{"id":24178,"date":"2016-01-13T12:30:23","date_gmt":"2016-01-13T01:30:23","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=24178"},"modified":"2016-01-13T09:22:55","modified_gmt":"2016-01-12T22:22:55","slug":"cyber-wrap-103","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-103\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a><\/p>\n 2016 has kicked off in big way with what\u2019s been billed as the first cyber attack to actually disable a power grid<\/a>. SANS ICS analysis<\/a> indicates that the six-hour outage in western Ukraine was caused when hackers remotely switched breakers while simultaneously slowing the response by infecting utility company workstations and servers, then flooding customer call centres to prevent customers reporting blackouts. The companies affected had to switch their systems to \u2018manual\u2019 to restore power.<\/p>\n Unsurprisingly, media and intelligence agencies<\/a> are looking at Russia, although Cyber Squirrel 1<\/a> could soon point its finger at another culprit. For some further reading, Net Politics<\/em> has an interesting post about the use of cyber power between Russia and Ukraine<\/a>.<\/p>\n China\u2019s Defence Ministry announced<\/a> the activation of three new units on 1 January, including one that it\u2019s referred to as \u2018cyber war forces\u2019. The \u2018Strategic Support Force\u2019 is likely an amalgam of existing space operations and cyber and information warfare units<\/a>. Its new commanding general, Gao Jin, was previously the Director of the PLA Academy of Military Science. The Academy is the source of the PLA\u2019s Science of Military Strategy publication which included extensive discussion on Chinese concepts of cyber warfare<\/a>. The reorganisation is likely part of broader reforms of the PLA announced at the Third Plenum of the 18th Party Congress in 2013<\/a> designed to centralise political control of the PLA which place the Central Military Commission in direct control of all military forces<\/a>.<\/p>\n Also in China, authorities unveiled draft counterterrorism legislation<\/a> in late 2015 that would require technology companies to install back doors and hand over encryption keys and user information to government agencies. US officials were quick to criticise the draft legislation, but this disapproval was quickly deflected by the Chinese Foreign Ministry which noted that recent US legislation included similar surveillance powers.<\/p>\n Encryption has continued to be a point of contention. Writing at the Wall Street Journal<\/em>, Christopher Mims notes<\/a> that \u2018there is no such thing as \u201cgood enough\u201d encryption once a backdoor has been added\u2019. Mims states that there are already enough vulnerabilities in most personal devices that \u2018lawful hacking\u2019 by law enforcement agencies remains a better alternative than building in further vulnerabilities. Elsewhere, digital rights group Access Now have posted a letter online signed by nearly 200 experts, activists and corporations<\/a> urging governments globally not to ban or limit access to encryption in any form.<\/p>\n Just before Christmas, the White House released a new strategy<\/a> for greater US involvement in the development of international standards for cybersecurity. Cybersecurity Coordinator Michael Daniel announced the strategy as part of the US Government\u2019s efforts to support a \u2018consensus based, private sector driven international standards development process\u2019 to develop internationally adopted standards for cybersecurity to help create trust in cyberspace and the growth of the digital economy.<\/p>\n The Israeli Ministry of Defense has announced new export permit requirements for cyber security products.<\/a> The list of products subject to oversight includes systems that can deceive users, operating programs or communications with penetration programs; systems adapted for protecting or monitoring communication lines at a national level; and equipment and components designed for digital forensics.<\/p>\n And for those of you still on holiday or already nostalgic about the year that was 2015, our friends at the Council on Foreign Relations\u2019 Net Politics<\/em><\/a> blog have just finished a five-part series on the top five cyber news events of 2015 that\u2019s well worth a read.<\/p>\n","protected":false},"excerpt":{"rendered":" 2016 has kicked off in big way with what\u2019s been billed as the first cyber attack to actually disable a power grid. SANS ICS analysis indicates that the six-hour outage in western Ukraine was caused …<\/p>\n","protected":false},"author":364,"featured_media":24180,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,1597,1414,163,714],"class_list":["post-24178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-strategy","tag-pla","tag-russia","tag-ukraine"],"acf":[],"yoast_head":"\n