- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By and on December 14, 2016 @ 12:30

For the final two cyber wraps of 2016, ICPC will review some of the biggest cyber stories to make headlines over the last twelve months so that we can all laugh, cry and reflect on the year that was together.

On the home front, 2016 was a big year. Australia’s Cyber Security Strategy [1] was released in April by Prime Minister Malcolm Turnbull. The Strategy committed a total of $230 million to new initiatives to strengthen Australia’s cyber security, in addition to the $400 million funding already allocated to cyber security efforts in the 2016 Defence White Paper [2]. The Strategy also created a new ministerial position for cyber issues, with two new positions—a Special Adviser to the PM, and a Cyber Ambassador—joining the existing ACSC Coordinator. Work has commenced [3] on new capital city threat sharing centres and academic Centres of Excellence, as have preparations [4] to move the ACSC from within ASIO HQ to new digs that will be more accessible to private sector partners and cyber workers with lower levels of security clearance. While those are all promising signs for the implementation of the Strategy, there’s been some [5] criticism [6] from industry about the pace of implementation. Full steam ahead for 2017.

Australia’s offensive cyber capability, which is being housed in the Australian Signals Directorate HQ, was also announced in the Strategy. While there understandably isn’t much detail available, the PM revealed [7] that Australia’s capabilities have been engaged against Daesh’s cyber efforts in the Middle East. Other Australian highlights for 2016 include the second annual ACSC Threat Report [8] which revealed a state actor was behind the hack of the Australia’s Bureau of Meteorology [9] which took place last year.

2016 also saw a major change in how the internet is managed worldwide, with the transition of the Internet of Assigned Numbers Authority [10] (IANA) from a US Department of Commerce contract to a standalone multi-stakeholder-led institution. The move was the culmination of a policy plan which stretches back to the Clinton administration [11], which was spurred along by the Snowden disclosures and increasing international concern about the US’s role in internet governance. The transition was delayed [12] several [13] times [14] as the multi-stakeholder community struggled to implement a plan to take on the function, and was nearly further delayed by court action initiated by US Senator Ted Cruz. However, the move was eventually successful on 1 October. While the average Internet user wouldn’t have noticed any difference, the transition is a win for proponents of the multi-stakeholder model of internet governance.

Several other countries released new cyber strategies in 2016, with Britain [15], Germany [16],  New Zealand [17] and Singapore [18] providing some interesting policy contrasts to Australia’s effort. Britain’s government is taking a stronger position in protecting its citizens online, Germany is increasingly concerned about privacy, New Zealand is focused on cybercrime and education, and Singapore remains set on maximising digital growth’s full potential.

Cyber security incidents also remained weekly news in 2016. The fallout from the Dyn DDoS incident [19] back in October continues to reverberate as other attempts [20] to exploit security vulnerabilities of IoT infrastructure have followed—including one affecting Germany’s Deutsch Telekom [21] earlier last month. In the US, the revelation that Yahoo! had hidden a 2014 data breach [22] complicated the planned Verizon takeover. Other big breaches this year include the DNC hack (which we’ll cover next week), the US$81 billion dollar compromise of the SWIFT network [23] through Bangladesh’s Central Bank, and Australia’s largest ever data breach—when the Red Cross Blood Service accidentally leaked [24] the personal information of more than 550,000 donors.

We’ll see you next Wednesday for part two of our wrap-up of the year that was!



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-147/

URLs in this post:

[1] Cyber Security Strategy: https://cybersecuritystrategy.dpmc.gov.au/

[2] 2016 Defence White Paper: http://www.defence.gov.au/WhitePaper/

[3] Work has commenced: http://www.itnews.com.au/news/australias-first-cyber-threat-sharing-centre-to-open-before-end-of-year-439690

[4] as have preparations: http://www.canberratimes.com.au/national/public-service/australian-cyber-security-centre-to-relocate-from-asio-headquarters-20161121-gsu3x0.html

[5] some: http://www.zdnet.com/article/australian-government-agencies-testing-but-not-implementing-emerging-tech-accenture/

[6] criticism: http://www.smh.com.au/technology/consumer-security/from-cybercrime-to-cyber-warfare-australia-woefully-unprepared-20161130-gt0o5r

[7] the PM revealed: https://www.pm.gov.au/media/2016-11-23/address-parliament-national-security-update-counter-terrorism

[8] second annual ACSC Threat Report: https://www.acsc.gov.au/publications/ACSC_Threat_Report_2016.pdf

[9] hack of the Australia’s Bureau of Meteorology: https://www.aspistrategist.org.au/the-bom-infiltration/

[10] transition of the Internet of Assigned Numbers Authority: http://www.theregister.co.uk/2016/09/30/internet_handover_is_go_go_go/

[11] stretches back to the Clinton administration: https://www.ntia.doc.gov/files/ntia/publications/6_5_98dns.pdf

[12] delayed: https://www.techdirt.com/articles/20160930/15440635670/judge-says-no-way-to-attorneys-general-looking-to-block-iana-transition.shtml?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+techdirt%2Ffeed+(Techdirt)

[13] several: http://www.thehostingnews.com/iana-transition-moves-ahead-according-to-plan-despite-opposition.html

[14] times: http://domainnamewire.com/2016/09/30/court-rejects-last-minute-plea-halt-iana-contract-handover/

[15] Britain: https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021

[16] Germany: https://www.bsi.bund.de/EN/Publications/SecuritySituation/SecuritySituation_node.html

[17] New Zealand: http://www.dpmc.govt.nz/dpmc/publications/nzcss

[18] Singapore: https://www.csa.gov.sg/news/publications/singapore-cybersecurity-strategy

[19] Dyn DDoS incident: https://dyn.com/blog/dyn-statement-on-10212016-ddos-attack/

[20] other attempts: https://www.washingtonpost.com/news/the-switch/wp/2016/10/21/someone-attacked-a-major-part-of-the-internets-infrastructure/

[21] including one affecting Germany’s Deutsch Telekom: https://www.bloomberg.com/news/articles/2016-11-28/deutsche-telekom-probes-potential-hacking-after-router-issues

[22] Yahoo! had hidden a 2014 data breach: http://fortune.com/2016/11/09/yahoo-hack-data-breach-sec/

[23] compromise of the SWIFT network: https://www.ft.com/content/39ec1e84-ec45-11e5-bb79-2303682345c8

[24] accidentally leaked: http://www.abc.net.au/news/2016-10-28/red-cross-blood-service-admits-to-data-breach/7974036

Copyright © 2024 The Strategist. All rights reserved.