{"id":27027,"date":"2016-06-08T12:03:14","date_gmt":"2016-06-08T02:03:14","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=27027"},"modified":"2016-06-09T09:01:00","modified_gmt":"2016-06-08T23:01:00","slug":"cyber-wrap-123","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"The<\/span> ghosts of social media accounts past<\/span><\/a> have come back to haunt millions of people this week, with the release of user credentials for<\/span> 360 million MySpace users<\/span><\/a> being released for sale online. Selling stolen credentials<\/span> can be a lucrative business<\/span><\/a>, and reseller LeakedSource.com has<\/span> reportedly<\/span><\/a> added 1 billion records to its database in the past month. One high profile victim was<\/span> Facebook founder and CEO Mark Zuckerberg<\/span><\/a>, who has been caught red handed breaking the cardinal rule of password security and reusing the same password for multiple sites (yeah I know\u2026we all do it). Zuckerberg\u2019s Twitter and Pinterest accounts were hacked using the password \u2018dadada\u2019, which also<\/span> appeared<\/span><\/a> as one of 100 million LinkedIn credentials leaked last month. If you want to check if any of your old accounts have been compromised,<\/span> click here<\/span><\/a>.<\/span><\/p>\n

The annual Shangri-La Dialogue<\/span> devoted a dedicated special session to cyber issues for the first time<\/span><\/a> over the weekend. William Saito, special adviser on cybersecurity to the Japanese Cabinet<\/span> noted that Japan was focussed on defending infrastructure critical to the 2020 Tokyo Olympic games<\/span><\/a> from cyber threats, while the head of Singapore\u2019s Cyber Security Agency David Koh highlighted the ability of malicious cyber actors to take advantage of the seams in regulation between countries to avoid punishment. One of the largest barriers to greater cooperation on cybersecurity is the<\/span> different objectives of major international states for the future of the internet<\/span><\/a>, which former US National Intelligence Officer for Cybersecurity Sean Kanuck noted means that \u2018it probably isn’t a surprise that the accomplishments to date have been modest\u2019.<\/span><\/p>\n

US Defense Secretary Ash Carter also noted<\/span> the growing anxiety in the Asia\u2013Pacific about China’s actions in cyberspace<\/span><\/a> at Shangri-La. These comments echoed Carter\u2019s speech to the<\/span> US Naval Academy on 27 May<\/span><\/a>, which moved beyond the usual calling out of Chinese cyber espionage and linked China\u2019s behaviour in cyberspace to its actions in the South China Sea. His criticism at the Academy also had a heavy trade focus, saying that Chinese regulation of digital trade undercuts the<\/span> principles of the global system from which China has benefitted<\/span><\/a>. It\u2019s likely Carter\u2019s message was also intended to hit home before the Sino-US<\/span> Strategic and Economic Dialogu<\/span><\/a>e in Beijing this week, where cyber issues were also high on the agenda. <\/span>The Wall Street Journal<\/span><\/i> has a good summary of new Chinese cyber regulations<\/span> here<\/span><\/a> and there\u2019s a more in-depth discussion of Chinese cyber laws from <\/span>The Diplomat<\/span><\/i> here<\/span><\/a>.<\/span><\/p>\n

The<\/span> NATO conference in Warsaw next month<\/span><\/a> will focus on the alliance\u2019s cyber capabilities and threats. German Major General Ludwig Leinhos, head of the Bundeswehr\u2019s fledgling Cyber Command, told reporters that he expects that<\/span> NATO will officially designate cyberspace as an operational domain of warfare<\/span><\/a>. NATO\u2019s refocus on Russia has brought with it attention on Russia\u2019s asymmetric capabilities including cyber capabilities. However,<\/span> despite warnings of a new arms race by figures such as Mikko Hypponen<\/span><\/a>, a US Defense spokesperson<\/span> told Russian news outlet Sputnik this week<\/span><\/a> that due to Russian actions in Ukraine, the US has no plans to discuss cyberspace with the Russian military.<\/span><\/p>\n

