- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on August 26, 2015 @ 12:05

Canadian dollars [1]

The US Department of Commerce announced [2] last week that it’s extended its Internet Assigned Numbers Authority (IANA) contract with the Internet Corporation for Assigned Names and Numbers until 30 September 2016. While originally scheduled for handover this September, the delay in formulating a transition plan has made it necessary to extend US Government involvement in managing the Domain Names System. Comments [3] on the draft IANA transition plan are due by 8 September.

Impact Team, the group that have claimed responsibility for the Ashley Madison hack, carried through with their threat to release a database [4] containing information on 37 million members worldwide. Ashley Madison’s parent company Avid Life Media has now offered [5] a CAD$500,000 reward for information that leads to the prosecution of the hackers. Some scammers are reportedly now targeting [6] Ashley Madison members, fraudulently offering to remove the leaked data from the internet, and using interest in the hack to entice others to visit compromised websites. Sadly, the release of data identifying members of the site has so far allegedly been linked [7] with two suicides in Canada and one in the US.

This week, the Council for Foreign Relations (CFR) released its third Cyber Brief [8] on developing proportionate responses to cyber incidents, penned by Tobias Feakin, the director of ASPI’s International Cyber Policy Centre. The brief proposes a framework that policymakers can use to respond to disruptive or destructive state-sponsored cyber activity in a proportionate, legal, timely and discriminatory manner. It notes that determining attribution is critical to crafting an appropriate response, a point also cited [9] by computer security expert Bruce Schneier as a complicating factor in responding to what he sees as the beginning of a cyber arms race.

Also at CFR, Elaine Korzak has dissected [10] the bilateral agreement signed by Russia and China in May this year. She notes that the agreement, which includes a non-aggression clause, is a continuation of the international initiatives that China and Russia have pursued since 2009, notably their 2011 proposal for a code of conduct in cyberspace.

The theft of personal data from Japan’s Pension Service has prompted the release [11] of a draft Cybersecurity Strategy by the Japanese government this week. The draft of the strategy was released in May, but was revised to expand the scope of the NISC [12] cybersecurity monitoring to include non-core government agencies. Japan’s cybersecurity posture will become increasingly critical as the country hosts major international events in the coming years, notably the 2020 Olympic Games. The strategy calls for greater public–private cooperation including a joint response team [13] that can be activated in cyber emergencies.

And finally, those of you with an evil twin should feel comforted that they won’t be able to use Microsoft’s new facial recognition login feature—Windows Hello—to access your computer. The Australian [14] gathered a group of identical twins and attempted to fool the system into logging in the wrong person. Windows Hello wasn’t fooled once, although it did lock out one genuine user.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-85/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/08/2219220078_b3090045cd_z.jpg

[2] announced: http://www.ntia.doc.gov/blog/2015/update-iana-transition

[3] Comments: https://www.ianacg.org/calls-for-input/combined-proposal-public-comment-period/

[4] database: http://www.theguardian.com/technology/2015/aug/19/ashley-madison-hackers-release-10gb-database-of-33m-infidelity-site-accounts

[5] offered: http://www.bbc.com/news/technology-34044506

[6] now targeting: http://www.cbsnews.com/news/scams-extortion-attempts-arising-from-ashley-madison-hack/

[7] linked: http://www.theregister.co.uk/2015/08/24/death_toll_ashley_madison/

[8] Cyber Brief: http://blogs.cfr.org/cyber/2015/08/24/new-cyber-brief-developing-a-proportionate-response-to-a-cyber-incident/#more-2015

[9] cited: http://www.zdnet.com/article/bruce-schneier-the-cyberwar-arms-race-is-on/

[10] dissected: http://blogs.cfr.org/cyber/2015/08/20/the-next-level-for-russia-china-cyberspace-cooperation/

[11] release: http://www.japantimes.co.jp/news/2015/08/21/national/japan-government-adopts-draft-cybersecurity-strategy/#.Vdp9npfNx8F

[12] NISC: http://www.nisc.go.jp/eng/

[13] joint response team: http://the-japan-news.com/news/article/0002371088

[14] The Australian: http://www.theaustralian.com.au/business/in-depth/windows-hello-can-identical-twins-fool-microsoft-and-intel/story-fnw66tov-1227490164701

Copyright © 2016 The Strategist. All rights reserved.