{"id":17098,"date":"2014-11-26T14:30:15","date_gmt":"2014-11-26T03:30:15","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=17098"},"modified":"2014-12-02T07:13:53","modified_gmt":"2014-12-01T20:13:53","slug":"cyber-wrap-52","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>South Korea is set to<\/a> absorb its Cyber Command into its military apparatus over the next two months, formalising a decision taken earlier<\/a> in the year to alter the focus of the organisation from the defensive protection of national infrastructure, to a more offensive, outward-focused mission. Previously, activities \u00a0of the national Cyber Command were classified as \u2018administrative actions\u2019. The government has now made the necessary alterations to the \u2018Cyber Command Decree\u2019 to transition control of the organisation to the Joint Chiefs of Staff (JCS), freeing up personnel to carry out military-like operations, primarily against the North.<\/p>\n

South Korea isn\u2019t the only country doing a spot of international hacking. Germany\u2019s top domestic spy Hans Georg Maassen has told<\/a> a cybersecurity conference in Berlin this week that of the 3,000 attacks experienced by government networks on average each day, at least five are the handiwork of foreign governments. Those sophisticated attacks are often traced to either Russia or China and are most frequent in the lead-up to major international events and negotiations such as the G20. He also explained that hackers were often after the \u2018cutting-edge\u2019 technology produced by German firms.<\/p>\n

Maassen\u2019s signals-intelligence counterpart across the Atlantic, NSA Chief Admiral Michael Rogers, also spoke publicly<\/a> this week on the threat posed by foreign cyber attackers. Testifying to the House Intelligence Committee on threats posed to critical national infrastructures, Rogers was asked a series of questions surrounding the security of US critical national infrastructure:<\/p>\n

There shouldn\u2019t be any doubt in our minds that there are nation-states and groups out there that have the capability .\u2009.\u2009. to shut down, forestall our ability to operate our basic infrastructure, whether it\u2019s generating power across this nation, whether it\u2019s moving water and fuel.<\/p><\/blockquote>\n

He explained<\/a> that \u2018reconnaissance\u2019 missions designed to map the layout of such systems and identify vulnerabilities had already been detected. The Admiral identified China as being among those countries he suspected of possessing the capability to carry out such an attack, but he also said there were \u2018probably one or two others\u2019, without elaborating.<\/p>\n

Expanding on the Admiral\u2019s comments, Jonathan Pollet has a good article that puts the issue of attacks against critical national infrastructure into perspective. He explains<\/a> that since the US energy grid is owned and operated by hundreds of different companies with different software and security set-ups, trying to break into them all at once would be similar to \u2018trying to rob a hundred different banks at the exact same time\u2019.<\/p>\n

The New Zealand Government is currently reviewing its National Cyber Policy Strategy, last updated in 2011. This week the head of the NZ Cyber Policy Office, Paul Ash, gave a sneak peek as to what to expect in a discussion<\/a> with Radio New Zealand. He said the new strategy will refine the roles of those agencies involved with cyber, encourage public agencies to work with the private sector and generally call for a \u2018net lift in effort, not just from the public sector but from private sector partners and others\u2019. It\u2019s a lead the Australian government would do well to follow.<\/p>\n

Staying in the region a recent report<\/a> has picked out Vietnam, India and Indonesia as the next big sources for DDoS attacks heading into the New Year. All three countries\u2019 expanding but under-protected IT networks, and exploding smartphone use, coupled with lack of end-user awareness surrounding IT security, has led to the prediction of a botnet storm.<\/p>\n

Finally Elina Noor has an excellent piece<\/a> up at the New Straits Times<\/em> calling for ASEAN to step up and play a greater role in shaping the cyber domain through groupings such as the ASEAN Defence Ministers Meeting. She argues that it\u2019s in the region\u2019s best interest to establish rules for online interaction based around an international legal framework and highlights the military domain as a key starting point.<\/p>\n

Jessica Woodall<\/em><\/a> is an analyst in ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Flickr user\u00a0Alejandro Ju\u00e1rez<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

South Korea is set to absorb its Cyber Command into its military apparatus over the next two months, formalising a decision taken earlier in the year to alter the focus of the organisation from the …<\/p>\n","protected":false},"author":133,"featured_media":17108,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[189,52,1059,713,732,694,73,211],"class_list":["post-17098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-asean","tag-china","tag-cni","tag-cyberattack","tag-ddos-attack","tag-germany","tag-new-zealand","tag-south-korea"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"South Korea is set to absorb its Cyber Command into its military apparatus over the next two months, formalising a decision taken earlier in the year to alter the focus of the organisation from the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-26T03:30:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-12-01T20:13:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/2568510756_c1a4620ed8_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/2568510756_c1a4620ed8_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/2568510756_c1a4620ed8_z.jpg\",\"width\":640,\"height\":427},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/#primaryimage\"},\"datePublished\":\"2014-11-26T03:30:15+00:00\",\"dateModified\":\"2014-12-01T20:13:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"South Korea is set to absorb its Cyber Command into its military apparatus over the next two months, formalising a decision taken earlier in the year to alter the focus of the organisation from the ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-11-26T03:30:15+00:00","article_modified_time":"2014-12-01T20:13:53+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/2568510756_c1a4620ed8_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/2568510756_c1a4620ed8_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/2568510756_c1a4620ed8_z.jpg","width":640,"height":427},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/#primaryimage"},"datePublished":"2014-11-26T03:30:15+00:00","dateModified":"2014-12-01T20:13:53+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-52\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17098"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=17098"}],"version-history":[{"count":7,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17098\/revisions"}],"predecessor-version":[{"id":17208,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17098\/revisions\/17208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/17108"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=17098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=17098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=17098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}