SlideShare a Scribd company logo
1 of 24
Download to read offline
Cyber
Threats and
Cooperation
in the
Indo Pacific
Benjamin Ang
Senior Fellow, Cyber and
Homeland Defence /
Deputy Head, Centre of Excellence
for National Security (CENS)
S Rajaratnam School of
International Studies (RSIS)
Nanyang Technological University
Singapore
Twitter @benjaminang
Cyber threats in the
Indo-Pacific region
1. High-profile cyber-attacks and data leaks and
Advanced Persistent Threat campaigns
2. Information warfare tactics and countermeasures
3. Singapore’s role in enhancing regional cybersecurity
4. Convergence and divergence between Singapore
and the US
HIGH-PROFILE CYBER-ATTACKS
AND DATA LEAKS AND ADVANCED
PERSISTENT THREAT CAMPAIGNS
SingHealth breach
• 1.5 million patients' non-
medical personal data
stolen, incl PM
• “This was a deliberate,
targeted and well-planned
cyberattack. It was not the
work of casual hackers or
criminal gangs … we are
not able to reveal more
because of operational
security reasons.”
• Symantec attributed to APT
SingHealth Committee of Inquiry
• 22 days
• 37 witnesses
• 26 written
submissions
• 454-page report
The breach was detected by IT staff …
… and their manager told them not to
escalate further
Why?
What the manager said
• "I thought to myself: 'If I
report the matter, what do
I get?' If I report the
matter, I will simply get
more people chasing me
for more updates. If they
are chasing me for more
updates, I need to be
able to get more
information to provide
them."
What his boss said
• “If a security incident is
declared when it turns out
there is no security
incident, this may look
bad on the person who
made the declaration.”
More incidents in ASEAN 2018-2019
• Singapore
– 2,400 MINDEF/ SAF
personnel, by phishing a 3rd
party vendor
• Singapore
– 14,200 people diagnosed
with HIV, taken by ex-lover
of a doctor with access
• Thailand and Vietnam
– Toyota customer data, no
details given
• Philippines
– 82,150 customers of
Wendy’s
• Philippines
– 900,000 customers of
pawnshop Cebuana
• Thailand
– 45,000 customers of True
Corp mobile
• Malaysia
– 46 million mobile
subscribers’ data
» [source: CSO Online]
APTs and their targets in Asia
APT Target countries Target entities
FunnyDream (C) Malaysia, Philippines,
Thailand, Vietnam
High-level government
organisations; political parties
Platinum Indonesia, Malaysia,
Vietnam
Diplomatic and government
entities
Cycldek (C) Laos, Philippines, Thailand,
Vietnam
Government, defence, and energy
sectors
HoneyMyte Myanmar, Singapore,
Vietnam
Government organisations
Finspy Indonesia, Myanmar,
Vietnam
Individuals
PhantomLance Indonesia, Malaysia,
Vietnam
Entities
Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky]
INFORMATION WARFARE TACTICS
AND COUNTERMEASURES
Allegations of info ops
and foreign interference
• Facebook took down accounts from Iran, Israeli
company targeting SE Asia, and Russian campaign
targeting Thailand (2019)
• China accused US of supporting Hong Kong
protesters (2019)
• Australia accused China of influencing
businessmen, politicians, educational institutions
(2019)
• Taiwan briefed on China campaign to interfere with
elections (2018)
• Reuters reported China Radio International backed
33 stations (2015)
Operation Naval Gazing
(Philippines, 2020)
• Facebook announced it
took down a Chinese
disinformation campaign of
