{"id":26682,"date":"2016-05-18T12:30:57","date_gmt":"2016-05-18T02:30:57","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=26682"},"modified":"2016-05-18T12:09:52","modified_gmt":"2016-05-18T02:09:52","slug":"cyber-wrap-120","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Encryption\"<\/p>\n

In an interesting turn of events, it appears that the 2014 Sony hack, February\u2019s Bangladeshi bank heist and the attempted breach of a Vietnamese bank last year may<\/span> all be linked<\/span><\/a>. Vietnam\u2019s Tien Phong Bank released a statement over the weekend saying it<\/span> disrupted an attempted cyber heist<\/span><\/a> valued at US$1.1 million at the end of last year. The thwarted incident and the<\/span> breach of Bangladesh\u2019s central<\/span><\/a> bank in February are both thought to have<\/span> targeted SWIFT<\/span><\/a>, the central network for global financial transactions, with fraudulent transfer requests. SWIFT\u2019s CEO has<\/span> denied claims<\/span><\/a> that vulnerabilities in the payment network facilitated the Bangladesh heist, with the company releasing a<\/span> statement<\/span><\/a> arguing that PDF-targeting malware was used to initiate fraudulent bank transfers. However, security firm BAE has just published<\/span> a blog<\/span><\/a> highlighting the \u2018strong links\u2019 between the methods used in those two bank incidents and the<\/span> infamous hack of Sony Pictures<\/span><\/a> in 2014. The similarities suggest that these events are part of a broader campaign that could be traced back to a<\/span> single group of hackers<\/span><\/a>.<\/span><\/p>\n

To counter such breaches in the future, IBM\u2019s super computer, Watson, is now being trained to<\/span> combat cybercrime<\/span><\/a>. The computing system already excels in many areas, including<\/span> healthcare<\/span><\/a>,<\/span> cooking<\/span><\/a>,<\/span> finance<\/span><\/a>,<\/span> customer service<\/span><\/a> and<\/span> playing Jeopardy<\/span><\/a>.<\/span> IBM describes Watson<\/span><\/a> as \u2018a technology platform that uses natural language processing and machine learning to reveal insights from large amounts of unstructured data\u2019. Now,<\/span> eight universities<\/span><\/a> across the US will be part of the effort to expand Watson\u2019s knowledge on the topic of cybercrime. IBM will provide Watson with<\/span> 15,000 annotated security documents per month<\/span><\/a>, and expects it to attain an expert level of understanding of the cybersecurity landscape and the ability to monitor large scale trends, as well as the ability to detect potential threats. Watch a video explaining the process<\/span> here<\/span><\/a>.<\/span><\/p>\n

The US<\/span> Senate has asked President Obama<\/span><\/a> to develop a national definition of cyberwar. Republican Senator Mike Rounds has proposed the<\/span> Cyber Act of War Act 2016<\/span><\/i><\/a>, which would \u2018require the President to develop a policy for determining when an action carried out in cyberspace constitutes an act of war against the United States, and for other purposes\u2019. Rounds\u2019 suggestion has raised criticism, including this<\/span> CFR<\/span> article<\/span><\/a> that describes the bill as \u2018an ill-conceived proposal that deserves to die, quickly, in Congress\u2019.<\/span><\/p>\n

The US Department of Commerce\u2019s National Telecommunications and Information Administration (NTIA) has<\/span> published new research<\/span><\/a> revealing that the<\/span> ongoing encryption debate<\/span><\/a> is eroding public confidence in the safety of the Internet. A survey of 41,000 households in the US revealed that nearly one in two individuals report that privacy and security concerns now prevent them from doing even simple things online. NTIA has<\/span> raised concerns<\/span><\/a> that this significant loss of trust may \u2018reduce economic activity and hamper the free exchange of ideas online\u2019, a trend that<\/span> could be reversed<\/span><\/a> by encouraging broad use of strong encryption technologies.<\/span><\/p>\n

