- The Strategist - https://www.aspistrategist.org.au -
Cyber wrap
Posted By Jessica Woodall on November 12, 2014 @ 14:30
We’re starting this week off in the States with the FBI successfully crossing off a name on their most wanted [2] cyber list. John Gordon Baden, wanted in connection with the identify theft of 40,000 individuals, was apprehended [3] in Tijuana, Mexico. He and his co-conspirators allegedly used the stolen details to siphon millions of dollars from victims’ bank accounts by buying expensive products and taking out loans. Baden’s arrest was the result of several anonymous tip-offs and quick work on the ground by the Tijuana Municipal Police. The collaboration serves as a good example of what can be achieved through international collaboration on the cybercrime-fighting front.
Thousands of international delegates and media representatives are streaming into Brisbane this week ahead of the G20 Summit. Large international summits have proven [4] to be attractive targets for both state-backed intelligence gathering and hacktivist operations. A phishing campaign was used during a G20 Finance Minister’s meeting in Paris 2011 to try and gain access to sensitive information. During the London Olympics plans were also laid to target critical national infrastructure. The Australian Signals Directorate’s CSOC has released a handy Protect Notice [5] on the G20 Summit for Australian government attendees, but it also contains sound advice for all those attending.
China has allegedly ‘gone postal’ this week, stealing the personal details of the US Postal Service’s 800,000 employees. Whilst the Postal Service may seem like a strange target for the Chinese government, ICPC’s international fellow James Lewis has a simple explanation [6] for the Washington Post. ‘They’re just looking for big pots of data on government employees’, Lewis said. ‘For the Chinese, this is probably a way of building their inventory on U.S. persons for counterintelligence and recruitment purposes.’ The information stolen included addresses, dates of birth and social security numbers. But the infiltrators seemed to be motivated by intelligence gathering, not crime or monetary gain. That led investigators to connect the attack to more traditional government-backed hackers driven by espionage.
Keen not to be left out, hackers linked [7] to the Malaysian government have allegedly crashed an American environmental news website. The website had run an article publicising a new book critical of Abdul Taib Mahmud, a senior politician in Malaysia’s ruling coalition, the Barisan Nasional. The attack follows earlier threats to a domestic news organisation based in Sarawak that had reported on government corruption.
A man in the United Kingdom has been convicted [8] on charges of posting a ‘malicious web link’ and encouraging a DDOS attack after he lent support to an Anonymous campaign in 2012 via his Twitter feed. The attack brought down the website of the UK Home Office and targeted the website of Home Secretary Theresa May. The man admitted supporting the group but argued that he hadn’t posted the links and his Twitter feed had been hacked.
Over in Vienna, the OSCE just wants us all to get along. Cyber Confidence Building Measures (CBMs) were the latest [9] topic of discussion in a meeting held in the Austrian capital on Friday. Convened by the Swiss OSCE Chairmanship, the group met to discuss the implementation of a set of CBMs [10] decided upon by the OSCE last year and to seek the advice of several NGO and CNI providers. The group was also keen to engage with representatives from other regional groupings including Asia.
Ambassador Benno Laggner, Head of the Division for Security Policy, at the Swiss Foreign Ministry explained: ‘Cyberspace constitutes an area with much room for speculation, doubt, and ambiguity. The use of ICTs for malicious purposes is not directly visible and it is even less tangible’. ‘Therefore, confidence-building measures designed to increase transparency and trust are crucial in order to reduce the danger of miscalculation, misperception and misunderstanding.’
Jessica Woodall [11] is an analyst in ASPI’s International Cyber Policy Centre [12]. Image courtesy of Flickr user Emilien Etienne [13].
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-50/
URLs in this post:
[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/11/14784489258_b1b6c47b6c_z.jpg
[2] most wanted: http://www.fbi.gov/wanted/cyber
[3] apprehended: http://www.networkworld.com/article/2844019/security0/fbi-grabs-a-most-wanted-cyber-fugitive.html
[4] proven: http://www.smh.com.au/it-pro/security-it/australia-on-alert-as-cyber-threats-circle-g20-20141107-11igrs.html
[5] Protect Notice: http://www.asd.gov.au/publications/csocprotect/g20-cyber-security-advice.htm
[6] explanation: http://www.washingtonpost.com/blogs/federal-eye/wp/2014/11/10/china-suspected-of-breaching-u-s-postal-service-computer-networks/
[7] linked: http://www.skynews.com.au/news/world/asiapacific/2014/11/07/malaysians-accused-of-hacking-us-news-site.html
[8] convicted: http://www.bbc.com/news/uk-england-stoke-staffordshire-29958425
[9] latest: http://www.osce.org/cio/126475
[10] set of CBMs: http://www.osce.org/pc/109168?download=true
[11] Jessica Woodall: https://www.aspi.org.au/about-aspi/aspi-staff/analysts/jessica-woodall
[12] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/
[13] Emilien Etienne: https://www.flickr.com/photos/emilienetiennephotography/14784489258
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.