- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Zoe Hawkins on October 5, 2016 @ 12:30
The inaugural Australia-US Cyber Security Dialogue was held in Washington D.C., by CSIS and ASPI the week before last. The event, announced [1] by Prime Minister Turnbull and President Obama in January, brought together senior representatives from government, the private sector and academia to discuss common challenges and opportunities in cyberspace. The dialogue covered cyber developments in the Asia–Pacific, the fight against cybercrime and practical methods of advancing an innovative and secure digital economy for both countries. At the close of the dialogue, Prime Minister Turnbull delivered a keynote address followed by remarks from the US Secretary of Homeland Security Jeh Johnson. Check out the full speeches here [2] and standby for upcoming blog pieces that will offer an insight into the dialogue discussions.
ICPC also launched its new report Cyber Maturity in the Asia-Pacific 2016 [3] at New America [4] in Washington DC last week. Peter W. Singer moderated an expert panel, including ICPC’s Dr Tobias Feakin, Denise Zheng of CSIS and Ryan Gillis from Palo Alto Networks, to discuss the findings of the report and broader themes of regional cyber policy development. Check out full video here [5].
While we were away, it was revealed [6] that Yahoo! suffered a cybersecurity breach dating back to 2014. The breach exposed the names, emails, phone numbers, birthdays and encrypted passwords of at least 500 million customers—making it ‘the biggest hack the world has ever seen [7]’. Apparently, the organisation’s lazy approach [8] to security in favour of more convenient user-friendly methods is what led to this headline-grabbing cyber incident. Such negligence has prompted several lawsuits [9], as well as a critical open letter [10] from six US senators, demanding that Yahoo! answer specific questions on how the breach came about and was subsequently handled by the organisation. Meanwhile, rumours are circulating over the true scale of the incident, with a former company insider putting the figure at between one to three billion [11] compromised accounts. And in terms of attribution, the act was originally cast [12] as being state-sponsored, however a recent cybersecurity firm report points the finger [13] at an eastern European crime gang thought to be selling the data onto third parties. While at first glance the breach looks like a simple case of corporate incompetence, latest reports suggest [14] the incident may have had something to do with an intelligence sharing arrangement the company had with the US government, involving the routine scanning of millions of customer emails. Well, now that’s awkward for everyone.
Staying stateside, the first of three presidential debates took place [15] last week featuring White House hopefuls Hillary Clinton and Donald Trump, with ‘the cyber’ briefly taking centre stage. Sadly, the candidates’ cybersecurity debate was content-light to put it mildly, mostly circling around the attribution of the DNC hack [16], with Clinton pointing the finger squaring at Moscow and Trump putting forward the ‘400-pound hacker’ as his best guess. Critics were left listing [16] cyber issues that deserved serious attention at the debate, such as encryption, data-breach disclosures and protection of critical national infrastructure. Nevertheless, other experts were simply pleased [17] cybersecurity made it onto the agenda. You can watch all seven enlightening minutes of the cybersecurity segment here [18].
At midnight on 30 September, after years of planning and discussion, the Internet Assigned Numbers Authority (IANA) function of the US National Telecommunications and Information Administration (NTIA) was handed over [19] to the Internet Corporation for Assigned Names and Numbers (ICANN). The IANA functions underpin [20] the operation of the global internet allowing users to search names rather than numeric addresses to find information (e.g. aspistrategist.ru instead of 104.20.14.180). NTIA, part of the Department of Commerce, previously contracted ICANN to manage its IANA responsibilities. The move to hand over these functions to ICANN is the culmination of a policy announced in 1998 [21] by the US government to transition management of the Internet’s domain name system to the international multistakeholder community. The process was met with opposition [22], including failed eleventh hour injunction filed by Ted Cruz [23] and three other Republican state attorney generals to stop the process. The injunction was a last minute effort by Cruz after his attempt to convince Congress [24] to include a rider to its continuing resolution preventing the transfer also failed.
