Japan and Australia launch Pacific Digital Development Initiative

Japan and Australia have recently strengthened their collaboration to enhance economic security for Pacific Island nations, responding to China’s growing influence in the region. The initiative was formalised during a ‘two-plus-two’ meeting of foreign and defence ministers, where both countries committed to establishing the Japan-Australia Pacific Digital Development Initiative.

That framework aims to support the development of telecommunications infrastructure, including installing submarine cables, which are crucial for secure communication. By investing in these projects, Japan and Australia aim to reduce the reliance of Pacific Island nations on Chinese technology, which poses potential security risks due to vulnerabilities in data extraction and disruption.

Additionally, Japan and Australia are upgrading their Economic Security Dialogue and enhancing military collaboration as part of their broader security initiative. The Economic Security Dialogue will explore practical cooperation against economic coercion from China, focusing on enhancing the financial resilience of Pacific Island nations. The two countries are also dispatching a liaison officer from Japan’s Self-Defense Forces to Australia’s Joint Operations Command to improve operational coordination and strengthen their collective defence posture.

Furthermore, both nations have reaffirmed their strong opposition to unilateral attempts to alter the status quo in the East and South China Seas, emphasising their commitment to regional stability and international law.

White House urges tech giants to boost VPN support

The White House met with major tech companies and civil society activists on Thursday to address the need for increased digital bandwidth for government-funded tools that help bypass internet censorship. Companies like Amazon, Google, Microsoft, and Cloudflare were encouraged to provide discounted or subsidised server bandwidth for virtual private networks (VPNs) supported by the US-backed Open Technology Fund (OTF).

The OTF has seen a dramatic increase in VPN usage due to rising internet censorship in countries like Russia, Iran, and Myanmar. The number of VPN users has surged from around nine million monthly to over 46 million, driven by heightened demand for privacy and access to uncensored information. Despite receiving additional funding from the US State Department, the OTF struggles to keep up with the increased demand due to high hosting costs.

The meeting aimed to address these challenges by persuading tech giants to help manage the growing need for VPN infrastructure. The OTF’s president, Laura Cunningham, highlighted the urgent need for support to sustain the surge in VPN usage and continue providing critical services to users in restrictive environments.

NTIA launches inquiry to support US data centres’ growth

The US National Telecommunications and Information Administration (NTIA) has launched an inquiry to address the challenges surrounding US data centres’ growth, resilience, and security. This initiative is crucial in light of the increasing demand for computing power driven by advancements in AI and other emerging technologies. Currently, the US has over 5,000 data centres, with demand projected to grow by approximately 9% annually through 2030, highlighting their role as foundational elements of a secure technology ecosystem.

To effectively tackle these challenges, the NTIA has issued a Request for Comment (RFC) to solicit stakeholders’ input on various data centre growth issues. Key focus areas include supply chain resilience, access to trusted equipment, energy demands, and the need for a specialised workforce. The RFC also explores the implications of data centre modernisation on society and the necessary data security practices for facilities hosting AI models. Insights from this inquiry will help develop comprehensive policy recommendations supporting sustainable and resilient data centre growth.

The inquiry is being conducted in coordination with the Department of Energy (DOE), highlighting the importance of addressing energy challenges associated with data centres. The collaboration aims to ensure the US can meet the energy demands of expanding data centre infrastructure while promoting clean energy solutions. The feedback received from the RFC will inform a report that outlines actionable recommendations for the US government, ultimately fostering a robust data centre ecosystem capable of supporting future technological advancements.

FBI files expose Russian efforts to influence public opinion in Europe

The US government indicted two Russian nationals and seized over 30 internet domains on Wednesday, disrupting an operation aimed at influencing the American election. However, an extensive FBI dossier revealed a broader Russian campaign targeting political and social stability in Europe. The 277-page affidavit detailed plans to manipulate politicians, businesspeople, journalists, and influencers in Germany, France, Italy, and the UK, with the Kremlin intending to sow division, discredit the US, and undermine support for Ukraine.

Documents showed the Social Design Agency, under the directive of Sergey Kiriyenko, Deputy Chief of Staff to President Vladimir Putin, orchestrated these efforts. The agency used real posts on social media to bypass bot filters and created ‘doppelgänger domains’ that mimicked reputable media outlets like Reuters and Le Monde to spread fake news. Funded by cryptocurrencies such as bitcoin, these sophisticated methods aimed to provoke rational and emotional anti-West sentiments, questioning the necessity of supporting Ukraine and criticising Americans.

Germany was identified as particularly vulnerable due to its economic ties with Russia. Russian memos stressed discrediting the USA, Great Britain, and NATO, while convincing Germans to oppose sanctions.

Another operation, ‘International Conflict Incitement,’ focused on escalating tensions in France and Germany, using fake articles and targeted social media posts to create conflicts and destabilise these societies.

Why does it matter?

