- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on June 24, 2015 @ 12:59

6101434856_e7eafdfdf2_z


It’s ConnectSmart week across the Tasman, an event that seeks to raise awareness of cyber security in the New Zealand community. National Cyber Policy Office director Paul Ash has encouraged Kiwis to come up with unique and complex passwords for all of their online accounts and to change them regularly; and Communications Minister Amy Adams noted the need for greater awareness of cyber security threats among small-to-medium sized enterprises, asking them to improve their online security through a few simple measures like securing work tablets and smartphones with passwords. To assist in reducing cyber security incidents, and as part of their contribution to ConnectSmart week, Auckland's Unitec Institute of Technology and Japan's National Institute of Information and Communications Technology launched a ‘Red Alert' service back in March. The subscription service will help protect any network that’s connected and subscribed to the service by issuing an alert as soon as an intrusion takes place. It’s also National Cyber Week in Israel.

Across the Pacific, the fallout from the Office of Personnel Management (OPM) breach continues. While the US has been careful to not officially name China as the source of the hack, others have pointed towards a Chinese group possibly named Shell Crew, PinkPanther, KungFu Kittens, Group 72 or Deep Panda. Cyber security incidents have had dramatic effects on the US-China relationship in the past, principally the suspension of the bilateral cybersecurity working group after the US indicted five PLA officers for cyber espionage.

Cyber security was reportedly discussed in ‘direct terms’ by Deputy Secretary of State Antony Blinken and China’s Executive Vice Foreign Minister, Zhang Yesui, at Monday’s Strategic Security Dialogue in Washington DC. Treasury Secretary Jack Lew was similarly direct on US concerns about Chinese support for economic cyber espionage at the bilateral Strategic and Economic Dialogue on Tuesday. Those talks precede the visit of Chinese president Xi Jinping to Washington DC in September this year.

Also in DC, the House approved the 2016 Intelligence Authorization Bill that sets requirements for the new Cyber Threat Intelligence Centre, and would compel the administration to provide detail to Congress on the breach at OPM. Several senators have also begun to lobby for cybersecurity information sharing legislation to progress quickly.

Further afield, June marks the one year anniversary of the African Union’s (AU) Convention on Cyber security and Personal Data Convention. The convention established a standard legal framework for conducting electronic commerce, protecting personal data, promoting cybersecurity, and addressing cybercrime. While no AU members have ratified the convention, Kenya, Madagascar, Mauritania, Morocco, Tanzania, Tunisia and Uganda are in the process of adopting national cybersecurity legislation, although these laws may be more damaging to human rights than the AU convention. Overall the future for cyber security in Africa appears to remain dim.

And finally in Australia, the intergovernmental Financial Action Task Force met in Brisbane this week, where discussions on terrorist networks using the internet for fund raising took place, as well as the use of BitCoin and other online currencies to hide terrorist financing. FATF head and former Secretary of the Attorney-General’s Department Roger Wilkins noted that further research on the use of cyberspace to finance groups including Boko Haram and Jemaah Islamiyah was needed, and that exchanges that turned virtual currencies into hard cash should be required to report suspicious transactions in the same way as banks do. In Canberra last week, Defence Minister Kevin Andrews previewed  what’s in store for cyber security in the forthcoming Defence White Paper. At the same conference, other senior Defence leaders spoke about the need for innovative non-traditional recruitment techniques to attract cyber expertise to Defence—and keep it there.


Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-76/

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/06/6101434856_e7eafdfdf2_z.jpg

[2] ConnectSmart: http://www.stuff.co.nz/business/better-business/69581151/kiwis-urged-to-tighten-online-security

[3] noted: https://www.beehive.govt.nz/release/smes-focus-connect-smart-week

[4] Red Alert: http://www.unitec.ac.nz/about-us/cyber-security-in-new-zealand-moves-forward

[5] Israel: http://www.israel21c.org/news/cyber-week-2015-underway/

[6] others: http://www.theage.com.au/it-pro/security-it/hunting-deep-panda-investigation-into-cyberattack-on-us-government-continues-20150621-ghtyrj.html

[7] past: http://www.bloomberg.com/news/articles/2014-05-20/china-suspends-cybersecurity-cooperation-with-u-s-after-charges

[8] indicted: http://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor

[9] Strategic Security Dialogue: http://www.wsj.com/articles/senior-u-s-chinese-officials-meet-in-washington-shadowed-by-strains-1435003925

[10] direct: http://www.reuters.com/article/2015/06/23/us-usa-china-idUSKBN0P226N20150623

[11] approved: http://www.natlawreview.com/article/congress-begins-to-take-action-cybersecurity-legislation

[12] Convention on Cyber security and Personal Data Convention: http://blogs.cfr.org/cyber/2015/06/22/the-african-union-cybersecurity-convention-a-missed-human-rights-opportunity/

[13] although: https://s3.amazonaws.com/access.3cdn.net/c638de23becc918b77_1xm6b5y67.png

[14] Financial Action Task Force: http://www.theaustralian.com.au/in-depth/terror/financial-action-task-force-puts-focus-on-cyber-terror-networks/story-fnpdbcmu-1227408646468?memtype=anonymous

[15] previewed: http://www.minister.defence.gov.au/2015/06/17/minister-for-defence-adm-cyber-security-summit/

[16] spoke: http://www.itnews.com.au/News/405391,defence-willing-to-relax-rules-offer-more-cash-to-recruit-more-cyber-experts.aspx