{"id":17917,"date":"2015-01-21T14:30:38","date_gmt":"2015-01-21T03:30:38","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=17917"},"modified":"2015-01-22T07:06:53","modified_gmt":"2015-01-21T20:06:53","slug":"cyber-wrap-58","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-58\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a>The 2007 theft<\/a> of Lockheed Martin\u2019s F-35 Joint Strike Fighter plans was this week officially linked to \u00a0China by German newspaper\u00a0Der Spiegel. <\/em>The classified US document, given to the paper by Edward Snowden, detailed the loss of \u2018many terabytes of data\u2019 relating to the development of the fifth-generation fighter. That China was behind the attack was one of the US Defense community\u2019s more poorly kept secrets. But the release of the information is interesting given Edward Snowden\u2019s previous reluctance to disclose information implicating countries such as China or Russia in online espionage.<\/p>\n China has claimed<\/a> that it wasn\u2019t behind the 2007 attacks, questioning the findings in the Snowden document, and reminding us that attribution is quite difficult due to the \u2018complex nature\u2019 of cyber-attacks.<\/p>\n The US and the UK recently announced<\/a> a joint taskforce aimed at countering online threats. The \u2018joint cell\u2019\u2014co-locating experts from GCHQ, MI5, the NSA and FBI across both countries\u2014will facilitate the real-time sharing of threat data. The taskforce is also set to carry out cyber wargaming later in the year with scenarios built around attacks on the financial sector.<\/p>\n The<\/em> New York Times<\/em> has an interesting article<\/a> explaining how early NSA groundwork facilitated the quicker-than-usual attribution (to North Korea) following the Sony Hack<\/a>. The NSA program, developed as an \u2018early warning radar\u2019, allowed for the monitoring of North Korean hackers. The program, developed over the past five years, placed malware on several machines within North Korea\u2019s offensive hacking unit, Bureau 121. While North Korea\u2019s attempts to penetrate Sony\u2019s networks looked fairly half-hearted and innocuous at the time, it wasn\u2019t until after the attack that the NSA realised the scale of the breach.<\/p>\n ICPC international fellow James A Lewis told the Times,<\/em> \u2018Attributing where attacks come from is incredibly difficult and slow…The speed and certainty with which the United States made its determinations about North Korea told you that something was different here\u2014that they had some kind of inside view.\u2019<\/p>\n Closer to home, Japan\u2019s impressive international cyber engagement agenda marches on, with Shinzo Abe this week pledging<\/a> to deepen cooperation with Israel. Abe and his counterpart Benjamin Netanyahu have pledged to work together to counter online attacks and promote exchanges between defence officials. The dialogue is another win for Japan as the state pursues a program of high-level international cyber engagement.<\/p>\n The Economist<\/em> has a nice article<\/a> explaining some of the difficulties encountered when attempting to put a figure on the cost of cybercrime. Issues faced by analysts include which future losses to include and exclude in calculations, how to deal with companies who are unaware of what information they have actually lost and how to treat businesses that are aware but are unwilling to disclose details.<\/p>\n Finally our Governing the Net<\/a> series explores the tall task ahead of ICANN as it tries to build a consensus on an IANA stewardship transition plan amongst the international multistakeholder community, enhance its internal accountability, and tiptoe around Washington politics. Also check out our handy Internet governance timeline<\/a> to keep up to date in what promises to be a busy 2015 in this cyber space<\/p>\n Jessica Woodall<\/em><\/a> is an analyst in ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Flickr user Airman Magazine<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":" The 2007 theft of Lockheed Martin\u2019s F-35 Joint Strike Fighter plans was this week officially linked to \u00a0China by German newspaper\u00a0Der Spiegel. The classified US document, given to the paper by Edward Snowden, detailed the …<\/p>\n","protected":false},"author":133,"featured_media":17920,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[52,169,95,713,647,736,692,731,135,649,507],"class_list":["post-17917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-china","tag-cyber-crime","tag-cyber-security","tag-cyberattack","tag-edward-snowden","tag-icann","tag-internet","tag-internet-governance","tag-japan","tag-nsa","tag-shinzo-abe"],"acf":[],"yoast_head":"\n