Internet Security System / image: muskoka411.com

While the Singapore Government is adamant on keeping the identity of the SingHealth cyberattacker a secret from the public, several experts and foreign publications have pinpointed China as the perpetrator of what has been deemed as Singapore’s largest cybersecurity breach to date.

Foreign Minister Vivian Balakrishnan said on Monday (28 Jan) that the decision to keep the identities of the perpetrators behind Singapore’s largest cyber-attack last year is rooted in the need to protect the Republic’s foreign policy, in addition to serving as a potentially unhelpful and counterproductive act against the public healthcare system.

TODAY Online reported Dr Balakrishnan as saying that carrying out an exposé on the cyber-attackers, who launched the attack for “commercial and state advantage”, will not increase the security of the SingHealth system, and will potentially result in negative outcomes for Singapore’s foreign policy should any particular nation-state be named.

Minister for Communications and Information S Iswaran has reiterated on several occasions in Parliament the Government’s prerogative to withhold the identities of the perpetrators of the cyber-attack.

In response to Pioneer Member of Parliament Cedric Foo Chee Keng’s question as to whether the Government could elaborate on the decision behind keeping the perpetrators’ identity a secret, given that there “seems to be a vacuum as far as the sense of justice is concerned”, Mr Iswaran told Parliament on Tuesday (15 Jan) that “in deriving a sense of confidence, our citizens should be looking at the totality of our response and not focus on one particular aspect of the response”.

Mr Iswaran added that the Government has full knowledge of the perpetrators of the cyberattack and that it has taken the “appropriate” course of action, following that discovery.

The Communications and Information Minister had previously stated on 6 Aug last year, in response to Aljunied Member of Parliament Low Thia Khiang’s query regarding the nation-state behind the cyberattack, that the Government will not divulge the identity of the perpetrator for “national security reasons”.

Mr Iswaran told the House: “He [Mr Low] asked whether we are prepared to share the names, if we know specifically whom and whether we are able to then share that. And I would put to the Member that first, I have explained why we have a larger set of concerns around this matter.

“Secondly, in this sort of matter, whilst one can have a high level of technical confidence, one may not be able to have the certainty that you might need in order to specifically assign responsibility.

“And this is the kind of evidentiary threshold that may not stand up in a court of law, but at the operational level, the agencies that are involved have a high level of confidence in their findings.

“Having said that, we do not think it serves our national interest, nor is it a productive exercise for us to be making specific public attribution. What is essential is that we diagnose the problem clearly and take the appropriate steps.

“And if, in the process of the COI deliberations, specific attribution can be made in a manner where action can subsequently be taken up in a court of law, we will certainly consider that course of action,” stressed Mr Iswaran.

China purportedly behind SingHealth cyberattack, among other cyberattacks on other nations’ major healthcare databases, according to experts and foreign publications

Experts and foreign publications, however, have pinpointed a world superpower as the perpetrator behind Singapore’s largest cybersecurity breach to date.

On 21 Aug last year, Nikkei Asian Review named China as the nation-state responsible behind the SingHealth cyberattack.

Quoting Head of the Cyber Policy Centre at the Australian Strategic Policy Institute Fergus Hanson: “It certainly fits with a pattern of Chinese Communist Party cyberactivity”.

Mr Hanson noted that Beijing has also been accused of “other major healthcare hacks” in the United States.

Matt Palmer of risk consultancy firm Willis Towers Watson, however, credited Singapore authorities for managing to detect the SingHealth cybersecurity breach “in a matter of days”, adding that the cyberattack on a nation as well-prepared as Singapore in terms of cybersecurity serve as “a wake-up call globally”.

According to a survey by U.S. cybersecurity company FireEye, the median time from breach to discovery was 498 days last year among Asia-Pacific governments.

Professor of public ethics at Charles Sturt University and author of Silent Invasion: China’s Influence in Australia Clive Hamilton wrote in an article published on the Australian Financial Review on 13 Jan that “security agencies around the world have noticed an alarming spike of cyberattacks aimed at health records, with state-based actors in China the leading suspects”.

“Last July, it was reported that 1.5 million medical records were stolen in Singapore in a cyberattack experts believe came from state-based hackers in China,” he noted.

“The Singapore data theft followed a massive hack in 2014 that sucked up the personnel records of millions of Americans, and the theft of 4.5 million health records from a Tennessee-based hospital chain in the same year.

“In the same year, the medical records of an unspecified number of Australian soldiers, including special forces operating overseas, were sent to China by a health contractor that also has facilities in Guangdong,” he added.

Prof Hamilton added that such cyberattacks are a result of Chinese firms being compelled “by the law to obey directives from Beijing’s intelligence agencies”.

However, he opined that “Beijing’s security services would not need to hack into My Health Record” – which is Australia’s new public online medical database – in order to get their hands on the the medical data.

