{"id":32513,"date":"2017-06-21T12:56:28","date_gmt":"2017-06-21T02:56:28","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=32513"},"modified":"2017-06-21T12:56:28","modified_gmt":"2017-06-21T02:56:28","slug":"cyber-wrap-169","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

The encryption debate<\/a> has continued to dominate cyber security news this week. German ministers discussed measures to monitor encrypted messaging<\/a> by forcing \u2018source telecoms\u2019 to install monitoring software. Conversely, the European Parliament is currently considering<\/a> amending the EU Charter of Fundamental Rights<\/a> to prohibit decryption or other monitoring on encrypted communications. On top of that, founder of the encrypted messaging service Telegram, Pavel Durov, has claimed<\/a> that the US government previously approached Telegram to install ‘backdoors’<\/a> in the service, offering hefty financial incentives to boot.<\/p>\n

Facebook has finally weighed in on the elephant in the room in the encryption debate\u2014terrorist communications. In an unusually high-profile blog post<\/a>, the company stated that it has embraced technological solutions to remove terrorist communications and accounts from Facebook, including artificial intelligence. The blog post will be the first in a series called \u2018Hard Questions\u2019<\/a>, where Facebook seeks to address complex social issues. It\u2019ll be a series to watch closely as Facebook begins taking a more active role<\/a> in public debate.<\/p>\n

Back in Australia, the government has selected host universities<\/a> for Australia\u2019s first Academic Centres of Cyber Security Excellence. The University of Melbourne and Edith Cowan University will be the inaugural hosts for the centres, and will receive shares of funding allocated by the Cyber Security Strategy<\/a>. That positive step in cyber education comes on top of Australia\u2019s high performance in the International Telecommunications Union\u2019s annual Global Cybersecurity Index<\/a>. Australia placed 7th out of 134 member states in cybersecurity commitments and policy, with our technical certification and standards highlighted as a strong suit. Lastly, the Department of Defence is looking at introducing intelligence analytics tools<\/a> and techniques to manage natural language data, from text, speech and video.<\/p>\n

A data firm affiliated with the Republican National Committee, Deep Root Analytics, accidentally left a database full of voter information open on the internet<\/a> to random users\u2014potentially exposing private information on 198 million US voters<\/a>. Election security has been a prominent theme elsewhere this week, with early findings from investigations in Illinois indicating that cyber attackers attempted<\/a> to delete or alter voter data on software systems across 39 states in the 2016 presidential election\u2014far more than previous reports indicated<\/a>. North of the border, the Canadian Communications Security Establishment released a report stating that hackers attacked the 2015 General Election<\/a> using a combination of selective leaks and disinformation campaigns. The report found that the attacks were relatively unsophisticated and not conducted by nation-states, but there\u2019s little to suggest the next Canuck election will prove as resilient.<\/p>\n

The Trump administration has taken an aggressive approach to government deregulation, issuing a memo<\/a> instructing government agencies to remove up to 50 outdated reporting requirements<\/a>, seven of which had forced federal agencies to provide updates on their preparedness for the Y2K bug\u201417 years after the bug became a non-issue. There\u2019s nothing quite like timeliness\u2026<\/p>\n

By letting registration of a control domain expire, Samsung left phones with the stock Samsung S Suggest app potentially vulnerable to hijacking<\/a>. The app was discontinued in 2014, but continued to receive instructions from a web domain, which expired this week. Fortunately, ethically-minded cybersecurity researchers<\/a> bought out the domain before harm could be done, but they found that the domain could have pushed malicious code directly to phones with the app.<\/p>\n

Finally, in the US, the Girl Scouts of the USA have announced<\/a> a partnership with Palo Alto Networks<\/a> to introduce cybersecurity education to the girl scouts including \u00a018 new cybersecurity badges<\/a> starting in 2018. The new focus area was decided on as a result of a survey<\/a> of young women, who stated they wanted to learn technical skills and boost their participation in STEM. The badges provide programs for all skill levels<\/a>, from the basics of privacy and online safety to learning how to become an ethical hacker.<\/p>\n","protected":false},"excerpt":{"rendered":"

The encryption debate has continued to dominate cyber security news this week. German ministers discussed measures to monitor encrypted messaging by forcing \u2018source telecoms\u2019 to install monitoring software. Conversely, the European Parliament is currently considering …<\/p>\n","protected":false},"author":608,"featured_media":32514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[391,1428,868,1570],"class_list":["post-32513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cyber","tag-donald-trump","tag-education","tag-encryption"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The encryption debate has continued to dominate cyber security news this week. German ministers discussed measures to monitor encrypted messaging by forcing \u2018source telecoms\u2019 to install monitoring software. Conversely, the European Parliament is currently considering ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-21T02:56:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/2941015699_408ab48fb9_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Chi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Chi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/2941015699_408ab48fb9_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/2941015699_408ab48fb9_z.jpg\",\"width\":640,\"height\":482},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/#primaryimage\"},\"datePublished\":\"2017-06-21T02:56:28+00:00\",\"dateModified\":\"2017-06-21T02:56:28+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\",\"name\":\"Michael Chi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"caption\":\"Michael Chi\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The encryption debate has continued to dominate cyber security news this week. German ministers discussed measures to monitor encrypted messaging by forcing \u2018source telecoms\u2019 to install monitoring software. Conversely, the European Parliament is currently considering ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-06-21T02:56:28+00:00","og_image":[{"width":640,"height":482,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/2941015699_408ab48fb9_z.jpg","type":"image\/jpeg"}],"author":"Michael Chi","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Michael Chi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/2941015699_408ab48fb9_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/06\/2941015699_408ab48fb9_z.jpg","width":640,"height":482},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/#primaryimage"},"datePublished":"2017-06-21T02:56:28+00:00","dateModified":"2017-06-21T02:56:28+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-169\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9","name":"Michael Chi","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","caption":"Michael Chi"},"url":"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32513"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/608"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=32513"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32513\/revisions"}],"predecessor-version":[{"id":32515,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/32513\/revisions\/32515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/32514"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=32513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=32513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=32513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}