{"id":30717,"date":"2017-03-01T12:26:31","date_gmt":"2017-03-01T01:26:31","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=30717"},"modified":"2017-03-01T13:58:42","modified_gmt":"2017-03-01T02:58:42","slug":"cyber-wrap-153","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

The Australian government has kept the cyber ball rolling this week, with the launch<\/a> of the Joint Cyber Security Centre in Brisbane, the first of five slated capital city hubs worth $47 million<\/a> in across the country. The joint cyber centres are designed as collaborative work spaces and an information sharing portal across government, business and law enforcement on cybersecurity issues. Cybersecurity centres haven\u2019t been limited to Australia, with Microsoft opening<\/a> up a Cyber Security Engagement Centre in Mexico, aiming to dismantle botnets and cybercrime organisations in Latin America.<\/p>\n

New York State\u2019s Stewart International Airport was confronted with an embarrassing discovery<\/a> this week; a server backup drive had been left exposed to the internet since April 2016, potentially leaking 760GB of unsecured data, including<\/a> internal e-mails, memos, \u201csensitive\u201d TSA letters of investigation, and schematics of the airport and surrounding infrastructure. One file contained an unsecured list of usernames and passwords for the various systems at the airport, which reportedly could\u2019ve been used to generate boarding passes to any destination for any traveller at the airport, even those on the no-fly list. The drive has since been secured<\/a>, with no preliminary indications that data was copied from the drive.<\/p>\n

Israeli Prime Minister Benjamin Netanyahu visited Australia last week, and issued a joint statement<\/a> with Prime Minister Turnbull about the two countries\u2019 commitment to bilateral cooperation in cybersecurity. In Israel, the Ministry of Justice\u2019s Israel Law, Information and Technology Authority has formulated draft regulations<\/a> to be discussed in the Knesset regarding data security, including a regulation to compel database owners to notify subjects regarding data breach events, similar to mandatory data breach notification regulations in the EU<\/a> and, very recently, Australia<\/a>.<\/p>\n

Still in Israel, researchers from the Cyber Research Center at Ben-Gurion University demonstrated<\/a> (in a report<\/a> delightfully titled \u2018LED-it-GO\u2019) how to exfiltrate data from air-gapped computers by flashing hard-drive indicator lights up to 5,800 times a second to a nearby drone-mounted<\/a> camera. Vulnerability researchers from Google and the Netherlands-based Centrum Wiskunde & Informatica announced<\/a> that, after two years of research, they\u2019d successfully mounted a \u2018collision attack\u2019 against the Secure Hash Algorithm-1 function, rendering it insecure. For a good breakdown of the specifics, as well as links to the supporting research, read this<\/a>.<\/p>\n

Google has again used Twitter to sound<\/a> the alarm about a vulnerability on the Cloudflare Content-Delivery-Network. Cloudflare, an information security service provider that keeps clients safe from DDoS attacks, has since announced<\/a> that their servers were leaking sensitive information. In a promising display of resilience and responsiveness, the source of the bug was shut down within 44 minutes and fixed completely within 7 hours, but concerns remain over data leaked from websites that used Cloudflare in the period from September 2016 till now.<\/p>\n

As much as \u201cfake news\u201d has been trending in traditional media, the cyber-world has seen a crackdown on \u201cfake accounts\u201d, with the Philippines\u2019 Senate set to debate<\/a> a bill which would require social media networks to verify the identity of users who register for accounts, and mandating shut-down procedures for compromised accounts. US Customs and Border Protection officials are also beginning<\/a> to ask incoming visitors for their social media accounts. Officials have maintained that the question is optional, and refusing to answer shouldn\u2019t be cause for penalty, but critics are concerned about the increasing use of social media intelligence in routine border controls. Google has boosted the accessibility of its tools to manage fake accounts , opening up the Jigsaw<\/a> Application Programming Interface (API), giving developers throughout the open source community access to anti-harassment machine learning tools (like their \u2018toxicity meter\u2019) to automatically detect insults, harassment and abuse hurled online. The developers hope<\/a> that the tool will be used carefully to create \u201csafe spaces\u201d and restore open discussion on the internet, but critics have voiced their concerns<\/a> about the implications for automated censorship and over-moderation.<\/p>\n

And finally, ASPI was fortunate enough to host the Australian launch event<\/a>, one of a series of launches around the world, for the Tallinn Manual 2.0<\/a>\u00a0on International Law Applicable to Cyber Operations last Friday, hearing directly from the experts behind the manual. One of the experts was Professor Michael Schmitt, Senior Fellow at the NATO Cooperative Cyber Defence Center of Excellence, who also spoke to the ABC\u2019s current affairs program PM<\/em> about the manual. Check out the interview here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

The Australian government has kept the cyber ball rolling this week, with the launch of the Joint Cyber Security Centre in Brisbane, the first of five slated capital city hubs worth $47 million in across …<\/p>\n","protected":false},"author":608,"featured_media":30718,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,95,728,240,1264],"class_list":["post-30717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-cyber-security","tag-hacking","tag-israel","tag-tallinn-manual-process"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The Australian government has kept the cyber ball rolling this week, with the launch of the Joint Cyber Security Centre in Brisbane, the first of five slated capital city hubs worth $47 million in across ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-01T01:26:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-01T02:58:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/structure-1559179_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1285\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Chi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Chi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/structure-1559179_1920.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/structure-1559179_1920.jpg\",\"width\":1920,\"height\":1285},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/#primaryimage\"},\"datePublished\":\"2017-03-01T01:26:31+00:00\",\"dateModified\":\"2017-03-01T02:58:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\",\"name\":\"Michael Chi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"caption\":\"Michael Chi\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The Australian government has kept the cyber ball rolling this week, with the launch of the Joint Cyber Security Centre in Brisbane, the first of five slated capital city hubs worth $47 million in across ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-03-01T01:26:31+00:00","article_modified_time":"2017-03-01T02:58:42+00:00","og_image":[{"width":1920,"height":1285,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/structure-1559179_1920.jpg","type":"image\/jpeg"}],"author":"Michael Chi","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Michael Chi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/structure-1559179_1920.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/structure-1559179_1920.jpg","width":1920,"height":1285},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/#primaryimage"},"datePublished":"2017-03-01T01:26:31+00:00","dateModified":"2017-03-01T02:58:42+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-153\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9","name":"Michael Chi","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","caption":"Michael Chi"},"url":"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30717"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/608"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=30717"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30717\/revisions"}],"predecessor-version":[{"id":30725,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30717\/revisions\/30725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/30718"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=30717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=30717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=30717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}