155 accounts, 11 pages,
nine groups and six
Instagram accounts with an
audience of at least
130,000 followers
• Generated millions of digital
interactions by promoting
politicians favorable to
China, including President
Rodrigo Duterte
Allegations of domestic info ops
• Indonesia’s political
parties use ‘buzzers’
on social media
• Philippines journalists
in conflict with
government – arrest
of Rappler editor
• Singapore – spike in
anonymous online
criticism during 2018
dispute with Malaysia
RSIS Framework for Countermeasures
(1) Understand the
Adversary’s objectives
(2) Assess the Defender’s
vulnerabilities
(3) Set clear goals for the
countermeasures
(4) Set up a task force for
strategic response
(5) Counter specific tactics
where needed
Some countermeasures and concerns
Countermeasure Concern
Restricting foreign funding of
political parties, politicians,
NGOs(?), edu institutions(?)
Suppression of criticism?
Education on critical thinking Mobile only populations?
Legislation Suppression of criticism?
Fact checkers Independence?
Self-policing by tech platforms Will they do enough?
Whose standards do they
follow?
SINGAPORE’S ROLE IN ENHANCING
REGIONAL CYBERSECURITY
Strengthen international partnerships
• Sign bilateral MOU’s
with Canada, France,
India, NL, USA etc
• Build capacity in
ASEAN with S$10m
(US$7.3m)
ASEAN Cyber
Capacity fund,
upgraded to S$30
million (US$21.9m)
4
Why build capacity in ASEAN?
• ASEAN needs Cyberspace, because Digital
Transformation can bring economic progress for all
Member States
• BUT Member States have different levels of cyber
maturity – see the ASPI and EU Cyber Direct reports
on Cyber Maturity in Asia Pacific region
• AND cyber attackers will attack ASEAN through the
weakest Member States e.g. through the ASEAN
Smart City Network
ASEAN Ministers Cybersecurity
Conference (AMCC) agreed …
• 2016: Agreed on value of
practical cybersecurity norms
of behaviour in ASEAN
• 2017: Supported development
of basic, operational and
voluntary norms
• 2018: Singapore would
propose a mechanism to
enhance ASEAN cyber
coordination
• 2019: Agreed to move forward
on a formal cybersecurity
coordination mechanism
2020 AMCC announced:
• Singapore + United
Nations will draw up a
checklist of steps to
implement cyber norms
• e.g. legal frameworks
and sharing networks
• ASEAN will share its
experience and
knowledge with the UN
What next for ASEAN?
Capacity Building
Programmes
• ASEAN-Singapore Cyber
Centre of Excellence
• ASEAN-Japan
Cybersecurity Capacity
Building Centre in
Thailand
Confidence Building
Measures
• Joint training between
Member States to
improve communication
• Sharing cyber threat
information (between
CERTS)
• Contact list
Convergence and divergence between
Singapore and the US
Convergence
• Commitment to rules
based world order in
cyberspace – see
UNGGE and UNOEWG
• Bilateral MOU for
cooperation in
cybersecurity
• Top 5 trading partner
Divergence
• No US Ambassador since
2017
• Bilateral Trade between
China and Singapore:
S$135 billion (USD 100
billion) (top trading
partner)
Cyber
Threats and
Cooperation
in the
Indo Pacific
Benjamin Ang
Senior Fellow, Cyber and
Homeland Defence /
Deputy Head, Centre of Excellence
for National Security (CENS)
S Rajaratnam School of
International Studies (RSIS)
Nanyang Technological University
Singapore
Twitter @benjaminang

