Tag: Cyber Security

  • Turkey establishes the National Cyber Security Coordination Foundation

    Turkey establishes the National Cyber Security Coordination Foundation

    By Kevin Coleman — Defense Tech Cyberwarfare Correspondent

    cyber security global

    Countries around the world have growing concerns about the continued growth in cyber threats and attacks. As their concerns rise, they begin to prepare for what many believe is the inevitable – a significant attack on the critical infrastructure of their country. Turkey is the latest country to follow the lead of the United States in recognizing that the threats in cyber space are a growing national security concern.

    Few details about the specifics of the National Cyber Security Coordination Foundation have been made public. It is believed that its primary goal is to rapidly establish a coordinated defense against cyber attacks. Turkey is taking a combined approach that will provide cyber defense for business as well as for the nation’s government and armed forces. One inside source said that “recent cyber hostilities” are what drove the Turkish government to take this step. It is easy to believe that when the Turkish government got into the throws of cyber defense and investigations of the sophisticated cyber attacks they have experienced lately, the need for such an organization became clear! Taking substantive steps like this are typically cyber event driven – reactive versus being proactive. Before Turkey’s election earlier this year, large-scale, coordinated cyber attacks against government web sites were launched and said to have been highly disruptive.

    It will be interesting to see if Turkey, like several other countries, appoints a cyber diplomat as the point of coordination for all cyber efforts internationally. This is another indicator of the maturing our approach to dealing with the global proliferation of cyber threats and weapons.

    Related Link — http://​defensetech​.org/​2​0​1​1​/​0​4​/​1​8​/​t​h​e​-​m​a​t​u​r​i​n​g​-​o​f​-​g​l​o​b​a​l​-​c​y​b​e​r​-​a​f​f​a​i​rs/

    via Turkey establishes the National Cyber Security Coordination Foundation. | Defense Tech.

  • Spy fears as Chinese firm eyes NBN deal

    Spy fears as Chinese firm eyes NBN deal

    Maris Beck

    SECURITY experts are alarmed that a company with links to the Chinese military is bidding to supply equipment to the national broadband network, warning that the equipment could be used to spy or launch cyber attacks on Australian governments and businesses.

    The United States’ National Security Agency intervened to block Huawei Technologies’ bids to supply equipment to AT&T last year, threatening to withdraw government business if Huawei was chosen, The Washington Post reported.
    The company also has faced opposition from Indian and British intelligence agencies and Australian security experts are voicing similar concerns as Huawei seeks a slice of the $43 billion broadband roll-out.
    As the rate of cyber attacks on Australian interests intensifies, an intelligence expert at the Australian National University’s Strategic and Defence Studies Centre, Desmond Ball, said he didn’t want to sound alarmist ”but this is the highest order risk that I would see with regard to network vulnerability”.
    Bids by Huawei ”would have to be subject to the closest scrutiny but in the end it would be the government’s responsibility to reject such an involvement”.
    He said the cyber security debate focused on malicious software but more attention should be paid to hardware, which could carry digital trapdoors. Professor Ball said even the most secure cable systems were vulnerable.
    Over the next decade, he said, the US-China relationship would become the most likely source of major international conflict and Australia was a key ally of the US.
    Retired air commodore Gary Waters, a former senior official in the Defence Department who now works for consultancy firm Jacobs Australia, said the government appeared not to be taking cyber security seriously enough. ”The threat is increasing and I think this is one of those threats,” he said, adding that an independent private-sector audit would be required of any foreign company ”where alarm bells could sound on cyber security”.
    Alan Dupont, director of the Centre for International Security Studies at the University of Sydney, called for a robust discussion of the NBN’s security risks, saying: ”This is the critical piece of infrastructure that is going to go down over the next 30 or 40 years … there needs to be a broader discussion of the national security implications.”
    The executive director of national security policy at Verizon in Washington, DC, Marcus Sachs, said malicious software was easy to hide in hardware and any risk assessment should focus on how much a company could be trusted.
    Huawei lost a bid to supply the NBN’s ethernet aggregation equipment and the gigabit passive optical network in June. The contract went to Alcatel-Lucent, a French company.
    Huawei, the world’s second-largest telecommunications network provider, is believed to be preparing bids to supply almost all the equipment the NBN needs. Former Victorian minister Theo Theophanous is lobbying Canberra on Huawei’s behalf.
    Huawei emphasises that it is privately owned and has released details that show its employees own its shares. But links with the military are persistently reported. According to The New York Times, Huawei’s founder and chief executive, Ren Zhengfei, was an officer in the People’s Liberation Army. China analysts say loan credits from China Construction Bank, which were granted to small companies that wanted to buy Huawei equipment, were not necessarily repaid.
    Jeremy Mitchell, public affairs director for Huawei Australia, denied the company was linked to the Chinese government.
    He said Huawei guaranteed that its equipment was safe. Despite intelligence resistance, Huawei has supplied equipment to British Telecom. He said Optus and Telstra already used Huawei’s equipment and about 50 per cent of Australians relied on it. A spokeswoman for Communications Minister Senator Stephen Conroy said the government would ensure that ”national security and resilience issues are addressed in the design and operation of the NBN”.

