{"id":16625,"date":"2014-10-29T14:30:38","date_gmt":"2014-10-29T03:30:38","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=16625"},"modified":"2014-10-30T08:16:05","modified_gmt":"2014-10-29T21:16:05","slug":"cyber-wrap-48","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-48\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a>A month after purring down the line<\/a> to UK PM David Cameron over the outcome of the Scottish independence vote, the Queen has decided to cut out the middle man and go straight to the world. HRH exhibited her openness to the information age by tweeting<\/a> the opening of the Information Age exhibition at London\u2019s Science Museum. The resulting celebrity tweet got the usual treatment\u2014lots of retweets, favourites and, inevitably, abuse. Cue the \u2018One is not amused\u2019 headlines.<\/p>\n Speaking of middle men, Apple has issued an update<\/a> in response to reports early last week from GreatFire.org that the Chinese government was engaging in man-in-the middle<\/a> attacks on iCloud. If successful, the attacks would enable the perpetrators to decipher and monitor communications between two devices and alter messages if desired. The warning comes shortly after the release of the iPhone 6 in China, which apparently had its encryption boosted to keep the NSA out, and it\u2019s possible that might also be vexing Chinese authorities.<\/p>\n On the other side of the world, Belgium\u2019s national telco Belgacom has alleged<\/a> that Britain\u2019s GCHQ was involved in a similar man-in-the-middle attack on its infrastructure that has left it with a \u20ac15m fix. While initial suspicion fell on GCHQ thanks to leaked information by Edward Snowden that was published in Der Spiegel<\/em>, an ongoing criminal investigation is yet to reveal the actual culprit. However, by Belgacom\u2019s own admission, the attack \u2018was clearly not designed to intercept data in bulk. They were not out to copy databases. It was very specific information [that they were after].\u2019 If GCHQ is found to have had its hand in the cookie jar, London will doubtless feel more embarrassed. But, considering the sophistication of the attack, the attribution problem probably means it won\u2019t be possible to pin the tail on any particular donkey.<\/p>\n Removing the man in the middle altogether is the possibility of life-imitating-art-hacking of hospital devices and medical equipment, a la Homeland. The US Department of Homeland Security (DHS) is apparently<\/a> \u2018poring over around two dozen instances of cyber-security flaws in medical devices and hospital equipment that could eventually be exploited for illicit means\u2019. While there haven\u2019t been any documented cases of this type of attack\u2014and experts believe the eventuality is quite low compared to other issues with medical devices\u2014DHS is taking no chances and working with manufacturers to address any possible flaws before they\u2019re discovered by parties with malicious intent.<\/p>\n Meanwhile, over at the Pentagon, the US Navy is concerned<\/a> that Windows XP chips on its nuclear submarines (located in the back-up diesel engines) could expose the fleet to hacking of its control systems, according to Vice Admiral William Hilarides, head of Naval Sea Systems Command (NAVSEA). Hilarides pointed out a few quick fixes that Navy could implement now to protect the data sent from the boats to maintenance crews at a warfare centre, but stressed that \u2018ultimately ships and submarines need to be built with cyber-security in mind right from the outset\u2019.<\/p>\n The ITU Plenipotentiary (PP-14) continues this week with member states releasing additional policy statements as well as lobbying for their representatives to be elected to various positions within the organisation. Australia\u2019s efforts appear to have paid off with our re-election to the ITU Council. Samantha Dickinson is keeping a close eye on proceedings on Lingua Synaptica<\/a> and has reported that \u2018a very large number of developing countries have made requests for ITU to continue its capacity building work.\u2019 The benefits of that work were expounded by Samoa, which cited ICTs as a \u2018a contributing factor for its move from \u201cLeast Developing Country\u201d to \u201cDeveloping Country\u201d on the UN scale of development\u2019. Stay tuned for developments\u2014and fireworks between the US and Cuba, Israel and Palestine, and Russia and Ukraine. Other news out of Busan finds that the ITU Plenipotentiary will head to the UAE in 2018, the same location as the 2012 ITU World Conference on International Telecommunications.<\/p>\n Finishing on a national security cross-over note, an emerging phishing scam<\/a> is using a false World Health Organisation (WHO) badged email to spread malware stored in an attachment that claims to have \u2018life-saving advice about the Ebola outbreak\u2019. The malware appears to give total control to the hacker, allowing access to files, microphones and cameras on your computer as well as installing a keylogger. Most concerning of all is that \u2018the “DarkComet Remote Access Trojan” is completely undetectable to anti-virus software\u2019.<\/p>\n In an effort<\/a> to promote transparency and engage the US polity in debate on offensive cyber strategy, \u2018the Pentagon this week published a doctrine that was unusually candid about offensive scenarios in cyberspace\u2019. The declassified reports, originally developed for the Joint Chiefs of Staff in 2013, were released earlier this week to the public. The release brings a normally secretive part of the defence establishment into the open and encourages discussion of the topic among \u2018experts in and out of government.\u2019 But, as FCW notes \u2018[while a] doctrinal hurdle to offensive cyber operations may have been cleared \u2026 a large bureaucratic hurdle apparently remains\u2019 in addressing the coordination between civil and military agencies in this space.<\/p>\n Roy Birch is a visiting analyst at ASPI. These are his personal views. Image courtesy of Flickr user ecks ecks<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":" A month after purring down the line to UK PM David Cameron over the outcome of the Scottish independence vote, the Queen has decided to cut out the middle man and go straight to the …<\/p>\n","protected":false},"author":268,"featured_media":16642,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1,531],"tags":[391,95,713,728,1015,825],"class_list":["post-16625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-cyber-security-2","tag-cyber","tag-cyber-security","tag-cyberattack","tag-hacking","tag-malware","tag-phishing"],"acf":[],"yoast_head":"\n