{"id":15891,"date":"2014-09-17T14:30:08","date_gmt":"2014-09-17T04:30:08","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=15891"},"modified":"2014-09-18T10:17:30","modified_gmt":"2014-09-18T00:17:30","slug":"cyber-wrap-43","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"John<\/a>This week news broke<\/a> that New Zealand has become the latest five-eyes country to be involved in submarine cable tapping. The communications cables that lie on the sea floor, carrying global internet and phone traffic, have proven<\/a> to be attractive targets to signals intelligence organisations. Edward Snowden has claimed in a recent blog post<\/a> that NZ\u2019s Government Communications Security Bureau (GCSB) was involved in tapping the Southern Cross cable network, one of the largest<\/a> cables connecting Australia to the United States via New Zealand, in 2012 and 2013. He also links New Zealand to the mass surveillance tool X-KEYSCORE, created by the NSA.<\/p>\n

Prime Minister John Key has denied<\/a> that GCSB conducts mass surveillance of its own citizens and has refused to comment on the X-KEYSCORE program, stating \u2018we don’t discuss the specific programmes the GCSB may, or may not use\u2019.<\/p>\n

The other big story<\/a> this week is Gmail\u2019s supposed \u2018hack\u2019 of \u2018millions of passwords\u2019. A file containing 4.93 million account logins was published on a Russian Bitcoin board early last week, but the source and validity of the data has been called into question. The Department of Communications Stay Smart Online notification service reports that the data \u2018is believed to be made up of old information captured from a number of other sources rather than a breach of Google services\u2019. But if you\u2019ve reused your Gmail password online in other locations, they also suggest changing it as a precaution. For those interested, you can subscribe to the excellent Stay Smart Online Service that outlines the latest online threats and vulnerabilities here<\/a>.<\/p>\n

Turning now to Northeast Asia, the North Korean government is upset<\/a> with foreign diplomatic missions in Pyongyang that establish and maintain satellite internet connections and Wi-Fi networks in their posts. The State Radio Regulatory Department sent a polite \u2018cease and desist\u2019 letter to diplomatic posts and International Organisations within the country urging them to gain a \u2018licence\u2019 if they wish to use a \u2018regional wireless network\u2019 in future. The letter justifies the request by stating that \u2018the signals of regional wireless network [sic<\/em>], installed and being used without licence, produce some effect upon our surroundings\u2019.<\/p>\n

Whilst that \u2018effect\u2019 is left deliberately ambiguous, the overall crackdown is most probably linked to a report<\/a> published by The Diplomat<\/em> in August. The article claimed real estate prices in diplomatic areas had risen due to local North Koreans moving closer to, and taking advantage of, internet access provided by wifi networks left unsecured by foreign missions.<\/p>\n

Moving south of the border, the South Korean government has lined up a promising dialogue<\/a> with China and Japan. Set to occur at the level of Deputy Foreign Minister, the meeting seeks to lay the foundations for a fully-fledged trilateral discussion, the last of which was held over two years ago. On the table is a new cyber security cooperation project, which, if successful, would see the issue discussed at ministerial level between the three countries for the first time.<\/p>\n

Another surprising but encouraging collaboration occurred this week between two of the world\u2019s three largest anti-virus companies. McAfee and Symantec have agreed to join the Cyber Threat Alliance (CTA), an industry grouping whose goal is to share malicious threat data across member companies. CSO reports<\/a> that the CTA aims to share \u2018malware signatures as well as mobile campaigns, botnet command and control channels, and patterns that indicate Advanced Persistent Threats (APTs)\u2019.<\/p>\n

The biggest take-away from the partnership is the agreement to share information on major attacks including targeted campaigns. This type of collaboration allows information and resources to be pooled, and a bigger more holistic picture of online adversaries to be constructed.<\/p>\n

Jessica Woodall<\/em><\/a> is an analyst in ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Flickr user\u00a0International Council for Science<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

This week news broke that New Zealand has become the latest five-eyes country to be involved in submarine cable tapping. The communications cables that lie on the sea floor, carrying global internet and phone traffic, …<\/p>\n","protected":false},"author":133,"featured_media":15897,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[52,391,750,728,692,135,86,649,211],"class_list":["post-15891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-china","tag-cyber","tag-data-retention","tag-hacking","tag-internet","tag-japan","tag-north-korea","tag-nsa","tag-south-korea"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This week news broke that New Zealand has become the latest five-eyes country to be involved in submarine cable tapping. The communications cables that lie on the sea floor, carrying global internet and phone traffic, ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-17T04:30:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-09-18T00:17:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/09\/14913862040_e818b73209_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/09\/14913862040_e818b73209_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/09\/14913862040_e818b73209_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"John Key at the ICSU General Assembly opening ceremony\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/#primaryimage\"},\"datePublished\":\"2014-09-17T04:30:08+00:00\",\"dateModified\":\"2014-09-18T00:17:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"This week news broke that New Zealand has become the latest five-eyes country to be involved in submarine cable tapping. The communications cables that lie on the sea floor, carrying global internet and phone traffic, ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-09-17T04:30:08+00:00","article_modified_time":"2014-09-18T00:17:30+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/09\/14913862040_e818b73209_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/09\/14913862040_e818b73209_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/09\/14913862040_e818b73209_z.jpg","width":640,"height":427,"caption":"John Key at the ICSU General Assembly opening ceremony"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/#primaryimage"},"datePublished":"2014-09-17T04:30:08+00:00","dateModified":"2014-09-18T00:17:30+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-43\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15891"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=15891"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15891\/revisions"}],"predecessor-version":[{"id":15923,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15891\/revisions\/15923"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/15897"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=15891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=15891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=15891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}