{"id":20221,"date":"2015-05-06T14:23:41","date_gmt":"2015-05-06T04:23:41","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=20221"},"modified":"2015-05-06T14:23:55","modified_gmt":"2015-05-06T04:23:55","slug":"cyber-wrap-69","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>The cyber wrap is back after ICPC\u2019s short break attending the Global Conference on Cyberspace in The Hague. Stay tuned for a series of blogs about the event soon, but in the meantime you can check out the GCCS YouTube page<\/a> for all best bits.<\/p>\n

Estonia knows all too well<\/a> the impact of a large-scale cyber attack and has begun<\/a> to assemble a \u2018volunteer army\u2019 of civilians who are willing and able to help defend the country in the event of a large-scale attack. The unit\u2014a component of the Estonian Defence League\u2014is a reserve force of civilians with the appropriate technical skills who can be called on during a national emergency to help protect the country\u2019s infrastructure. It\u2019s an idea that\u2019s been embraced in several countries, including the US; the Estonian decision looks set to encourage more countries<\/a> to follow suit.<\/p>\n

Taiwan in about to carry out five days\u2019 worth of \u2018computer-assisted war games\u2019. The drills constitute stage one of Taiwan\u2019s annual Han Kuang exercises and will simulate cyber attacks against Taiwanese targets along with electronic warfare. The drills will also incorporate scenarios where the military will lend assistance to \u2018outlying countries\u2019. The announcement of the drills is hardly surprising given Taiwan\u2019s recent<\/a> troubles<\/a> in cyberspace.<\/p>\n

Cybercrime cooperation was at the top of the agenda<\/a> during a recent Japanese trade mission to India led by Yoichi Miyazawa, Japan\u2019s Minister of Economy, Trade and Industry. The talks explored which Japanese technologies could be utilised to help India prevent cybercrime and cyber espionage and maintain the security of government cloud-computing. Reassuringly, the talks also focused on the need not to just possess the technologies necessary to catch cyber criminals, but the need to implement the appropriate legislative structures and enforcement powers to apprehend and prosecute offenders.<\/p>\n

Governments worldwide are dealing with IT security skills shortages, often in competition with larger, well-resourced private sector players. But the UK\u2019s GCHQ has decided to fight back<\/a>. The SIGINT agency has placed large advertising outside the NCC Group\u2019s offices promoting a government career switch, no doubt targeting the information security firm\u2019s highly skilled workforce. But the move may have backfired with the NCC Chief commenting to the media, \u2018Our lot just looked at it and said they wouldn\u2019t work for that small amount of money, but by the way, why don\u2019t we just put some advertising outside their offices?\u2019 No word yet if NCC has followed through on the suggestion.<\/p>\n

Internet connections in developing countries can be notoriously unreliable. Vietnam has had more than its fair share<\/a> of issues, experiencing seven submarine cable breakages since 2011. Each time the AAG cable off the coast of Vung Tau has broken, it\u2019s seriously impacted the countries internet capacity. The most recent break two weeks<\/a> ago was the straw that broke the camel\u2019s back, with the government announcing they will build a new overland cable to China. The announcement is interesting given Hanoi\u2019s current frosty relationship with Beijing over the South China\/East Vietnam Sea and China\u2019s propensity to target<\/a> Vietnam\u2019s online infrastructure when tensions hit their peak<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

The cyber wrap is back after ICPC\u2019s short break attending the Global Conference on Cyberspace in The Hague. Stay tuned for a series of blogs about the event soon, but in the meantime you can …<\/p>\n","protected":false},"author":133,"featured_media":20224,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[52,391,713,1254,540],"class_list":["post-20221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-china","tag-cyber","tag-cyberattack","tag-gchq","tag-vietnam"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The cyber wrap is back after ICPC\u2019s short break attending the Global Conference on Cyberspace in The Hague. Stay tuned for a series of blogs about the event soon, but in the meantime you can ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-06T04:23:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-05-06T04:23:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/05\/4982578210_1c588a40aa_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"328\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/05\/4982578210_1c588a40aa_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/05\/4982578210_1c588a40aa_z.jpg\",\"width\":640,\"height\":328},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/#primaryimage\"},\"datePublished\":\"2015-05-06T04:23:41+00:00\",\"dateModified\":\"2015-05-06T04:23:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The cyber wrap is back after ICPC\u2019s short break attending the Global Conference on Cyberspace in The Hague. Stay tuned for a series of blogs about the event soon, but in the meantime you can ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-05-06T04:23:41+00:00","article_modified_time":"2015-05-06T04:23:55+00:00","og_image":[{"width":640,"height":328,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/05\/4982578210_1c588a40aa_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/05\/4982578210_1c588a40aa_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/05\/4982578210_1c588a40aa_z.jpg","width":640,"height":328},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/#primaryimage"},"datePublished":"2015-05-06T04:23:41+00:00","dateModified":"2015-05-06T04:23:55+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-69\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/20221"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=20221"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/20221\/revisions"}],"predecessor-version":[{"id":20225,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/20221\/revisions\/20225"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/20224"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=20221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=20221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=20221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}