{"id":17543,"date":"2014-12-17T12:30:34","date_gmt":"2014-12-17T01:30:34","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=17543"},"modified":"2014-12-18T08:53:33","modified_gmt":"2014-12-17T21:53:33","slug":"cyber-wrap-55","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Pipeline\"<\/a>Well done (or commiserations) to those diligent souls that have yet to decamp for the summer break. To help soften the blow, here\u2019s the last cyber wrap for the year from the ICPC.<\/p>\n

Last week Bloomberg released an interesting report<\/a> speculating on the reason behind the Baku-Tbilisi-Ceyhan (BTC) pipeline explosion in 2008. The explosion, in Erzincan, eastern Turkey, had largely been attributed to the Kurdistan Workers\u2019 Party, or PKK. Bloomberg asserts that the explosion was evidence of one of the first instances of kinetic cyber attack. Apparently, Western intelligence agencies who investigated the attack found that \u2018hackers had shut down alarms, cut off communications and super-pressurized the crude oil in the line\u2019. The article links the sabotage to the Russians, who, don\u2019t forget, were the alleged victims of a cyber-linked pipeline bomb<\/a> in 1982.<\/p>\n

The Chinese Communist Party is slowly trying to become \u2018hip to the youth\u2019 with its propaganda campaigns. The Economist<\/em> is reporting<\/a> that to maintain currency with a tech-savvy and younger audience the Party is supporting and encouraging traditional print media outlets to build an online presence. Interestingly, this type of reporting has \u2018repackaged\u2019 traditional forms of propaganda into grabs and headlines that are most likely to attract the eyeballs of a younger crowd. The article even claims that the latest online offering from Shanghai Observer<\/em>, dubbed \u2018The Paper<\/em>\u2019 is similar in style to the US-based Huffington Post<\/em> (minus the independent reporting). We wait with anticipation for the propaganda machine to discover lolcats and memes.<\/p>\n

Two separate computer security firms released reports<\/a> last week into diplomat-targeting malware. The malware, dubbed Inception<\/a> or Cloud Atlas<\/a> depending on your preference, is a professional (most likely state-backed) attempt to steal data from devices running Windows, Android, BlackBerry, and iOS. Kaspersky Lab reports:<\/p>\n

It’s almost certainly an update of the Red October malware platform that previously infected hundreds of diplomatic, governmental, and scientific research organizations around the world. One of the most sophisticated so-called advanced persistent threats (APTs) ever discovered, Red October seemed to vanish once Kaspersky Lab researchers brought it to light.<\/p><\/blockquote>\n

Well now it\u2019s back and it\u2019s going after the data of officials in Russia, Central and Eastern Europe and South America, among others.<\/p>\n

The ITU has released<\/a> its Global Cybersecurity Index (GCI), a study designed to rank the cyber capabilities of nation-states across five sets of criteria: Legal Measures, Technical Measures, Organisational Measures, Capacity Building and Cooperation. The study utilised a combination of surveys, which were completed by some of the countries, and open-source research as the basis of the assessment. Most of the usual suspects fill out the top ten, except perhaps for Oman, which unexpectedly pops up at number four, ahead of traditional players such as Germany, the United Kingdom and Japan.<\/p>\n

\u2018Major General Stephen Day wants you!… To report cyber crime\u2019. The Australian Cyber Security Centre has launched<\/a> a new, streamlined reporting system on its website and is calling on businesses and government agencies to make use of the service. The major general explained:<\/p>\n

Every report helps the ACSC to develop a better understanding of the threat environment and will assist other organisations who are also at risk\u2026Cyber security incident reports are also used in aggregate for developing new defensive techniques and training measures to help prevent future incidents.<\/p><\/blockquote>\n

That\u2019s it from us here at ICPC for 2014. Thanks to all for your support, have a great break and we\u2019ll see you in the New Year!<\/p>\n

Jessica Woodall<\/em><\/a> is an analyst in ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Flickr user Travis<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Well done (or commiserations) to those diligent souls that have yet to decamp for the summer break. To help soften the blow, here\u2019s the last cyber wrap for the year from the ICPC. Last week …<\/p>\n","protected":false},"author":133,"featured_media":17546,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[52,95,728,163],"class_list":["post-17543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-china","tag-cyber-security","tag-hacking","tag-russia"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Well done (or commiserations) to those diligent souls that have yet to decamp for the summer break. To help soften the blow, here\u2019s the last cyber wrap for the year from the ICPC. Last week ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-17T01:30:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-12-17T21:53:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/12\/225007470_4a02060c86_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/12\/225007470_4a02060c86_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/12\/225007470_4a02060c86_z.jpg\",\"width\":640,\"height\":480,\"caption\":\"Pipeline\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/#primaryimage\"},\"datePublished\":\"2014-12-17T01:30:34+00:00\",\"dateModified\":\"2014-12-17T21:53:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Well done (or commiserations) to those diligent souls that have yet to decamp for the summer break. To help soften the blow, here\u2019s the last cyber wrap for the year from the ICPC. Last week ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-12-17T01:30:34+00:00","article_modified_time":"2014-12-17T21:53:33+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/12\/225007470_4a02060c86_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/12\/225007470_4a02060c86_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/12\/225007470_4a02060c86_z.jpg","width":640,"height":480,"caption":"Pipeline"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/#primaryimage"},"datePublished":"2014-12-17T01:30:34+00:00","dateModified":"2014-12-17T21:53:33+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-55\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17543"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=17543"}],"version-history":[{"count":7,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17543\/revisions"}],"predecessor-version":[{"id":17571,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17543\/revisions\/17571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/17546"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=17543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=17543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=17543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}