{"id":19587,"date":"2015-04-08T13:54:29","date_gmt":"2015-04-08T03:54:29","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=19587"},"modified":"2015-05-06T11:30:50","modified_gmt":"2015-05-06T01:30:50","slug":"cyber-wrap-68","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Great<\/a>Kicking off April, President Obama continued his efforts to secure cyberspace by Executive Order<\/a>. Following up on the slew of proposals set out in the lead up to January\u2019s State of the Union Address<\/a>, the latest White House move offers a new tool for the US government to crack down on \u2018significant malicious cyber-enabled activities.\u2019 The Executive Order<\/a> authorises the Secretary of State to impose sanctions on individuals and entities deemed to be responsible for or complicit in malicious cyber activities directed against the US and its interests. While this tool can easily, and perhaps rightfully, be seen as the latest escalation in the US\u2013China disagreements on cyber issues, the move does offer a useful deterrent and punitive tool for the US to wield. Three possible targets suggested by CFR’s\u00a0Robert Knake<\/a> are bulletproof hosting providers, vulnerability and attack tool resellers, and BitCoin exchanges.<\/p>\n

Economic tools continue to be a useful lever for the US in its international cyber efforts. Late last month, the US filed complaints with the World Trade Organization<\/a> over China\u2019s proposed restrictions on foreign IT equipment, which led to\u00a0the restrictions being quickly suspended<\/a>. More ambitiously, Kevin Holden has called on the US and EU to employ the WTO to break through China\u2019s Great Firewall<\/a>. While such a challenge may be a ways off, it wouldn\u2019t be surprising to see the White House continue to appeal to financial interests as a means of prodding movement on international cyber \u2018rules of the road\u2019.<\/p>\n

Turning to Asia, where we\u2019ve seen a flurry of organisational movement over the past week. On Friday South Korean President Park Geun-Hye appointed<\/a> a new cybersecurity tsar. General Shin In-Seop will serve as a \u2018control tower\u2019 for government efforts against external threats, including North Korean hackers. Not to be left behind, Singapore\u2019s created an entirely new<\/a> cybersecurity body; the Cyber Security Agency of Singapore was launched last Wednesday. The federal organisation oversees cyber strategy, education, outreach and industry development. The body reports directly to the Prime Minister\u2019s office.<\/p>\n

Singapore is also home to INTERPOL\u2019s new Global Complex for Innovation (IGCI) which is edging<\/a> closer to an official launch next week. The new research and development facility is designed to help identify international cyber criminals and crimes. It aims to build capacity and lend operational support to police forces across the globe. Finishing up this week\u2019s list of new appointments, the current head of India\u2019s national CERT (Cert-In) is set to become<\/a> India\u2019s new Cyber Security Chief. Gulshan Rai was appointed to the newly created role last week. On a recent visit<\/a> to Vietnam, India\u2019s National Security Advisor Ajit Kumar Doval and Prime Minister Nguyen Tan Dung agreed to work together on cyber security issues. Cyber security has proven to be a popular<\/a> topic<\/a> for both<\/a> countries<\/a> in recent times. The agreement came following a request from Prime Minister Dung for cooperation on cyber issues and assistance combating hi-tech crime.<\/p>\n

The cyber countdown is on here at ICPC, with only eight more sleeps until the Global Conference on Cyber Space in The Hague. We\u2019ll be taking a break from the cyber wrap while we\u2019re in Europe, but be sure to follow all the goings-on via our twitter @ASPI_ICPC<\/a> and you\u2019re in The Hague be sure to come along to our Asia\u2013Pacific themed \u2018Borrel<\/a>\u2019.<\/p>\n","protected":false},"excerpt":{"rendered":"

Kicking off April, President Obama continued his efforts to secure cyberspace by Executive Order. Following up on the slew of proposals set out in the lead up to January\u2019s State of the Union Address, the …<\/p>\n","protected":false},"author":133,"featured_media":19588,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[143,176,52,391,95,69,50,540],"class_list":["post-19587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-asia-pacific","tag-barack-obama","tag-china","tag-cyber","tag-cyber-security","tag-india","tag-singapore","tag-vietnam"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Kicking off April, President Obama continued his efforts to secure cyberspace by Executive Order. Following up on the slew of proposals set out in the lead up to January\u2019s State of the Union Address, the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-08T03:54:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-05-06T01:30:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/2849953493_8e83c007ed_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/2849953493_8e83c007ed_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/2849953493_8e83c007ed_z.jpg\",\"width\":640,\"height\":426,\"caption\":\"Great Firewall of China\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/#primaryimage\"},\"datePublished\":\"2015-04-08T03:54:29+00:00\",\"dateModified\":\"2015-05-06T01:30:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Kicking off April, President Obama continued his efforts to secure cyberspace by Executive Order. Following up on the slew of proposals set out in the lead up to January\u2019s State of the Union Address, the ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-04-08T03:54:29+00:00","article_modified_time":"2015-05-06T01:30:50+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/2849953493_8e83c007ed_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/2849953493_8e83c007ed_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/04\/2849953493_8e83c007ed_z.jpg","width":640,"height":426,"caption":"Great Firewall of China"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/#primaryimage"},"datePublished":"2015-04-08T03:54:29+00:00","dateModified":"2015-05-06T01:30:50+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-68\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19587"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=19587"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19587\/revisions"}],"predecessor-version":[{"id":19592,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/19587\/revisions\/19592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/19588"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=19587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=19587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=19587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}