{"id":10705,"date":"2013-11-13T13:30:48","date_gmt":"2013-11-13T02:30:48","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=10705"},"modified":"2013-11-14T11:07:09","modified_gmt":"2013-11-14T00:07:09","slug":"cyber-wrap-8","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"\"<\/a><\/figure>\n

Western intelligence agencies are finding themselves under increasing public scrutiny from lawmakers as the fallout of the Snowden leaks continues. In the UK, the heads of the three national intelligence agencies appeared at an open hearing<\/a> of the Intelligence and Security Committee<\/a>, usually conducted in-camera<\/i>. Their testimony, which The Guardian<\/i> panned as \u2018choreographed\u2019<\/a>, revealed the deep concerns about the loss of capability caused by the Snowden leaks in the UK intelligence community, with GCHQ chief Sir\u00a0Iain Lobban revealing that GCHQ had monitored conversations between intelligence targets discussing alternate communications methods to avoid electronic surveillance. Lobban defended GCHQ\u2019s activities and the \u2018proportionate\u2019 nature of the surveillance, rejecting any inference that the agency\u2019s operations broke the law.<\/p>\n

The US intelligence community is also facing increasing calls<\/a> for major structural reform, specifically splitting up US Cyber Command and the NSA to slow the \u2018militarisation\u2019 of cyberspace by the combined intelligence and cyber warfare behemoth.<\/p>\n

Disclosure of US and UK cyber espionage tools and techniques has continued, such as the use of a practice known as \u2018Quantum Insert\u2019<\/a> to manipulate copies of legitimate websites such as LinkedIn to gain access to target computers. In the US, the New York Times has reported<\/a> on the dawning realisation within the Obama administration that despite significant opposition to mass data collection, it must continue, at least for the meantime, as there is no replacement capability that can produce the same intelligence.<\/p>\n

Australia also faced further criticism for its role in intelligence gathering in the region, particularly from Indonesia, where the Jakarta Post called<\/a> for greater oversight of Australian intelligence agencies, and Indonesian based activists conducted<\/a> a distributed denial of service against the Australian Secret Intelligence Service website.<\/p>\n

In the UN, Germany and Brazil have introduced a draft resolution condemning mass data collection<\/a> in the General Assembly, calling for measures to end collection and a UN report on protection of human rights in the context of mass data collection.<\/p>\n

US Defense Secretary Chuck Hagel has discussed<\/a> how the US Defense Department will continue to draw down conventional forces and readiness to protect investments in new technologies, including cyber warfare capabilities. This may be easier said than done as the US Air Force struggles<\/a> to build a trained cyber workforce , and domestic agencies including Homeland Security<\/a> struggle with cyber security responses and reporting due to funding and staffing issues . Russian AV guru Eugene Kaspersky would be concerned with Hagel\u2019s focus on cyber warfare as he continues his worldwide crusade for a cyber arms treaty,<\/a> most recently in Canberra.<\/p>\n

The US\u2013China Economic and Security Commission\u2019s draft report<\/a> to Congress discusses the response of Chinese cyber espionage operators to Mandiant\u2019s exposure of Unit 61398 in February this year. The exposure only created a brief pause in Chinese cyber espionage and no change in its objectives. The only notable affect was that Unit 61398 made changes to its tactics, techniques and procedures in order to better mask its activities.<\/p>\n

The RAND Institute has released a report<\/a> on the role of the internet in radicalisation of 15 terrorists in the UK, finding that while the internet provides more opportunities for radicalisation, it doesn\u2019t replace the need for personal contact during the radicalisation process.<\/p>\n

And a warning<\/a> for those BitCoin investors (or speculators) out there, don\u2019t store the digital currency on internet connected devices. The warning came after the compromise of Australian based online bitcoin repository Inputs.Io in late October saw 4,100 bitcoins (US$1.2 million) filched in two separate intrusions.<\/p>\n","protected":false},"excerpt":{"rendered":"

Western intelligence agencies are finding themselves under increasing public scrutiny from lawmakers as the fallout of the Snowden leaks continues. In the UK, the heads of the three national intelligence agencies appeared at an open …<\/p>\n","protected":false},"author":184,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391],"class_list":["post-10705","post","type-post","status-publish","format-standard","hentry","category-general","tag-cyber"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Western intelligence agencies are finding themselves under increasing public scrutiny from lawmakers as the fallout of the Snowden leaks continues. In the UK, the heads of the three national intelligence agencies appeared at an open ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-13T02:30:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-11-14T00:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\" \/>\n<meta name=\"author\" content=\"ASPI International Cyber Policy Centre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ASPI International Cyber Policy Centre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/#primaryimage\",\"url\":\"http:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"contentUrl\":\"http:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/#primaryimage\"},\"datePublished\":\"2013-11-13T02:30:48+00:00\",\"dateModified\":\"2013-11-14T00:07:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1\",\"name\":\"ASPI International Cyber Policy Centre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g\",\"caption\":\"ASPI International Cyber Policy Centre\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/aspi-international-cyber-policy-centre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Western intelligence agencies are finding themselves under increasing public scrutiny from lawmakers as the fallout of the Snowden leaks continues. In the UK, the heads of the three national intelligence agencies appeared at an open ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-11-13T02:30:48+00:00","article_modified_time":"2013-11-14T00:07:09+00:00","og_image":[{"url":"http:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg"}],"author":"ASPI International Cyber Policy Centre","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"ASPI International Cyber Policy Centre","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/#primaryimage","url":"http:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","contentUrl":"http:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/#primaryimage"},"datePublished":"2013-11-13T02:30:48+00:00","dateModified":"2013-11-14T00:07:09+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-8\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1","name":"ASPI International Cyber Policy Centre","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g","caption":"ASPI International Cyber Policy Centre"},"url":"https:\/\/www.aspistrategist.ru\/author\/aspi-international-cyber-policy-centre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10705"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/184"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=10705"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10705\/revisions"}],"predecessor-version":[{"id":10737,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10705\/revisions\/10737"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=10705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=10705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=10705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}