Singapore’s Mounting Cyber Threats

Security agencies will find it increasingly challenging to deal with the threat of terrorism, as terrorists can now easily access sophisticated capabilities through the internet or dark web, said Senior Minister of State for Defence and Foreign Affairs Mohamad Maliki Osman.

In the face of such non-traditional security challenges, regional militaries have to step up cooperation and adapt to the new security environment, he added in a speech recently at the S Rajaratnam School of International Studies’ 19th Asia-Pacific Programme for Senior Military Officers (APPSMO).

Below is an excerpt from his speech.

The world has experienced an eventful year of turbulence and security challenges. Allow me to share some perspectives on our increasingly complex security environment.

Ongoing conflicts continue to simmer and threaten regional peace and security.

All of us are deeply concerned by the series of deliberate and provocative actions by North Korea, including the two nuclear tests in January and September last year, as well as what appears to be a ballistic missile just last week.

While Singapore is not a major player on the Korean Peninsula, we watch developments there keenly as any disruption to peace and stability on the Peninsula could destabilise the whole region.

Any miscalculation could have devastating consequences and upset the existing rules-based international order that has allowed peace and security to flourish in the Asia-Pacific for the last few decades. We hope the major players on the Korean Peninsula can find a way to resume dialogue and prevent the situation from deteriorating.

Over the past one year, we have also seen a proliferation of non-traditional security threats, such as cyber and terrorist attacks.

On cyber-security, I’m sure all of you present are aware of the recent Wannacry and Petya attacks which crippled the critical infrastructure of some states and shut down numerous businesses around the world.

The damage from such attacks would be incalculable for many countries, especially as we become more and more reliant on computer networks and the internet.

Terrorism is also increasingly becoming a key threat to our region.

While we are seeing a defeat of ISIS militarily in Iraq and Syria, we are also witnessing a re-emergence of terrorism in the Asia-Pacific.

ISIS has intentions to establish a caliphate in our region too. It has been estimated that more than 1,400 Southeast Asian citizens have travelled to Iraq and Syria to support ISIS, and a large proportion of this number could return after the defeat of ISIS in the Middle East.

There have been an increasing number of attacks claimed by ISIS in Southeast Asia in recent years, such as a grenade attack in Malaysia in June last year and the Jakarta bombing in May this year.

The ongoing siege in Marawi is a reflection of the increasing likelihood of the violent extremism spreading from the Middle East to the Asia-Pacific.

In addition, regional terror groups are well-funded, using charities and non-profit groups as a cover to support terrorism. The ease with which terrorists can conduct small-scale attacks with everyday materials, such as pipe bombs, is also a significant concern.

For example, in Marawi, unlike previous incidents with Abu Sayyaf that were typically kidnappings for ransom, the current Abu Sayyaf is well-armed, well-organised and well-funded by ISIS.

It is supported by funding from illegal drug trafficking networks and a very complex and sophisticated chain of command that runs from Syria, through the Philippines, to Indonesia and elsewhere in the region.

As of early June, the death toll was about 100 including terrorists, government troops and civilians. While the actual fighting is limited to Marawi for now, the trafficking and funding ties, as well as the spillover of terrorist insurgencies, to other parts of Southeast Asia and beyond is a significant source of concern.

The barrier for such terrorist elements to access sophisticated capabilities ranging from cyber to biological and chemical weapons is also lower as they are easily available through the internet or dark web.

This will have a concomitant impact on the security and stability of our region. Militaries and Homeland Security forces will also find themselves increasingly hard-pressed to deal with such adversaries as they gain almost “near-peer” capabilities.

The modus operandi of terrorists is also constantly evolving. ISIS has been very effective in its use of social media thus far.

For example, ISIS has adapted its propaganda material into various languages to cater to the different populations in our region. We are also witnessing increasing sophistication in ISIS’ use of the internet.

Recently, ISIS started creating its own social media platforms to avoid security crackdowns on their communications, as companies like Facebook and Twitter start clamping down on ISIS’ accounts.

An equally great concern for us in this regard is the challenge of fighting self-radicalisation of individuals as they are exposed to radical ideologies via the Internet. Linked to this is how we should strengthen the resilience of our people in the face and aftermath of such terrorist attacks.

Role of Armed Forces Today

In the face of such non-traditional security challenges, how relevant are the armed forces, which have traditionally been structured for full-on conventional warfare.

As conventional conflicts become increasingly unlikely, how prepared are our Armed Forces to address the new challenges in today’s security environment?

The fight against terrorists has moved beyond the frontlines in Iraq, Syria and Afghanistan and come closer to home.

