Cyber wrap
Posted By
Zoe Hawkins
on September 2, 2015 @ 12:30

The US Third Circuit Court of Appeals has
affirmed the Federal Trade Commission’s (FTA) authority to charge corporations over insufficient levels of cybersecurity. Wyndham Worldwide, the parent company of several hotel chains is being taken to court by the FTA for the company’s alleged failure to protect customers’ personal data, which resulted in more than 600,000 customers having their credit card details stolen between 2008 and 2010. This
court ruling marks a significant step towards reaffirming the powers of the FTC, setting legal precedent for cybersecurity liability and raising questions in regards to other large-scale corporate breaches, like those which affected
Target in 2013 and
eBay last year.
After their well-publicised hack of a Jeep Cherokee, computer security engineers Charlie Miller and Chris Valasek have been
hired by Uber. You might recall that the duo exploited the vulnerabilities of Fiat Chrysler’s Uconnect software in order to remotely
manipulate the Jeep’s blinkers, navigation, brakes and steering; Jeep responded by recalling 1.4 million vehicles. Miller and Valasek will now be working at Uber’s Advanced Technology Centre in Pittsburgh which is currently researching autonomous car technologies. While questions have been
raised over the potential PR motives behind the hiring, this move comes as part of a much broader talent acquisition program which has recently
poached more than 100 engineers from different divisions of Google.
The White House is reportedly in the process of crafting a
suite of sanctions targeting Chinese firms responsible for corporate cyber espionage. Informed by an
executive order made by Obama in April, the US has shortlisted five state-owned and private Chinese firms that steal trade secrets from American companies. Retribution for activities in cyberspace wouldn’t be an unprecedented move, with the US having
imposed sanctions on North Korea after the Sony hack in 2014. The discussion is occurring at a politically precarious moment, only weeks before Chinese President Xi Jinping makes his
first state visit to Washington. Some are in favour of the move, arguing that it will act as a
vital deterrent for future cyberthefts, while other are wary that this could escalate Sino-US tensions and cause
economic retaliation. A decision is expected to be reached in the coming weeks, and will undoubtedly impact the outcomes of the visit, with the spokesperson of the Chinese embassy in Washington
advocating for ‘enhanced dialogue and cooperation’ between the two parties.
An American teenager has been
sentenced to 11 years in prison for supporting Islamic State. Ali Shukri Amin, a 17 year old high school student from Virginia, has been
convicted of running an influential pro-ISIS Twitter account with the handle @Amreekiwitness, which accrued more than 4,000 followers. In addition to his social media outreach, Amin
raised funds for the terrorist organisation by giving tutorials on how to use the cytpocurrency, Bitcoin. The teen’s jail sentence has sparked
debate over whether the government is being overly harsh on those who, while expressing hateful views, possess no capacity to inflict actual harm. However, Amin was also accused of
radicalising a fellow teen who proceeded to travel to Syria as a foreign fighter.
Japan’s Internal Affairs and Communications Ministry will execute large-scale
simulated cyberattacks in order to prepare for the 2020 Tokyo Olympics and Paralympics. The new National Centre of Incident Readiness and Strategy for Cybersecurity will
run drills to anticipate and prevent likely cyberattacks on critical infrastructure and processing systems. The urgency is fuelled by a lack of public confidence in the government’s cybersecurity following the data breach of the Japan Pension Service earlier this year. Starting in the 2016 financial year, Japan will
allocate more than ¥1 billion to the effort, however a shortage of trained cyber security experts remains a critical obstacle.
Zoe Hawkins is a research intern at ASPI. Image courtesy of Flickr user Sydsquid.
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-86/
[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/09/4275066215_7c7b6de6c4_z.jpg
[2] affirmed: http://thehill.com/policy/cybersecurity/252217-court-rules-leads-to-fears-of-ftc-litigation-on-cybersecurity
[3] court ruling: http://www2.ca3.uscourts.gov/opinarch/143514p.pdf
[4] Target: http://www.bloomberg.com/bw/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data
[5] eBay: http://www.forbes.com/sites/gordonkelly/2014/05/21/ebay-suffers-massive-security-breach-all-users-must-their-change-passwords/
[6] hired: http://www.wired.com/2015/08/uber-hires-hackers-wirelessly-hijacked-jeep/
[7] manipulate: http://arstechnica.com/security/2015/08/uber-hires-researchers-who-hacked-chrysler-uconnect/
[8] raised: http://www.gizmodo.com.au/2015/08/uber-hires-the-car-hackers-that-stopped-chrysler-in-its-tracks/
[9] poached: http://www.nytimes.com/2015/08/29/technology/uber-hires-two-engineers-who-showed-cars-could-be-hacked.html?_r=0
[10] suite of sanctions: http://edition.cnn.com/2015/08/31/politics/china-sanctions-cybersecurity-president-obama/
[11] executive order: https://www.whitehouse.gov/the-press-office/2015/04/01/executive-order-blocking-property-certain-persons-engaging-significant-m
[12] imposed sanctions: http://www.bbc.com/news/world-us-canada-30661973
[13] first state visit: https://www.washingtonpost.com/world/national-security/administration-developing-sanctions-against-china-over-cyberespionage/2015/08/30/9b2910aa-480b-11e5-8ab4-c73967a143d3_story.html?postshare=9151441036659720
[14] vital deterrent: http://www.scmp.com/tech/enterprises/article/1853235/white-house-must-threaten-great-firewall-any-hope-curbing-chinas
[15] economic retaliation: http://www.wsj.com/articles/white-house-readying-sanctions-plan-against-chinese-firms-for-cybertheft-1441057946
[16] advocating: http://www.ibtimes.co.uk/us-weighing-sanctions-china-over-cyber-attacks-ahead-xis-visit-1517893
[17] sentenced: http://www.nbcnews.com/news/us-news/virginia-teen-sentenced-prison-isis-case-n417691
[18] convicted: https://www.hackread.com/pro-isis-virginia-teen-twitter/
[19] raised funds: http://www.ibtimes.com/who-ali-shukri-amin-virginia-isis-teenager-behind-pro-islamic-state-twitter-sentenced-2073208
[20] debate: http://thehill.com/policy/national-security/252172-virginia-teen-gets-11-years-for-tweeting-support-for-isis
[21] radicalising a fellow teen: http://arstechnica.com/tech-policy/2015/08/jihadist-us-teen-gets-11-years-for-blog-tweets-about-crypto-and-bitcoin/
[22] simulated cyberattacks: http://www.thejakartapost.com/news/2015/08/26/japan-plans-large-drills-avert-cyber-attacks-2020-games.html
[23] run drills: http://www.japantimes.co.jp/news/2015/08/30/national/filling-ranks-japans-cyberwarriors-time-2020-olympics-proves-major-challenge/
[24] allocate: http://the-japan-news.com/news/article/0002379732