{"id":17839,"date":"2015-01-14T14:30:23","date_gmt":"2015-01-14T03:30:23","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=17839"},"modified":"2015-01-15T10:18:10","modified_gmt":"2015-01-14T23:18:10","slug":"cyber-wrap-57","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Credit<\/a>Bad news for the social media team at US Central Command (CENTCOM) this week: on Monday their Twitter and YouTube accounts were hacked<\/a> by Islamic State (IS) sympathisers. The hackers replaced the banner and user image with pro-IS messages, posted a few threatening tweets, and released publicly-available documents that showed the email addresses and phone numbers of US military officers posted overseas.<\/p>\n

It appears that the group only gained access to the accounts and not sensitive information. According to a CENTCOM media statement<\/a>, \u2018Centcom’s operational military networks were not compromised and there was no operational impact to US Central Command\u2019. The release continued that \u2018we are viewing this purely as a case of cybervandalism\u2019. But, for IS the value in the attack isn\u2019t so much vandalism but propaganda. The hack contributes to a narrative of IS growing stronger by depicting the \u2018cybercaliphate\u2019 group as capable hackers which helps to attract new members to the cause.<\/p>\n

Embarrassingly, the attacks came minutes after US President Obama pitched new cybersecurity initiatives at a Federal Trade Commission event. Obama pushed<\/a> for federal legislation that would force companies to be more forthcoming when credit-card data and consumer information are lost in data breaches. The Personal Data Notification and Protection Act <\/em>would require companies to tell their customers within 30 days about a breach. According to a White House fact sheet<\/a>, \u2018the proposal helps business and consumers by simplifying the existing patchwork of 46 state laws into one federal statute, and puts in place a clear requirement to ensure that companies notify their employees and customers about security breaches\u2019. Obama also pushed for a consumer-privacy bill of rights (a proposal<\/a> he outlined in 2012) and a student digital privacy act<\/a>, with both giving Americans more control over what\u00a0personal information gets collected and how it\u2019s used.<\/p>\n

\u2018Cyber threats are an urgent and growing danger\u2026if we\u2019re going to be connected, then we need to be protected\u2019 said Obama. On Tuesday, the US President unveiled further cybersecurity initiatives (with two more expected before his upcoming State of the Union address). The legislative proposals announced<\/a> include enabling cybersecurity information-sharing between the private sector and government, and modernising law-enforcement authorities to combat cybercrime. The information-sharing legislation will give companies legal immunity for sharing information on attacks so that countermeasures can be coordinated. While the law-enforcement proposal contains provisions that would allow for the prosecution of the sale of botnets, it would criminalise the overseas sale of stolen US financial information like credit-card and bank-account numbers, as well as expanding law-enforcement authority to deter the sale of spyware.<\/p>\n

There has already been some opposition<\/a> to the President\u2019s proposals. Mark Jaycox, an analyst with the Electronic Frontier Foundation, has questioned the proposed \u2018targeted liability protection\u2019, instead arguing<\/a> that existing rules allow sufficient public\u2013private coordination. Also, to become law, the new cybersecurity proposals will have to win over the Republicans. So far that looks promising. In one statement, the office of House speaker John Boehner said<\/a> that \u2018Republicans are ready to work with both parties to address this important issue and put some common-sense measures on the president’s desk.\u2019<\/p>\n

If you managed to get through most of your holiday reading, add one more to the list, Amnesia<\/a><\/em>. Australian novelist Peter Carey\u2014inspired by the actions of Julian Assange\u2014explores the lives of eccentric hackers and the US\u2013Australia political relationship. See the Wall Street Journal<\/em>\u2019s and The Economist<\/em>\u2019s reviews here<\/a> and here<\/a>.<\/p>\n

Finally, the latest issue of the journal International Security<\/em> has a heated academic correspondence<\/a> (PDF) between Jon Lindsay at the University of California and Lucas Kello at Oxford University. In the piece, Lindsay critiques Kello\u2019s article \u2018The meaning of the cyber revolution: perils to theory and statecraft\u2019. It\u2019s worth reading for the authors\u2019 exploration of the evolution of technology and strategy, the offence\/defence debate, policy\/technical problems, and the topic of cybersecurity within strategic and security studies.<\/p>\n

Simon Hansen<\/em><\/a>\u00a0is a research intern in ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em>. Image courtesy of Flickr user Sean MacEntee<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Bad news for the social media team at US Central Command (CENTCOM) this week: on Monday their Twitter and YouTube accounts were hacked by Islamic State (IS) sympathisers. The hackers replaced the banner and user …<\/p>\n","protected":false},"author":214,"featured_media":17840,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1101,713,750,895,704,21,31],"class_list":["post-17839","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-centcom","tag-cyberattack","tag-data-retention","tag-islamic-state","tag-legislation","tag-strategy-2","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Bad news for the social media team at US Central Command (CENTCOM) this week: on Monday their Twitter and YouTube accounts were hacked by Islamic State (IS) sympathisers. The hackers replaced the banner and user ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-14T03:30:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-14T23:18:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/12696032183_0d9622ae98_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/12696032183_0d9622ae98_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/12696032183_0d9622ae98_z.jpg\",\"width\":640,\"height\":360,\"caption\":\"Credit cards\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/#primaryimage\"},\"datePublished\":\"2015-01-14T03:30:23+00:00\",\"dateModified\":\"2015-01-14T23:18:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Bad news for the social media team at US Central Command (CENTCOM) this week: on Monday their Twitter and YouTube accounts were hacked by Islamic State (IS) sympathisers. The hackers replaced the banner and user ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-01-14T03:30:23+00:00","article_modified_time":"2015-01-14T23:18:10+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/12696032183_0d9622ae98_z.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/12696032183_0d9622ae98_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/12696032183_0d9622ae98_z.jpg","width":640,"height":360,"caption":"Credit cards"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/#primaryimage"},"datePublished":"2015-01-14T03:30:23+00:00","dateModified":"2015-01-14T23:18:10+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-57\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17839"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=17839"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17839\/revisions"}],"predecessor-version":[{"id":17856,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/17839\/revisions\/17856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/17840"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=17839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=17839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=17839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}