- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Liam Nevill on December 2, 2015 @ 11:51
This week marks the first anniversary of the Australian Cyber Security Centre. Launched by former prime minister Tony Abbott, the ACSC had a busy year. According to this Department of the Prime Minister and Cabinet press release, [2] 2016 will be another big one as initiatives from the yet-to-be-released Cyber Security Review and Strategy increase ACSC’s engagement with the private sector.
In its new National Security Strategy and Strategic Defence and Security Review [3], the British Government has announced that it’ll renew the country’s Cyber Security Strategy in 2016 and establish its own National Cyber Centre, led by GCHQ. This comes several days after Chancellor of the Exchequer George Osborne announced [4] an increase cyber security spending to £1.9 billon by 2020 to develop sovereign cyber capability and protect the UK. This additional investment is almost double previous funding, and brings the UK’s total spending on cyber security to £3.2 billion. It’s not apparent if GCHQ’s latest recruitment campaign of spray painting pavements [5] is part of this program.
Anonymous’ counter daesh campaign #OpISIS has been canned by rival Ghost Security Group [6], who slammed the amateurish tactics of Anonymous and the limited effectiveness of the movement. Anonymous has targeted Twitter accounts related to daesh, claiming to have shut down more than 20,000 accounts [7] and has posted lists compiled of daesh-related Twitter accounts. However Twitter hasn’t reviewed the lists, noting that third party reviews have found them to be inaccurate [8]. Perhaps more effective has been the campaign by users of 4Chan to replace images of daesh fighters with pictures of rubber ducks. [9]
With the debate on privacy vs security reignited by the Paris attacks, The Economist [10] has made some interesting points about the value of encryption for an open internet and the protection of personal privacy. There’s been a similar debate in Canada. Royal Canadian Mountain Police Commissioner Bob Paulson has warned that police can do little to prevent or protect people from cyber crime [11] because of the need to gain warrants to collect basic information about people’s online activities. Paulson wants Canadian police to have warrantless access to subscriber information, but stated he doesn’t agree with any additional powers that might interfere with privacy.
Following the September deal between presidents Obama and Xi to have ministerial-level cybersecurity discussions, Chinese state media has reported on a high-level dialogue [12] between the Secretary of Homeland Security, Jeh Johnson, and Chinese Minister for Public Security, Guo Shegkun, to strike a deal on cyber crime cooperation. Despite the possibility of cooperation, Commander of US Cyber Command and head of the NSA Admiral Mike Rogers warned China at the Halifax Security Forum that it wasn’t immune to cyber attack [13], and that it should remain cognisant of this vulnerability in its broader security policy and actions.
The Washington Post has reported that Chinese PLA cyber-espionage [14] has in fact decreased since five of its officers were indicted in May 2014, but that the Ministry of State Security has continued undeterred by US legal actions. China’s cyber espionage capabilities were on show during the ongoing campaign to shut down pro-democracy campaigners in Hong Kong, with US firm FireEye reporting on new tactics to lure victims with infected Dropbox files [15]. FireEye has previously connected DDoS attacks on pro-democracy newspaper Apple Daily with the Chinese government. Iranian hackers have also reportedly targeted State Department officials [16] involved in designing and implementing the Joint Comprehensive Plan of Action. Victims were alerted by a new Facebook feature [17] that alerts people Facebook believes were targets of state actors.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-99/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/12/10266723935_416cca2cd8_z.jpg
[2] press release,: https://www.dpmc.gov.au/pmc/media/2015/australian-cyber-security-centre-celebrating-year-operations
[3] National Security Strategy and Strategic Defence and Security Review: https://www.gov.uk/government/publications/national-security-strategy-and-strategic-defence-and-security-review-2015
[4] Chancellor of the Exchequer George Osborne announced: https://www.gov.uk/government/news/chancellor-sets-out-vision-to-protect-britain-against-cyber-threat-in-gchq-speech
[5] latest recruitment campaign of spray painting pavements: http://www.theguardian.com/cities/2015/nov/23/shoreditch-spies-why-does-gchq-want-to-hire-hipsters
[6] canned by rival Ghost Security Group: http://www.news.com.au/technology/online/hacking/ghost-security-group-claims-anonymouss-tactics-are-not-working/news-story/311002b42259faac63ca936ba5ce225c
[7] claiming to have shut down more than 20,000 accounts: http://arstechnica.com/tech-policy/2015/11/whos-isis-anonymous-opparis-campaign-against-islamic-state-goes-awry/
[8] noting that third party reviews have found them to be inaccurate: http://www.dailydot.com/politics/twitter-isnt-reading-anonymous-list-isis-accounts/
[9] replace images of daesh fighters with pictures of rubber ducks.: http://www.telegraph.co.uk/news/worldnews/islamic-state/12022424/Islamic-State-4Chan-puts-rubbers-ducks-on-Isil-heads.html
[10] The Economist: http://www.economist.com/news/briefing/21679266-how-balance-security-privacy-after-paris-attacks-terrorist-data?fsrc=scn/tw/te/pe/ed/theterroristinthedata
[11] police can do little to prevent or protect people from cyber crime: http://ottawacitizen.com/news/politics/we-cant-protect-public-from-cyber-crimes-rcmp-boss
[12] Chinese state media has reported on a high-level dialogue: http://www.scmp.com/news/china/diplomacy-defence/article/1885101/chinese-public-security-chief-heads-us-talks-cybercrime
[13] warned China at the Halifax Security Forum that it wasn’t immune to cyber attack: http://thediplomat.com/2015/11/us-cyber-commands-veiled-threat-china-vulnerable-in-cyberspace/
[14] The Washington Post has reported that Chinese PLA cyber-espionage: https://www.washingtonpost.com/world/national-security/following-us-indictments-chinese-military-scaled-back-hacks-on-american-industry/2015/11/30/fcdb097a-9450-11e5-b5e4-279b4501e8a6_story.html?postshare=4381448907435154&tid=ss_tw
[15] with US firm FireEye reporting on new tactics to lure victims with infected Dropbox files: http://www.smh.com.au/it-pro/security-it/cyber-spies-raise-their-game-against-prodemocracy-chinese-20151129-glb2ad.html
[16] Iranian hackers have also reportedly targeted State Department officials: http://www.nytimes.com/2015/11/25/world/middleeast/iran-hackers-cyberespionage-state-department-social-media.html
[17] new Facebook feature: http://www.theguardian.com/technology/2015/oct/19/facebook-warn-users-state-spying-hackers
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.