The findings underscore how pervasive strategic manipulation of public opinion through sophisticated cyber operations is. Through FBI evidence, the depth and breadth of these influence operations to escalate internal tensions and to promote the interests of the Russian Federation are made clear, highlighting ongoing geopolitical tensions and the sophisticated nature of modern information warfare.

Australian government to reform Triple Zero emergency call service

The Australian Government has taken decisive action to enhance the Triple Zero emergency call service in response to the November 2023 Optus outage, which left many Australians unable to access this critical service. Minister for Communications of Australia, the Hon. Michelle Rowland MP, announced a comprehensive set of reforms to improve industry accountability and ensure public access to emergency services. These changes are being implemented through a Ministerial direction to the Australian Communications and Media Authority (ACMA), which will amend enforceable rules for mobile carriers.

The government has directed the ACMA to require mobile carriers to take all reasonable steps to ensure that emergency calls can be made on any available network during outages. This directive addresses the technical issues that prevented many Optus customers from reaching Triple Zero during the outage. Additionally, the government is mandating that providers improve the visibility of future outages for frontline emergency service organisations, thereby enhancing communication and preparedness during emergencies.

Also, the government is committed to implementing all 18 recommendations from the Post Incident Review of the Optus outage, the first comprehensive assessment of the Triple Zero ecosystem in over a decade. These recommendations include establishing a Triple Zero Custodian framework, requiring telecommunications carriers to provide detailed work plans after major outages, and creating a comprehensive testing regime for telecommunications networks and devices.

USDA faces mounting criticism over cybersecurity vulnerabilities in the food and agriculture sector

Experts warn that the potential for disaster in the food and agriculture sector is immense. The US Department of Agriculture (USDA) is tasked with preventing such crises by securing the sector’s infrastructure from physical and cyber threats. However, in today’s increasingly digital world, the USDA is alarmingly unprepared to fulfil this role, according to policymakers, independent experts, and even the department’s reports to Congress.

That crucial responsibility is handled by a small, underfunded office within the USDA, which is already stretched thin with other duties. The department’s leadership rarely highlights the serious cyber threats facing the food and agriculture industry. This industry contributed over 5% to the US economy and provided about 10% of the nation’s jobs last year. Despite these pressing risks, it remains uncertain whether the department has made meaningful progress in addressing them.

While other agencies that protect critical infrastructure have been proactive in confronting cyber threats, the USDA needs to be faster to act, even as industry stakeholders become increasingly anxious about their digital vulnerabilities. The food and agriculture sector has largely remained under the radar regarding cybersecurity, with hackers focusing on more profitable targets for now. But this reprieve is unlikely to last indefinitely. The 2021 ransomware attack on meat-processing giant JBS, which forced the closure of plants across the country and threatened to disrupt beef prices, served as a wake-up call about the sector’s vulnerabilities.

Over the past decade, the cyber risks to food and agriculture have escalated as automation has become more widespread across the industry. Technology has become deeply embedded in modern agriculture, from tractors guided by GPS and cloud-connected devices controlling planting patterns to drones (some manufactured in China) surveying and spraying crops and automated systems managing livestock feeding. That integration extends through the entire supply chain, from food processors to distributors, making it more vulnerable to cyberattacks.

However, these technological advancements were adopted mainly before the rise in cyber threats to critical infrastructure, leading to serious concerns about the security of the US food supply. Cyberattacks on the food system could manifest in various ways, and one of the most severe concerns involves manipulating food safety data, either by concealing a food-borne illness or by falsely creating evidence of one.

Why does this matter?

The USDA still needs to provide interviews. However, a spokesperson emphasised that the department remains ‘committed to enhancing our cyber capabilities, promoting cyber awareness across the sector, and raising the industry’s cyber profile, despite the limited funding allocated by Congress for this purpose.’

The department also stays engaged with the sector through biweekly email updates, periodic meetings with industry leaders, and organised threat briefings. Additionally, when pro-Russian hacktivists targeted the sector earlier this year, Detlefsen noted that USDA quickly brought in him and his colleagues to discuss the situation. According to Scott Algeier, executive director of the Food and Agriculture ISAC, the USDA is ‘doing well’ in its role as a policy coordinator, collaborator, and convener’ while allowing the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to handle the technical aspects of cybersecurity.

Latvian cybersecurity officials warn of cyberattacks linked to Russia and Belarus

Latvian cybersecurity officials report that politically motivated hackers linked to Russia and Belarus are launching a new wave of cyberattacks against the Latvian government and critical infrastructure websites. The attacks aim to disrupt access rather than steal sensitive data, according to Baiba Kaskina, head of the Latvian Computer Emergency Response Team (CERT). Varis Teivans, deputy manager of Latvian CERT, highlighted this trend two years ago in an interview with Recorded Future News.

