{"id":31659,"date":"2017-05-03T13:05:54","date_gmt":"2017-05-03T03:05:54","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=31659"},"modified":"2017-05-03T13:13:43","modified_gmt":"2017-05-03T03:13:43","slug":"cyber-wrap-162","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

AFP Commissioner Andrew Colvin revealed last week<\/a> that an AFP officer had, in the course of an investigation, accessed the call record metadata of a journalist without a warrant, putting the error down to poor processes within the AFP. While much of the data retained under the scheme can been accessed by Australian law enforcement agencies without a warrant, data on journalists is specifically exempt<\/a>. The incident comes only two weeks after the controversial legislation<\/a> came into force, and has added more fuel to the fire<\/a> for privacy advocates. Guardian Australia<\/em> journalist Paul Farrell has called the incident a \u2018systemic, structural failure of the AFP\u2019s internal policies\u2019<\/a>, and Electronic Frontiers Australia has renewed its push for a universal warrant requirement<\/a> for metadata access. While the affected journalist hasn\u2019t been told that their data was inappropriately accessed and no action has been taken against the officer, the Commonwealth Ombudsman<\/a> will now conduct their own inquiry to the incident. On the same day news broke about the AFP\u2019s bungle, UNESCO released a report Protecting Journalism Sources in the Digital Age<\/a>, <\/em>which notes the \u2018chilling\u2019 effect of data retention schemes, undermining public access to information, the democratic role of the media and journalistic quality.<\/p>\n

Last Thursday marked the 10th anniversary of the 2007 cyber attack on Estonia<\/a>. The three-week spat, sparked when Estonian authorities moved a Russian war memorial, resulted in a massive and coordinated campaign of cyber operations that severely disrupted the highly-connected Baltic state<\/a>. In the decade since, Estonia has championed norms of responsible behavior in cyberspace, including the Tallinn Manual<\/a>, and it hosts NATO\u2019s Cooperative Cyber Defence Centre of Excellence (CCDCoE)<\/a>. To mark the anniversary, CCDCoE hosted NATO\u2019s annual cyber exercise, Exercise Locked Shields<\/a>, where 25 countries fought to defend themselves from a major cyber attack on military assets. Australia\u2019s foreign minister Julie Bishop observed part of the exercise<\/a>, and has indicated that Australia may join future iterations.<\/p>\n

The 2007 attacks on Estonia have been widely attributed to Russia, and Russians remained a key issue for cyber security across Europe this week. In France evidence has emerged that Russian hacking group APT28 (aka Fuzzy Bear), also responsible for hacking the DNC last year<\/a>, have been targeting centrist candidate and current frontrunner Emmanuel Macron\u2019s campaign team<\/a> since January, trying to steal email credentials. It\u2019s also been revealed that GCHQ has been placed at a higher state of readiness<\/a> to respond to cyber threats to the forthcoming general election, forming surge teams to respond to potential cyber incidents affecting the election.<\/p>\n

Denmark\u2019s Centre for Cyber Security has released a report into hacking incidents<\/a> that targeted the Danish defence and foreign ministries in 2015 and 2016. While the report doesn\u2019t attribute the activities to a country, it does brand APT28 as the likely culprit. The Danish defence minister later told a national newspaper that Russia was behind the incident<\/a>. And the International Olympic Committee has announced a new Digital and Technology Commission<\/a> charged with strengthening the organisations cyber security. The new commission comes several months after the World Anti-Doping Agency claimed it was hacked by APT28<\/a>.<\/p>\n

While the weekend marked President Trump\u2019s first 100 days in office, concerns remain about the role of fake news in the 2016 US election.\u00a0Facebook has released a report<\/a> into information operations conducted through the social network to spread misinformation, noting that they will increase their monitoring of suspicious activity in order to reduce the spread of fake news.<\/p>\n

Also in the US, CSIS hosted a panel last week on the effects of significant cyber security breaches in the US<\/a>. The panelists, including former Cyber Czar Michael Daniel and CrowdStrike\u2019s Dmitri Alperovitch, discussed the apparent futility of existing defences, the link between foreign policy and cyber security, and the need to be more forthcoming when attributing cyber incidents.<\/p>\n

And in brief news this week, South Australia has followed NSW\u2019s lead<\/a> by appointing its first state government Chief Information Security Officer. David Goodman<\/a>, currently the SA government\u2019s cyber risk director has been appointed to develop and deliver a new government cyber security strategy. British police have charged a man who allegedly provided information to Islamic State on the use of encryption and ToR<\/a> to hide their activities, including producing instructional videos. And Rwanda has passed a law to establish a National Cyber Security Authority<\/a>\u2014hats off to them!<\/p>\n","protected":false},"excerpt":{"rendered":"

AFP Commissioner Andrew Colvin revealed last week that an AFP officer had, in the course of an investigation, accessed the call record metadata of a journalist without a warrant, putting the error down to poor …<\/p>\n","protected":false},"author":364,"featured_media":31661,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,83,728,1162,163],"class_list":["post-31659","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-elections","tag-hacking","tag-metadata","tag-russia"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"AFP Commissioner Andrew Colvin revealed last week that an AFP officer had, in the course of an investigation, accessed the call record metadata of a journalist without a warrant, putting the error down to poor ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-03T03:05:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-05-03T03:13:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/6588259005_3b7ae335d9_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/6588259005_3b7ae335d9_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/6588259005_3b7ae335d9_z.jpg\",\"width\":640,\"height\":344},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/#primaryimage\"},\"datePublished\":\"2017-05-03T03:05:54+00:00\",\"dateModified\":\"2017-05-03T03:13:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"AFP Commissioner Andrew Colvin revealed last week that an AFP officer had, in the course of an investigation, accessed the call record metadata of a journalist without a warrant, putting the error down to poor ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-05-03T03:05:54+00:00","article_modified_time":"2017-05-03T03:13:43+00:00","og_image":[{"width":640,"height":344,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/6588259005_3b7ae335d9_z.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/6588259005_3b7ae335d9_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/6588259005_3b7ae335d9_z.jpg","width":640,"height":344},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/#primaryimage"},"datePublished":"2017-05-03T03:05:54+00:00","dateModified":"2017-05-03T03:13:43+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-162\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31659"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=31659"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31659\/revisions"}],"predecessor-version":[{"id":31668,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31659\/revisions\/31668"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/31661"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=31659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=31659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=31659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}