\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/#primaryimage\"},\"datePublished\":\"2014-11-05T03:30:20+00:00\",\"dateModified\":\"2014-11-05T23:58:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Another big week in cyberspace kicked off with news that \u2018suspicious activity\u2019 had been detected on an unclassified network at the White House. The activity, which caused some disruption to IT services within the Executive ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-11-05T03:30:20+00:00","article_modified_time":"2014-11-05T23:58:46+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/7051355897_27148c4f93_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/7051355897_27148c4f93_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/7051355897_27148c4f93_z.jpg","width":640,"height":427,"caption":"President Barack Obama enters the South Portico of the White House"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/#primaryimage"},"datePublished":"2014-11-05T03:30:20+00:00","dateModified":"2014-11-05T23:58:46+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-49\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16761"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=16761"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16761\/revisions"}],"predecessor-version":[{"id":16791,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16761\/revisions\/16791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/16770"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=16761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=16761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=16761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}