Cyber wrap
Posted By
Zoe Hawkins
on November 18, 2015 @ 12:28

The 2016
National Defense Authorization Act (NDAA) passed US Congress last week and has interesting implications for US cybersecurity policy. The NDAA instructs US Cyber Command to
undertake cyber ‘war games’ to ensure the nation’s cyber capabilities rival its opponents’ in a future offensive cyber conflict. The Act explicitly identifies Russia, China, Iran and North Korea as the countries that the US must be most prepared to confront in cyberspace. It also
authorises a budget of up to US$200 million for the Secretary of Defense to perform an ‘evaluation of cyber vulnerabilities of major weapons systems’. The move is partly in response to an
inspection of the weapons program last year, which revealed widespread network vulnerabilities, unpatched software and weak passwords. Finally, the NDAA entrusts US Cyber Command with its
own procurement budget designed to facilitate the rapid adaptation required for effective cybersecurity. All 1,300 pages of the Defense spending bill are
set to be approved and signed by President Obama this week.
War gaming seems to be the theme of the week, with the
US and the UK teaming up to test the cyber resilience of their financial institutions. Last Thursday’s exercise involved each state simulating an attack on the other’s financial sector to test the levels of information sharing, communication with the public and management of the incident.
Participating actors included the White House National Security Council, the US Department of the Treasury, the FBI and the US Federal Reserve Bank of New York on the US side, and the UK Intelligence Community, the Bank of England and Her Majesty’s Treasury on the British side. Originally announced by President Obama and Prime Minister Cameron back in January, this war-game was
designed to enhance transatlantic cooperation and collective resilience in cyberspace.
Privacy is a significant concern for internet users and apparently prison inmates are no exception. Securus Technologies, a leading provider of phone services inside US prisons, suffered a
data breach that revealed the company has been recording all inmates’ conversations.
The Intercept released a
report claiming that a hacker provided them with Securus records of over 70 million phone calls that not only includes the call metadata (time, date, duration etc.) but also a ‘recording URL’ of the conversation audio. Now, it’s actually a widely accepted procedure to monitor inmates’ personal phone calls for security reasons. What makes this revelation interesting is that at least
14,000 of them are between inmates and attorneys. If that’s proven to be the case, it may have undermined inmates’ Sixth Amendment rights to a fair trial and has been
described by David Fathi, Director of the American Civil Liberties Union, as ‘the most massive breach of attorney-client privilege in US history’. While Securus is currently denying the existence of those illegal records, the company is also claiming that the data in question
wasn't obtained through a hack, but leaked by an individual with authorized access.
A number of recent events have revived questions around the relationship between the FBI, Carnegie Melon University (CMU), and arrests of dark net users. Tor Project Director Roger Dingledine is
claiming that the FBI paid CMU at least US$1 million for its research that de-anonymises Tor users. Last July, two CMU researchers, Alexander Volynkin and Michael McCord, were going to hold a talk at the Black Hat Conference titled ‘you don’t have to be the NSA to break Tor’; however they
pulled out at the last minute. Shortly after, the FBI conducted
Operation Onymous, a multi-agency effort that took down multiple Tor-based websites, including Silk Road 2.0, and led to 17 arrests. Court documents from the proceeding trial of drug distributor Brian Farrell reveal the prosecution based Farrell’s involvement with Silk Road 2.0 on information obtained from ‘
a university-based research institute’. According to Dingledine, the implied collaboration between CMU and the FBI to expose Tor-users’ information isn’t only unethical, but also a
violation of the Fourth Amendment if the FBI didn’t obtain a warrant. The
FBI has stated that those accusations are ‘inaccurate’, although speculation remains over whether it’s the accusation or the amount paid that’s inaccurate.
The tragic terrorist attacks that occurred in Paris last weekend have reverberated in cyberspace. The events
re-opened the debate around encrypted messaging technologies and whether tech companies should be required to provide law enforcement with ‘back-doors’ to their encrypted communications. It was
only last month that the Obama administration decided to not force companies to open their backdoors, however
ISIS’ use of encrypted apps, such as Wickr, Signal and Telegram, to broadcast responsibility for both the crash of the Russian jet in the Sinai Peninsula at the end of October and last weekend’s Paris attacks has intensified demands. It’s suggested that ISIS exploited the
encrypted connections of PlayStation 4 to execute the Paris attacks. Many are
blaming the continued prioritisation of privacy over security following the Snowden revelations.
