{"id":23446,"date":"2015-11-18T12:28:19","date_gmt":"2015-11-18T01:28:19","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=23446"},"modified":"2015-11-18T12:28:19","modified_gmt":"2015-11-18T01:28:19","slug":"cyber-wrap-97","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"PS4\"<\/a><\/p>\n

The 2016 National Defense Authorization Act<\/em><\/a> (NDAA) passed US Congress last week and has interesting implications for US cybersecurity policy. The NDAA instructs US Cyber Command to undertake cyber \u2018war games\u2019<\/a> to ensure the nation\u2019s cyber capabilities rival its opponents\u2019 in a future offensive cyber conflict. The Act explicitly identifies Russia, China, Iran and North Korea as the countries that the US must be most prepared to confront in cyberspace. It also authorises a budget<\/a> of up to US$200 million for the Secretary of Defense to perform an \u2018evaluation of cyber vulnerabilities of major weapons systems\u2019. The move is partly in response to an inspection of the weapons program<\/a> last year, which revealed widespread network vulnerabilities, unpatched software and weak passwords. Finally, the NDAA entrusts US Cyber Command with its own procurement budget<\/a> designed to facilitate the rapid adaptation required for effective cybersecurity. All 1,300 pages of the Defense spending bill are set to be approved<\/a> and signed by President Obama this week.<\/p>\n

War gaming seems to be the theme of the week, with the US and the UK teaming up<\/a> to test the cyber resilience of their financial institutions. Last Thursday\u2019s exercise involved each state simulating an attack on the other\u2019s financial sector to test the levels of information sharing, communication with the public and management of the incident. Participating actors<\/a> included the White House National Security Council, the US Department of the Treasury, the FBI and the US Federal Reserve Bank of New York on the US side, and the UK Intelligence Community, the Bank of England and Her Majesty\u2019s Treasury on the British side. Originally announced by President Obama and Prime Minister Cameron back in January, this war-game was designed to enhance<\/a> transatlantic cooperation and collective resilience in cyberspace.<\/p>\n

Privacy is a significant concern for internet users and apparently prison inmates are no exception. Securus Technologies, a leading provider of phone services inside US prisons, suffered a data breach<\/a> that revealed the company has been recording all inmates\u2019 conversations. The Intercept <\/em>released a report<\/a> claiming that a hacker provided them with Securus records of over 70 million phone calls that not only includes the call metadata (time, date, duration etc.) but also a \u2018recording URL\u2019 of the conversation audio. Now, it\u2019s actually a widely accepted procedure to monitor inmates\u2019 personal phone calls for security reasons. What makes this revelation interesting is that at least 14,000 of them<\/a> are between inmates and attorneys. \u00a0If that\u2019s proven to be the case, it may have undermined inmates\u2019 Sixth Amendment rights to a fair trial and has been described by David Fathi,<\/a> Director of the American Civil Liberties Union, as \u2018the most massive breach of attorney-client privilege in US history\u2019. While Securus is currently denying the existence of those illegal records, the company is also claiming that the data in question wasn’t obtained through a hack<\/a>, but leaked by an individual with authorized access.<\/p>\n

A number of recent events have revived questions around the relationship between the FBI, Carnegie Melon University (CMU), and arrests of dark net users. Tor Project Director Roger Dingledine is claiming<\/a> that the FBI paid CMU at least US$1 million for its research that de-anonymises Tor users. Last July, two CMU researchers, Alexander Volynkin and Michael McCord, were going to hold a talk at the Black Hat Conference titled \u2018you don\u2019t have to be the NSA to break Tor\u2019; however they pulled out<\/a> at the last minute. Shortly after, the FBI conducted Operation Onymous<\/a>, a multi-agency effort that took down multiple Tor-based websites, including Silk Road 2.0, and led to 17 arrests. Court documents from the proceeding trial of drug distributor Brian Farrell reveal the prosecution based Farrell\u2019s involvement with Silk Road 2.0 on information obtained from \u2018a university-based research institute<\/a>\u2019. According to Dingledine, the implied collaboration between CMU and the FBI to expose Tor-users\u2019 information isn\u2019t only unethical, but also a violation of the Fourth Amendment<\/a> if the FBI didn\u2019t obtain a warrant. The FBI has stated<\/a> that those accusations are \u2018inaccurate\u2019, although speculation remains over whether it\u2019s the accusation or the amount paid that\u2019s inaccurate.<\/p>\n

The tragic terrorist attacks that occurred in Paris last weekend have reverberated in cyberspace. The events re-opened the debate<\/a> around encrypted messaging technologies and whether tech companies should be required to provide law enforcement with \u2018back-doors\u2019 to their encrypted communications. It was only last month<\/a> that the Obama administration decided to not force companies to open their backdoors, however ISIS\u2019 use of encrypted apps<\/a>, such as Wickr, Signal and Telegram, to broadcast responsibility for both the crash of the Russian jet in the Sinai Peninsula at the end of October and last weekend\u2019s Paris attacks has intensified demands. It\u2019s suggested that ISIS exploited the encrypted connections of PlayStation 4<\/a> to execute the Paris attacks. Many are blaming <\/a>the continued prioritisation of privacy over security following the Snowden revelations.<\/p>\n

You might also be interested to know that hactivist collective Anonymous has joined the coalition and declared war on ISIS<\/a> with #OpParis.<\/p>\n

And finally, speaking of cyberspace and terrorism, check out this great Sydney Morning Herald<\/em> article<\/a> that distinguishes between cyber terrorism in Hollywood and reality.<\/p>\n","protected":false},"excerpt":{"rendered":"

The 2016 National Defense Authorization Act (NDAA) passed US Congress last week and has interesting implications for US cybersecurity policy. The NDAA instructs US Cyber Command to undertake cyber \u2018war games\u2019 to ensure the nation\u2019s …<\/p>\n","protected":false},"author":390,"featured_media":23447,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[638,391,713,1038,1548],"class_list":["post-23446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-anonymous","tag-cyber","tag-cyberattack","tag-fbi","tag-paris-attacks"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The 2016 National Defense Authorization Act (NDAA) passed US Congress last week and has interesting implications for US cybersecurity policy. The NDAA instructs US Cyber Command to undertake cyber \u2018war games\u2019 to ensure the nation\u2019s ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-18T01:28:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/15586306097_6b71456192_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/15586306097_6b71456192_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/15586306097_6b71456192_z.jpg\",\"width\":640,\"height\":360,\"caption\":\"PS4\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/#primaryimage\"},\"datePublished\":\"2015-11-18T01:28:19+00:00\",\"dateModified\":\"2015-11-18T01:28:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The 2016 National Defense Authorization Act (NDAA) passed US Congress last week and has interesting implications for US cybersecurity policy. The NDAA instructs US Cyber Command to undertake cyber \u2018war games\u2019 to ensure the nation\u2019s ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-11-18T01:28:19+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/15586306097_6b71456192_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/15586306097_6b71456192_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/15586306097_6b71456192_z.jpg","width":640,"height":360,"caption":"PS4"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/#primaryimage"},"datePublished":"2015-11-18T01:28:19+00:00","dateModified":"2015-11-18T01:28:19+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-97\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23446"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=23446"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23446\/revisions"}],"predecessor-version":[{"id":23449,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23446\/revisions\/23449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/23447"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=23446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=23446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=23446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}