Closer to home, it’s been reported that the Australian government has experienced another data-breach incident overnight. The information of more than 96,000 public servants has been compromised [25] from the APS internal staff census, with confirmation that the data-set was downloaded almost 60 times before the information was taken down. The news comes less than a week after an embarrassing leak [26] of patients’ health records in a Medicare data breach by the Health Department, which is now being investigated [27] by the Australian Privacy Commissioner Timothy Pilgrim.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-137/
URLs in this post:
[1] announced: https://aspistrategist.ru/aspi-and-csis-to-bring-together-new-australia-us-cyber-security-dialogue/
[2] here: https://www.csis.org/events/deepening-us-australia-cyber-security-cooperation
[3] Cyber Maturity in the Asia-Pacific 2016: https://www.aspistrategist.ru/publications/cyber-maturity-2016
[4] New America: https://www.newamerica.org/
[5] here: https://www.newamerica.org/cybersecurity-initiative/events/cybersecurity-asia-pacific/
[6] revealed: http://fortune.com/2016/09/22/yahoo-hack/
[7] the biggest hack the world has ever seen: http://www.csoonline.com/article/3123668/data-breach/the-massive-yahoo-hack-ranks-as-the-worlds-biggest-so-far.html
[8] lazy approach: http://www.nytimes.com/2016/09/29/technology/yahoo-data-breach-hacking.html?smid=tw-share&_r=1
[9] several lawsuits: https://www.bloomberg.com/news/articles/2016-09-23/yahoo-s-massive-data-breach-draws-negligence-lawsuit-by-user
[10] critical open letter: https://www.leahy.senate.gov/press/in-wake-of-massive-data-breach-affecting-millions-of-customers-leahy-leads-senators-in-pressing-yahoo-for-answers
[11] one to three billion: http://www.businessinsider.com.au/yahoo-insider-hacking-2016-9?r=US&IR=T
[12] originally cast: http://www.abc.net.au/news/2016-09-23/yahoo-hack-hit-500-million-users-likely-state-sponsored/7870534
[13] points the finger: http://fortune.com/2016/09/29/yahoo-hacked-by-eastern-european-gang-cybersecurity-firm-says/
[14] reports suggest: http://www.reuters.com/article/us-yahoo-nsa-exclusive-idUSKCN1241YT
[15] took place: http://www.govtech.com/security/Presidential-Debate-2016-Cybersecurity-Highlights-Significant-Differences-in-Policy-Understanding-Between-Candidates.html
[16] attribution of the DNC hack: http://finance.yahoo.com/news/heres-the-cybersecurity-debate-hillary-and-clinton-should-have-had-212742019.html
[17] pleased: http://venturebeat.com/2016/09/27/heres-what-trump-and-clinton-had-to-say-about-cybersecurity-and-cyberwarfare-in-the-debate/
[18] here: http://abcnews.go.com/Politics/video/clinton-trump-debate-cybersecurity-hacks-42379073
[19] was handed over: http://www.theregister.co.uk/2016/09/30/internet_handover_is_go_go_go/
[20] underpin: http://www.ntia.doc.gov/other-publication/2014/iana-functions-and-related-root-zone-management-transition-questions-and-answ
[21] policy announced in 1998: http://www.ntia.doc.gov/files/ntia/publications/6_5_98dns.pdf
[22] was met with opposition: https://www.techdirt.com/articles/20160930/15440635670/judge-says-no-way-to-attorneys-general-looking-to-block-iana-transition.shtml?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+techdirt%2Ffeed+(Techdirt)
[23] filed by Ted Cruz: http://www.thehostingnews.com/iana-transition-moves-ahead-according-to-plan-despite-opposition.html
[24] attempt to convince Congress: http://domainnamewire.com/2016/09/30/court-rejects-last-minute-plea-halt-iana-contract-handover/
[25] compromised: http://www.canberratimes.com.au/national/public-service/96000-public-servants-in-new-data-breach-20161004-grul2p.html
[26] leak: http://www.abc.net.au/news/2016-09-29/medicare-pbs-dataset-pulled-over-encryption-concerns/7888686
[27] investigated: http://www.cio.com.au/article/607709/privacy-commissioner-investigates-data-privacy-breach-health-department/
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.