There have been renewed calls in India to stand up a Cyber Command,<\/span> first promised in 2013<\/span><\/a> after a cyber espionage campaign targeting Indian government officials was reported by<\/span> FireEye<\/span><\/a>. The group,<\/span> suspected<\/span><\/a> to be a Pakistani APT previously observed by FireEye, used spear phishing tactics to dupe officials into opening a Microsoft Word document that<\/span> dropped a malicious payload called BreachRAT<\/span><\/a>, opening a backdoor to the users information. ASPI has previously commented on the slowness of India\u2019s implementation of its 2013 National Cyber Policy in the 2015<\/span> Cyber Maturity in the Asia\u2013Pacific report<\/span><\/a>.<\/span><\/p>\n

On a final note, make sure to check out ASPI\u2019s latest publication,<\/span> Agenda for Change 2016<\/span><\/i><\/a>: Strategic choices for the next government<\/span><\/i> released yesterday. The International Cyber Policy Centre has summed up the key cyber issues facing the next government and made five key recommendations them to quickly address critical \u00a0cyber policy challenges, and to take a leading role\u2014regionally and globally\u2014in overcoming cyber threats:<\/span><\/p>\n

    \n
  1. Effectively implement the recently announced Australian Cyber Security Strategy.<\/span><\/li>\n
  2. Deliver an international cyber strategy. Appoint an ambassador who will be able to hit the ground running and quickly engage internationally. Increase the budget for capacity building in line with regional aspirations outlined in the international strategy.<\/span><\/li>\n
  3. Devise a strategy to fill IT skills shortages in the immediate short-term (<2years).<\/span><\/li>\n
  4. Ensure that the government\u2019s threat information sharing centres are accessible, productive and effective. Removing red tape around security classifications and access to information will be crucial, as will providing threat information that\u2019s timely, relevant and actionable.<\/span><\/li>\n
  5. Release a publicly accessible Defence Department policy on how cyber operations, both offensive and defensive, are governed and integrated into broader Defence activities. This will support the coherent development of those capabilities, assist efforts to shape international cyber policy in line with the whole-of-government strategy and maintain a rules-based global order as outlined in the 2016 DWP.<\/span><\/li>\n<\/ol>\n

    Late news just in, New Zealand has announced that it has an offensive cyber capability in its new<\/span> Defence White Paper<\/span><\/a>, released today. Defence Minister Gerry Brownlee told media that<\/span> New Zealand has developed the capability to deter cyber interference in critical defence networks<\/span><\/a>. In case you missed it, Jim Lewis has explained the rationale for such capabilities for ASPI<\/span> here<\/span><\/a>, and on<\/span> The Strategist <\/span><\/i>earlier today<\/span><\/a>. \u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

    The ghosts of social media accounts past have come back to haunt millions of people this week, with the release of user credentials for 360 million MySpace users being released for sale online. Selling stolen …<\/p>\n","protected":false},"author":364,"featured_media":27034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,713,1263],"class_list":["post-27027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyberattack","tag-cyberspace"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The ghosts of social media accounts past have come back to haunt millions of people this week, with the release of user credentials for 360 million MySpace users being released for sale online. Selling stolen ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-08T02:03:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-08T23:01:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/binary-1188505_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"451\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/binary-1188505_640.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/binary-1188505_640.jpg\",\"width\":640,\"height\":451},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/#primaryimage\"},\"datePublished\":\"2016-06-08T02:03:14+00:00\",\"dateModified\":\"2016-06-08T23:01:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The ghosts of social media accounts past have come back to haunt millions of people this week, with the release of user credentials for 360 million MySpace users being released for sale online. Selling stolen ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-06-08T02:03:14+00:00","article_modified_time":"2016-06-08T23:01:00+00:00","og_image":[{"width":640,"height":451,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/binary-1188505_640.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/binary-1188505_640.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/binary-1188505_640.jpg","width":640,"height":451},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/#primaryimage"},"datePublished":"2016-06-08T02:03:14+00:00","dateModified":"2016-06-08T23:01:00+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-123\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27027"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=27027"}],"version-history":[{"count":7,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27027\/revisions"}],"predecessor-version":[{"id":27056,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27027\/revisions\/27056"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/27034"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=27027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=27027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=27027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}