{"id":26222,"date":"2016-04-27T12:56:48","date_gmt":"2016-04-27T02:56:48","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=26222"},"modified":"2016-04-28T12:59:40","modified_gmt":"2016-04-28T02:59:40","slug":"cyber-wrap-117","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

The major cyber story of the week is the long-awaited release of<\/span> Australia\u2019s Cyber Security Strategy<\/span><\/a>, the first document of its kind<\/span> since 2009<\/span><\/a>. The Strategy outlines<\/span> $230 million of funding<\/span><\/a> for enhanced cyber security efforts over four years, with a focus on<\/span> five key themes<\/span><\/a>. Specifically, significant investment will be funnelled into<\/span> improving<\/span><\/a> the cyber capabilities of the AFP, Crime Commission, Australian Signals Directorate and Australia\u2019s Computer Emergency Response Team (CERT Australia).<\/span><\/p>\n

The Strategy\u2019s overarching principle of<\/span> public\u2013private sector partnership<\/span><\/a> informs the establishment of a Cyber Security Growth Centre and Joint Cyber Threat centres in capital cities. The government will also<\/span> relocate Australia\u2019s Cyber Security Centre<\/span><\/a> from the highly classified ASIO building to allow greater private-sector access.<\/span><\/p>\n

The Strategy establishes<\/span> new positions<\/span><\/a>: a Minister Assisting the Prime Minister on Cyber Security, a Special Advisor on Cyber Security (to be filled by Alastair MacGibbon), and a Cyber Ambassador to be appointed by Julie Bishop. Further, the development of a sustainable cyber-savvy workforce will be encouraged through investment in STEM education and the creation of<\/span> academic centres of excellence<\/span><\/a> in universities.<\/span><\/p>\n

Notably, the Strategy explicitly refers to Australia\u2019s offensive cyber capabilities\u2014a<\/span> first in Australia\u2019s rhetoric<\/span><\/a> surrounding cyber security. At the launch,<\/span> Turnbull stated<\/span><\/a> than an \u2018offensive cyber capability, housed in the Australian Signals Directorate, provides another option for the Government to respond\u2019.<\/span><\/p>\n

The Strategy has been hailed as \u2018<\/span>the most important and innovative government strategy yet written<\/a><\/span>\u2019. However, there has been criticism of the document\u2019s language not addressing the seriousness of contemporary cyber threats<\/span> strongly or directly enough<\/span><\/a>. Others are concerned that this underestimation is reflected in the funding on offer, which<\/span> falls short in comparison<\/span><\/a> to the billions being spent by Australia\u2019s peers. Last year, the UK announced plans to invest<\/span> \u00a31.9 billion<\/span><\/a> (A$3 billion) in cybersecurity, while the US has recently upped its spending by US$5 billion to a total of<\/span> US$19 billion<\/span><\/a> (A$24.8 billion). Check out some in-depth analysis of the new Strategy from the ICPC team<\/span> here<\/span><\/a>,<\/span> here<\/span><\/a> and<\/span> here<\/span><\/a>.<\/span><\/p>\n

In the US,<\/span> tech firms have banded together<\/span><\/a> to oppose a bill that would<\/span> effectively outlaw end-to-end encryption<\/span><\/a> and require companies to help the government decrypt customer data. A coalition of companies\u2014including Apple, Facebook, Google, Netflix, Microsoft and Twitter\u2014wrote an<\/span> open letter<\/span><\/a> to the sponsors of the<\/span> new bill<\/span><\/a>, Senators Richard Burr and Dianne Feinstein. The tech giants<\/span> warn against<\/span><\/a> the \u2018unworkable policies around encryption that would weaken the very defences we need to protect us from people who want to cause economic and physical harm\u2019.<\/span><\/p>\n

In an amusing concurrent development, popular instant messaging service Viber<\/span> just announced<\/span><\/a> it will make end-to-end encryption the default for its 700 million users. The company<\/span> stated<\/span><\/a> that it\u2019s \u2018proud that our users can confidently use Viber without war of their messages being intercepted\u2019. This comes<\/span> only a few weeks after WhatsApp<\/span><\/a> made the same transition.<\/span><\/p>\n

