{"id":20563,"date":"2015-05-20T15:00:01","date_gmt":"2015-05-20T05:00:01","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=20563"},"modified":"2015-05-20T14:38:51","modified_gmt":"2015-05-20T04:38:51","slug":"cyber-wrap-71","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-71\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a><\/p>\n Last week<\/a> German Bundestag internal servers fell victim to an external hacking attempt. The government is keeping details close to its chest, but a spokesperson for the German Lower House confirmed that the attack had indeed taken place. Spiegel Online<\/em> reported<\/a> just days before the attack that German domestic intelligence experts and the internal Bundestag team had noticed an increase in the number of attempts to access the House\u2019s servers. No information has been released as to what, if any sensitive data was compromised in the attack, but the attempt was serious enough for sections of the network to be locked down temporarily.<\/p>\n Jarno Limn\u00e9ll has some advice<\/a> for his European cyber colleagues, suggesting they could learn \u00a0a thing or two from the latest US DoD cyber strategy<\/a>. He commends the strategy\u2019s transparency surrounding U.S. cyber doctrine, government roles, policy formation, and more generally, for better integrating cyber strategy into its foreign and security policies. He urges European countries to think more strategically about cyber, in an open, level-headed manner that clarifies their own doctrine, roles, and policy.<\/p>\n Foreign Policy has put together a nice profile<\/a> on Chris Painter, the US State Department\u2019s mercurial cyber director. The article chronicles some of the most pressing problems Painter faces in his international engagement agenda. Painter shared details of his goal to establish a set of voluntary international cyber standards, including one that would see nations not deliberately targeting civilian critical infrastructure.<\/p>\n On Thursday Painter spoke in greater detail about the international standards and US foreign cyber policy, before the Senate Foreign Relations Committee Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy. You can check out his full testimony here<\/a>. The subcommittee recently absorbed responsibility for international cyber policy and it\u2019s increasing \u00a0prominence is being seen<\/a> as an attempt by the government \u2018to get serious about cyber as a foreign policy issue\u2019.<\/p>\n The Reserve Bank of India is reportedly<\/a> pondering the creation of its own cyber security body. The Bank\u2019s Governor confirmed that negotiations were taking place on the establishment of a subsidiary entity that \u2018(would) supervise and formulate policies for cyber security among other information technology issues related to banks.\u2019 Internet banking has taken off on the subcontinent in recent years and it\u2019s encouraging that the RBI has taken such a direct interest in improving cyber practices, particularly given the delays the Indian government has had in implementing its national cyber strategy.<\/p>\n In the past week, three interesting pieces have analysed the implications of over-hyping the cyber threat. The first, from the Harvard Belfer Centre, looks specifically at the consequences of exaggerating the Chinese cyber threat. The policy brief argues that spreading inflated misperceptions around Chinese capabilities and intentions increases the risk of miscalculation and backlash in cyberspace. The second article<\/a>, took issue with a recently released brief that claimed U.S. critical national infrastructure had experienced \u2018more than 500,000 attacks on Industrial Control systems over the last 24 months,\u2019 laying blame primarily at the feet of Iran. As the commentary in the article points out, it\u2019s difficult to attribute the source of attacks to any one country, and using the primary IP addresses (which were located in Iran) as a key evidence base is fraught with problems. The final article<\/a> appeared in Foreign Affairs<\/em>, rejected the hyper-alarmist idea of a \u2018cyber pearl harbour\u2019 by arguing that \u00a0we are headed towards a period of \u2018cyberpeace\u2019. While the authors concede that the number of cyber-attacks are on the rise, the number of attacks that have resulted in a kinetic or physical impact had remained steady, if not dropped. They contend that offensive cyber-attacks alone are not an effective means to air grievances, and that as a result states have entered into a \u2018protocol of restraint\u2019.<\/p>\n And finally, for those that are more technically inclined, the Army has released its new cloud computing strategy<\/a>. For the rest of us, be sure to check out New America<\/em>‘s Peter Singer and Passcode<\/em>‘s Sara Sorcher\u2019s latest cybersecurity podcast<\/a>. This month they interview Bruce Schneier, Nate Fick, and Kim Zetter discussing \u2018Stuxnet, sexism, CEOs, and surveillance.\u2019<\/p>\n","protected":false},"excerpt":{"rendered":" Last week German Bundestag internal servers fell victim to an external hacking attempt. The government is keeping details close to its chest, but a spokesperson for the German Lower House confirmed that the attack had …<\/p>\n","protected":false},"author":133,"featured_media":20564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,391,95,694,69],"class_list":["post-20563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyber","tag-cyber-security","tag-germany","tag-india"],"acf":[],"yoast_head":"\n