Last Wednesday, Chinese and US officials<\/span> met in DC to discuss cyber issues<\/span><\/a> for the first time since establishing some common cyber principles as part of a broader bilateral<\/span> agreement in September<\/span><\/a> last year. The first iteration of the new Senior Experts Group,<\/span> \u00a0included<\/span><\/a> US representatives from the US Department of State, Department of Defense, and Department of Homeland Security, with Chinese representatives from the Ministry of Foreign Affairs, Ministry of National Defense, Cyberspace Administration of China, and the Ministry of Public Security.<\/span> According<\/span><\/a> to the Chinese Foreign Ministry\u2019s spokesperson, the discussions took place in a \u2018positive, in-depth and constructive way, touching upon norms for state behaviour and cyberspace-related international law and confidence-building measures\u2019. The group is expected to<\/span> meet twice a year<\/span><\/a>, and represents an improvement of bilateral cyber relations after China<\/span> withdrew from a similar initiative<\/span><\/a> in response to the US indictment of five Chinese military officers in 2014.<\/span><\/p>\n

Unfortunately, it\u2019s not all good news in Sino\u2013US cyber relations. The recent release of US Defense Department\u2019s annual report to Congress,<\/span> Military and Security Developments Involving the People\u2019s Republic of China<\/span><\/i><\/a>, offers a critical assessment of Chinese cyber posturing. It<\/span> re-issues accusations<\/span><\/a> of China\u2019s attempts on US government networks, describing the use of \u2018cyber capabilities to support intelligence collection against the US diplomatic, economic, and defense industrial base sectors that support US national defense programs\u2019. Chinese Defence Ministry spokesman Yang Yujun<\/span> denounced<\/span><\/a> the report as having \u2018deliberately distorted\u2019 Chinese defence policies, while Chinese Foreign Ministry spokesman Hong Lei<\/span> described<\/span><\/a> it as \u2018full of prejudice against China\u2019. At the same time, <\/span>The New York Times <\/span><\/i>is<\/span> reporting<\/span><\/a> that Chinese authorities have been secretly reviewing the security features of tech products sold in China by overseas companies. The assessments are supposedly run by a committee within the Cyberspace Administration of China and are expected to create a \u2018new front in an already tense relationship with Washington over digital security\u2019.<\/span><\/p>\n

Lastly, please join us in a moment of silence to honour the timely<\/span> death of <\/span>CSI: Cyber<\/span><\/i><\/a>. Ok, that\u2019ll do.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

In an interesting turn of events, it appears that the 2014 Sony hack, February\u2019s Bangladeshi bank heist and the attempted breach of a Vietnamese bank last year may all be linked. Vietnam\u2019s Tien Phong Bank …<\/p>\n","protected":false},"author":390,"featured_media":26683,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,391,1570],"class_list":["post-26682","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyber","tag-encryption"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"In an interesting turn of events, it appears that the 2014 Sony hack, February\u2019s Bangladeshi bank heist and the attempted breach of a Vietnamese bank last year may all be linked. Vietnam\u2019s Tien Phong Bank ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-18T02:30:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-18T02:09:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/privacy-policy-445153_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/privacy-policy-445153_640.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/privacy-policy-445153_640.jpg\",\"width\":640,\"height\":480,\"caption\":\"Encryption\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/#primaryimage\"},\"datePublished\":\"2016-05-18T02:30:57+00:00\",\"dateModified\":\"2016-05-18T02:09:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"In an interesting turn of events, it appears that the 2014 Sony hack, February\u2019s Bangladeshi bank heist and the attempted breach of a Vietnamese bank last year may all be linked. Vietnam\u2019s Tien Phong Bank ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-05-18T02:30:57+00:00","article_modified_time":"2016-05-18T02:09:52+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/privacy-policy-445153_640.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/privacy-policy-445153_640.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/privacy-policy-445153_640.jpg","width":640,"height":480,"caption":"Encryption"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/#primaryimage"},"datePublished":"2016-05-18T02:30:57+00:00","dateModified":"2016-05-18T02:09:52+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-120\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26682"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=26682"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26682\/revisions"}],"predecessor-version":[{"id":26684,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26682\/revisions\/26684"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/26683"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=26682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=26682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=26682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}