{"id":21197,"date":"2015-06-24T12:59:20","date_gmt":"2015-06-24T02:59:20","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=21197"},"modified":"2015-07-02T10:37:48","modified_gmt":"2015-07-02T00:37:48","slug":"cyber-wrap-76","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-76\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a><\/p>\n It\u2019s ConnectSmart<\/a> week across the Tasman, an event that seeks to raise awareness of cyber security in the New Zealand community. National Cyber Policy Office director Paul Ash has encouraged Kiwis to come up with unique and complex passwords for all of their online accounts and to change them regularly; and Communications Minister Amy Adams noted<\/a> the need for greater awareness of cyber security threats among small-to-medium sized enterprises, asking them to improve their online security through a few simple measures like securing work tablets and smartphones with passwords. To assist in reducing cyber security incidents, and as part of their contribution to ConnectSmart week, Auckland’s Unitec Institute of Technology and Japan’s National Institute of Information and Communications Technology launched a \u2018Red Alert<\/a>‘ service back in March. The subscription service will help protect any network that\u2019s connected and subscribed to the service by issuing an alert as soon as an intrusion takes place. It\u2019s also National Cyber Week in Israel<\/a>.<\/p>\n Across the Pacific, the fallout from the Office of Personnel Management (OPM) breach continues. While the US has been careful to not officially name China as the source of the hack, others<\/a> have pointed towards a Chinese group possibly named Shell Crew, PinkPanther, KungFu\u00a0Kittens, Group 72 or Deep Panda. Cyber security incidents have had dramatic effects on the US-China relationship in the past<\/a>, principally the suspension of the bilateral cybersecurity working group after the US indicted<\/a> five PLA officers for cyber espionage.<\/p>\n Cyber security was reportedly discussed in \u2018direct terms\u2019 by Deputy Secretary of State Antony Blinken and China\u2019s Executive Vice Foreign Minister, Zhang Yesui, at Monday\u2019s Strategic Security Dialogue<\/a> in Washington DC. Treasury Secretary Jack Lew was similarly direct<\/a> on US concerns about Chinese support for economic cyber espionage at the bilateral Strategic and Economic Dialogue on Tuesday. Those talks precede the visit of Chinese president Xi Jinping to Washington DC in September this year.<\/p>\n Also in DC, the House approved<\/a> the 2016 Intelligence Authorization Bill that sets requirements for the new Cyber Threat Intelligence Centre, and would compel the administration to provide detail to Congress on the breach at OPM. Several senators have also\u00a0begun to lobby\u00a0for cybersecurity information sharing legislation to progress quickly.<\/p>\n Further afield, June marks the one year anniversary of the African Union\u2019s (AU)\u00a0Convention on Cyber security and Personal Data Convention<\/a>. The convention established a standard legal framework for conducting electronic commerce, protecting personal data, promoting cybersecurity, and addressing cybercrime. While no AU members have ratified the convention, Kenya, Madagascar, Mauritania, Morocco, Tanzania, Tunisia and Uganda are in the process of adopting national cybersecurity legislation, although<\/a> these laws may be more damaging to human rights than the AU convention. Overall the future for cyber security in Africa appears to remain dim.<\/p>\n And finally in Australia, the intergovernmental Financial Action Task Force<\/a> met in Brisbane this week, where discussions on terrorist networks using the internet for fund raising took place, as well as the use of BitCoin and other online currencies to hide terrorist financing. FATF head and former Secretary of the Attorney-General\u2019s Department Roger Wilkins noted that further research on the use of cyberspace to finance groups including Boko Haram and Jemaah Islamiyah was needed, and that exchanges that turned virtual currencies into hard cash should be required to report suspicious transactions in the same way as banks do. In Canberra last week, Defence Minister Kevin Andrews previewed<\/a> \u00a0what\u2019s in store for cyber security in the forthcoming Defence White Paper. At the same conference, other senior Defence leaders spoke<\/a> about the need for innovative non-traditional recruitment techniques to attract cyber expertise to Defence\u2014and keep it there.<\/p>\n","protected":false},"excerpt":{"rendered":" It\u2019s ConnectSmart week across the Tasman, an event that seeks to raise awareness of cyber security in the New Zealand community. National Cyber Policy Office director Paul Ash has encouraged Kiwis to come up with …<\/p>\n","protected":false},"author":364,"featured_media":21201,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[177,52,391,95,31],"class_list":["post-21197","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-africa","tag-china","tag-cyber","tag-cyber-security","tag-united-states"],"acf":[],"yoast_head":"\n