{"id":27779,"date":"2016-07-20T13:30:10","date_gmt":"2016-07-20T03:30:10","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=27779"},"modified":"2016-07-20T14:27:19","modified_gmt":"2016-07-20T04:27:19","slug":"cyber-wrap-128","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

Yesterday\u2019s appointment of Malcolm Turnbull\u2019s new ministry has followed through with the commitment made in last year\u2019s<\/span> Cyber Security Strategy to create a ministerial position for cyber security<\/span><\/a>. Dan Tehan from Victoria has added<\/span> Minister assisting the Prime Minister for Cyber Security<\/span><\/a>, in addition to his other roles as Minister for Defence Personnel, Minister for Veteran\u2019s Affairs and Minister assisting the Prime Minister for the centenary of ANZAC.<\/span><\/p>\n

Part of Tehan\u2019s responsibilities will be leading work with the private sector to implement the government\u2019s cyber<\/span> strategy<\/span><\/a>. The other change relevant to cyber policy and security is<\/span> Greg Hunt\u2019s move to the Industry, Innovation and Science portfolio.<\/span><\/a> Mitch Fifield remains in Communications, Angus Taylor retains Assistant Minister for cities and digital transformation, and Fiona Nash has kept the regional communications role.<\/span><\/p>\n

In the US, Department of Defense leaders are apparently<\/span> \u2018frustrated\u2019<\/span><\/a> by the pace of Cyber Command\u2019s actions to disrupt Islamic State\u2019s online activities. Cyber Command\u2019s campaign against IS<\/span> is the first time the US has publicly acknowledged that Cyber Command is engaged in operations<\/span><\/a>, but the seven year-old command was established to tackle state actors, and<\/span> apparently is having difficulty getting the right people and capabilities in place to overcome IS<\/span><\/a> use of the internet for recruitment, operations and propaganda.<\/span><\/p>\n

A new<\/span> Joint Task Force, dubbed \u2018Ares\u2019 has been established<\/span><\/a> to conduct cyber operations against IS and coordinate with Central Command\u2019s plans and operations in Iraq and Syria. Officials suggested <\/span>to<\/span><\/i> The<\/span><\/i> Washington Post<\/span><\/i><\/a> that possible actions might include disrupting payment systems, chat apps and other online platforms such as IS\u2019 magazine \u2018Dabiq\u2019, but that IS was able to counteract this by switching to new servers and other hardware to stay ahead of US cyber operations against them.<\/span><\/p>\n

The attempted coup in Turkey over the weekend took advantage of the security features of messaging app<\/span> WhatsApp to coordinate operations across the country<\/span><\/a>. However it seems that despite realising the advantages of encrypted online communications for their planning<\/span>, the coup\u2019s leaders didn\u2019t take account of the power of the internet and social media to rally resistance<\/span><\/a>, as President Erdogan did via FaceTime from his plane. While they did seize control of two television channels, access to the internet and social media wasn\u2019t significantly disrupted during the coup.<\/span><\/p>\n

The military<\/span> did attempt to throttle access<\/span><\/a> to social media but this appears to have been quickly overhauled by the President after only a few hours.<\/span> Security researcher \u2018the grugq\u2019 noted on Medium<\/span><\/a> that by failing to cut access to cyberspace the coup was bound to fail, as Erdogan could still call on supporters to oppose the coup. Grugq goes on to compare the successful coups in Thailand in<\/span> 2006<\/span><\/a> and<\/span> 2014<\/span><\/a> to the failure in Turkey, noting that the Thai coups succeeded in part because they quickly denied access to mass communication by political leaders by either cutting the power, or detaining them <\/span>en masse<\/span><\/i>. He concludes that a successful coup plan needs to better incorporate cyberspace into its execution, and within the first hour cut power to main cities, neutralise leadership and take over all telcos, ISPs and TV stations.<\/span><\/p>\n

And finally, Pok\u00e9mon Go has<\/span> literally taken over the world<\/span><\/a>. Its popularity has made it a target for cyber criminals<\/span> using third party apps infected with malware<\/span><\/a>, and hackers seeking notoriety who brought down<\/span> \u00a0servers for US and European players last Saturday<\/span><\/a>. The DDOS incident was claimed by hacker group<\/span> \u2018PoodleCorp\u2019<\/span><\/a>, who promised more to come. But how can you join in and battle with your friends if you\u2019re a spy and need to protect your identity, location and other sensitive personal information? Luckily the US government has created a guide for employees on how to catch em\u2019 all without breaching operational security, kindly shared by<\/span> Thomas Rid on Twitter<\/span><\/a>. Some of the advice is<\/span> good cyber security advice generally<\/span><\/a>, such as avoiding play in areas you don\u2019t want to be geo-tagged and not using personal Gmail accounts. Other tips such as<\/span> \u2018do not attempt to catch Pok\u00e9mon while driving\u2019<\/span><\/a> also seem pretty sensible. Wait, is that a<\/span> Vaporeon<\/span><\/a>?<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

Yesterday\u2019s appointment of Malcolm Turnbull\u2019s new ministry has followed through with the commitment made in last year\u2019s Cyber Security Strategy to create a ministerial position for cyber security. Dan Tehan from Victoria has added Minister …<\/p>\n","protected":false},"author":364,"featured_media":27780,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,95,1748,747],"class_list":["post-27779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-cyber-security","tag-pokemon","tag-turkey"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Yesterday\u2019s appointment of Malcolm Turnbull\u2019s new ministry has followed through with the commitment made in last year\u2019s Cyber Security Strategy to create a ministerial position for cyber security. Dan Tehan from Victoria has added Minister ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-20T03:30:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-07-20T04:27:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/07\/9076215503_5a3117918c_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/07\/9076215503_5a3117918c_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/07\/9076215503_5a3117918c_z.jpg\",\"width\":640,\"height\":360,\"caption\":\"Image courtesy of Flickr user Lee McKusick\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/#primaryimage\"},\"datePublished\":\"2016-07-20T03:30:10+00:00\",\"dateModified\":\"2016-07-20T04:27:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Yesterday\u2019s appointment of Malcolm Turnbull\u2019s new ministry has followed through with the commitment made in last year\u2019s Cyber Security Strategy to create a ministerial position for cyber security. Dan Tehan from Victoria has added Minister ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-07-20T03:30:10+00:00","article_modified_time":"2016-07-20T04:27:19+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/07\/9076215503_5a3117918c_z.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/07\/9076215503_5a3117918c_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/07\/9076215503_5a3117918c_z.jpg","width":640,"height":360,"caption":"Image courtesy of Flickr user Lee McKusick"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/#primaryimage"},"datePublished":"2016-07-20T03:30:10+00:00","dateModified":"2016-07-20T04:27:19+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-128\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27779"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=27779"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27779\/revisions"}],"predecessor-version":[{"id":27781,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27779\/revisions\/27781"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/27780"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=27779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=27779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=27779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}