This week also brought an exciting development in Artificial Intelligence (AI) technology. Scientists from MIT\u2019s Computer Science and Artificial Intelligence Laboratory (<\/span>CSAIL<\/span><\/a>), in partnership with machine learning start-up<\/span> PatternEx<\/span><\/a>, <\/span>have<\/span> developed a hybrid machine<\/span><\/a> that can learn how to identify 85% of cyber attacks. The findings, which merge state-of-the-art AI and analyst intuition, were published in a paper titled<\/span> AI<\/span><\/i>2<\/span><\/i>: Training a big data machine to defend<\/span><\/i><\/a>. The initiative works on an active learning system, where artificial intelligence network assessments are verified by an analyst, and any corrections are integrated back into the machine as a<\/span> feedback loop<\/span><\/a> that continues to improve its detection accuracy. The system can reportedly<\/span> reduce false positives<\/span><\/a> by a factor of five and is about three times more accurate than comparable technologies\u2014a major development in the potential of AI for cybersecurity.<\/span><\/p>\n

Staying stateside, a<\/span> Bloomberg<\/span><\/i> report<\/span><\/a> has revealed that a US$12 billion tactical mobile Internet network used by the US Army suffers significant cyber security vulnerabilities. The<\/span> Warfighter Information Network-Tactical Increment 2<\/span><\/a>, or WIN-T, uses satellite and radio technology to offer secure voice, video and data communications to troops on the move. The network is<\/span> deployed<\/span><\/a> to 11 of the Army\u2019s combat brigades and is already in use in Iraq and Afghanistan. However, an assessment conducted by Johns Hopkins University and the Army Research Laboratory<\/span> recommended<\/span><\/a> \u2018improvement to user training techniques and hardware and software enhancements to harden against the cyberthreat\u2019. In light of those findings, the US Army and General Dynamics are undertaking efforts to upgrade systems already in use and line-up improvements that will be deployed through 2028.<\/span><\/p>\n

Notwithstanding its apparently flawed military cyber defences, the US has been having fun with its offensive cyber rhetoric this week. Check out this piece from\u00a0<\/span>The New York Times<\/span><\/i><\/a> to understand what US Deputy Defense Secretary Roger Work really means when he says the US is dropping \u2018cyberbombs\u2019 on ISIS.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

The major cyber story of the week is the long-awaited release of Australia\u2019s Cyber Security Strategy, the first document of its kind since 2009. The Strategy outlines $230 million of funding for enhanced cyber security …<\/p>\n","protected":false},"author":390,"featured_media":26225,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1060,391,1597,1570],"class_list":["post-26222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australian-cyber-security-centre","tag-cyber","tag-cyber-strategy","tag-encryption"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The major cyber story of the week is the long-awaited release of Australia\u2019s Cyber Security Strategy, the first document of its kind since 2009. The Strategy outlines $230 million of funding for enhanced cyber security ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-27T02:56:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-04-28T02:59:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/17509747641_123146b27c_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/17509747641_123146b27c_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/17509747641_123146b27c_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"Image courtesy of Flickr user Pabs D\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/#primaryimage\"},\"datePublished\":\"2016-04-27T02:56:48+00:00\",\"dateModified\":\"2016-04-28T02:59:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The major cyber story of the week is the long-awaited release of Australia\u2019s Cyber Security Strategy, the first document of its kind since 2009. The Strategy outlines $230 million of funding for enhanced cyber security ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-04-27T02:56:48+00:00","article_modified_time":"2016-04-28T02:59:40+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/17509747641_123146b27c_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/17509747641_123146b27c_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/04\/17509747641_123146b27c_z.jpg","width":640,"height":427,"caption":"Image courtesy of Flickr user Pabs D"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/#primaryimage"},"datePublished":"2016-04-27T02:56:48+00:00","dateModified":"2016-04-28T02:59:40+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-117\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26222"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=26222"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26222\/revisions"}],"predecessor-version":[{"id":26255,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26222\/revisions\/26255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/26225"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=26222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=26222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=26222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}