{"id":17733,"date":"2015-01-07T14:30:53","date_gmt":"2015-01-07T03:30:53","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=17733"},"modified":"2015-01-08T08:30:09","modified_gmt":"2015-01-07T21:30:09","slug":"cyber-wrap-56","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"Kimchi\"<\/a><\/figure>\n

Happy New Year from Team ICPC!<\/p>\n

Unfortunately last year\u2019s mess that was the hack of Sony Pictures Entertainments has followed us into 2015 and tensions continue to rise between the United States and North Korea. Despite a growing chorus of voices<\/a> that suggest the hermit kingdom may not have been responsible for the hack, the United States continues to pull what few, essentially symbolic, levers it can to put further pressure<\/a> on the regime. With the back and forth likely to drag on with little meaningful resolution, it might be worth considering how the White House could make some\u00a0kimchi out of all this cabbage<\/a>.<\/p>\n

And if North Korea isn\u2019t a satisfying culprit, head over to sony.attributed.to<\/a> for some alternative cyber vandals (just click refresh til you\u2019ve found your offender of choice!).<\/p>\n

The evolution of the Sony incident from a corporate and criminal matter into one of national security has reignited debate around what constitutes a \u2018cyber attack\u2019 as opposed to \u2018cybercrime\u2019. Former head of Allied Command Ops in NATO Admiral James Stavridis<\/a> wades into the debate, exploring the elements of the use of force in cyberspace to build the foundational definition:<\/p>\n

A cyber attack is the deliberate projection of cyberforce resulting in kinetic or nonkinetic consequences that threaten or otherwise destabilize national security; harm economic interests; create political or cultural instability; or hurt individuals, devices or systems.<\/p><\/blockquote>\n

While the Sony debacle ultimately failed to save us from The Interview<\/a><\/em>, it may be the much-needed push to drive public\u2013private cooperation on cybersecurity. In Washington<\/a> there\u2019s a new sense of urgency on cyber issues, with most observers pointing to information-sharing legislation as a likely winner in 2015.<\/p>\n

The development of robust information-sharing mechanisms is vital, especially in light of recent findings from IBM<\/a> that despite a 50% decrease in retail cyber attacks, data theft continues to rise, hitting 61 million records from retailers in 2014.<\/p>\n

Such large figures may make cybercrime seem like a distant and impersonal phenomenon. But there is a real, human cost as Alina Simone found out when her mum\u2019s PC was held for ransom<\/a>. While Alina had a positive experience with the Bitcoin ATM repairman, bitcoin is proving to be much more of a headache for prosecutors and investigators<\/a> of cybercrime. With cybercrime<\/a> likely to continue topping the cyber news throughout 2015, Australia should look for the silver lining and use cybercrime cooperation to boost ties with others in the Asia Pacific, especially China<\/a>.<\/p>\n

Also in our neighbourhood, Japan is looking to boost its cyber maturity with the establishment of a Headquarters of Cyber Security Strategy<\/a>, under Chief Cabinet Secretary Suga. The HQ will have the legal authority to require organisations targeted by cyber attacks to submit information on the incident. Japan is also looking to boost international cooperation, with an agreement with Israel<\/a> to expand joint research grants and increase cooperation on cyber and information security.<\/p>\n

This year is set to be a consequential one for Internet governance. With the IANA transition set to occur in September, expect to see negotiations heat up. The Washington Post<\/a><\/em> has planted its flag, calling on the US to Protect the Internet: Keep the Contract with ICANN<\/em>, to which recently retired Swedish Foreign Minister Carl Bildt<\/a> quickly retorted \u2018Internet governance battle heating up. But for US to keep contract with ICANN no viable option. Transition necessary.\u2019 For an interesting look at the bread-and-butter business of ICANN, names and numbers, tune into the team at podcast series Reply All as they explore the \u2018Byzantine underworld of domain sales<\/a>.\u2019<\/p>\n

Along with names and numbers, an oft-underappreciated dimension of cyber is the undersea cables<\/a> that provide the backbone of internet connectivity. One can simply look to Vietnam<\/a> to understand the importance of this dimension of physical cybersecurity, where for the fourth time in a year, a cut in the AAG submarine cable has disrupted Internet service across the country. But if your submarine cables are intact (lucky you), and you\u2019ve got the rest of the day to spare (even luckier you), take the time to check out the Krebs on Security<\/a> rundown of the top cyber attack maps.<\/p>\n

Kl\u00e9e Aiken<\/em><\/a> is an analyst in\u00a0ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Flickr ~dgies<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Happy New Year from Team ICPC! Unfortunately last year\u2019s mess that was the hack of Sony Pictures Entertainments has followed us into 2015 and tensions continue to rise between the United States and North Korea. …<\/p>\n","protected":false},"author":153,"featured_media":17734,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[169,713,736,135,86,1087,884],"class_list":["post-17733","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber-crime","tag-cyberattack","tag-icann","tag-japan","tag-north-korea","tag-the-interview","tag-undersea-cables"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Happy New Year from Team ICPC! Unfortunately last year\u2019s mess that was the hack of Sony Pictures Entertainments has followed us into 2015 and tensions continue to rise between the United States and North Korea. ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-07T03:30:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-07T21:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/4740593175_5c10675510_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/4740593175_5c10675510_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/4740593175_5c10675510_z.jpg\",\"width\":640,\"height\":480,\"caption\":\"Kimchi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/#primaryimage\"},\"datePublished\":\"2015-01-07T03:30:53+00:00\",\"dateModified\":\"2015-01-07T21:30:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Happy New Year from Team ICPC! Unfortunately last year\u2019s mess that was the hack of Sony Pictures Entertainments has followed us into 2015 and tensions continue to rise between the United States and North Korea. ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-01-07T03:30:53+00:00","article_modified_time":"2015-01-07T21:30:09+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/4740593175_5c10675510_z.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/4740593175_5c10675510_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/4740593175_5c10675510_z.jpg","width":640,"height":480,"caption":"Kimchi"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/#primaryimage"},"datePublished":"2015-01-07T03:30:53+00:00","dateModified":"2015-01-07T21:30:09+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-56\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17733"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=17733"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17733\/revisions"}],"predecessor-version":[{"id":17767,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17733\/revisions\/17767"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/17734"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=17733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=17733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=17733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}