{"id":23094,"date":"2015-10-28T12:30:31","date_gmt":"2015-10-28T01:30:31","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=23094"},"modified":"2015-10-28T12:32:00","modified_gmt":"2015-10-28T01:32:00","slug":"cyber-wrap-95","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"David<\/a><\/p>\n

The US Government is up in arms<\/a> this week over Apple\u2019s unwillingness to provide backdoors into its software. The iPhone 5s of a man charged with distributing meth has been deemed evidence in an investigation, but law enforcement agencies have been stumped by his phone\u2019s passcode protection. The tech company refused to play ball and has been taken to court based on the Department of Justice\u2019s argument<\/a> that Apple owns the software that is \u2018thwarting the execution of the warrant\u2019. Technically, Apple has the ability<\/a> to access the data, as the phone in question is using iOS 7 which doesn\u2019t possess the same encryption features as the more recent versions. However, the company maintains that doing so would \u2018substantially tarnish the brand\u2019.<\/p>\n

The division between Apple and Washington runs even deeper this week, after Apple joined the ranks of companies opposing the Cybersecurity Information Sharing Act. The bill<\/a>, designed to encourage the flow of threat-information between the private sector and government, has advanced to the Senate and is expected to pass this week. Apple has united with a large group of tech companies\u2014including Dropbox, Google and Facebook\u2014that are taking a stand<\/a> against the bill, stating that they don\u2019t believe security should come at the expense of their customers\u2019 privacy. Whilst CISA advocates maintain that personal privacy wouldn\u2019t be exploited, in a post-Snowden era it\u2019s simply good PR<\/a> for tech companies to be seen as strict on customer privacy. Regardless of those protests, the senate voted<\/a> 74 to 21 to pass the bill on Tuesday afternoon.<\/p>\n

Across the Atlantic, the UK\u2019s largest broadband and mobile phone service provider is having a tough time protecting its customers\u2019 privacy. Talk Talk has been the victim<\/a> of a data breach this week, resulting in the compromise an estimated 4 million customers\u2019 personal information. The data affected includes sensitive information such as credit card numbers, bank account details, addresses and dates of birth, however CEO Dido Harding has emphasised<\/a> that there was enough data protection to prevent hackers gaining bank account access. Regardless, Talk Talk is offering<\/a> its customers a free year of credit monitoring to ensure they aren\u2019t affected. There\u2019s speculation<\/a> that a Russian cyber-jihadist group was behind the attack. How this relates to the 15 year-old boy who has been arrested<\/a> in Northern Island in connection to the hack, remains to be seen.<\/p>\n

In more positive news, the UK has established some common ground with China in regards to cooperation in cyberspace. During his state visit this week, President Xi Jinping and Prime Minister David Cameron released a Joint Statement<\/a> which made reference to their bilateral cyber interactions, stating that:<\/p>\n

\u2018The UK and China agree not to conduct or support cyber-enabled theft of intellectual property, trade secrets or confidential business information with the intent of providing competitive advantage\u2019.<\/p><\/blockquote>\n

This comes in the wake of a similar agreement<\/a>, or \u2018common understanding\u2019, which was brokered between China and the US this month. While this is an important step in the dialogue towards cyber norm creation, this iteration isn\u2019t a formal agreement but more a \u00a0simple statement<\/a>\u2014one which comes with no relevant enforcement mechanisms. For this reason, it\u2019s expected to have as much immediate impact on hacking rates as the Sino\u2013US common understanding, which according to US security company, Crowdstrike, has so far been minimal<\/a>.<\/p>\n

Global activist group Anonymous has taken issue with the Thai government this week. Anonymous hacked the government<\/a> in a protest against the proposal of a \u2018single gateway\u2019 for all international internet traffic entering the country. This policy is seen as synonymous<\/a> with a state-controlled internet, akin to China\u2019s national firewall, and has generated public opposition as demonstrated by a Change.org petition with over 150,000 signatures. Anonymous decided to take action, targeting<\/a> the state-owned company, CAT Teleco, which had been delegated the responsibility of controlling the government\u2019s future gateway. Anonymous proceeded to post<\/a> stolen CAT customer account information as well as Thai government officials’ ID names, numbers and passwords on Twitter.<\/p>\n

Closer to home, ASPI\u2019s International Cyber Policy Centre (ICPC) released its 2015 report, Cyber Maturity in the Asia Pacific Region<\/em><\/a>, <\/em>this week. The report provides a snapshot into the level of cyber development found in specific countries in the region in governance, law enforcement, economic, military and social terms. For a breakdown of the regional rankings and trends illuminated by the report, read this recent Strategist<\/em> article<\/a> by ICPC\u2019s Director Tobias Feakin. David Irvine, the former head of ASIO, launched the publication and offered his insights into the relevance of cyberspace to today\u2019s evolving security landscape. Check out Mr Irvine\u2019s full address at the publication launch here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

The US Government is up in arms this week over Apple\u2019s unwillingness to provide backdoors into its software. The iPhone 5s of a man charged with distributing meth has been deemed evidence in an investigation, …<\/p>\n","protected":false},"author":390,"featured_media":23095,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[638,1500,52,391,95,141],"class_list":["post-23094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-anonymous","tag-apple","tag-china","tag-cyber","tag-cyber-security","tag-united-kingdom"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The US Government is up in arms this week over Apple\u2019s unwillingness to provide backdoors into its software. The iPhone 5s of a man charged with distributing meth has been deemed evidence in an investigation, ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-28T01:30:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-28T01:32:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/22206733049_8ff06931ae_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/22206733049_8ff06931ae_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/22206733049_8ff06931ae_z.jpg\",\"width\":640,\"height\":454,\"caption\":\"David Cameron and President Xi visit a local pub, The Plough at Cadsden during his visit to Chequers\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/#primaryimage\"},\"datePublished\":\"2015-10-28T01:30:31+00:00\",\"dateModified\":\"2015-10-28T01:32:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The US Government is up in arms this week over Apple\u2019s unwillingness to provide backdoors into its software. The iPhone 5s of a man charged with distributing meth has been deemed evidence in an investigation, ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-10-28T01:30:31+00:00","article_modified_time":"2015-10-28T01:32:00+00:00","og_image":[{"width":640,"height":454,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/22206733049_8ff06931ae_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/22206733049_8ff06931ae_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/22206733049_8ff06931ae_z.jpg","width":640,"height":454,"caption":"David Cameron and President Xi visit a local pub, The Plough at Cadsden during his visit to Chequers"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/#primaryimage"},"datePublished":"2015-10-28T01:30:31+00:00","dateModified":"2015-10-28T01:32:00+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-95\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23094"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=23094"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23094\/revisions"}],"predecessor-version":[{"id":23099,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23094\/revisions\/23099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/23095"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=23094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=23094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=23094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}