{"id":28995,"date":"2016-10-05T12:30:24","date_gmt":"2016-10-05T01:30:24","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=28995"},"modified":"2016-10-17T13:18:19","modified_gmt":"2016-10-17T02:18:19","slug":"cyber-wrap-137","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

<\/p>\n

The inaugural Australia-US Cyber Security Dialogue was held in Washington D.C., by CSIS and ASPI the week before last. The event, announced<\/a> by Prime Minister Turnbull and President Obama in January, brought together senior representatives from government, the private sector and academia to discuss common challenges and opportunities in cyberspace. The dialogue covered cyber developments in the Asia\u2013Pacific, the fight against cybercrime and practical methods of advancing an innovative and secure digital economy for both countries. At the close of the dialogue, Prime Minister Turnbull delivered a keynote address followed by remarks from the US Secretary of Homeland Security Jeh Johnson. Check out the full speeches here<\/a> and standby for upcoming blog pieces that will offer an insight into the dialogue discussions.<\/p>\n

ICPC also launched its new report Cyber Maturity in the Asia-Pacific 2016<\/em><\/a> at New America<\/a> in Washington DC last week. Peter W. Singer moderated an expert panel, including ICPC\u2019s Dr Tobias Feakin, Denise Zheng of CSIS and Ryan Gillis from Palo Alto Networks, to discuss the findings of the report and broader themes of regional cyber policy development. Check out full video here<\/a>.<\/p>\n

While we were away, it was revealed<\/a> that Yahoo! suffered a cybersecurity breach dating back to 2014. The breach exposed the names, emails, phone numbers, birthdays and encrypted passwords of at least 500 million customers\u2014making it \u2018the biggest hack the world has ever seen<\/a>\u2019. Apparently, the organisation\u2019s lazy approach<\/a> to security in favour of more convenient user-friendly methods is what led to this headline-grabbing cyber incident. Such negligence has prompted several lawsuits<\/a>, as well as a critical open letter<\/a> from six US senators, demanding that Yahoo! answer specific questions on how the breach came about and was subsequently handled by the organisation. Meanwhile, rumours are circulating over the true scale of the incident, with a former company insider putting the figure at between one to three billion<\/a> compromised accounts. And in terms of attribution, the act was originally cast<\/a> as being state-sponsored, however a recent cybersecurity firm report points the finger<\/a> at an eastern European crime gang thought to be selling the data onto third parties. While at first glance the breach looks like a simple case of corporate incompetence, latest reports suggest<\/a> the incident may have had something to do with an intelligence sharing arrangement the company had with the US government, involving the routine scanning of millions of customer emails. Well, \u00a0now that\u2019s awkward for everyone.<\/p>\n

Staying stateside, the first of three presidential debates took place<\/a> last week featuring White House hopefuls Hillary Clinton and Donald Trump, with \u2018the cyber\u2019 briefly taking centre stage. Sadly, the candidates\u2019 cybersecurity debate was content-light to put it mildly, mostly circling around the attribution of the DNC hack<\/a>, with Clinton pointing the finger squaring at Moscow and Trump putting forward the \u2018400-pound hacker\u2019 as his best guess. Critics were left listing<\/a> cyber issues that deserved serious attention at the debate, such as encryption, data-breach disclosures and protection of critical national infrastructure. Nevertheless, other experts were simply pleased<\/a> cybersecurity made it onto the agenda. You can watch all seven enlightening minutes of the cybersecurity segment here<\/a>.<\/p>\n

At midnight on 30 September, after years of planning and discussion, the Internet Assigned Numbers Authority (IANA) function of the US National Telecommunications and Information Administration (NTIA) was handed over<\/a> to the Internet Corporation for Assigned Names and Numbers (ICANN). The IANA functions underpin<\/a> the operation of the global internet allowing users to search names rather than numeric addresses to find information (e.g. aspistrategist.ru instead of 104.20.14.180). NTIA, part of the Department of Commerce, previously contracted ICANN to manage its IANA responsibilities. The move to hand over these functions to ICANN is the culmination of a policy announced in 1998<\/a> by the US government to transition management of the Internet\u2019s domain name system to the international multistakeholder community. The process was met with opposition<\/a>, including failed eleventh hour injunction filed by Ted Cruz<\/a> and three other Republican state attorney generals to stop the process. The injunction was a last minute effort by Cruz after his attempt to convince Congress<\/a> to include a rider to its continuing resolution preventing the transfer also failed.<\/p>\n

Closer to home, it\u2019s been reported that the Australian government has experienced another data-breach incident overnight. The information of more than 96,000 public servants has been compromised<\/a> from the APS internal staff census, with confirmation that the data-set was downloaded almost 60 times before the information was taken down. The news comes less than a week after an embarrassing leak<\/a> of patients\u2019 health records in a Medicare data breach by the Health Department, which is now being investigated<\/a> by the Australian Privacy Commissioner Timothy Pilgrim.<\/p>\n","protected":false},"excerpt":{"rendered":"

The inaugural Australia-US Cyber Security Dialogue was held in Washington D.C., by CSIS and ASPI the week before last. The event, announced by Prime Minister Turnbull and President Obama in January, brought together senior representatives …<\/p>\n","protected":false},"author":390,"featured_media":28996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[143,391,95,728,1606],"class_list":["post-28995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-asia-pacific","tag-cyber","tag-cyber-security","tag-hacking","tag-presidential-election-2016"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The inaugural Australia-US Cyber Security Dialogue was held in Washington D.C., by CSIS and ASPI the week before last. The event, announced by Prime Minister Turnbull and President Obama in January, brought together senior representatives ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-05T01:30:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-17T02:18:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/4158462258_bb65e7a3e9_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/4158462258_bb65e7a3e9_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/4158462258_bb65e7a3e9_z.jpg\",\"width\":640,\"height\":480},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/#primaryimage\"},\"datePublished\":\"2016-10-05T01:30:24+00:00\",\"dateModified\":\"2016-10-17T02:18:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The inaugural Australia-US Cyber Security Dialogue was held in Washington D.C., by CSIS and ASPI the week before last. The event, announced by Prime Minister Turnbull and President Obama in January, brought together senior representatives ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-10-05T01:30:24+00:00","article_modified_time":"2016-10-17T02:18:19+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/4158462258_bb65e7a3e9_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/4158462258_bb65e7a3e9_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/4158462258_bb65e7a3e9_z.jpg","width":640,"height":480},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/#primaryimage"},"datePublished":"2016-10-05T01:30:24+00:00","dateModified":"2016-10-17T02:18:19+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-137\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28995"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=28995"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28995\/revisions"}],"predecessor-version":[{"id":29000,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28995\/revisions\/29000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/28996"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=28995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=28995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=28995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}