{"id":16876,"date":"2014-11-12T14:30:04","date_gmt":"2014-11-12T03:30:04","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=16876"},"modified":"2014-11-13T08:58:12","modified_gmt":"2014-11-12T21:58:12","slug":"cyber-wrap-50","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"China<\/a><\/figure>\n

We\u2019re starting this week off in the States with the FBI successfully crossing off a name on their most wanted<\/a> cyber list. John Gordon Baden, wanted in connection with the identify theft of 40,000 individuals, was apprehended<\/a> in Tijuana, Mexico. He and his co-conspirators allegedly used the stolen details to siphon millions of dollars from victims\u2019 bank accounts by buying expensive products and taking out loans. Baden\u2019s arrest was the result of several anonymous tip-offs and quick work on the ground by the Tijuana Municipal Police. The collaboration serves as a good example of what can be achieved through international collaboration on the cybercrime-fighting front.<\/p>\n

Thousands of international delegates and media representatives are streaming into Brisbane this week ahead of the G20 Summit. Large international summits have proven<\/a> to be attractive targets for both state-backed intelligence gathering and hacktivist operations. A phishing campaign was used during a G20 Finance Minister\u2019s meeting in Paris 2011 to try and gain access to sensitive information. During the London Olympics plans were also laid to target critical national infrastructure. The Australian Signals Directorate\u2019s CSOC has released a handy Protect Notice<\/a> on the G20 Summit for Australian government attendees, but it also contains sound advice for all those attending.<\/p>\n

China has allegedly \u2018gone postal\u2019 this week, stealing the personal details of the US Postal Service\u2019s 800,000 employees. Whilst the Postal Service may seem like a strange target for the Chinese government, ICPC\u2019s international fellow James Lewis has a simple explanation<\/a> for the Washington Post<\/em>.\u00a0\u2018They\u2019re just looking for big pots of data on government employees\u2019, Lewis said. \u2018For the Chinese, this is probably a way of building their inventory on U.S. persons for counterintelligence and recruitment purposes.\u2019\u00a0The information stolen included addresses, dates of birth and social security numbers. But the infiltrators seemed to be motivated by intelligence gathering, not crime or monetary gain. That led investigators to connect the attack to more traditional government-backed hackers driven by espionage.<\/p>\n

Keen not to be left out, hackers linked<\/a> to the Malaysian government have allegedly crashed an American environmental news website. The website had run an article publicising a new book critical of Abdul Taib Mahmud, a senior politician in Malaysia\u2019s ruling coalition, the Barisan Nasional. The attack follows earlier threats to a domestic news organisation based in Sarawak that had reported on government corruption.<\/p>\n

A man in the United Kingdom has been convicted<\/a> on charges of posting a \u2018malicious web link\u2019 and encouraging a DDOS attack after he lent support to an Anonymous campaign in 2012 via his Twitter feed. The attack brought down the website of the UK Home Office and targeted the website of Home Secretary Theresa May. The man admitted supporting the group but argued that he hadn\u2019t posted the links and his Twitter feed had been hacked.<\/p>\n

Over in Vienna, the OSCE just wants us all to get along. Cyber Confidence Building Measures (CBMs) were the latest<\/a> topic of discussion in a meeting held in the Austrian capital on Friday. Convened by the Swiss OSCE Chairmanship, the group met to discuss the implementation of a set of CBMs<\/a> decided upon by the OSCE last year and to seek the advice of several NGO and CNI providers. The group was also keen to engage with representatives from other regional groupings including Asia.<\/p>\n

Ambassador Benno Laggner, Head of the Division for Security Policy, at the Swiss Foreign Ministry explained: \u2018Cyberspace constitutes an area with much room for speculation, doubt, and ambiguity. The use of ICTs for malicious purposes is not directly visible and it is even less tangible\u2019. \u2018Therefore, confidence-building measures designed to increase transparency and trust are crucial in order to reduce the danger of miscalculation, misperception and misunderstanding.\u2019<\/p>\n

Jessica Woodall<\/em><\/a> is an analyst in ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Flickr user Emilien Etienne<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

We\u2019re starting this week off in the States with the FBI successfully crossing off a name on their most wanted cyber list. John Gordon Baden, wanted in connection with the identify theft of 40,000 individuals, …<\/p>\n","protected":false},"author":133,"featured_media":16879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[52,749,1038,102,1037,1039,825],"class_list":["post-16876","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-china","tag-cyber-espionage","tag-fbi","tag-malaysia","tag-mexico","tag-osce","tag-phishing"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"We\u2019re starting this week off in the States with the FBI successfully crossing off a name on their most wanted cyber list. John Gordon Baden, wanted in connection with the identify theft of 40,000 individuals, ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-12T03:30:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-11-12T21:58:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/14784489258_b1b6c47b6c_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"424\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/14784489258_b1b6c47b6c_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/14784489258_b1b6c47b6c_z.jpg\",\"width\":640,\"height\":424},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/#primaryimage\"},\"datePublished\":\"2014-11-12T03:30:04+00:00\",\"dateModified\":\"2014-11-12T21:58:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"We\u2019re starting this week off in the States with the FBI successfully crossing off a name on their most wanted cyber list. John Gordon Baden, wanted in connection with the identify theft of 40,000 individuals, ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-11-12T03:30:04+00:00","article_modified_time":"2014-11-12T21:58:12+00:00","og_image":[{"width":640,"height":424,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/14784489258_b1b6c47b6c_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/14784489258_b1b6c47b6c_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/11\/14784489258_b1b6c47b6c_z.jpg","width":640,"height":424},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/#primaryimage"},"datePublished":"2014-11-12T03:30:04+00:00","dateModified":"2014-11-12T21:58:12+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-50\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16876"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=16876"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16876\/revisions"}],"predecessor-version":[{"id":16893,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/16876\/revisions\/16893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/16879"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=16876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=16876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=16876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}