{"id":30817,"date":"2017-03-08T12:30:53","date_gmt":"2017-03-08T01:30:53","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=30817"},"modified":"2017-03-08T11:26:34","modified_gmt":"2017-03-08T00:26:34","slug":"cyber-wrap-154","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

Welcome back to your weekly fix of cyber news, analysis and research.<\/p>\n

The New York Times <\/em>reported<\/a> last Saturday that, back in 2013, President Barack Obama ordered cyber sabotage operations against Pyongyang\u2019s nuclear weapons program. The persistently high failure<\/a> rate of the US\u2019s kinetic antimissile weapons, despite significant investment, reportedly prompted Obama to consider a cyber supplement. The project to pre-emptively undermine missiles in their development stages, known as a \u2018left of launch<\/a>\u2019 strategy, receives dedicated resources at the Pentagon and is now President Trump\u2019s to play with. However, experts are concerned that this kind of cyber offensive approach sets a dangerous precedent<\/a> for Beijing and Moscow, particularly if they believe that US cyber operations could successfully undermine their nuclear deterrence capability.<\/p>\n

Staying stateside, the future of the NSA\u2019s spying powers are under scrutiny<\/a> this week as elements of the Foreign Intelligence Surveillance Act (FISA) approach sunset. Section 702<\/a> of the Act forms the basis for the NSA\u2019s monitoring of foreign nationals\u2019 communications around the globe in the interests of national security. It was under this FISA authority that the US\u2019s infamous \u201cbig brother\u201d program PRISM\u2014revealed<\/a> in the Snowden disclosures of 2013\u2014was established.<\/p>\n

While the legislation is designed for foreign targets, there have long been concerns it could be used to surveil US citizens through their contact with foreigners. Human rights advocates such as the American Civil Liberties Union are protesting<\/a> the renewal of this legislation in defence of international privacy. The issue also has the trans-Atlantic data-sharing agreement on thin ice, especially given that EU Justice Commissioner Vera Jourova has made it clear that she \u2018will not hesitate<\/a>\u2019 to suspend the painstakingly crafted arrangement should the US fail to uphold its stringent privacy requirements.<\/p>\n

That task may be even more difficult after WikiLeaks\u2019 overnight release of a dossier, dubbed \u2018Vault\u00a07\u2019<\/a>, detailing the CIA\u2019s cyber espionage tools and techniques. WikiLeaks released over 8,000 documents<\/a> it claims were taken from a CIA computer network in the agency\u2019s Center for Cyber Intelligence. The documents detail the agency\u2019s expansive and sophisticated<\/a> cyber espionage capability, including compromising the security common devices and apps including Apple iPhones, Google\u2019s Android software and Samsung televisions to collect intelligence.<\/p>\n

China\u2019s Foreign Ministry and the Cyberspace Administration of China this week launched<\/a> the country\u2019s first International Strategy of Cooperation on Cyberspace<\/em>. The Strategy outlines China\u2019s basic principles for cyber diplomacy and its strategic goals in cyberspace. Encouragingly, the Foreign Ministry\u2019s Coordinator for Cyberspace Affairs Long Zhao stated<\/a> that \u2018enhancing deterrence, pursuing absolute security and engaging in a cyber arms race\u2026is a road to nowhere\u2019. Unsurprisingly, the Strategy offers strong support for the concept of cyber sovereignty, stating that \u2018countries should respect each other’s right to choose their own path of cyber development\u2019, and emphasises the importance of avoiding cyberspace becoming \u2018a new battlefield\u2019. You can read a full English language version of the Strategy here<\/a>.<\/p>\n

The revelation<\/a> that the Australian Signals Directorate (ASD) was temporarily forced to rely on diesel generators during last month\u2019s heat wave has prompted the government to significantly upgrade to the agency\u2019s infrastructure. The Minister Assisting the Prime Minister for Cyber Security told Parliament on Wednesday that it was recommended by ActewAGL and the NSW Department of Environment that ASD switch to back up power on 10 February as part of state-wide load shedding to protect power supplies. The new $75 million project, funded by the Defence Integrated Investment Program, is intended to bolster the intelligence agency\u2019s resilience.<\/p>\n

Several cyber incidents have kept the internet on its toes this week. The Amazon Simple Storage Service cloud hosting service went down last week, knocking hundreds of thousands<\/a> of popular websites and apps offline. The disruptive incident, originally described by the company as \u2018increased error rates<\/a>\u2019, was actually not the result<\/a> of cyber criminals or hacktivists, but that of an employee\u2019s fat fingers entering a command incorrectly\u2014whoops! Yahoo is in the doghouse (again) with the awkward announcement in its annual report<\/a> to the Security and Exchange Commission that 32 million customer accounts are thought to have been compromised through forged cookies. This isn\u2019t to be confused with the entirely separate<\/a> and very embarrassing loss of 1 billion accounts in a 2013 breach, which recently cost the company $350 million in its acquisition deal with Verizon<\/a> and CEO Marissa Mayer her annual cash bonus<\/a>. And if you\u2019ve been tracking the #cloudbleed<\/a> saga, catch up with some post-mortems here<\/a>, here<\/a> and here<\/a>.<\/p>\n

Finally we\u2019ve got you covered for your weekly cyber research reads. A new Intel report, written by the Centre for Strategic and International Studies, examines the discrepancies in cyberspace that put defenders at a disadvantage. Titled Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity<\/em><\/a>, the report reveals the gaps between attackers vs. defenders, strategy vs. implementation and executives vs. implementers, offering recommendations to overcome such obstacles. And get your fix of statistics from PwC\u2019s annual Digital IQ<\/a> assessment based on a survey of more than 2,000 executives from across the world. The research reveals that only 52% of companies consider their corporate Digital IQ to be \u2018strong,\u2019 a considerable drop from 67% last year.<\/p>\n","protected":false},"excerpt":{"rendered":"

Welcome back to your weekly fix of cyber news, analysis and research. The New York Times reported last Saturday that, back in 2013, President Barack Obama ordered cyber sabotage operations against Pyongyang\u2019s nuclear weapons program. …<\/p>\n","protected":false},"author":390,"featured_media":30825,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[915,52,391,95,787],"class_list":["post-30817","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-asd","tag-china","tag-cyber","tag-cyber-security","tag-wikileaks"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Welcome back to your weekly fix of cyber news, analysis and research. The New York Times reported last Saturday that, back in 2013, President Barack Obama ordered cyber sabotage operations against Pyongyang\u2019s nuclear weapons program. ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-08T01:30:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-08T00:26:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/electricity-1854093_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/electricity-1854093_1920.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/electricity-1854093_1920.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/#primaryimage\"},\"datePublished\":\"2017-03-08T01:30:53+00:00\",\"dateModified\":\"2017-03-08T00:26:34+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Welcome back to your weekly fix of cyber news, analysis and research. The New York Times reported last Saturday that, back in 2013, President Barack Obama ordered cyber sabotage operations against Pyongyang\u2019s nuclear weapons program. ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-03-08T01:30:53+00:00","article_modified_time":"2017-03-08T00:26:34+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/electricity-1854093_1920.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/electricity-1854093_1920.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/03\/electricity-1854093_1920.jpg","width":1920,"height":1080},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/#primaryimage"},"datePublished":"2017-03-08T01:30:53+00:00","dateModified":"2017-03-08T00:26:34+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-154\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30817"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=30817"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30817\/revisions"}],"predecessor-version":[{"id":30826,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/30817\/revisions\/30826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/30825"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=30817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=30817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=30817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}