As seen from the Paris attacks, these terrorist attackers are striking in cities, where the terrain is significantly more complex and challenging – urban, high rise, and densely populated areas where militaries are unable to bring the full range of their capabilities to bear.

At the same time, homeland forces may find themselves overwhelmed should these attackers be equipped with military grade capabilities. Militaries will need to find ways to adapt to the new security environment.

The Singapore Armed Forces is therefore building a SAF Training Institute City (SAFTI City), to train our battalions to fight across both conventional and urban terrains successively.

The SAF also recognises that counter-terrorism is a Whole-of-Government endeavour which requires seamless interagency coordination, underpinned by an effective legal framework.

Unfortunately, the threat of terrorism is no longer simply confined to kinetic attacks.

With the availability of cyber tools leaked from the US National Security Agency, terrorists now possess advanced cyber weapons that can take out critical infrastructure and retrieve sensitive military information even as they perpetrate their attacks with devastating impact.

In this regard, it is also important for a country’s cyber infrastructure and defence to be adequately prepared. The Ministry of Defence is in the midst of establishing the Defence Cyber Organisation, which will have about 2,600 soldiers when it is fully stood up.

Regional Cooperation

To counter the cross-border nature of these emerging threats and maintain the existing rules-based international order, Singapore is fortunate to enjoy strong support and cooperation from our friends and partners around the world.

In particular for our region, we have multilateral platforms like the Asean Defence Ministers Meeting (ADMM) and ADMM-Plus to build confidence and interoperability.

Besides addressing non-conventional threats, the ADMM and ADMM-Plus are also valuable platforms in our regional security architecture to build trust and confidence among regional militaries.

As Singapore assumes the ADMM Chairmanship in 2018, we hope to promulgate common guidelines across the maritime and air domains as confidence-building mechanisms for our militaries to reduce tensions and the risk of miscalculations in the region. This is particularly pertinent as the maritime and air traffic in the Asia-Pacific increases with the rising development and prosperity of countries in the region.

In this regard, we hope to expand the Code for Unplanned Encounters at Sea, or CUES in short, to all ADMM-Plus countries. We also hope to establish a set of guidelines for air encounters between military aircraft, akin to the US-China Memorandum of Understanding on the Rules of Behaviour for Safety of Air-to-Air Encounters.

These confidence building mechanisms would be practiced during upcoming ADMM-Plus Exercises, such the maritime security exercise that Singapore will co-organise with the Republic of Korea.

In addition, CUES would also be practiced during the ASEAN-China Maritime Exercise that Singapore will facilitate in our capacity as the ASEAN-China Dialogue Relations Coordinator.

As we grapple with the threat of terrorism, regional countries will have to come together to shoulder this collective responsibility.

Closer cooperation with each other is critical especially as terror attacks could be planned or even launched from one country to damage another.

Last year, Singapore convicted four Bangladeshi nationals who plotted to finance terror attacks in their own home country. We also saw an ISIS-linked group plotting to launch a rocket attack on Singapore from the island of Batam.

Singapore and Indonesia worked closely together to foil the attack and arrest the group.

As Malaysian Defence Minister Hishammuddin Hussein rightly said, such joint initiatives and cooperation will show ISIS that they are not just facing individual countries but a united Southeast Asia.

Intelligence sharing is also essential in countering the threat of terrorism.

Given the transnational nature of terrorist threats, no one country has the bandwidth to identify all the threats out there. The only way we can address this is if countries pool our resources together and share intelligence.

During my visit to Indonesia in June this year, the Indonesian Defence Minister General Ryamizard Ryacudu suggested to develop a regional framework for intelligence sharing, joint training and exercises on counter-terrorism.

Hisham and I think that this is a good and timely idea given the increasing terrorist threat, exemplified by the Marawi situation in the Philippines.

Beyond the Asia-Pacific region, we also recognise the global nature of threats like terrorism and cyber-attacks. In this regard, we welcome all our partners to also share their experiences and ideas through professional exchanges and exercises between militaries.

Of course, aside from the military exercises that we conduct, dialogue is also important. Particularly in times when we may not always agree on the way forward, we can leverage platforms like the Shangri-La Dialogue and APPSMO. These are useful in developing shared perspectives on security threats and finding constructive solutions.

Today Online:

You Might Also Read:

Singapore Defense Ministry Under Remote Attack:

Australian Government Networks Hacked:

« Australian Spy Data Helps Business Cyber Threats
The US Power Generation System Is Under Siege »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

SafenSoft (SnS)

SafenSoft (SnS)

SafenSoft delivers high-efficiency, low-impact proactive protection against malware, insider threats, and confidential data leakage.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.