SlideShare a Scribd company logo
CYBERSECURITY AND
INTERNATIONAL SECURITY
IN ASEAN AND SINGAPORE
Benjamin Ang
Head, Centre of Excellence for
National Security
and Future Issues in
Technology;
Head, Digital Impact Research
RSIS | NTU | Singapore
OUTLINE
1. What does ‘cybersecurity’ mean in ASEAN?
2. Types of cyber threats in ASEAN
3. What are the characteristics of ASEAN cyberspace?
4. How do ASEAN member states cooperate in cyberspace?
DEFINITIONS
Cybersecurity in the West
Confidentiality
- Data breach (e.g., OPM)
Integrity
- Critical infrastructure (e.g., water)
Availability
- DDOS
- Ransomware (e.g., MGM Grand,
Colonial pipeline)
Priorities in ASEAN
Cybercrime and scams
Child pornography
‘Fake news’
TYPES OF CYBER
THREATS IN ASEAN
SERVICES IN ASEAN AT RISK
Source:
Palo Alto
ASEAN State of
Cybersecurity
Report 2023
Source:
Palo Alto
ASEAN State of
Cybersecurity
Report 2023
IOT, PERSONAL DEVICES, DIGITAL
TRANSACTIONS AT RISK
CYBER THREAT
LANDSCAPE FOR ASEAN
Palo Alto State of
Cybersecurity Report ASEAN
2022
CYBER INCIDENTS IN ASEAN 2020 -
2023
Data breach in Malaysia personal
information of over 13,000,000
allegedly from Maybank, Astro
Indonesia data breach over
1,000,000,000 Indonesian SIM card
data, sold on Dark Web by Bjorka
Singapore data of an alleged
2,600,00 user accounts from online
marketplace Carousell, sold on Dark
Web
RANSOMWARE CASES IN ASEAN 2020
APTS TARGETING ASEAN FOR
ECON/GEOPOL INTELLIGENCE
APT Target countries Target entities
FunnyDream
(C)
Malaysia, Philippines,
Thailand, Vietnam
High-level government
organisations; political parties
Platinum Indonesia, Malaysia,
Vietnam
Diplomatic and government
entities
Cycldek (C) Laos, Philippines, Thailand,
Vietnam
Government, defence, and
energy sectors
HoneyMyte Myanmar, Singapore,
Vietnam
Government organisations
Finspy Indonesia, Myanmar,
Vietnam
Individuals
PhantomLance Indonesia, Malaysia,
Vietnam
Entities
Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky]
CYBERCRIME IN ASEAN
INTERPOL ASEAN Cybercrime
Operations Desk reported increase in
2019
Botnets
Phishing
Business email compromise (BEC)
Banking malware
Ransomware
Cryptojacking
Vulnerability is due to
Quicker digital transactions
Greater internet connectivity
Growing digital economies
Asia becoming digital asset hub
Lacking cybersecurity investment
Low awareness
Source: INTERPOL
CASE STUDY: CYBER THREAT LANDSCAPE
FOR SINGAPORE 2022
Phishing
• 8500
• Double from 2021
Ransomware
• 132
• 4% less than 2021
Infected
Infrastructure
• 81,500
• 13% less than 2021
Website
Defacement
• 340
• 19% less than 2021
INFORMATION THREATS IN ASEAN
Threat actors
 Buzzers (PR companies)
 Cyber Troops (government backed)
 Cyber criminals (and call centres)
 Great powers
Examples of information operations
 COVID-19 pandemic
 Russia / Ukraine war
 Israel / Hamas war
Drivers
 Pro-western sentiment
 Anti-western sentiment
 Islamist extremists
RECENT DEVELOPMENTS IN ASEAN
THAT ACCELERATED CYBER THREATS
Changes
Pandemic WFH
Pandemic forced digital
transformation
More IOT (Smart everything)
US-China Great Power Competition
Impact
More targets online
More data on insecure systems used
by vulnerable people
More reliance on networks
Impact on supply chains
Benjamin Ang | Centre of Excellence for National Security | RSIS
CYBERSECURITY AND NATIONAL SECURITY
CHARACTERISTICS OF
ASEAN IN CYBERSPACE
ASEAN PRINCIPLES & PRIORITIES
Mutual respect
Non-interference
Sovereignty
ASEAN states do not pool sovereignty
like the European Union
 sovereignty and non-intervention are a
defence against neo-colonialism
Priorities for cooperation
 Economic
 Political
 Security
ASEAN MEMBERS ARE DIFFERENT
Different legal systems (common,
civil, hybrid)
Different political systems
(democratic, communist, military)
Different languages and cultures
Different economic and cyber levels
Different alliances (US, Russia, China)
Different interpretations of cyber
CASE STUDY: VIETNAM
AIRPORT SCREENS HACKED
Cyberattack by 1937CN? 1
They denied responsibility
Vietnam Government tells
cyber community to show
restraint after attack 2
CASE STUDY:
SINGAPORE’S
HEALTHCARE
SYSTEM
Personal data of 1.5 million
patients, including Prime Minister
Lee 3
“Deliberate, targeted and well-
planned cyber attack … not the
work of casual hackers or criminal
gangs" 4
“We are not able to reveal more
because of operational security
reasons”5
SYMANTEC CALLS SINGHEALTH
HACKER ‘WHITEFLY’
‘Whitefly’ launched targeted
attacks against multiple
organizations 8
CSA comment “As this is an
independent investigation
report by a commercial entity,
we have no comment on its
contents.”9
WHY DIDN’T THEY
IMPOSE
CONSEQUENCES?
Difficulty of attribution?
Lack of capacity to impose consequences?
Diplomatic
Informational
Military
Economic
Financial
Intelligence
Legal
Power imbalance or economic dependence?
ASEAN COOPERATION
IN CYBERSPACE
AMCC DECISIONS
Adopted Norms
Support development of
cyber norms, referring to
2015 UNGGE
2016
Propose
mechanism
Singapore would propose
a mechanism to enhance
ASEAN cyber
coordination
2018
Agree to move
Agreed to move forward
on a formal cybersecurity
coordination mechanism
2019
Checklist
Singapore + United
Nations to draw up a
checklist of steps to
implement cyber norms
2020
Design by PresentationGo
2020 AMCC AGREES TO ACTION
ON NORMS
Singapore + United
Nations to draw up a
Norms Implementation
Checklist with ASEAN
ASEAN to share its
experience and knowledge
with the UN
SG + Malaysia to start
Regional Action Plan (RAP)
Matrix
PROGRAMMES IN MOTION IN ASEAN
Capacity Building Programmes
ASEAN-Singapore Cyber Centre of
Excellence (ASCCE)
ADMM Cyber Info Centre of
Excellence (ACICE)
ASEAN-Japan Cybersecurity Capacity
Building Centre in Thailand
UN-Singapore Cyber Programme
(UNSCP)
Capacity building with US, NL, UK, AU
Confidence Building Measures
Joint training between Member States
to improve communication
ACID Drill (ASEAN CERT Incident Drill)
CYBERCRIME
COOPERATION IN
ASEAN
Interpol Cyber Capabilities & Capacity
Development Project
Operation Night Fury (2019-2020)
- malware targeting e-commerce websites in
ASEAN
- arrest of three individuals in Indonesia
Operation Goldfish Alpha (2019)
- region-wide operations against cryptojacking
targeting routers
- located infected routers, alerted victims and
assisted with patching 78% of the identified
devices
WHAT ARE YOUR
TAKEAWAYS?

