{"id":3870,"date":"2013-02-08T12:20:20","date_gmt":"2013-02-08T02:20:20","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=3870"},"modified":"2013-06-28T13:55:17","modified_gmt":"2013-06-28T03:55:17","slug":"how-far-can-we-raise-the-cyber-stakes","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/","title":{"rendered":"How far can we raise the cyber stakes?"},"content":{"rendered":"
\"How<\/a><\/figure>\n

It\u2019s been a busy couple of weeks in the world of cyber security, and it\u2019s been a period that defines the discussion in new ways. Not only did the New York Times directly accuse the Chinese military of hacking activity<\/a>, the US government released a legal review of its cyber policies<\/a> which included the ability to order a pre-emptive strike. The two aren\u2019t directly related, but it\u2019s hard to ignore the coincidence of both revelations in the same week, with the stakes in the cyber world being raised yet again.<\/p>\n

Over the past decade it\u2019s been hard to escape reports of Chinese hacking<\/a> of government and private sector computer systems. What makes the New York Times\u2019 hacking worth further examination is the directness and detail of the accusations and what the NYT stands to lose as a business.<\/p>\n

To recap, the NYT had been subject to sustained hacking for four months, beginning after the paper published a story in October last year regarding Wen Jiabao\u2019s relatives accumulating several billion dollars through various business dealings during his time in power<\/a>. The release of this story led to the Chinese government blocking access to the newly launched (June 2012) NYT Chinese language site, and censoring searches for the paper online. In addition, telecommunications company AT & T informed the NYT that it had noticed behaviour \u2018consistent with other attacks believed to have been perpetrated by the Chinese military\u2019<\/a>. It\u2019s not known how the hackers initially accessed the systems, but a \u2018spear-phishing\u2019 attack, (an email with an inconspicuous attachment which contains malware) is suspected. The various details of the hacking process<\/a> are fascinating to read.<\/p>\n

Akin to a collective sigh of relief amongst the US media community that someone was opening the door to their shared problems, Bloomberg, the Wall Street Journal and the Washington Post all admitted to similar hacking incidents<\/a> related to stories they published on Chinese politicians, political and legal issues in China and the state-owned telecom giants Huawei and ZTE.<\/p>\n

This story is going to make life difficult for the NYT\u2019s Chinese language enterprise, which was established just last year with 30 newly-hired staff. Not only are Western companies reluctant to make such announcements due to possible negative publicity and lowering of shareholder confidence but also the because of the risk of antagonising the Chinese government.<\/p>\n

The NYT\u2019s investment is considerable: in an increasingly crowded global media market that\u2019s seen as the holy-grail for western media firms, the Chinese population is a relatively untapped opportunity. But it comes at a high price, as Rupert Murdoch discovered, having attempted for twenty years to create a fully global media empire by courting senior leaders within the Chinese government in order to create a satellite network which would be fully accepted by the Chinese public. In August 2011, News Corporation sold its controlling stakes in three of its Chinese television channels<\/a>. Also, operating media sources in China isn\u2019t without its costs\u2014it\u2019s a case of be careful what you say as the censors are watching. However, change is slowly progressing, demonstrated by the week-long stand-off between Chinese journalists at the Southern Weekend<\/em><\/a> newspaper and their state censors.<\/p>\n

In many respects this incident mirrors the international debate currently raging regarding global governance of the internet. As I\u2019ve previously explored<\/a>, there\u2019s a risk that Chinese and Russian pressure will steer the negotiations on governance towards tight regulation of the internet and its users. For the media, tighter regulation means increasing governmental influence and control of messages, including media sources. The private sector needs to have a voice in the discussions\u2014as the NYT case shows, they\u2019re being targeted more and more frequently. And not only do they need to be able to understand the threats, but have to assist in shaping and influencing the international dialogue and policies being developed.<\/p>\n

It seemed like calculated timing on behalf of the NYT (or indeed the US Government) to release a story about a secret legal review of US approaches to the use of offensive cyber attacks<\/a> some three days after the revelations about the hacking of the NYT\u2019s systems. Yet the message was stark: US officials determined that the cyber weapons at their disposal \u2018were so powerful that\u2014like nuclear weapons\u2014they should be unleashed only on the direct orders of the Commander in Chief, and that pre-emptive strikes should be allowed if the US detected credible evidence of a major digital attack coming from abroad, however difficult it may actually be to assess imminent threats in cyberspace.<\/p>\n

How China views this review is yet to be seen, but indications of their irritation at being caught has been illustrated by their own claims of US sourced hacking on Chinese systems<\/a>. It\u2019ll have surely raised a few eyebrows in Beijing and beyond. There\u2019s no doubt that the stakes are being raised ever higher in cyberspace, and more than ever constructive dialogue is required before escalation produces some unwanted consequences for all involved.<\/p>\n

Tobias Feakin is a senior analyst at the Australian Strategic Policy Institute. Image courtesy of Flickr user Dillsnufus<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

It\u2019s been a busy couple of weeks in the world of cyber security, and it\u2019s been a period that defines the discussion in new ways. Not only did the New York Times directly accuse the …<\/p>\n","protected":false},"author":49,"featured_media":3873,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[480],"tags":[52,95,162,339,31],"class_list":["post-3870","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-national-security","tag-china","tag-cyber-security","tag-governance","tag-new-york-times","tag-united-states"],"acf":[],"yoast_head":"\nHow far can we raise the cyber stakes? | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How far can we raise the cyber stakes? | The Strategist\" \/>\n<meta property=\"og:description\" content=\"It\u2019s been a busy couple of weeks in the world of cyber security, and it\u2019s been a period that defines the discussion in new ways. Not only did the New York Times directly accuse the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-08T02:20:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-06-28T03:55:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/02\/6785223185_b4190e44fd_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tobias Feakin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tobias Feakin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/02\/6785223185_b4190e44fd_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/02\/6785223185_b4190e44fd_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"How far will the dragon fly?\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/\",\"name\":\"How far can we raise the cyber stakes? | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/#primaryimage\"},\"datePublished\":\"2013-02-08T02:20:20+00:00\",\"dateModified\":\"2013-06-28T03:55:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How far can we raise the cyber stakes?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\",\"name\":\"Tobias Feakin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"caption\":\"Tobias Feakin\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How far can we raise the cyber stakes? | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/","og_locale":"en_US","og_type":"article","og_title":"How far can we raise the cyber stakes? | The Strategist","og_description":"It\u2019s been a busy couple of weeks in the world of cyber security, and it\u2019s been a period that defines the discussion in new ways. Not only did the New York Times directly accuse the ...","og_url":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-02-08T02:20:20+00:00","article_modified_time":"2013-06-28T03:55:17+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/02\/6785223185_b4190e44fd_z.jpg","type":"image\/jpeg"}],"author":"Tobias Feakin","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tobias Feakin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/02\/6785223185_b4190e44fd_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/02\/6785223185_b4190e44fd_z.jpg","width":640,"height":427,"caption":"How far will the dragon fly?"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/","url":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/","name":"How far can we raise the cyber stakes? | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/#primaryimage"},"datePublished":"2013-02-08T02:20:20+00:00","dateModified":"2013-06-28T03:55:17+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/how-far-can-we-raise-the-cyber-stakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"How far can we raise the cyber stakes?"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd","name":"Tobias Feakin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","caption":"Tobias Feakin"},"url":"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/3870"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=3870"}],"version-history":[{"count":9,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/3870\/revisions"}],"predecessor-version":[{"id":7300,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/3870\/revisions\/7300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/3873"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=3870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=3870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=3870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}