{"id":31324,"date":"2017-04-12T12:30:36","date_gmt":"2017-04-12T02:30:36","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=31324"},"modified":"2017-04-12T15:10:11","modified_gmt":"2017-04-12T05:10:11","slug":"cyber-wrap-159","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

In big news this week for our Kiwi neighbours, New Zealand opened<\/a> its first national Computer Emergency Response Team (CERT). CERT NZ<\/a>, a deliverable of New Zealand\u2019s 2015 Cyber Security Strategy<\/a>, has been established within the Ministry of Business, Innovation and Employment with NZ$22.2 million funding over four years. CERT NZ will<\/a> be the centrepiece of New Zealand\u2019s cyber architecture and be responsible for cyber vulnerability and threat identification, incident reporting, response coordination and general readiness support for the Kiwi economy. Communications Minister Simon Bridges stated<\/a> that the CERT \u2018will make it easier for people at work and at home to understand, prevent and recover from cyber security incidents\u2019.<\/p>\n

Twitter resisted<\/a> pressure from the US government last month to unmask the identity of an individual tweeting criticism about President Trump from account @ALT_USCIS<\/a>. The social media platform filed a law suit to block the administration\u2019s request, citing users\u2019 First Amendment rights<\/a> to freedom of speech. Twitter\u2019s move was backed by the American Civil Liberties Union, who described it<\/a> as \u2018an affront to our fundamental right to anonymous expression\u2019. Customs and Border Protection proceeded to withdraw the summons<\/a> the day after Twitter filed the lawsuit. This is a positive development after the administration cracked down<\/a> on federal agency social media activity in January.<\/p>\n

Spanish police arrested<\/a> Russian computer programmer Pyotr Levashov in Barcelona this week in collaboration with the FBI. While rumours are circling<\/a> about potential connections between this arrest and the 2016 US presidential election campaign hacking, the central focus looks to be Levashov\u2019s responsibility for the Kelihos botnet<\/a>. This botnet has enslaved hundreds of thousands of computers and used the resulting network to facilitate international malicious cyber activities such as the mass distribution of spam, spreading of ransomware, and theft of login credentials. The US Department of Justice announced<\/a> it\u2019s undertaking \u2018an extensive effort to disrupt and dismantle the Kelihos botnet\u2019 and the botnet operator is expected<\/a> to be extradited to the US.<\/p>\n

The transition<\/a> from the Internet\u2019s current IP system for web addressing IPv4 to the next generation protocol IPv6 may not be as seamless as we would hope. The transfer is necessary<\/a> to fulfil the exponential Internet demand and support. While the current system offers four billion unique IP addresses, IPv6 will offer 340 undecillion. Unfortunately, new research<\/a> from the NATO Cooperative Cyber Defence Centre of Excellence in Estonia indicates that this complex transition may be introducing vulnerabilities to the system.<\/p>\n

In an effort to combat fake news, Google is expanding a fact check program<\/a> for its search and news services to the entire globe. The company\u2019s idea of providing fact checks to help its users \u2018divine fact from fiction\u2019 was initially piloted<\/a> in the US and UK at the end of last year, but is now available to the whole world. Google isn\u2019t undertaking the checks in-house, but relying<\/a> on the validations of third party organisations such as PolitiFact<\/a>, FactCheck.org<\/a> and Snopes<\/a>. This tool is a great step in the right direction to combat the spread of misinformation online, providing readers with an indication<\/a> of how authoritative a source is and whether it reflects the general consensus view.<\/p>\n

Notorious hacker(s), the Shadow Brokers<\/a>, have stepped back in the limelight over the weekend, releasing more alleged hacking tools of the NSA. After leaking a number of stolen NSA exploits in August last year, the group tried and failed<\/a> to auction off the contents of a second cache for an asking price of $1 million. This week the Shadow Brokers group has published the password needed to decrypt this second cache along with a political rant<\/a> at President Trump on Medium<\/em>, chastising him for abandoning his \u2018base\u2019. Despite the fanfare, many have been left disappointed<\/a> by this second dump, which consists mostly of tools that are much older and target operating systems that are generally no longer in service. NSA\u2019s friends over at Langley haven\u2019t had a good week<\/a> either with Wikileaks releasing the third tranche of the Vault 7 leak on CIA cyber tools, titled \u2018Grasshopper\u2019<\/a>, last Friday.<\/p>\n

Dallas learned an important lesson on infrastructure security this week with the city\u2019s emergency warning system being compromised<\/a> by a hacker. The network of sirens across the city were activated just after midnight on Friday night, triggering public panic<\/a>, more than 4,400 911 calls and an emergency call wait time of six minutes. The incident highlights the vulnerability of critical national infrastructure and the impact its compromise can have on a government\u2019s ability to deliver essential services. The city has requested<\/a> assistance from the Federal Communications Commission to identify the source of the breach.<\/p>\n

And to finish things off, we\u2019ve got your weekly report reading sorted. Check out McAfee Labs Threat Report<\/a>, which focuses on intelligence sharing, the Mirai IoT botnet and other threat statistics. Dip into the cyber workforce dilemma with the US Government Accountability Office\u2019s report<\/a> on how the government should train and recruit the cybersecurity workforce to address the threats to federal IT systems. Lastly, the Center for a New American Security\u2019s Phishing in Troubled Waters<\/em><\/a> will take you through the state of cyber espionage across the Pacific and the Strait of Taiwan. Happy reading!<\/p>\n","protected":false},"excerpt":{"rendered":"

In big news this week for our Kiwi neighbours, New Zealand opened its first national Computer Emergency Response Team (CERT). CERT NZ, a deliverable of New Zealand\u2019s 2015 Cyber Security Strategy, has been established within …<\/p>\n","protected":false},"author":390,"featured_media":31325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,728,1606,224],"class_list":["post-31324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-hacking","tag-presidential-election-2016","tag-social-media"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"In big news this week for our Kiwi neighbours, New Zealand opened its first national Computer Emergency Response Team (CERT). CERT NZ, a deliverable of New Zealand\u2019s 2015 Cyber Security Strategy, has been established within ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-12T02:30:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-12T05:10:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/alarm-1680620_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/alarm-1680620_640.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/alarm-1680620_640.jpg\",\"width\":640,\"height\":480,\"caption\":\"Image courtesy of Pixabay user WerbeFabrik.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/#primaryimage\"},\"datePublished\":\"2017-04-12T02:30:36+00:00\",\"dateModified\":\"2017-04-12T05:10:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"In big news this week for our Kiwi neighbours, New Zealand opened its first national Computer Emergency Response Team (CERT). CERT NZ, a deliverable of New Zealand\u2019s 2015 Cyber Security Strategy, has been established within ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-04-12T02:30:36+00:00","article_modified_time":"2017-04-12T05:10:11+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/alarm-1680620_640.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/alarm-1680620_640.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/alarm-1680620_640.jpg","width":640,"height":480,"caption":"Image courtesy of Pixabay user WerbeFabrik."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/#primaryimage"},"datePublished":"2017-04-12T02:30:36+00:00","dateModified":"2017-04-12T05:10:11+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-159\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31324"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=31324"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31324\/revisions"}],"predecessor-version":[{"id":31326,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31324\/revisions\/31326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/31325"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=31324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=31324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=31324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}