{"id":26033,"date":"2016-04-20T12:30:47","date_gmt":"2016-04-20T02:30:47","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=26033"},"modified":"2016-04-20T11:23:32","modified_gmt":"2016-04-20T01:23:32","slug":"cyber-wrap-116","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

Last week, the Department of Prime Minister and Cabinet<\/span> confirmed<\/span><\/a> that Australia\u2019s new cyber strategy will be released this Thursday. The update will be the first since the release of the<\/span> 2009 strategy<\/span><\/a>. Expect to see a big focus on skills, private sector collaboration and<\/span> information sharing<\/span><\/a>\u2014and an increased focus on how Australia can leverage the international components of its cyber relations and engagements. Check back on <\/span>The Strategist<\/span><\/i> from Thursday afternoon for in-depth coverage of the Strategy from the ICPC team.<\/span><\/p>\n

The Strategy\u2019s launch was announced at the Australian Cyber Security Centre\u2019s<\/span> annual conference<\/span><\/a> held last week. The ACSC conference is one of the few of its kind, bringing together both technical and policy experts from government and the private sector. This year over a thousand people attended the conference to hear<\/span> numerous<\/span><\/a> interesting<\/span><\/a> presentations<\/span><\/a> from government and private sector leaders. It was particularly refreshing to see such candidness from leaders representing both sectors as to the type of online<\/span> challenges<\/span><\/a> they face each day, and how they go about trying to tackle them.<\/span><\/p>\n

The UK Cabinet Office has released its final<\/span> Annual Report<\/span><\/a> on the UK Cyber Security Strategy 2011\u20132016. The Annual Report, which is presented to Parliament by the Minister for the Cabinet Office, is an opportunity for the government to outline how it is working to achieve the key objectives laid out in the original strategy. It shares practical information on program outcomes and achievements and details funding allocated to each thematic area over the five year program. Unsurprisingly, defence took the largest piece of the funding cake with AU$815.5 million dedicated to <\/span>National Sovereign capability to detect and defeat high end threats. <\/span><\/i>Law enforcement and cybercrime prevention efforts received $215.9 million and international engagement and capacity building $14.3 million. The Government is currently producing the UK\u2019s next cyber strategy which is expected to be<\/span> released<\/span><\/a> later this year.<\/span><\/p>\n

Last week President Obama<\/span> alluded to US operations taking place online against ISIS<\/span><\/a>. While this is the first time the President has acknowledged the US is carrying out cyber operations against ISIS, he was non-descript about what form those operations took. This week US Defense officials were more forthcoming,<\/span> sharing<\/span><\/a> with the Daily Beast that the operations have moved beyond basic disruption\u2014such as the blocking of encrypted communication channels\u2014to more targeted campaigns. That includes the infiltration of individual members\u2019 computers via spear phishing and the gathering of intelligence on their networks using malware.<\/span><\/p>\n

The US and Russia are set to<\/span> carry out<\/span><\/a> a high level bilateral meeting on cyber issues this week, but that won\u2019t affect the wider<\/span> freeze<\/span><\/a> in dialogue between the two countries following Russia\u2019s annexation of Crimea. The US State Department was quick to stress that the talks\u2014which will take place in Geneva with representatives from the White House, State Department and FBI\u2014weren\u2019t a restart of the stalled Bilateral Presidential Commission working group. It appears that the US is<\/span> keen<\/span><\/a> to keep dialogue open on cyber issues\u2014in particular the 2013 Bilateral US\u2013Russia Cyber confidence-building measures that led to the installation of the \u2018Cyber hotline\u2019 that exists between both counties<\/span> among other measures<\/span><\/a>.<\/span><\/p>\n

Bangladeshi police, working in collaboration with INTERPOL, believe they\u2019ve identified 20 individuals involved<\/span> in the theft<\/span><\/a> of over US$80 million dollars from the Bangladesh Central Bank. The robbery, which was carried out by a group of hackers from the Philippines and Sri Lanka, is estimated to be one of the largest ever bank heists. The hackers\u2019 details have been shared with counterpart police forces, and the Philippines Senate has<\/span> already begun<\/span><\/a> an inquiry as to how \u2018the money stolen from the Bangladesh central bank wound up with two casinos and a junket operator in the country\u2019.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

Last week, the Department of Prime Minister and Cabinet confirmed that Australia\u2019s new cyber strategy will be released this Thursday. The update will be the first since the release of the 2009 strategy. Expect to …<\/p>\n","protected":false},"author":133,"featured_media":26034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,1597,1330,163,31],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Last week, the Department of Prime Minister and Cabinet confirmed that Australia\u2019s new cyber strategy will be released this Thursday. The update will be the first since the release of the 2009 strategy. Expect to ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-20T02:30:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-04-20T01:23:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/21367191096_45424c4513_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"359\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/21367191096_45424c4513_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/21367191096_45424c4513_z.jpg\",\"width\":640,\"height\":359,\"caption\":\"Image courtesy of Flickr user Christiaan Colen\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/#primaryimage\"},\"datePublished\":\"2016-04-20T02:30:47+00:00\",\"dateModified\":\"2016-04-20T01:23:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Last week, the Department of Prime Minister and Cabinet confirmed that Australia\u2019s new cyber strategy will be released this Thursday. The update will be the first since the release of the 2009 strategy. Expect to ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-04-20T02:30:47+00:00","article_modified_time":"2016-04-20T01:23:32+00:00","og_image":[{"width":640,"height":359,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/21367191096_45424c4513_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/21367191096_45424c4513_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/21367191096_45424c4513_z.jpg","width":640,"height":359,"caption":"Image courtesy of Flickr user Christiaan Colen"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/#primaryimage"},"datePublished":"2016-04-20T02:30:47+00:00","dateModified":"2016-04-20T01:23:32+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-116\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26033"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=26033"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26033\/revisions"}],"predecessor-version":[{"id":26035,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26033\/revisions\/26035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/26034"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=26033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=26033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=26033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}