More Related Content

What's hot

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 

What's hot (20)

Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
Gifec
GifecGifec
Gifec
 

Similar to Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020

Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
Ray Bugg
 

Similar to Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020 (20)

Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
NGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNasNGN integrated information security v3 DetikNas
NGN integrated information security v3 DetikNas
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
 
All Things Digital
All Things DigitalAll Things Digital
All Things Digital
 
The Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanThe Present and the Future ISAC in Taiwan
The Present and the Future ISAC in Taiwan
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
National policy and strategy
National policy and strategyNational policy and strategy
National policy and strategy
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
ISOC Update
ISOC UpdateISOC Update
ISOC Update
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 

More from Benjamin Ang

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
Benjamin Ang
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
Benjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
Benjamin Ang
 

More from Benjamin Ang (18)

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
 
Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness) Introduction to ICT supply chain (Cyber norms awareness)
Introduction to ICT supply chain (Cyber norms awareness)
 
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
 
Crime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspectiveCrime sensing with big data - Singapore perspective
Crime sensing with big data - Singapore perspective
 
The Dark Side of Fake News (2018)
The Dark Side of Fake News (2018)The Dark Side of Fake News (2018)
The Dark Side of Fake News (2018)
 
Legal Technology Vision (Singapore) 2018 update v 2
Legal Technology Vision (Singapore) 2018 update v 2Legal Technology Vision (Singapore) 2018 update v 2
Legal Technology Vision (Singapore) 2018 update v 2
 

Recently uploaded

Recently uploaded (8)

Income Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdfIncome Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdf
 
12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf12052024_First India Newspaper Jaipur.pdf
12052024_First India Newspaper Jaipur.pdf
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf11052024_First India Newspaper Jaipur.pdf
11052024_First India Newspaper Jaipur.pdf
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
Textile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-IndiaTextile Waste In India/managing-textile-waste-in-India
Textile Waste In India/managing-textile-waste-in-India
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf
 

Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020

  • 1. Cyber Threats and Cooperation in the Indo Pacific Benjamin Ang Senior Fellow, Cyber and Homeland Defence / Deputy Head, Centre of Excellence for National Security (CENS) S Rajaratnam School of International Studies (RSIS) Nanyang Technological University Singapore Twitter @benjaminang
  • 2. Cyber threats in the Indo-Pacific region 1. High-profile cyber-attacks and data leaks and Advanced Persistent Threat campaigns 2. Information warfare tactics and countermeasures 3. Singapore’s role in enhancing regional cybersecurity 4. Convergence and divergence between Singapore and the US
  • 3. HIGH-PROFILE CYBER-ATTACKS AND DATA LEAKS AND ADVANCED PERSISTENT THREAT CAMPAIGNS
  • 4. SingHealth breach • 1.5 million patients' non- medical personal data stolen, incl PM • “This was a deliberate, targeted and well-planned cyberattack. It was not the work of casual hackers or criminal gangs … we are not able to reveal more because of operational security reasons.” • Symantec attributed to APT
  • 5. SingHealth Committee of Inquiry • 22 days • 37 witnesses • 26 written submissions • 454-page report
  • 6. The breach was detected by IT staff …
  • 7. … and their manager told them not to escalate further
  • 8. Why? What the manager said • "I thought to myself: 'If I report the matter, what do I get?' If I report the matter, I will simply get more people chasing me for more updates. If they are chasing me for more updates, I need to be able to get more information to provide them." What his boss said • “If a security incident is declared when it turns out there is no security incident, this may look bad on the person who made the declaration.”
  • 9. More incidents in ASEAN 2018-2019 • Singapore – 2,400 MINDEF/ SAF personnel, by phishing a 3rd party vendor • Singapore – 14,200 people diagnosed with HIV, taken by ex-lover of a doctor with access • Thailand and Vietnam – Toyota customer data, no details given • Philippines – 82,150 customers of Wendy’s • Philippines – 900,000 customers of pawnshop Cebuana • Thailand – 45,000 customers of True Corp mobile • Malaysia – 46 million mobile subscribers’ data » [source: CSO Online]
  • 10. APTs and their targets in Asia APT Target countries Target entities FunnyDream (C) Malaysia, Philippines, Thailand, Vietnam High-level government organisations; political parties Platinum Indonesia, Malaysia, Vietnam Diplomatic and government entities Cycldek (C) Laos, Philippines, Thailand, Vietnam Government, defence, and energy sectors HoneyMyte Myanmar, Singapore, Vietnam Government organisations Finspy Indonesia, Myanmar, Vietnam Individuals PhantomLance Indonesia, Malaysia, Vietnam Entities Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky]
  • 12. Allegations of info ops and foreign interference • Facebook took down accounts from Iran, Israeli company targeting SE Asia, and Russian campaign targeting Thailand (2019) • China accused US of supporting Hong Kong protesters (2019) • Australia accused China of influencing businessmen, politicians, educational institutions (2019) • Taiwan briefed on China campaign to interfere with elections (2018) • Reuters reported China Radio International backed 33 stations (2015)
  • 13. Operation Naval Gazing (Philippines, 2020) • Facebook announced it took down a Chinese disinformation campaign of 155 accounts, 11 pages, nine groups and six Instagram accounts with an audience of at least 130,000 followers • Generated millions of digital interactions by promoting politicians favorable to China, including President Rodrigo Duterte
  • 14. Allegations of domestic info ops • Indonesia’s political parties use ‘buzzers’ on social media • Philippines journalists in conflict with government – arrest of Rappler editor • Singapore – spike in anonymous online criticism during 2018 dispute with Malaysia
  • 15. RSIS Framework for Countermeasures (1) Understand the Adversary’s objectives (2) Assess the Defender’s vulnerabilities (3) Set clear goals for the countermeasures (4) Set up a task force for strategic response (5) Counter specific tactics where needed
  • 16. Some countermeasures and concerns Countermeasure Concern Restricting foreign funding of political parties, politicians, NGOs(?), edu institutions(?) Suppression of criticism? Education on critical thinking Mobile only populations? Legislation Suppression of criticism? Fact checkers Independence? Self-policing by tech platforms Will they do enough? Whose standards do they follow?
  • 17. SINGAPORE’S ROLE IN ENHANCING REGIONAL CYBERSECURITY
  • 18. Strengthen international partnerships • Sign bilateral MOU’s with Canada, France, India, NL, USA etc • Build capacity in ASEAN with S$10m (US$7.3m) ASEAN Cyber Capacity fund, upgraded to S$30 million (US$21.9m) 4
  • 19. Why build capacity in ASEAN? • ASEAN needs Cyberspace, because Digital Transformation can bring economic progress for all Member States • BUT Member States have different levels of cyber maturity – see the ASPI and EU Cyber Direct reports on Cyber Maturity in Asia Pacific region • AND cyber attackers will attack ASEAN through the weakest Member States e.g. through the ASEAN Smart City Network
  • 20. ASEAN Ministers Cybersecurity Conference (AMCC) agreed … • 2016: Agreed on value of practical cybersecurity norms of behaviour in ASEAN • 2017: Supported development of basic, operational and voluntary norms • 2018: Singapore would propose a mechanism to enhance ASEAN cyber coordination • 2019: Agreed to move forward on a formal cybersecurity coordination mechanism
  • 21. 2020 AMCC announced: • Singapore + United Nations will draw up a checklist of steps to implement cyber norms • e.g. legal frameworks and sharing networks • ASEAN will share its experience and knowledge with the UN
  • 22. What next for ASEAN? Capacity Building Programmes • ASEAN-Singapore Cyber Centre of Excellence • ASEAN-Japan Cybersecurity Capacity Building Centre in Thailand Confidence Building Measures • Joint training between Member States to improve communication • Sharing cyber threat information (between CERTS) • Contact list
  • 23. Convergence and divergence between Singapore and the US Convergence • Commitment to rules based world order in cyberspace – see UNGGE and UNOEWG • Bilateral MOU for cooperation in cybersecurity • Top 5 trading partner Divergence • No US Ambassador since 2017 • Bilateral Trade between China and Singapore: S$135 billion (USD 100 billion) (top trading partner)
  • 24. Cyber Threats and Cooperation in the Indo Pacific Benjamin Ang Senior Fellow, Cyber and Homeland Defence / Deputy Head, Centre of Excellence for National Security (CENS) S Rajaratnam School of International Studies (RSIS) Nanyang Technological University Singapore Twitter @benjaminang