    http://www.theage.com.au/technology/technology-news/spy-fears-as-chinese-firm-eyes-nbn-deal-20101016-16odq.html, October 17, 2010

  • GCHQ  needs “ultra, ultra criminals”

    GCHQ needs “ultra, ultra criminals”

    a5Britons face a growing online threat from criminals, terrorists and hostile states, according to the UK’s first cyber security strategy.

    Businesses, government and ordinary people are all at risk, it says.

    The strategy has been published alongside an updated, wider National Security Strategy.

    Its publication is a sign of the growing recognition within government of the need to bolster defences against a growing threat.

    In line with a wider focus within the National Security Strategy on not just protecting the state but also citizens, the cyber-strategy encompasses protecting individuals from forms of fraud, identity theft and e-crime committed using technology as well as defending government secrets and businesses.

    ‘Attack capability’

    Launching the strategy, security minister Lord West said: “We know that various state actors are very interested in cyber warfare. The terrorist aspect of this is the least (concern), but it is developing.”

    He warned that future targets could include key businesses, the national power grid, financial markets and Whitehall departments.

    He said: “We know terrorists use the internet for radicalisation and things like that at the moment, but there is a fear they will move down that path (of cyber attacks).

    “As their ability to use the web and the net grows, there will be more opportunity for these attacks.”

    He confirmed that the UK government has already faced cyber attacks from foreign states such as Russia and China.

    But he denied that hackers had successfully broken into government systems and stolen secret information.

    He also said he could not deny that the government had its own online attack capability, but he refused to say whether it had ever been used.

    “It would be silly to say that we don’t have any capability to do offensive work from Cheltenham, and I don’t think I should say any more than that.”

    ‘Naughty boys’

    Among those the government has turned to for help on cyber crime are former illegal hackers, Lord West added.

    He said the government listening post GCHQ at Cheltenham had not employed any “ultra, ultra criminals” but needed the expertise of former “naughty boys” he said.

    “You need youngsters who are deep into this stuff… If they have been slightly naughty boys, very often they really enjoy stopping other naughty boys,” he said.

    Officials said e-crime crime is estimated to costs the UK several billion pounds a year.

    Two new bodies will be established in the coming months as part of the strategy.

    A dedicated Office of Cyber Security in the Cabinet Office will co-ordinate policy across government and look at legal and ethical issues as well as relations with other countries.

    The second body will be a new Cyber Security Operations Centre (CSOC) based at GCHQ.

    This will bring people together from across government and from outside to get a better handle on cyber security issues and work out how to better protect the country, providing advice and information about the risks.

