{"id":31775,"date":"2017-05-10T12:30:45","date_gmt":"2017-05-10T02:30:45","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=31775"},"modified":"2017-05-10T11:58:53","modified_gmt":"2017-05-10T01:58:53","slug":"cyber-wrap-163","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

The 2017 Cyber Security Challenge Australia (CySCA)<\/a> kicks off today. Seventy-nine teams will compete<\/a> over 24 hours for trips to cybersecurity conferences including DEFCON<\/a>, Cisco Live<\/a>, and RUXCON<\/a>, as well as the possibility of being headhunted for a cyber security job. CySCA is just part of the Australian government\u2019s push to expand the cybersecurity talent pool in Australia.<\/p>\n

Last Friday, the government\u2019s Special Advisor, Alastair MacGibbon, was talking up the need to start teaching primary school children about cybersecurity<\/a>. And MacGibbon\u2019s deputy, Sandra Ragg, was also out on the hustings last week pitching the idea of an Australian cyber alumni network<\/a> to a conference in Sydney. The network would be a means to transfer skills between the public and private sectors, crowd source new ideas and provide a \u2018surge\u2019 capability for major cybersecurity threats to the country.<\/p>\n

Also in Canberra last week was the inaugural Australia-Indonesia Cyber Policy Dialogue<\/a>, hosted by Australia\u2019s Cyber Ambassador Dr Tobias Feakin. The Dialogue, announced by the Prime Minister and Indonesian President Widodo in February<\/a>, reportedly discussed views on international cyber norms, cooperation on cybersecurity and engagement with regional countries to reduce cyber risks. Mirroring the broader bilateral relationship, Australia\u2019s cyber relationship with Indonesia has been rocky<\/a> in the past<\/a>, but events such as the Dialogue indicate a new positive focus from both countries.<\/p>\n

China has launched an ambitious program to write an online Chinese Encyclopaedia<\/a>, dubbed a \u2018Great Wall of Culture\u2019 by its new editor in chief Yang Muzhi. 20,000 authors have been recruited from Chinese universities to write 300,000 entries. Yang also told the South China Morning Post that the project will directly compete with Wikipedia, to \u2018guide and lead the public and society\u2019<\/a>.\u00a0 SCMP also notes that access to Wikipedia in China is \u2018patchy\u2019, with possibly controversial subjects usually timing out. Gizmodo notes that Wikipedia access has been a tricky subject for Chinese web-censors<\/a>, who have variously blocked access to single pages, the Chinese version, and the whole site<\/a> at different times.<\/p>\n

The French presidential election was marred by the last minute dump of nine gigabytes of information stolen by hackers<\/a> from the eventual victor Emmanuel Macron\u2019s campaign. Macron\u2019s campaign headquarters had previously noted persistent attempts<\/a> by suspected Russian-linked hacking group APT28 to access campaign information. Just before the 12pm Friday media blackout, Macron\u2019s campaign announced that they had fallen victim to a \u2018massive hacking attack\u2019, which resulted in thousands of emails, internal campaign memos and accounts being posted online late<\/a> Friday. The material also included some obviously fake documentation<\/a>.<\/p>\n

While the documents were largely mundane, and the incident didn\u2019t appear to have a noticeable effect on the ultimate outcome, Macron hasn\u2019t ruled out retaliation<\/a> against Russia for the incident. His foreign policy adviser said that \u2018We will have a doctrine of retaliation when it comes to Russian cyberattacks or any other kind of attacks\u2019. France\u2019s national cybersecurity agency<\/a> will also be investigating the incident.<\/p>\n

