{"id":21069,"date":"2015-06-17T13:17:03","date_gmt":"2015-06-17T03:17:03","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=21069"},"modified":"2015-06-17T16:12:33","modified_gmt":"2015-06-17T06:12:33","slug":"cyber-wrap-75","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Chairman<\/a><\/p>\n

The gargantuan scale of the Office of Personnel Management (OPM) hack, initially thought to have affected 4 million current and former US government workers has now ballooned to over 9 million. The White House announced<\/a> on Friday that the same group of hackers were responsible for a second infiltration on a different section of the agency\u2019s network. These files are said to include a database filled with Standard Form 86s\u2014a security clearance questionnaire given to prospective government employees. In addition to applicant details, these forms also include extensive information on non-government workers including close acquaintances, friends and family. This has drastically inflated the number of people affected by the breach and has helped fuel the mounting<\/a> pressure from the media on the Obama administration to \u2018retaliate\u2019<\/a>.<\/p>\n

Congress began the cross-examination of senior OPM officials before the House Oversight Committee this morning<\/a>. When Chairman Jason Chaffetz asked why the sensitive data on OPM\u2019s networks wasn\u2019t encrypted, Director Katherine Archuleta explained that \u2018it is not feasible to implement on networks that are too old\u2019. Apparently OPM is now working to rectify the encryption issue, but according<\/a> to Dr Andy Ozment\u2014Assistant Secretary for Cybersecurity at the Department of Homeland Security\u2014even encryption wouldn\u2019t have saved OPM. He explained to the committee that the intruders had stolen valid user credentials, probably via social engineering, and this, combined with the fact that OPM had failed to implement multifactor authentication, gave the attackers easy access.<\/p>\n

Proving that no one is completely secure in cyberspace, computer security giant Kaspersky Labs last week disclosed<\/a> that that it recently fell victim to an internal network compromise. The company believes the intruders were seeking commercial information, probably connected to the development of its new technologies, but are confident they caught the intrusion in its initial stages. The malware used in the attack was distributed via Microsoft Software Installer files and didn\u2019t write any files to disk \u2018but instead resided in affected computers’ memory, making it relatively hard to detect.\u2019 The infiltration attempt also utilised three zero-day exploits<\/a>\u2014an impressive number considering the significant price a single exploit can garner on the black market.<\/p>\n

Switching focus to cyber diplomacy, the Chinese government has been busy in Africa and Southeast Asia. China’s Industry and Information Technology Minister Miao Wei travelled to South Africa to meet with Telecommunications and Postal Services Minister Dr Siyabonga Cwele. The two signed<\/a>\u00a0a \u2018Plan of Action\u2019 designed to help expand the country\u2019s connectivity via technology, skills and knowledge exchange. It was reported that the agreement also covered everything from cyber security to e-government and intriguingly, internet governance.<\/p>\n

Back in Beijing, the Cyberspace Administration of China (CAC) met<\/a> with Indonesia\u2019s new National Desk for Information Resilience & Cyber Security (DK2ICN).. The meeting sought to explore ways the two countries could build bilateral cyber cooperation, and highlighted the newly-established China\u2013Southeast Asia Data Centre as a potential space for bilateral cooperation.<\/p>\n

The Office of General Counsel at the US Department of Defense has released its latest edition of the Law of War Manual<\/em>. The manual acts as a guide for military and defence officials on customary and treaty law of war, with the last comprehensive manual published in 1956. This edition<\/a> of the weighty publication (1,180 single spaced pages) includes a chapter on cyber operations. Helpful definitions as to what might constitute a cyber operation, when a cyber attack could constitute a use of force, and what a proportional response might look like in response to such an incident are included in the chapter.<\/p>\n","protected":false},"excerpt":{"rendered":"

The gargantuan scale of the Office of Personnel Management (OPM) hack, initially thought to have affected 4 million current and former US government workers has now ballooned to over 9 million. The White House announced …<\/p>\n","protected":false},"author":133,"featured_media":21070,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,391,713,162,31],"class_list":["post-21069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyber","tag-cyberattack","tag-governance","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The gargantuan scale of the Office of Personnel Management (OPM) hack, initially thought to have affected 4 million current and former US government workers has now ballooned to over 9 million. The White House announced ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-17T03:17:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-06-17T06:12:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/4074555399_092a1683d6_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/4074555399_092a1683d6_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/4074555399_092a1683d6_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"Chairman Jason Chaffetz\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/#primaryimage\"},\"datePublished\":\"2015-06-17T03:17:03+00:00\",\"dateModified\":\"2015-06-17T06:12:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The gargantuan scale of the Office of Personnel Management (OPM) hack, initially thought to have affected 4 million current and former US government workers has now ballooned to over 9 million. The White House announced ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-06-17T03:17:03+00:00","article_modified_time":"2015-06-17T06:12:33+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/4074555399_092a1683d6_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/4074555399_092a1683d6_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/4074555399_092a1683d6_z.jpg","width":640,"height":427,"caption":"Chairman Jason Chaffetz"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/#primaryimage"},"datePublished":"2015-06-17T03:17:03+00:00","dateModified":"2015-06-17T06:12:33+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-75\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21069"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=21069"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21069\/revisions"}],"predecessor-version":[{"id":21081,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21069\/revisions\/21081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/21070"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=21069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=21069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=21069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}