    “CSOC’s aim will be to identify in real time what type of cyber attacks are taking place, where they come from and what can be done to stop them”, according to a Whitehall security official.

    Experts say the “forensics” of detecting who is behind a cyber attack and attributing responsibility remains extremely difficult.

    Officials said it would require input from those who had their own expertise in hackers. “We need youngsters,” an official said.

    The range of potentially hostile cyber activity – from other states seeking to carry out espionage through criminal gangs to terrorists – is daunting.

    Critical information

    At one end of the spectrum, military operations – such as Russia’s conflict with Georgia last year – are now accompanied by attacks on computer systems.

    The UK’s critical national infrastructure is also more reliant on technology than it was even five years ago and terrorists who have used the internet for fundraising and propaganda are also believed to have the intent – if not yet the capability- to carry out their own cyber-attacks.

    Officials declined to give a figure of how many attacks on government computer networks take place each day.

    In a speech in 2007, the head of MI5, Jonathan Evans, explicitly mentioned Russia and China in the context of a warning that that “a number of countries continue to devote considerable time and energy trying to steal our sensitive technology on civilian and military projects, and trying to obtain political and economic intelligence at our expense. They do not only use traditional methods to collect intelligence but increasingly deploy sophisticated technical attacks, using the internet to penetrate computer networks.”

    Officials said they were not aware of any “key pieces of information” that had gone missing yet but said that British companies had lost critical information.

    The new Cyber Security Operations Centre will work closely with the designated parts of the critical national infrastructure and wider industry and officials say that business are keen for the government to take a lead but also share as much information as possible.

    US President Barack Obama has been carrying out a similar re-organisation for defending US computer networks and British officials said the two countries were co-ordinating closely not least because of the intimate relationship between GCHQ and its US equivalent.

    British officials believe that their government systems may also have fewer vulnerabilities than their US counterparts partly because they moved online later and have fewer connections between the internal government system and the rest of cyberspace to monitor.

    Officials in the US and UK are also thought to be working on forms of offensive cyber-warfare capability but officials are unwilling to go into any details of what this might involve.

    Some Comments:

    CSOC’s aim will be to identify in real time what type of cyber attacks are taking place, where they come from and what can be done to stop them
    Whitehall security official
    It would be silly to say that we don’t have any capability to do offensive work from Cheltenham, and I don’t think I should say any more than that
    Lord West, security minister
    BBC
  • Fears over terrorist cyber attacks in UK

    Fears over terrorist cyber attacks in UK

    aAl Qaida is intent on using the internet to launch a cyber-warfare campaign against the UK, ministers have revealed.

    Terrorist groups, which already use the internet for recruitment, propaganda and communication purposes, want to turn it into a dangerous weapon.

    Security Minister Lord West issued the warning as he published the Government’s new Cyber Security Strategy aimed at heading off online threats.

    As well as potential cyber-attacks from terrorists, the UK faces a real and growing threat from foreign governments such as China and Russia, and from organised criminal gangs, he said. Targets include key businesses, the national power grid, financial markets and Whitehall departments.

    As part of attempts to beef up defences, a new Office for Cyber Security will be set up to co-ordinate Government policy.

    Another new development will see the creation of a “cyber-forensics” team based at GCHQ, the Government’s eavesdropping centre in Cheltenham, Gloucestershire. The Cyber Security Operations Centre will constantly monitor, analyse and counter cyber attacks as they happen.

    Lord West said the terrorists’ capability to launch attacks was something he believed “will develop” in future.

    “We know terrorists use the internet for radicalisation and things like that at the moment, but there is a fear they will move down that path (of cyber attacks). As their ability to use the web and the net grows, there will be more opportunity for these attacks.

    He confirmed that the UK Government has already faced cyber attacks from foreign states such as Russia and China. But he denied that hackers had successfully broken into Government systems and stolen secret information.

    He also said he could not deny that the Government has its own online attack capability, but he refused to say whether it had ever been used.

    Press Association