In Germany, Hans-Georg Maasse, the head of domestic security agency BfV<\/a>, has threatened to \u2018wipe out\u2019 servers<\/a> used by threat actors, including APT28<\/a>, APT29<\/a> and APT10<\/a>, if the owners of the servers aren\u2019t willing to assist authorities to prevent further cyber incidents. BfV has been investigating hacking incidents<\/a> that targeted the Bundestag in 2015 and political associations connected with the major parties last month, that have all been linked to Russian cyber actors. And according to the Washington Post, two former officials from the Obama Administration have called for a comprehensive US\/NATO\/EU strategy<\/a> to deter further Russian attempts to \u2018subvert\u2019 elections.<\/p>\n

The British Army has announced a new recruitment campaign for cyber savvy soldiers after its previous attempts failed to secure the necessary number of recruits. Payments of \u00a35,000, known as a \u2018Golden Hello\u2019, will be provided<\/a> to communications systems operators and engineers in the Royal Corps of Signals. Meanwhile, the US Marine Corps is reportedly struggling with the concept of admitting cyber skilled Marines through lateral entry programs<\/a> that allow personnel to skip basic training in junior ranks. Concerns that the Marines can\u2019t recruit enough of the right people to ensure mission effectiveness are balanced by concerns that lateral entry will undermine the Marine\u2019s esprit de corps<\/em> and the \u2018every Marine a rifleman\u2019 ethos.<\/p>\n

Japan\u2019s Yomiuri Shimbun has learnt that Japan\u2019s Internal Affairs and Communications Ministry plans to introduce a certification system for IoT devices<\/a> in 2018. The Ministry plans to devise an index to rate the cybersecurity measures of IoT devices, which will be indicated by a Ministry certification mark. The emergence last year of the Mirai botnet<\/a>, which uses infected IoT devices to mount massive denials of service (DDoS) , has further heightened long standing concern among governments and cybersecurity researchers about the security of IoT devices.<\/p>\n

And finally, the manager of the .au domain auDA<\/a> wants your views on the introduction of direct registration in Australia<\/a>. The change to direct registration will allow shorter domains in the .au domain space, e.g. aspistrategist.au instead of aspistrategist.ru. Tell auDA your thoughts here<\/a> before 15\u00a0May.<\/p>\n","protected":false},"excerpt":{"rendered":"

The 2017 Cyber Security Challenge Australia (CySCA) kicks off today. Seventy-nine teams will compete over 24 hours for trips to cybersecurity conferences including DEFCON, Cisco Live, and RUXCON, as well as the possibility of being …<\/p>\n","protected":false},"author":364,"featured_media":31779,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,391,83,8,135],"class_list":["post-31775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyber","tag-elections","tag-indonesia","tag-japan"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The 2017 Cyber Security Challenge Australia (CySCA) kicks off today. Seventy-nine teams will compete over 24 hours for trips to cybersecurity conferences including DEFCON, Cisco Live, and RUXCON, as well as the possibility of being ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-10T02:30:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-05-10T01:58:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/mother-board-581597_640.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/mother-board-581597_640.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/mother-board-581597_640.jpg\",\"width\":640,\"height\":480,\"caption\":\"Image courtesy of Pixabay user Magnascan.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/#primaryimage\"},\"datePublished\":\"2017-05-10T02:30:45+00:00\",\"dateModified\":\"2017-05-10T01:58:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The 2017 Cyber Security Challenge Australia (CySCA) kicks off today. Seventy-nine teams will compete over 24 hours for trips to cybersecurity conferences including DEFCON, Cisco Live, and RUXCON, as well as the possibility of being ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-05-10T02:30:45+00:00","article_modified_time":"2017-05-10T01:58:53+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/mother-board-581597_640.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/mother-board-581597_640.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/05\/mother-board-581597_640.jpg","width":640,"height":480,"caption":"Image courtesy of Pixabay user Magnascan."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/#primaryimage"},"datePublished":"2017-05-10T02:30:45+00:00","dateModified":"2017-05-10T01:58:53+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-163\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31775"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=31775"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31775\/revisions"}],"predecessor-version":[{"id":31780,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31775\/revisions\/31780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/31779"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=31775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=31775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=31775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}