In August, the frequency of attacks surged again, likely in response to Latvia’s new aid package to Ukraine, which includes drones and air defense systems. Vineta Sprugaine, a representative of the Latvian State Radio and Television Center, noted that such attacks often coincide with political decisions or holidays.

Most of these incidents involve distributed denial-of-service (DDoS) attacks, which temporarily slow down targeted websites. Kaskina described the attacks as “very large” in volume and “well customized” to their targets.

Russia-linked hacktivist groups, including NoName057(16) and Anonymous Guys, have claimed responsibility for the recent cyberattacks on Latvian websites, asserting they are retaliating against Latvia for supporting Ukraine. NoName057(16) declared on Telegram, “We continue to punish Russophobic Latvia for aiding the criminal Kyiv regime.”

Baiba Kaskina acknowledged that while Latvia is ‘well prepared’ for these attacks, the constantly evolving tactics of the hackers make them challenging to combat. She described the attacks on Latvia and other Baltic states as part of a ‘hybrid war’ aimed at creating societal panic and eroding trust in government institutions.

White House urges better security for internet routing protocol

The White House’s cybersecurity office urged network operators to adopt available measures to secure the Border Gateway Protocol (BGP), a critical yet vulnerable technology used for routing internet traffic. The new guidance highlights that BGP lacks sufficient security and resilience features against current risks, a concern that has persisted for 25 years.

BGP is used by networks to exchange routing information, such as internet addresses, with other networks. For example, a mobile network uses BGP to connect with a cloud service or residential broadband network. Without updates, BGP is susceptible to exploits by malicious actors. Hijacking BGP can redirect users to malicious sites, exposing them to theft or data breaches, and can also facilitate DDoS attacks or disrupt telecommunications.

The Office of the National Cyber Director (ONCD) recommends that network operators adopt Resource Public Key Infrastructure (RPKI), which involves digital certificates managed by Regional Internet Registries. RPKI supports technologies like Route Origin Validation (ROV) and Route Origin Authorization (ROA) to help networks verify reachable internet addresses.

The ONCD acknowledges that securing BGP is challenging and provides detailed guidance on the protocol. It notes that federal networks in the US have not fully implemented ROAs but aim to have over 60% of advertised IP space secured by the end of the year. The ONCD will lead a new Internet Routing Security Working Group, including the Cybersecurity and Infrastructure Security Agency (CISA) and industry partners.

India keeps tight restriction on Chinese telecom firms

The Indian government maintains strict restrictions on Chinese telecom equipment manufacturers like ZTE and Huawei, citing security concerns. Despite ZTE’s recent proposal to partner with Celkon Resolute to manufacture routers in Andhra Pradesh, the government’s stance remains unchanged. This is due to the National Security Directive, which prohibits using equipment from ‘non-trusted sources’ in India’s telecom networks, effectively barring these companies from participating in the 5G rollout and limiting their involvement in existing networks.

The ‘trusted sources’ policy enforced by the National Cyber Security Coordinator (NCSC) is central to the issue. ZTE and Huawei still need to meet the stringent compliance requirements, which include detailed disclosures about their operations and products. As a result, they remain excluded from India’s telecom projects. The Department of Telecommunications (DoT) has also asked operators to assess and report the use of non-trusted equipment in their networks, further limiting these companies’ prospects.

Although ZTE can manufacture consumer Wi-Fi equipment in India, these products can only be used in telecom networks with NCSC approval. The ZTE-Celkon partnership has stalled due to a lack of progress and clarity from the government. Despite some recent relaxations for Chinese companies in other sectors, the telecom equipment industry remains tightly regulated, with little chance of relief for ZTE and Huawei amid ongoing geopolitical tensions and cybersecurity concerns.

Netherlands to restrict ASML’s repairs in China

The Dutch government’s potential decision to restrict ASML’s ability to repair its machines in China could have significant repercussions for the global semiconductor industry. These machines are critical for Chinese companies such as Huawei and Semiconductor Manufacturing International Corp. (SMIC). Access to necessary repairs and spare parts is required to avoid operational failures or reduced efficiency, potentially disrupting semiconductor manufacturing in China.

China’s dependence on ASML is particularly acute because the country cannot produce comparable equipment domestically and cannot purchase ASML’s more advanced extreme ultraviolet (EUV) machines. The restriction on repair services could force Chinese chipmakers to seek less advanced alternatives or face significant production challenges, impacting their ability to manufacture high-performance chips.

The potential policy shift also highlights a broader alignment with US strategies to limit China’s access to cutting-edge technology. Under previous Prime Minister Mark Rutte, the Netherlands had less complied with US trade restrictions on China. However, the current administration’s willingness to collaborate with US and Japanese efforts marks a significant policy change. This evolving stance underscores the increasing geopolitical complexities surrounding technology transfer and trade, with the US also contemplating stricter controls, such as the foreign direct product rule, to tighten restrictions on China further.