More Related Content

What's hot

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
Maganathin Veeraragaloo
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
Denise Bailey
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
Ivanti
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
Anne Oikarinen
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
McKonly & Asbury, LLP
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
 
Red teaming probably isn't for you
Red teaming probably isn't for youRed teaming probably isn't for you
Red teaming probably isn't for you
Toby Kohlenberg
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Amazon Web Services
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
James Wickett
 

What's hot (20)

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
Red teaming probably isn't for you
Red teaming probably isn't for youRed teaming probably isn't for you
Red teaming probably isn't for you
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
From NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdfFrom NIST CSF 1.1 to 2.0.pdf
From NIST CSF 1.1 to 2.0.pdf
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 

Similar to Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 2023.pdf

Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
Team Finland Future Watch
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
Settapong_CyberSecurity
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
Benjamin Ang
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz Asia Pte Ltd
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
JenniferBraun16
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
Eoin Keary
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
Ethical Sector
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Knowledge Group
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
ADISPO Asociación de directores de seguridad
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer
 

Similar to Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 2023.pdf (20)

Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Cybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdfCybersecurity and National Security in Southeast Asia 2022.pdf
Cybersecurity and National Security in Southeast Asia 2022.pdf
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
 

More from Benjamin Ang

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
Benjamin Ang
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
Benjamin Ang
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
Benjamin Ang
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
Benjamin Ang
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Benjamin Ang
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
Benjamin Ang
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Benjamin Ang
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Benjamin Ang
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
Benjamin Ang
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
Benjamin Ang
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
Benjamin Ang
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Benjamin Ang
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Benjamin Ang
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Benjamin Ang
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Benjamin Ang
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
Benjamin Ang
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
Benjamin Ang
 

More from Benjamin Ang (20)

International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...Cooperation between ASEAN military civil academic in international cybersecur...
Cooperation between ASEAN military civil academic in international cybersecur...
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 
Why Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdfWhy Application of International Law Applies to ASEAN.pdf
Why Application of International Law Applies to ASEAN.pdf
 
Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...Lessons learned from Capacity Building on International Cyber Norms in Southe...
Lessons learned from Capacity Building on International Cyber Norms in Southe...
 
Cybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdfCybersecurity and Geopolitical Risk.pdf
Cybersecurity and Geopolitical Risk.pdf
 
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
Cybercrime and Cyber Warfare (and Information Operations) – Your questions an...
 
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine NarrativesDisinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
Disinformation in Southeast Asia and Pro Russian Anti Ukraine Narratives
 
Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...Foreign Interference and National Security - Law Society Public Law conferenc...
Foreign Interference and National Security - Law Society Public Law conferenc...
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Contract law - an infographic view
Contract law - an infographic viewContract law - an infographic view
Contract law - an infographic view
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
Singapore Asean cyber conflict and cybersecurity strategy - for Columbia Univ...
 
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
Legal Technology Vision (Singapore) and the future of legal tech (2020 update)
 
Public education - enhancing the first line of defence against fake news - ...
Public education -   enhancing the first line of defence against fake news - ...Public education -   enhancing the first line of defence against fake news - ...
Public education - enhancing the first line of defence against fake news - ...
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020Internet Society Singapore Chapter AGM 2019 and update for 2020
Internet Society Singapore Chapter AGM 2019 and update for 2020
 

Recently uploaded

Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
bhavenpr
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
CI kumparan
 
Chapter-8th-Recent Developments in Indian Politics-PPT.pptx
Chapter-8th-Recent Developments in Indian Politics-PPT.pptxChapter-8th-Recent Developments in Indian Politics-PPT.pptx
Chapter-8th-Recent Developments in Indian Politics-PPT.pptx
ssuserec98a3
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Mizzima Weekly Analysis & Insight Issue 1
Mizzima Weekly Analysis & Insight Issue 1Mizzima Weekly Analysis & Insight Issue 1
Mizzima Weekly Analysis & Insight Issue 1
Mizzima Media
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
bhavenpr
 
ys jagan mohan reddy political career, Biography.pdf
ys jagan mohan reddy political career, Biography.pdfys jagan mohan reddy political career, Biography.pdf
ys jagan mohan reddy political career, Biography.pdf
VoterMood
 
Short history indo pak 1965 war 1st pd.ppt
Short history indo pak 1965 war 1st pd.pptShort history indo pak 1965 war 1st pd.ppt
Short history indo pak 1965 war 1st pd.ppt
pawan543822
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
bhavenpr
 
Future Of Fintech In India | Evolution Of Fintech In India
Future Of Fintech In India | Evolution Of Fintech In IndiaFuture Of Fintech In India | Evolution Of Fintech In India
Future Of Fintech In India | Evolution Of Fintech In India
TheUnitedIndian
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
ZackSpencer3
 
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptxHISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
aditiyad2020
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
sadiakorobi2
 
27052024_First India Newspaper Jaipur.pdf
27052024_First India Newspaper Jaipur.pdf27052024_First India Newspaper Jaipur.pdf
27052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Slator- Language Industry Intelligence
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
olaola5673
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
contact193699
 

Recently uploaded (20)

Draft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdfDraft-1-Resolutions-Key-Interventions-.pdf
Draft-1-Resolutions-Key-Interventions-.pdf
 
AI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest TrendsAI and Covert Influence Operations: Latest Trends
AI and Covert Influence Operations: Latest Trends
 
Chapter-8th-Recent Developments in Indian Politics-PPT.pptx
Chapter-8th-Recent Developments in Indian Politics-PPT.pptxChapter-8th-Recent Developments in Indian Politics-PPT.pptx
Chapter-8th-Recent Developments in Indian Politics-PPT.pptx
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf01062024_First India Newspaper Jaipur.pdf
01062024_First India Newspaper Jaipur.pdf
 
Mizzima Weekly Analysis & Insight Issue 1
Mizzima Weekly Analysis & Insight Issue 1Mizzima Weekly Analysis & Insight Issue 1
Mizzima Weekly Analysis & Insight Issue 1
 
Resolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdfResolutions-Key-Interventions-28-May-2024.pdf
Resolutions-Key-Interventions-28-May-2024.pdf
 
ys jagan mohan reddy political career, Biography.pdf
ys jagan mohan reddy political career, Biography.pdfys jagan mohan reddy political career, Biography.pdf
ys jagan mohan reddy political career, Biography.pdf
 
Short history indo pak 1965 war 1st pd.ppt
Short history indo pak 1965 war 1st pd.pptShort history indo pak 1965 war 1st pd.ppt
Short history indo pak 1965 war 1st pd.ppt
 
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdfSharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
Sharjeel-Imam-Judgement-CRLA-215-2024_29-05-2024.pdf
 
Future Of Fintech In India | Evolution Of Fintech In India
Future Of Fintech In India | Evolution Of Fintech In IndiaFuture Of Fintech In India | Evolution Of Fintech In India
Future Of Fintech In India | Evolution Of Fintech In India
 
03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf03062024_First India Newspaper Jaipur.pdf
03062024_First India Newspaper Jaipur.pdf
 
Codes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptxCodes n Conventionss copy (1).paaaaaaptx
Codes n Conventionss copy (1).paaaaaaptx
 
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptxHISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
HISTORY- XII-Theme 3 - Kinship, Caste and Class.pptx
 
role of women and girls in various terror groups
role of women and girls in various terror groupsrole of women and girls in various terror groups
role of women and girls in various terror groups
 
27052024_First India Newspaper Jaipur.pdf
27052024_First India Newspaper Jaipur.pdf27052024_First India Newspaper Jaipur.pdf
27052024_First India Newspaper Jaipur.pdf
 
31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf31052024_First India Newspaper Jaipur.pdf
31052024_First India Newspaper Jaipur.pdf
 
Do Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptxDo Linguistics Still Matter in the Age of Large Language Models.pptx
Do Linguistics Still Matter in the Age of Large Language Models.pptx
 
2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts2024 is the point of certainty. Forecast of UIF experts
2024 is the point of certainty. Forecast of UIF experts
 
Preview of Court Document for Iseyin community
Preview of Court Document for Iseyin communityPreview of Court Document for Iseyin community
Preview of Court Document for Iseyin community
 

Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 2023.pdf

  • 1. CYBERSECURITY AND INTERNATIONAL SECURITY IN ASEAN AND SINGAPORE Benjamin Ang Head, Centre of Excellence for National Security and Future Issues in Technology; Head, Digital Impact Research RSIS | NTU | Singapore
  • 2. OUTLINE 1. What does ‘cybersecurity’ mean in ASEAN? 2. Types of cyber threats in ASEAN 3. What are the characteristics of ASEAN cyberspace? 4. How do ASEAN member states cooperate in cyberspace?
  • 3. DEFINITIONS Cybersecurity in the West Confidentiality - Data breach (e.g., OPM) Integrity - Critical infrastructure (e.g., water) Availability - DDOS - Ransomware (e.g., MGM Grand, Colonial pipeline) Priorities in ASEAN Cybercrime and scams Child pornography ‘Fake news’
  • 5. SERVICES IN ASEAN AT RISK Source: Palo Alto ASEAN State of Cybersecurity Report 2023
  • 6. Source: Palo Alto ASEAN State of Cybersecurity Report 2023 IOT, PERSONAL DEVICES, DIGITAL TRANSACTIONS AT RISK
  • 7. CYBER THREAT LANDSCAPE FOR ASEAN Palo Alto State of Cybersecurity Report ASEAN 2022
  • 8.
  • 9. CYBER INCIDENTS IN ASEAN 2020 - 2023 Data breach in Malaysia personal information of over 13,000,000 allegedly from Maybank, Astro Indonesia data breach over 1,000,000,000 Indonesian SIM card data, sold on Dark Web by Bjorka Singapore data of an alleged 2,600,00 user accounts from online marketplace Carousell, sold on Dark Web
  • 10. RANSOMWARE CASES IN ASEAN 2020
  • 11. APTS TARGETING ASEAN FOR ECON/GEOPOL INTELLIGENCE APT Target countries Target entities FunnyDream (C) Malaysia, Philippines, Thailand, Vietnam High-level government organisations; political parties Platinum Indonesia, Malaysia, Vietnam Diplomatic and government entities Cycldek (C) Laos, Philippines, Thailand, Vietnam Government, defence, and energy sectors HoneyMyte Myanmar, Singapore, Vietnam Government organisations Finspy Indonesia, Myanmar, Vietnam Individuals PhantomLance Indonesia, Malaysia, Vietnam Entities Zebrocy (R) Malaysia, Thailand Entities [source: Kaspersky]
  • 12. CYBERCRIME IN ASEAN INTERPOL ASEAN Cybercrime Operations Desk reported increase in 2019 Botnets Phishing Business email compromise (BEC) Banking malware Ransomware Cryptojacking Vulnerability is due to Quicker digital transactions Greater internet connectivity Growing digital economies Asia becoming digital asset hub Lacking cybersecurity investment Low awareness Source: INTERPOL
  • 13. CASE STUDY: CYBER THREAT LANDSCAPE FOR SINGAPORE 2022 Phishing • 8500 • Double from 2021 Ransomware • 132 • 4% less than 2021 Infected Infrastructure • 81,500 • 13% less than 2021 Website Defacement • 340 • 19% less than 2021
  • 14. INFORMATION THREATS IN ASEAN Threat actors  Buzzers (PR companies)  Cyber Troops (government backed)  Cyber criminals (and call centres)  Great powers Examples of information operations  COVID-19 pandemic  Russia / Ukraine war  Israel / Hamas war Drivers  Pro-western sentiment  Anti-western sentiment  Islamist extremists
  • 15. RECENT DEVELOPMENTS IN ASEAN THAT ACCELERATED CYBER THREATS Changes Pandemic WFH Pandemic forced digital transformation More IOT (Smart everything) US-China Great Power Competition Impact More targets online More data on insecure systems used by vulnerable people More reliance on networks Impact on supply chains Benjamin Ang | Centre of Excellence for National Security | RSIS CYBERSECURITY AND NATIONAL SECURITY
  • 17. ASEAN PRINCIPLES & PRIORITIES Mutual respect Non-interference Sovereignty ASEAN states do not pool sovereignty like the European Union  sovereignty and non-intervention are a defence against neo-colonialism Priorities for cooperation  Economic  Political  Security
  • 18. ASEAN MEMBERS ARE DIFFERENT Different legal systems (common, civil, hybrid) Different political systems (democratic, communist, military) Different languages and cultures Different economic and cyber levels Different alliances (US, Russia, China) Different interpretations of cyber
  • 19. CASE STUDY: VIETNAM AIRPORT SCREENS HACKED Cyberattack by 1937CN? 1 They denied responsibility Vietnam Government tells cyber community to show restraint after attack 2
  • 20. CASE STUDY: SINGAPORE’S HEALTHCARE SYSTEM Personal data of 1.5 million patients, including Prime Minister Lee 3 “Deliberate, targeted and well- planned cyber attack … not the work of casual hackers or criminal gangs" 4 “We are not able to reveal more because of operational security reasons”5
  • 21. SYMANTEC CALLS SINGHEALTH HACKER ‘WHITEFLY’ ‘Whitefly’ launched targeted attacks against multiple organizations 8 CSA comment “As this is an independent investigation report by a commercial entity, we have no comment on its contents.”9
  • 22. WHY DIDN’T THEY IMPOSE CONSEQUENCES? Difficulty of attribution? Lack of capacity to impose consequences? Diplomatic Informational Military Economic Financial Intelligence Legal Power imbalance or economic dependence?
  • 24. AMCC DECISIONS Adopted Norms Support development of cyber norms, referring to 2015 UNGGE 2016 Propose mechanism Singapore would propose a mechanism to enhance ASEAN cyber coordination 2018 Agree to move Agreed to move forward on a formal cybersecurity coordination mechanism 2019 Checklist Singapore + United Nations to draw up a checklist of steps to implement cyber norms 2020 Design by PresentationGo
  • 25. 2020 AMCC AGREES TO ACTION ON NORMS Singapore + United Nations to draw up a Norms Implementation Checklist with ASEAN ASEAN to share its experience and knowledge with the UN SG + Malaysia to start Regional Action Plan (RAP) Matrix
  • 26. PROGRAMMES IN MOTION IN ASEAN Capacity Building Programmes ASEAN-Singapore Cyber Centre of Excellence (ASCCE) ADMM Cyber Info Centre of Excellence (ACICE) ASEAN-Japan Cybersecurity Capacity Building Centre in Thailand UN-Singapore Cyber Programme (UNSCP) Capacity building with US, NL, UK, AU Confidence Building Measures Joint training between Member States to improve communication ACID Drill (ASEAN CERT Incident Drill)
  • 27. CYBERCRIME COOPERATION IN ASEAN Interpol Cyber Capabilities & Capacity Development Project Operation Night Fury (2019-2020) - malware targeting e-commerce websites in ASEAN - arrest of three individuals in Indonesia Operation Goldfish Alpha (2019) - region-wide operations against cryptojacking targeting routers - located infected routers, alerted victims and assisted with patching 78% of the identified devices