{"id":22618,"date":"2015-09-23T11:38:59","date_gmt":"2015-09-23T01:38:59","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=22618"},"modified":"2015-09-23T11:41:07","modified_gmt":"2015-09-23T01:41:07","slug":"cyber-wrap-89","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Anonymous\"<\/a><\/p>\n

China and the US have stolen the show this week with their negotiations<\/a> of what may become the world\u2019s first major arms control agreement for cyberspace. Bilateral discussions focus on establishing a no first use policy<\/a> in regards to the targeting a state\u2019s critical national infrastructure during peacetime. While potentially ground breaking, the agreement would bear no relevance<\/a> to China\u2019s alleged hacking of either US corporations or the Office of Personnel Management.<\/p>\n

It\u2019s a promising turn of events for what\u2019s been a highly sensitive topic in the bilateral relationship. Obama has also refrained from enacting the proposed economic sanctions<\/a> on Chinese corporations for the cyber theft of US intellectual property. There\u2019s been a noticeable drop<\/a> in the frequency of Chinese cyber attacks against US corporations recently, which may be an effort to build \u00a0good will in the lead up to Xi\u2019s first state visit to Washington<\/a> later this week. Unfortunately, tensions are far from resolved. At the same time as Xi\u2019s visit, China will host a tech forum in Seattle<\/a> where it\u2019ll pressure US corporations to adopt a \u2018pledge of compliance\u2019 regarding company networks within China. The pledge requires<\/a> companies to make their data \u2018secure and controllable\u2019, a condition that may involve providing authorities with backdoors to systems for surveillance. By successfully drawing large players<\/a> such as Apple, Facebook, IBM, Google and Uber to the forum despite current bilateral tensions, the Chinese are set to demonstrate the leverage they wield over any cybersecurity discussion.<\/p>\n

Two US Democratic Senators have shone the spotlight on automakers\u2019 responsibility to secure their increasingly networked vehicles. Edward Markey and Richard Blumenthal requested information about cyber security policy from 18 large automakers<\/a> this week, including BMW, Fiat Chrysler and Toyota Motor Co. A similar survey was conducted in December 2013, however, the recent hacking of a Jeep Cherokee<\/a> in July has returned attention to the vulnerabilities of vehicle connectivity. Intel, which provides infotainment technology to some of the largest automakers and is a key target<\/a> for potential hackers, has this week revealed its interest in the issue by establishing a new Automotive Security Review Board<\/a>. This board will conduct security audits<\/a> on its products and has already released a \u2018white paper\u2019<\/a> outlining automotive cybersecurity best practice.<\/p>\n

There was a win for cybercrime fighters this week, with infamous Russian hacker Vladimir Drinkman pleading guilty<\/a> to criminal charges. Drinkman and four other defendants are on trial in the US for stealing 160 million credit card numbers from corporations including Diners Singapore, Nasdaq, JCP, 7-Eleven, Dow Jones and Jet Blue. The group exploited SQL database vulnerabilities<\/a> in order to install \u2018packet sniffers<\/a>\u2019\u2014malware that monitors and documents network traffic. Drinkman initially pled not guilty when captured in 2010 but has now confessed to his cybercrimes and is facing up to 30 years in prison. The theft incurred a corporate cost of $300 million, plus enormous private losses, and has been deemed the largest data breach scheme<\/a> ever prosecuted.<\/p>\n

The US has announced plans to post a prosecutor at Europol<\/a> in order to facilitate greater international cooperation in the fight against cybercrime. US Attorney General Loretta Lynch said that the representative will be a day-to-day presence, aiding investigations into botnet networks and dark web marketplaces. Europol Director, Rob Wainwright, is hopeful<\/a> that the presence of a US prosecutor will encourage the support of large US technology companies in international cybercrime investigations.<\/p>\n

Anonymous has been busy this week, hacking government websites of both Vietnam and the Philippines. The infamous hacktivist group defaced the homepage<\/a> of the Philippines\u2019 National Telecommunications Commission (NTC) as a demonstration against poor internet service delivery. The group\u2019s hack left a message protesting against the \u2018over promised, under delivered system\u2019 that it believes is an obstacle to equality of internet access. The breach came days after the agency’s service test<\/a> which revealed ISPs falling short of advertised speeds, and has prompted the NTC to guarantee an increase in the monitoring of internet speeds starting in October.<\/p>\n

Across the South China Sea, Vietnam suffered a blow to its government portal<\/a> on its recent National Day thanks to the collaborative hacking efforts of Anonymous, AntiSec and HagashTeam. The cyber vandalism was an attempt to pressure the Vietnamese government<\/a> to include political activists, journalists, bloggers and human rights defenders in their recent mass pardoning<\/a> of more than 15,000 prisoners, including drug traffickers and murderers.<\/p>\n","protected":false},"excerpt":{"rendered":"

China and the US have stolen the show this week with their negotiations of what may become the world\u2019s first major arms control agreement for cyberspace. Bilateral discussions focus on establishing a no first use …<\/p>\n","protected":false},"author":390,"featured_media":22619,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,713,1465,937,471],"class_list":["post-22618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyberattack","tag-europol","tag-negotiations","tag-south-china-sea"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"China and the US have stolen the show this week with their negotiations of what may become the world\u2019s first major arms control agreement for cyberspace. Bilateral discussions focus on establishing a no first use ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-23T01:38:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-09-23T01:41:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/2714188250_40855e5c42_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/2714188250_40855e5c42_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/2714188250_40855e5c42_z.jpg\",\"width\":640,\"height\":426,\"caption\":\"Anonymous\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/#primaryimage\"},\"datePublished\":\"2015-09-23T01:38:59+00:00\",\"dateModified\":\"2015-09-23T01:41:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"China and the US have stolen the show this week with their negotiations of what may become the world\u2019s first major arms control agreement for cyberspace. Bilateral discussions focus on establishing a no first use ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-09-23T01:38:59+00:00","article_modified_time":"2015-09-23T01:41:07+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/2714188250_40855e5c42_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/2714188250_40855e5c42_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/2714188250_40855e5c42_z.jpg","width":640,"height":426,"caption":"Anonymous"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/#primaryimage"},"datePublished":"2015-09-23T01:38:59+00:00","dateModified":"2015-09-23T01:41:07+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-89\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22618"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=22618"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22618\/revisions"}],"predecessor-version":[{"id":22620,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22618\/revisions\/22620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/22619"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=22618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=22618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=22618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}