You might also be interested to know that hactivist collective Anonymous has joined the coalition and
declared war on ISIS with #OpParis.
And finally, speaking of cyberspace and terrorism, check out
this great Sydney Morning Herald article that distinguishes between cyber terrorism in Hollywood and reality.
Zoe Hawkins is a research intern at ASPI. Image courtesy of Flickr user Daniel Lee.
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-97/
[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/11/15586306097_6b71456192_z.jpg
[2] National Defense Authorization Act: http://armedservices.house.gov/index.cfm?a=Files.Serve&File_id=27E9F5EB-757A-4BF2-B807-333B6BD6A627
[3] undertake cyber ‘war games’: http://www.washingtontimes.com/news/2015/nov/13/pentagon-plans-cyber-war-games-against-china-iran-/
[4] authorises a budget: http://www.nextgov.com/cybersecurity/2015/11/congress-demands-200-million-antivirus-scan-connected-weapons/123615/
[5] inspection of the weapons program: http://www.dote.osd.mil/pub/reports/FY2014/pdf/other/2014DOTEAnnualReport.pdf
[6] own procurement budget: http://federalnewsradio.com/congress/2015/11/five-things-know-ndaa/
[7] set to be approved: http://america.aljazeera.com/articles/2015/11/10/obama-expected-to-sign-defense-bill-that-blocks-gitmo-closure.html
[8] US and the UK teaming up: http://www.cnbc.com/2015/11/12/us-and-uk-test-financial-sector-response-to-cyber-attack.html
[9] Participating actors: http://www.treasury.gov/press-center/press-releases/Pages/jl0262.aspx
[10] designed to enhance: http://www.techweekeurope.co.uk/e-enterprise/financial-market/uk-us-financial-cyber-attack-180614
[11] data breach: http://www.esecurityplanet.com/network-security/breach-at-securus-technologies-exposes-70-million-prison-phone-calls.html
[12] report: https://theintercept.com/2015/11/11/securus-hack-prison-phone-company-exposes-thousands-of-calls-lawyers-and-clients
[13] 14,000 of them: http://thehill.com/policy/cybersecurity/259916-prison-phone-company-denies-it-recorded-private-calls
[14] described by David Fathi,: http://www.huffingtonpost.com.au/entry/securus-hack-the-intercept_56435dafe4b045bf3ded294c?section=australia&adsSiteOverride=au
[15] wasn't obtained through a hack: http://www.ibtimes.com/securus-technologies-rogue-employee-not-hacker-exposed-70-million-inmate-calls-2181819
[16] claiming: https://blog.torproject.org/blog/did-fbi-pay-university-attack-tor-users
[17] pulled out: https://www.blackhat.com/latestintel/07212014-a-schedule-update.html
[18] Operation Onymous: http://www.wired.com/2014/11/operation-onymous-dark-web-arrests/
[19] a university-based research institute: http://motherboard.vice.com/en_uk/read/court-docs-show-a-university-helped-fbi-bust-silk-road-2-child-porn-suspects
[20] violation of the Fourth Amendment: http://thehill.com/policy/cybersecurity/260075-fbi-denies-it-paid-researchers-1-million-to-unmask-web-users
[21] FBI has stated: http://arstechnica.com/tech-policy/2015/11/fbi-the-allegation-that-we-paid-cmu-1m-to-hack-into-tor-is-inaccurate/
[22] re-opened the debate: http://www.nbcnews.com/storyline/paris-terror-attacks/paris-attack-could-renew-debate-over-encrypted-messaging-apps-n464276
[23] only last month: http://www.wired.com/2015/10/security-news-this-week-us-wont-force-companies-to-install-backdoors/
[24] ISIS’ use of encrypted apps: http://www.nytimes.com/2015/11/17/world/europe/encrypted-messaging-apps-face-new-scrutiny-over-possible-role-in-paris-attacks.html?_r=0
[25] encrypted connections of PlayStation 4: http://www.forbes.com/forbes/welcome/
[26] blaming : https://theintercept.com/2015/11/15/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/
[27] declared war on ISIS: http://www.techinsider.io/anonymous-declares-war-on-isis-2015-11
[28] this great Sydney Morning Herald article: http://www.smh.com.au/national/is-cyber-terrorism-an-imminent-danger-or-merely-hollywood-fiction-20151111-gkwh5s.html