- The Strategist - https://aspistrategist.ru -

Cyber wrap

Posted By on July 22, 2015 @ 12:25

AshleyMadison [1]

Tony Abbott’s Telecommunications Sector Security Reforms continue [2]s to cause angst with major telco and tech firms. The proposed amendments [3] to legislation including the Telecommunications Act and Telecommunications (Interception and Access) Act would force telcos to supply security agencies with details of proposed supplier arrangements and purchases, and give government the authority to veto purchases deemed to pose a threat to national security. Three major  telco industry groups have developed a joint submission to the Attorney‑General criticizing the reforms as unecessary and disproportionate.

Meanwhile more Australian companies are seeking insurance to mitigate the risks of a cyber incident, although brokers have warned [4] that insurance cannot replace proper risk management practices. This is advice backed up by former GCHQ Director Sir David Ormand and NSA chief Admiral Mike Rogers who warned [5] London city financial firms that even the most cyber secure companies must assume their cyber defences will be breached at some point.

Paul Coyer from Forbes [6] has written a great piece discussing the dynamics of the US–China cyber relationship. Coyer points out that China’s behaviour in cyberspace and international cyber security discussions is driven by a deep sense of vulnerability in the face of America’s enormous technological advantage—a feeling that has grown as the full extent of the relationship between major US hardware and software firms and the NSA was revealed by Edward Snowden. China’s National Security Law and Cyber Security Law, discussed last week [7], is clearly informed by this insecurity, emphasising the principle of sovereignty in the information space and its links to national security.

The Hacking Team [8] breach has highlighted existing concerns about the transfer of cyber surveillance technology across borders. Mari Batashevski [9] has published a long piece on the role that Hacking Team and similar firms, often Israeli, play in installing and operating cyber surveillance systems in states like Uzbekistan and Kazakhstan. Back in May [10] the US Commerce Department released draft regulations that require permits to export encrypted software and cyber surveillance technologies, based on principles agreed by Wassenaar Arrangement [11] members (including Australia) in December 2013. Some US tech firms have criticised [12] the proposed regulations as flawed.

This week brings news of another data spill from a very sensitive target. AshleyMadison [13], the infamous website for those seeking ‘something on the side’ fell victim to a group called the Impact Team. The hackers apparently took action because Avid Life Media—AshleyMadison’s parent company—was advertising a ‘full delete’ feature for customer profiles but failing to actually delete all the data. Whether the Impact Team were truly upset by AshleyMadison’s supposed shonkiness, or just wanted to take down a target that prominently touted its security and privacy protection credentials is yet to be determined. Regardless, count it as another data spill that could prove awkward for many of its victims.

And finally our friends at CSIS have published a report [14] on the development of cyber security regulations for the US financial industry.



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /cyber-wrap-80/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/07/8654888696_82f615fb41_z.jpg

[2] continue: http://www.smh.com.au/business/abbott-buys-a-fight-on-overreach-plans-for-cyber-security-20150716-gidwqd.html

[3] amendments: http://www.ag.gov.au/Consultations/Pages/Telecommunications-Sector-Security-Reforms.aspx

[4] warned: http://www.afr.com/technology/more-companies-seeking-safety-in-cyber-insurance-20150720-gif06q

[5] warned: http://www.theregister.co.uk/2015/07/20/patriotic_russian_hackers_are_coming_for_you_exgchq_head_tells_stock_exchange/

[6] Forbes: http://www.forbes.com/sites/paulcoyer/2015/07/19/the-opm-data-breach-and-sino-american-competition/

[7] week: https://aspistrategist.ru/cyber-wrap-79/

[8] Hacking Team: http://www.npr.org/sections/thetwo-way/2015/07/06/420554427/controversial-italian-cyber-espionage-company-is-hacked

[9] Mari Batashevski: https://medium.com/vantage/panopticon-for-sale-c2fc662d85d2

[10] May: https://www.federalregister.gov/articles/2015/05/20/2015-11642/wassenaar-arrangement-2013-plenary-agreements-implementation-intrusion-and-surveillance-items

[11] Wassenaar Arrangement: http://www.wassenaar.org/participants/index.html

[12] criticised: http://www.npr.org/sections/alltechconsidered/2015/07/20/424473107/commerce-department-tighter-controls-needed-for-cyber-weapons

[13] AshleyMadison: https://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/

[14] report: https://csis.org/publication/evolution-cybersecurity-requirements-us-financial-industry

Copyright © 2024 The Strategist. All rights reserved.