{"id":15332,"date":"2014-08-20T14:37:51","date_gmt":"2014-08-20T04:37:51","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=15332"},"modified":"2014-09-10T13:00:12","modified_gmt":"2014-09-10T03:00:12","slug":"cyber-wrap-40","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>As tensions rise on the streets of Ferguson, Missouri over the shooting of Michael Brown, activists have taken their protests to the cyber sphere in a variety of ways. News reports<\/a> have linked \u2018hacktivist\u2019 group Anonymous with a distributed denial of service (DDoS) attack on the websites and email servers of the town\u2019s administrators which also took down the IP phone system and left most of the city\u2019s government officials working via text message. The attack was executed following a video post by the group on YouTube that threatened to take down \u2018every web-based asset of your departments and governments offline\u2019. The group also released personal information of members of the Ferguson Police Department.<\/p>\n

In his recent speech at the University of Canberra, Major General Stephen Day expressed concerns<\/a> that state governments\u2019 safeguards against computed-based attacks were \u2018patchy and variable\u2019, an issue he associated with a lack of depth in the understanding of the threat at the upper echelons of the state government system. MAJGEN Day, who heads up the Cyber Security Operations Centre in the Australian Signals Directorate, noted that at this level, a change of minister or senior bureaucrat \u2018can have an extraordinary impact on the understanding in a state government in terms of the cyber threat.’<\/p>\n

Scientists at the Technische Universitat Munchen (TUM)\u00a0have released software<\/a> that thwarts port-scanning reconnaissance hacks by the Hacienda program used by the \u2018Five Eyes\u2019 intelligence coalition. Researchers responsible for the software claim that their program provides a higher degree of protection than the existing token technology upon which it is based.<\/p>\n

US hospital operator Community Health Systems (CHS) believes that<\/a> Chinese hackers successfully accessed the personal\u2014but not medical\u2014data of 4.5 million patients from the past five years. The stolen data included all the information necessary for identity theft and resulted in CHS activating its liability insurance to assist the affected patients protect themselves from this possibility. In April 2014, the FBI warned<\/a> that \u2018the healthcare industry is not as resilient to cyber intrusions compared to the financial and retail sectors\u2019. The latest hack follows on from attacks targeting the three largest medical device manufacturers in the US, reported earlier in 2014<\/a>.<\/p>\n

Israeli experts have identified<\/a> Iran as well as state-sponsored and affiliated groups as being behind a number of cyberattacks on Israel, including some which were clumsily disguised as having been executed by Palestinian hackers. Though all attempted hacks by Iranian groups during Israel\u2019s recent military campaign in Gaza were successfully prevented by Israel\u2019s cyber defence capabilities, the IDF noted that the scale and ambition of the recent activity was greater than previous encountered.<\/p>\n

Sticking with state-based cyber intrusion, Germany\u2019s foreign intelligence agency (BND) has been reported<\/a>\u00a0to have intercepted phone calls of both current US Secretary of State John Kerry, and his predecessor Hillary Clinton. While the German government claims that both intercepts were \u2018bycatch\u2019 and were immediately deleted, Der Spiegel<\/em> reports that Clinton\u2019s conversation with former UN Secretary General Kofi Annan in 2012 regarding negotiations with Syria was not. These revelations come after German objections to the targeting of Chancellor Angela Merkel\u2019s telecommunications by the NSA and reports of German nationals spying for the US. To complicate matters further, German media carried news of government documentation purportedly ordering the agency to snoop on a NATO partner, later identified as Turkey.<\/p>\n

Roy Birch is a visiting analyst at ASPI. These are his personal views.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

As tensions rise on the streets of Ferguson, Missouri over the shooting of Michael Brown, activists have taken their protests to the cyber sphere in a variety of ways. News reports have linked \u2018hacktivist\u2019 group …<\/p>\n","protected":false},"author":268,"featured_media":15334,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[638,929,391,95,928,694,728,247,240],"class_list":["post-15332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-anonymous","tag-csoc","tag-cyber","tag-cyber-security","tag-five-eyes","tag-germany","tag-hacking","tag-iran","tag-israel"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"As tensions rise on the streets of Ferguson, Missouri over the shooting of Michael Brown, activists have taken their protests to the cyber sphere in a variety of ways. News reports have linked \u2018hacktivist\u2019 group ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-20T04:37:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-09-10T03:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/cyber-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1130\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roy Birch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roy Birch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/cyber-logo.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/cyber-logo.jpg\",\"width\":1130,\"height\":425,\"caption\":\"ASPI's International Cyber Policy Centre\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/#primaryimage\"},\"datePublished\":\"2014-08-20T04:37:51+00:00\",\"dateModified\":\"2014-09-10T03:00:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/94ca57bb52fb4285e1373d6d29221ca5\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/94ca57bb52fb4285e1373d6d29221ca5\",\"name\":\"Roy Birch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7460bf4682b018511dcf4d762bd7133b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7460bf4682b018511dcf4d762bd7133b?s=96&d=mm&r=g\",\"caption\":\"Roy Birch\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/roy-birch\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"As tensions rise on the streets of Ferguson, Missouri over the shooting of Michael Brown, activists have taken their protests to the cyber sphere in a variety of ways. News reports have linked \u2018hacktivist\u2019 group ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-08-20T04:37:51+00:00","article_modified_time":"2014-09-10T03:00:12+00:00","og_image":[{"width":1130,"height":425,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/cyber-logo.jpg","type":"image\/jpeg"}],"author":"Roy Birch","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Roy Birch","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/cyber-logo.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/cyber-logo.jpg","width":1130,"height":425,"caption":"ASPI's International Cyber Policy Centre"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/#primaryimage"},"datePublished":"2014-08-20T04:37:51+00:00","dateModified":"2014-09-10T03:00:12+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/94ca57bb52fb4285e1373d6d29221ca5"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-40\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/94ca57bb52fb4285e1373d6d29221ca5","name":"Roy Birch","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7460bf4682b018511dcf4d762bd7133b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7460bf4682b018511dcf4d762bd7133b?s=96&d=mm&r=g","caption":"Roy Birch"},"url":"https:\/\/www.aspistrategist.ru\/author\/roy-birch\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15332"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/268"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=15332"}],"version-history":[{"count":11,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15332\/revisions"}],"predecessor-version":[{"id":15338,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15332\/revisions\/15338"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/15334"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=15332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=15332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=15332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}