{"id":6830,"date":"2013-06-06T12:00:08","date_gmt":"2013-06-06T02:00:08","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=6830"},"modified":"2013-06-28T13:50:31","modified_gmt":"2013-06-28T03:50:31","slug":"squaring-up-for-round-one-cyber-intrusion-knock-out","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/","title":{"rendered":"Squaring up for round one \u2013 cyber intrusion knock out"},"content":{"rendered":"

\"Secretary<\/a>In his recent post<\/a>, Graeme Dobell described Secretary of Defense Chuck Hagel\u2019s comments on Chinese cyber intrusions at the Shangri La dialogue as \u2018pulling back the Chinese veil and jabbing\u2019. This is certainly a great analogy, and it could be said that Hagel took the boxing gloves from other colleagues in the US Administration, including John Kerry, Thomas Donilon (National Security Advisor, to be replaced in July by\u00a0Susan Rice) and Obama himself. With the amount of jabbing that the US is doing, there must be a few bruises appearing on their target.<\/p>\n

The aim of this high tempo \u2018calling out\u2019 of China is really to draw them into a dialogue about the issue and try to draw up some rules of the road and set some limitations on the use of cyber, which feels somewhat out of control at the moment.\u00a0 The levels and severity of cyber intrusions are hard to gauge precisely, but what\u2019s evident from increasing amounts of evidence in the public domain is that it\u2019s only now that we\u2019re beginning to understand quite how much malicious activity there is in cyberspace.<\/p>\n

The latest report<\/a> from the US identifies more than two dozen major weapons systems designs that have been breached, including programs critical to US missile defences, combat aircraft and ships. The list itself<\/a> contains many elements of US core capability, which is deeply concerning and gives an indication as to why US rhetoric is becoming ever more intense.<\/p>\n

But what does all this mean for Australia? Well firstly, Australia got a mention in Hagel\u2019s speech<\/a>, when he said that: \u2018With Australia, we are expanding cooperation related to cyber security and space situational awareness\u2019. It\u2019s comforting to hear that we\u2019ll be receiving assistance and cooperation from what\u2019s by far and away the most powerful cyber power on the planet\u2014an infrequently reported fact. However, with increasing reports of apparent Chinese hacking<\/a> of Australian government and private sector systems, isn\u2019t it time for Australia to create a dialogue with China in this area and begin to shape some boundaries for cyberspace?<\/p>\n

In an ASPI report published yesterday examining the nature of Chinese intelligence agencies cyber capabilities<\/a>, I said that the nature and tempo of Chinese cyber\u2011activities have policy implications for the Australian Government. This is an issue that can\u2019t be ignored: it must be addressed in order to build an increasingly mature relationship with China. Australia would be well served to look for similar dialogues on cybersecurity to those which the US has encouraged with China and other regional partners. The issue will only grow in strategic importance over the coming years, and efforts made now will begin what\u2019s likely to be a lengthy process. This is especially important in the light of the growing economic relationship between Australia and China.<\/p>\n

The report also drew out some of the limitations to Chinese cyber activities. Despite the large scale gathering of data, it doesn\u2019t necessarily mean that China can exploit it. One only needs to look at the Soviets during the Cold War, who ended up many generations behind the US in computing technology because they couldn\u2019t develop equipment from stolen US blueprints quickly enough. In the Chinese case, while they can achieve a certain \u2018leapfrogging\u2019 of technical development, the real payoff of their operations will depend on their ability to convert their skills at cloning other\u2019s technology into comprehensive research and development and a true innovation culture.<\/p>\n

What\u2019s certain is that the public debate often overlooks China\u2019s strong dependendence on cyberspace for its military and civilian government programs. It has just as many vulnerabilities to attack as much of the Western world, if not more\u2014as Chinese diplomats are all too eager to remind us when accusations are made against them. In fact, the National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT), which issues a weekly report on cyber attacks against China, says that 4,062 US-based computer servers hijacked 2.91 million mainframe computers in China<\/a>, although it didn’t say over what period of time these attacks took place\u2014an important detail to leave out. One wonders if Xi Jinping will be donning his boxing gloves for the first round of face to face discussions with Obama this week, when cyber intrusions will be on the agenda. It\u2019s certain that this won\u2019t be a first round knockout for either side\u2014I expect it to go the distance.<\/p>\n

Tobias Feakin is a senior analyst at ASPI. Image courtesy of Secretary of Defense<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

In his recent post, Graeme Dobell described Secretary of Defense Chuck Hagel\u2019s comments on Chinese cyber intrusions at the Shangri La dialogue as \u2018pulling back the Chinese veil and jabbing\u2019. This is certainly a great …<\/p>\n","protected":false},"author":49,"featured_media":6833,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[480],"tags":[391,95],"class_list":["post-6830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-national-security","tag-cyber","tag-cyber-security"],"acf":[],"yoast_head":"\nSquaring up for round one \u2013 cyber intrusion knock out | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Squaring up for round one \u2013 cyber intrusion knock out | The Strategist\" \/>\n<meta property=\"og:description\" content=\"In his recent post, Graeme Dobell described Secretary of Defense Chuck Hagel\u2019s comments on Chinese cyber intrusions at the Shangri La dialogue as \u2018pulling back the Chinese veil and jabbing\u2019. This is certainly a great ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-06T02:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-06-28T03:50:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/06\/8909745778_156d5f22fd_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tobias Feakin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tobias Feakin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/06\/8909745778_156d5f22fd_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/06\/8909745778_156d5f22fd_z.jpg\",\"width\":640,\"height\":426},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/\",\"name\":\"Squaring up for round one \u2013 cyber intrusion knock out | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/#primaryimage\"},\"datePublished\":\"2013-06-06T02:00:08+00:00\",\"dateModified\":\"2013-06-28T03:50:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Squaring up for round one \u2013 cyber intrusion knock out\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\",\"name\":\"Tobias Feakin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"caption\":\"Tobias Feakin\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Squaring up for round one \u2013 cyber intrusion knock out | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/","og_locale":"en_US","og_type":"article","og_title":"Squaring up for round one \u2013 cyber intrusion knock out | The Strategist","og_description":"In his recent post, Graeme Dobell described Secretary of Defense Chuck Hagel\u2019s comments on Chinese cyber intrusions at the Shangri La dialogue as \u2018pulling back the Chinese veil and jabbing\u2019. This is certainly a great ...","og_url":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-06-06T02:00:08+00:00","article_modified_time":"2013-06-28T03:50:31+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/06\/8909745778_156d5f22fd_z.jpg","type":"image\/jpeg"}],"author":"Tobias Feakin","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tobias Feakin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/06\/8909745778_156d5f22fd_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/06\/8909745778_156d5f22fd_z.jpg","width":640,"height":426},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/","url":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/","name":"Squaring up for round one \u2013 cyber intrusion knock out | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/#primaryimage"},"datePublished":"2013-06-06T02:00:08+00:00","dateModified":"2013-06-28T03:50:31+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/squaring-up-for-round-one-cyber-intrusion-knock-out\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Squaring up for round one \u2013 cyber intrusion knock out"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd","name":"Tobias Feakin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","caption":"Tobias Feakin"},"url":"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/6830"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=6830"}],"version-history":[{"count":8,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/6830\/revisions"}],"predecessor-version":[{"id":7290,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/6830\/revisions\/7290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/6833"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=6830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=6830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=6830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}