{"id":25523,"date":"2016-03-23T12:00:38","date_gmt":"2016-03-23T01:00:38","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=25523"},"modified":"2016-03-23T12:35:24","modified_gmt":"2016-03-23T01:35:24","slug":"cyber-wrap-112","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

The encryption debate has raged on this week with new developments in the rift between the US government and Apple over access to the iPhone used by Syed Farook, one of the<\/span> San Bernardino attackers<\/span><\/a>. Apple CEO Tim Cook recently<\/span> described<\/span><\/a> the FBI\u2019s behaviour as \u2018overreach\u2019 and made it clear that the backdoor access being requested is \u2018too dangerous to create\u2019. At Apple\u2019s product launch on Monday,<\/span> Cook also stated<\/span><\/a> that Apple \u2018will not shrink from this responsibility\u2019 to protect the privacy of their customers.<\/span><\/p>\n

In an unexpected twist, the Department of Justice moved to postpone court proceedings, having apparently been offered an<\/span> alternative method<\/span><\/a> to access Farook\u2019s phone data that may render Apple\u2019s cooperation unnecessary. Magistrate Judge Sheri Pym<\/span> cancelled<\/span><\/a> Tuesday\u2019s hearing and the government has<\/span> until 5 April<\/span><\/a> to determine whether it wishes to pursue the case. The Justice Department didn\u2019t provide details of its prospective encryption-cracking methodology, but the announcement came<\/span> only a day<\/span><\/a> after researchers at John Hopkins University<\/span> revealed a weakness<\/span><\/a> in Apple\u2019s encryption software.<\/span><\/p>\n

The encryption discussion continues to simmer across the Atlantic. A<\/span> report<\/span><\/a> in the <\/span>New York Times <\/span><\/i>reveals new details of the tactics used by the perpetrators of the<\/span> November Paris attacks<\/span><\/a>. The<\/span> discovery<\/span><\/a> of a number of disposable phones in a rubbish bin outside the Bataclan Theatre suggests the team\u2019s disciplined use of old-school burner phones, not encryption, might have been a key to their success in avoiding detection.<\/span><\/p>\n

The tension between digital privacy and public security keeps finding new life. In the wake of the tragic<\/span> events in Brussels<\/span><\/a> last night,<\/span> questions are already being asked<\/span><\/a> over the role encryption played in the execution of the attacks.<\/span><\/p>\n

Bangladesh\u2019s central bank is<\/span> considering a lawsuit<\/span><\/a> against the Federal Reserve Bank of New York in response to the massive cyber breach it experienced earlier this month. Hackers successfully<\/span> stole $81 million<\/span><\/a> from Bangladesh Bank\u2019s account with the NY Fed by instructing funds be transferred to bank accounts in the Philippines. It has been<\/span> described<\/span><\/a> as \u2018one of the largest cyber robberies in history\u2019 and has shaken confidence in the Fed despite<\/span> the bank\u2019s claim<\/span><\/a> that \u2018there is no evidence that any Fed systems were compromised.\u2019 Bangladesh Bank has reportedly<\/span> hired a US lawyer<\/span><\/a> and according to an internal report is \u2018preparing the ground to make a legitimate claim for the loss of funds against the FRB\u2019. The<\/span> disappearance<\/span><\/a> of cyber crime expert, Tanveer Hassan Zoha, after his discussions with police and media about the incident, suggests this will be one to watch.<\/span><\/p>\n

This week the<\/span> UK has revealed<\/span><\/a>\u00a0its new national cyber security strategy will focus on protecting its economy. The<\/span> first task<\/span><\/a> of the new National Cyber Security Centre (NCSC),<\/span> announced<\/span><\/a> in November, will be to focus on engagement with the private sector. The NCSC will work with the<\/span> Bank of England<\/span><\/a> to develop industry\u2019s understanding of cyber threats and help set standards of cyber resilience. The move is described as a response to the \u2018<\/span>industrial-scale theft<\/span><\/a>\u2019 of sensitive data that cost British businesses an average of\u00a0\u00a3375,000 last year.<\/span><\/p>\n

Finally, NATO\u2019s Cooperative Cyber Defence Centre of Excellence has made another contribution to the cyber debate. Their new report,<\/span> International Cyber Norms: Legal, Policy & Industry Perspectives<\/span><\/i><\/a>, was developed through a series of workshops during 2014 and 2015, and seeks to explain the concept of cyber norms and the differing approaches to the issue across research areas. The book was launched on 18 March in Tallinn, Estonia\u2014<\/span>itself a notable city for cyber wonks<\/span><\/a>\u2014and<\/span> features<\/span><\/a> chapters by UNSW Canberra professors Toni Erskine and Greg Austin.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

The encryption debate has raged on this week with new developments in the rift between the US government and Apple over access to the iPhone used by Syed Farook, one of the San Bernardino attackers. …<\/p>\n","protected":false},"author":390,"featured_media":25533,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1500,391,95,1570,1038],"class_list":["post-25523","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-apple","tag-cyber","tag-cyber-security","tag-encryption","tag-fbi"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The encryption debate has raged on this week with new developments in the rift between the US government and Apple over access to the iPhone used by Syed Farook, one of the San Bernardino attackers. ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-23T01:00:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-03-23T01:35:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/5658827200_44577279a4_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/5658827200_44577279a4_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/5658827200_44577279a4_z.jpg\",\"width\":640,\"height\":426,\"caption\":\"Image courtesy of Flickr user Stuart Webster\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/#primaryimage\"},\"datePublished\":\"2016-03-23T01:00:38+00:00\",\"dateModified\":\"2016-03-23T01:35:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The encryption debate has raged on this week with new developments in the rift between the US government and Apple over access to the iPhone used by Syed Farook, one of the San Bernardino attackers. ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-03-23T01:00:38+00:00","article_modified_time":"2016-03-23T01:35:24+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/5658827200_44577279a4_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/5658827200_44577279a4_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/03\/5658827200_44577279a4_z.jpg","width":640,"height":426,"caption":"Image courtesy of Flickr user Stuart Webster"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/#primaryimage"},"datePublished":"2016-03-23T01:00:38+00:00","dateModified":"2016-03-23T01:35:24+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-112\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25523"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=25523"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25523\/revisions"}],"predecessor-version":[{"id":25538,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/25523\/revisions\/25538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/25533"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=25523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=25523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=25523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}