{"id":23213,"date":"2015-11-04T12:30:01","date_gmt":"2015-11-04T01:30:01","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=23213"},"modified":"2015-11-04T10:40:25","modified_gmt":"2015-11-03T23:40:25","slug":"cyber-wrap-90","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Bangkok<\/a><\/p>\n

Last week, the US Senate approved<\/a> the CISA or Cyber Security Information Sharing Act<\/em>. Among the bill\u2019s main provisions is a proposal to expand liability protections to companies that voluntarily share threat information with the government. The bill managed to evade a series of last minute privacy amendments, passing with strong bipartisan support in a 74\u201321 vote. Congress will now have to work to reconcile the differences between CISA and a similar, earlier<\/a> version of the bill, the Protecting Cyber Networks Act<\/em>, which passed the House in April. Once the two have been merged, the White House is expected<\/a> to rubber stamp the finished product.<\/p>\n

The New York Times<\/em> has published an interesting piece<\/a> on the issue of export controls on surveillance technology. Last month two men were fined<\/a> by the US Department of Commerce for illegally exporting surveillance technology to Syria via an elaborate Middle East distribution network. The US has enacted specific bans on the export of American surveillance technology to both Syria and Iran, where it\u2019s feared they can be deployed to crackdown on dissidents and opposition parties. But moves to introduce a wider licencing arrangement for the export of surveillance technology have been met with stiff resistance by the US tech sector. Other countries including Germany<\/a> and Switzerland<\/a> successfully passed mandatory licensing laws on the export of surveillance technology earlier this year, and in September the European Parliament<\/a> agreed to a non-binding resolution calling for similar tech safeguards.<\/p>\n

Japan\u2019s Minister in charge of the Tokyo Olympic and Paralympic Games recently met<\/a> with the head of the London Olympics organising committee, Sebastian Coe. The get-together aimed to share insights into the types of cyber-attacks tackled during the 2012 games and to communicate lessons learnt with the Tokyo 2020 organising committee. The meet follows the announcement<\/a> that the Tokyo Metropolitan government will establish its own computer security incident response team (CSIRT) to assist in the protection of critical infrastructure in the lead-up to and during the games.<\/p>\n

Chinese hackers behind the breach were motivated<\/a> by a desire to understand how the US delivers health care, say insiders close to the investigation of the Anthem health insurance hack<\/a>. The Chinese government has vowed<\/a> to provide universal access to healthcare by 2020 but there\u2019s widespread frustration domestically as to the quality, availability and cost of care. While Chinese intelligence agencies might have been interested in US government employee information, it\u2019s believed that the theft of intellectual property and trade secrets was the main target for the infiltration. A US government official told the Financial Times<\/em>, \u2018Knowledge is power. How is it set up? What are they insuring? Why is this procedure covered but not that one? All of that is useful information.\u2019<\/p>\n

Last week Thai military chiefs publically<\/a> called for the creation of a whole-of-government body to help ensure \u2018cyber readiness\u2019 at the national level. Special adviser to the permanent secretary for the Defence Ministry General Bunjerd Tientongdee warned that Thailand only maintained preparedness within the military and the Information and Communications Technology Ministry. Deputy chief of the Air Forces’ Cyber Warfare Division called for the creation of a \u2018one-stop service\u2019 to handle national cybersecurity issues. Earlier in the week Prime Minister General Prayut Chan-o-cha moved<\/a> to distance Thailand\u2019s military cyber set-up from the controversial \u2018single gateway\u2019 proposal after new questions were raised by the public surrounding the militaries involvement in domestic surveillance.<\/p>\n","protected":false},"excerpt":{"rendered":"

Last week, the US Senate approved the CISA or Cyber Security Information Sharing Act. Among the bill\u2019s main provisions is a proposal to expand liability protections to companies that voluntarily share threat information with the …<\/p>\n","protected":false},"author":133,"featured_media":23214,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,728,500],"class_list":["post-23213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-hacking","tag-surveillance"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Last week, the US Senate approved the CISA or Cyber Security Information Sharing Act. Among the bill\u2019s main provisions is a proposal to expand liability protections to companies that voluntarily share threat information with the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-04T01:30:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-11-03T23:40:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/16045992343_e7bab1501c_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/16045992343_e7bab1501c_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/16045992343_e7bab1501c_z.jpg\",\"width\":640,\"height\":480,\"caption\":\"Bangkok Ultraviolet Project\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/#primaryimage\"},\"datePublished\":\"2015-11-04T01:30:01+00:00\",\"dateModified\":\"2015-11-03T23:40:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Last week, the US Senate approved the CISA or Cyber Security Information Sharing Act. Among the bill\u2019s main provisions is a proposal to expand liability protections to companies that voluntarily share threat information with the ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-11-04T01:30:01+00:00","article_modified_time":"2015-11-03T23:40:25+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/16045992343_e7bab1501c_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/16045992343_e7bab1501c_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/16045992343_e7bab1501c_z.jpg","width":640,"height":480,"caption":"Bangkok Ultraviolet Project"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/#primaryimage"},"datePublished":"2015-11-04T01:30:01+00:00","dateModified":"2015-11-03T23:40:25+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-90\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23213"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=23213"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23213\/revisions"}],"predecessor-version":[{"id":23215,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23213\/revisions\/23215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/23214"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=23213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=23213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=23213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}