Prof Hamilton suggested that “An easier route would be to suborn an employee of a Chinese-owned healthcare provider in Australia to copy a database and hand it over, or to plug in a USB that installs malware”.

He added: “Some Chinese investors have said they are particularly interested in the big data processing and artificial intelligence capabilities of Australian companies, including use of Australian patient data to develop systems for Chinese hospitals.

While Chinese companies such as The Jangho Group, a Shanghai-based building supplies firm, “may have entirely legitimate intentions when they buy up assets in Australia”, Prof Hamilton noted that “Chinese citizens and companies are obliged to participate in “intelligence work” if asked to do so, even when abroad”.

“In addition, every major Chinese company has a Communist Party cell operating in it. The Party secretary often doubles as chair of the board.

“This is the reality of the “corporate-state conglomerate” in China under President Xi Jinping,” said Prof Hamilton.

Prof Hamilton acknowledged the potential economic benefits of “Chinese investment in Australia’s healthcare sector”, which include “bringing new funds, stimulating the export of expertise and helping expansion into the booming Chinese market”.

However, he warned that “these [economic benefits] must be balanced against the risks to national security”.

“The specific risk of giving Chinese companies direct access to Australian medical records is that China’s intelligence services could access those records for information on current or future political, military and public service leaders in order to blackmail them, as posited by Prime Minister Lee Hsien Loong in the aftermath of the SingHealth cyberattack: “I don’t know what the attackers were hoping to find. Perhaps they were hunting for some dark state secret, or at least something to embarrass me.”

“Some may have psychiatric conditions or be on mental health plans. They may have sexually transmitted diseases. Data on medications would be enough. Publication of such sensitive information could wreck careers and make those who have been compromised open to coercion,” Prof Hamilton further cautioned.

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

似乎不了解禁令仅限电动滑板车 妇女推车徒步缓行网民心酸

前日,国会正式颁布禁令,不准电动滑板车在人行道上行驶,惟脚车和电动轮椅等代步工具(Personal Mobility Aids),仍可在人行道、脚车道和公园连道使用。 不过有网民发现,一位行动不便的妇女,可能是对禁令不甚了解,而在行人道上慢慢地推着行动辅助器、一拐一拐地行走,令见者都不免心酸。 一名网友于昨日(11月5日)下午5时许,在Helloあsia Singapore脸书群组上传了一段,只有短短六秒的视频。   视频拍摄者相信是乘坐着行驶中的车子,只见一名很穿暗色系的穆斯林妇女手推着一辆三轮的行动辅助器,在人行道上缓慢前行,行动非常不方便。 上载者也在视频中写道,“看了都让人心酸”。 这视频在15个小时内就获得七万人观看,2500人转发,以及305个留言。 呼吁撤下有关视频 有网民感叹禁令实施的不合时宜,“害惨了阿姨这群体的人士”。…

Straits Times supports Ministers and criticises PSP Leong for not retracting statements against CECA

Two weeks ago (6 Jul), a heated debate over India-Singapore Comprehensive Economic…

蔡厝港械斗事件:13人被逮捕,五人被控上法庭

日前,蔡厝港德惠巷101座組屋附近发生可怕械斗事件,反恐紧急应对部队出动,警方将13名嫌疑人逮捕归案。该13名嫌疑人于2月29日被控上法庭,而第14名嫌疑人在近日被逮捕后,于今日(4日)被起诉。 事发当时,两群人正在械斗,其中一群人含至少八人,手握刀和手杖,而另一群则至少有5人,携带巴朗刀(Parang),双方正在互相殴打。 由于当时大批人员正在械斗,附近的居民也纷纷将其拍下,甚至录影,有目击者拍到当时有一群人正对着一名男子殴打,也有目击者拍到当时嫌疑人正在组屋下四处走动并大声叫嚣。 随后,警方便全副武装抵达现场,准备缉拿闹事者。 事发后,一名自称是伤者妹妹的人表示,自己的哥哥的尾指已经断了,并拍下视频,以马来文表示,“是谁将我哥哥的手指砍断,我一定把你揪出来,你给我小心点。”视频显示,那名男子的手掌被开了道很深的口子,血流如注。 2月29日,13名嫌疑人均被控上法庭,包括两名18岁的少年法汗、海克尔,以及20岁的罗斯兰被指使用致命武器闹事,违反刑事法典第148条,一旦罪成,将可被判最高10年加鞭苔。 而另两名则是18岁的萨法力与17岁的扎希鲁丁,被指非法集会与携带致命武器,若罪成,将可判处最高五年监禁或罚款。 而第14名嫌疑人赫尔米则被指违反《腐蚀性、爆炸性物质及进攻性武器法》,一旦罪成,将可判处最高三年以上监禁,和至少鞭苔六下。 五名嫌疑人今日也随同警方重返现场,讲述事情经过。 目前案件仍在侦办中,以确定其余8人或更多嫌疑人涉案。