{"id":28416,"date":"2016-08-31T12:30:12","date_gmt":"2016-08-31T02:30:12","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=28416"},"modified":"2016-08-31T12:41:06","modified_gmt":"2016-08-31T02:41:06","slug":"cyber-wrap-134","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

Kicking off this week, China has invited<\/a> foreign tech corporations to join its government\u2019s central technical committee. Technical Committee 260, which reports to the Cyberspace Administration of China, is responsible<\/a> for establishing China\u2019s cyber security standards and will now feature Cisco, IBM, Intel and Microsoft as members. The move comes after intense criticism<\/a> of China\u2019s cyber regulations for being tough on international business interests, and has been interpreted as an attempt to placate those concerns. Ostensibly, these companies will now play a role in drafting China\u2019s cyber security legislation; however the extent of their influence is still an unknown.<\/p>\n

Cyber cooperation isn\u2019t all Beijing has on its mind however. Kaspersky stats show Chinese hacking of the defense, aviation and nuclear industries in Russia has almost tripled<\/a> since the beginning of the year. The clear focus on cyber espionage targeting critical national interests, rather than financial cybercrime on corporations, suggests these activities were either approved or undertaken by official Chinese representatives. This uptick of Russia\u2019s cyber suffering at the hands of the Chinese has interestingly coincided with a recent drop<\/a> in Chinese targeting of the US in cyberspace. Russia and China have historically demonstrated a fair degree of cooperation on cyber security, creating<\/a> and updating<\/a> a code of conduct for information security through the Shanghai Cooperation Organisation in 2011 and 2015, signing a bilateral \u2018non-aggression pact<\/a>\u2019 in May last year and releasing a joint statement<\/a> in June this year. However, these recent hacking trends may have confirmed suspicions<\/a> that such public comradeship may only be surface deep.<\/p>\n

Privacy feathers have been ruffled this week, with WhatsApp announcing<\/a> a new information sharing deal with Facebook. WhatsApp will now<\/a> disclose phone numbers and user activity analytics to its parent company in order to facilitate more targeted advertising and friend suggestions on Facebook, as well as fight spam. The new policy has raised eyebrows<\/a> across the world, representing WhatsApp\u2019s first diversion from its famous privacy vow<\/a> and Facebook\u2019s first steps to monetise the platform since purchasing it for US$22 billion in 2014. The good news is that users have the choice to opt-out<\/a> of this new policy change\u2014but you\u2019d better move fast because the window to do so is only open for 30 days. WhatsApp has provided a slightly awkward \u2018how-to\u2019 guide here<\/a>.<\/p>\n

The privacy battle between government and civil society continues in America. Last week, tech giants vocally rejected<\/a> the Obama administration\u2019s proposal to request the social media accounts of foreign visitors in an attempt to identify terrorist threats. The proposed change<\/a> would create a field stating \u2018please enter information associated with your online presence\u2019 on the US\u2019s ESTA and I-94W arrival\/departure forms. The companies, including Google, Facebook and Twitter, warn<\/a> that the proposed measure will \u2018have a chilling effect on the use of social media networks, online sharing and, ultimately, free speech online\u2019. Civil liberties advocacy groups have also argued<\/a> in an open letter that beyond invading individuals\u2019 personal privacy, this measure will be \u2018ineffective and prohibitively expensive to implement and maintain\u2019.<\/p>\n

Across the Atlantic, France and Germany are pushing<\/a> for a European crackdown on encryption technology in response to the recent wave of terrorist attacks in Europe. The German Interior Minister, Thomas De Maizi\u00e8re, and his French counterpart, Bernard Cazeneuve, put forward a joint proposal<\/a> calling on the European Commission to draft a law obliging<\/a> online messaging services to monitor content and assist law enforcement with decryption efforts when required. As expected, the move sparked opposition<\/a> from European industry groups who argue that enforcing such backdoors \u2018ultimately leaves online systems more vulnerable\u2019. It seems Europe is following in the footsteps of the privacy\u2013security debate that has unfolded in the US over the last year.<\/p>\n

Debate continues over the identity, capability and credibility of the Shadow Broker hackers who several weeks ago<\/a> hosted on online auction of programs apparently nabbed from the NSA. Importantly, this content was stolen from another hacking team<\/a>, Equation Group, and is actually fairly old, containing no programs more recent than October 2013. The indirect leak supposedly reveals some of the top secret cyber tools used by the spy agency to surveil American security companies such as Cisco and Fortinet. However, recent realisations<\/a> that these tools contain the ability to compromise the firewalls of Chinese tech manufacturer Huawei have given even deeper insight into the scope of NSA operations. The contents of the Shadow Brokers dump have seemingly been confirmed as authentic<\/a> by correlations with previously unreleased Snowden documents. Learn more about the speculated \u2018who and how\u2019 of the hack with this Engadget <\/em>article<\/a> and read this Lawfare<\/em> piece<\/a> for a low down of the questions that should be asked of the NSA in response.<\/p>\n

And finally, check out Monday night\u2019s episode of Four Corners, boldly titled \u2018Cyber War<\/a>\u2019. While it won\u2019t teach well-informed cyber nerds anything new, it\u2019s a welcome fourth estate attempt to raise public awareness of cyber security. You can read commentary on the episode here<\/a> and here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Kicking off this week, China has invited foreign tech corporations to join its government\u2019s central technical committee. Technical Committee 260, which reports to the Cyberspace Administration of China, is responsible for establishing China\u2019s cyber security …<\/p>\n","protected":false},"author":390,"featured_media":28417,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,391,1570,728,224],"class_list":["post-28416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyber","tag-encryption","tag-hacking","tag-social-media"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Kicking off this week, China has invited foreign tech corporations to join its government\u2019s central technical committee. Technical Committee 260, which reports to the Cyberspace Administration of China, is responsible for establishing China\u2019s cyber security ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-31T02:30:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-08-31T02:41:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/08\/23441093779_c5f923fdee_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/08\/23441093779_c5f923fdee_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/08\/23441093779_c5f923fdee_z.jpg\",\"width\":640,\"height\":426,\"caption\":\"Image courtesy of Flickr user Jeso Carneiro.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/#primaryimage\"},\"datePublished\":\"2016-08-31T02:30:12+00:00\",\"dateModified\":\"2016-08-31T02:41:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Kicking off this week, China has invited foreign tech corporations to join its government\u2019s central technical committee. Technical Committee 260, which reports to the Cyberspace Administration of China, is responsible for establishing China\u2019s cyber security ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-08-31T02:30:12+00:00","article_modified_time":"2016-08-31T02:41:06+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/08\/23441093779_c5f923fdee_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/08\/23441093779_c5f923fdee_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/08\/23441093779_c5f923fdee_z.jpg","width":640,"height":426,"caption":"Image courtesy of Flickr user Jeso Carneiro."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/#primaryimage"},"datePublished":"2016-08-31T02:30:12+00:00","dateModified":"2016-08-31T02:41:06+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-134\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28416"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=28416"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28416\/revisions"}],"predecessor-version":[{"id":28419,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28416\/revisions\/28419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/28417"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=28416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=28416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=28416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}