{"id":29189,"date":"2016-10-19T12:30:34","date_gmt":"2016-10-19T01:30:34","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=29189"},"modified":"2016-10-19T10:57:04","modified_gmt":"2016-10-18T23:57:04","slug":"cyber-wrap-139","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

 <\/p>\n

Last Tuesday the G7 announced<\/a> that they have agreed to new \u2018non-binding principles\u2019 to protect the global financial system from cyber threats such as last year\u2019s SWIFT hacking incident in Bangladesh<\/a>. A US Treasury official told Reuters<\/a> that the principles are an effort to encourage both regulators and companies to take a risk management approach to cyber security. Among other things, the G7 principles recommend that governments and banks share threat information and cooperate to manage incidents. Of course banks and regulators are already sharing information, with news from the UK this week noting that UK banks have reported 75 incidents<\/a> so far this year to the Financial Conduct Authority, but that\u2019s probably just the tip of the iceberg.<\/p>\n

On Monday WikiLeaks let the world know that Julian Assange isn\u2019t dead<\/a> (as some rumours suggested), but his internet connection is. WikiLeaks originally blamed a \u2018state actor\u2019<\/a> for cutting Assange\u2019s internet access, and while they were right, it probably wasn\u2019t who they expected. Assange\u2019s Ecuadorian hosts cut him off from the world<\/a> after WikiLeaks released more leaked Hillary Clinton emails, yet another move which violates Ecuador\u2019s principle of non-intervention in the affairs of other states. While Ecuador hasn\u2019t backed away from its commitment to protect Assange, it seems they may be getting a bit tired of their guest.<\/p>\n

Back in Australia, Senate Estimates have seen interesting exchanges about cyber security issues, highlighting the increasing prominence of cyber security in political circles, and its potential to embarrass the government. Most prominent was the examination of the use of encrypted messaging app WhatsApp<\/a> by Cabinet ministers and advisers. While the app isn\u2019t on ASD\u2019s list of approved communications and messaging services for sensitive or classified communications, the PM\u2019s Cyber Security Adviser Alastair MacGibbon<\/a> told estimates that ASD had approved the use of WhatsApp by Ministers for unclassified messages. In another exchange, the Parliamentary Services CIO was quizzed<\/a> on whether a smart watch that had been given to a government MP had been connected to the parliamentary network. The watch attracted interest because it was manufactured by Chinese firm Huawei, notable in Australia for being banned from providing NBN infrastructure on security grounds<\/a>.<\/p>\n

The Australian government has also taken another step forward in its digital transformation agenda, transferring<\/a> the IT procurement, project management and policy function from the Finance Department to the Digital Transformation Office, which will become the Digital Transformation Agency.<\/a> Also announced was the formation of a Digital Transformation Advisory Board of public and private sector experts to advise government on the rollout of digital government services. The DTO, formed by PM Malcolm Turnbull when he was Communications Minister<\/a>, has been charged with improving the delivery of government services online, including improvements to the myGov portal and its expansion to state government services.<\/p>\n

Telstra, Australia\u2019s largest telco, is looking for a new Chief Information Security Officer (CISO)<\/a> after incumbent Mike Burgess announced his move into private consultancy from early November. Burgess, formerly a Deputy Director at ASD has spent four years managing Telstra\u2019s cyber security. IT News<\/em> noted that this was the fifth \u2018big CISO move\u2019 this year, with CISO vacancies at Telstra and Qantas, and new appointments at Australia Post, AGL Energy, the National Australia Bank and the Department of Human Services<\/a>.<\/p>\n

Internet services in Syria and Lebanon have suffered from a series of outages caused by a spike in routing instability<\/a> according to US internet monitor Dyn<\/a>. While the group was careful to point out that correlation doesn\u2019t necessarily imply causation, Dyn has noted that the outages and instability have occurred since the arrival of Russian research vessel Yantar<\/em> off the Syrian coast. Yantar <\/em>is equipped with two autonomous submersible craft, and it\u2019s been suggested that the ship has been using these to tap submarine cables or seek out uncharted cables used for classified information<\/a>. In September last year the ship was in Cuban waters, and similar claims were made in some US media outlets that the ship was spying on US submarines and tapping submarine cables<\/a>. However cable industry experts have told War is Boring<\/em><\/a> that tapping submarine cables underwater is an unlikely method for the Russians to employ when tapping the cables on land is easier. Interestingly the Russian Navy plans to deploy a similar ship<\/a>, the Almaz<\/em>, to the Pacific Ocean by 2019.<\/p>\n

And finally, if you\u2019re looking for a gift for the special cryptanalyst in your life, perhaps consider GCHQ\u2019s new puzzle book<\/a>. GCHQ will be donating all proceeds from the book to mental illness awareness charity Heads Together.<\/p>\n","protected":false},"excerpt":{"rendered":"

  Last Tuesday the G7 announced that they have agreed to new \u2018non-binding principles\u2019 to protect the global financial system from cyber threats such as last year\u2019s SWIFT hacking incident in Bangladesh. A US Treasury …<\/p>\n","protected":false},"author":364,"featured_media":29191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,1296,728,163,787],"class_list":["post-29189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-g7","tag-hacking","tag-russia","tag-wikileaks"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"  Last Tuesday the G7 announced that they have agreed to new \u2018non-binding principles\u2019 to protect the global financial system from cyber threats such as last year\u2019s SWIFT hacking incident in Bangladesh. A US Treasury ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-19T01:30:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-18T23:57:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/16553870064_e81337a775_b.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"958\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/16553870064_e81337a775_b.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/16553870064_e81337a775_b.jpg\",\"width\":958,\"height\":640},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/#primaryimage\"},\"datePublished\":\"2016-10-19T01:30:34+00:00\",\"dateModified\":\"2016-10-18T23:57:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"  Last Tuesday the G7 announced that they have agreed to new \u2018non-binding principles\u2019 to protect the global financial system from cyber threats such as last year\u2019s SWIFT hacking incident in Bangladesh. A US Treasury ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-10-19T01:30:34+00:00","article_modified_time":"2016-10-18T23:57:04+00:00","og_image":[{"width":958,"height":640,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/16553870064_e81337a775_b.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/16553870064_e81337a775_b.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/10\/16553870064_e81337a775_b.jpg","width":958,"height":640},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/#primaryimage"},"datePublished":"2016-10-19T01:30:34+00:00","dateModified":"2016-10-18T23:57:04+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-139\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29189"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=29189"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29189\/revisions"}],"predecessor-version":[{"id":29197,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29189\/revisions\/29197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/29191"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=29189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=29189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=29189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}