Tag Archive for: cyber security

Cyber wrap

It’s been a big week in cybersecurity. The twin giants of #infosec conferences, Black Hat and DEF CON, has just wrapped up in Las Vegas, and a DefCon Beijing beta event has been announced. The show-stealer was the open challenge, in which five different types of voting booths were left in a room for DEF CON attendees as a challenge. The first booth was hacked after 90 minutes, and the exercise demonstrated a number of poor security procedures, such as the default administrator passwords for the booths being unchanged and available online. They were not able to change votes, however. For a great write-up of the other keynote events and lectures, see here. In equally momentous news, yesterday marked the fourth anniversary of the launch of ASPI’s International Cyber Policy Center. Happy birthday, @ASPI_ICPC!

Russia has taken steps to pass a law that will ban the use of virtual private networks (VPNs) and other anonymisation technologies in the country. It will enter into force on 1 November 2017. Other legislation is set to come in early next year that will force messaging app companies to identify users by phone numbers by 1 January 2018. Edward Snowden, ex-NSA ‘whistleblower’ (and current Moscow resident), has publicly criticised the ban on VPNs, and noted it’s the second of such bans this week, with Apple reportedly removing VPN apps from its App Store in the Chinese market. While the exact cause of the removal was initially unclear, Apple has since released a relatively short statement taking responsibility for the removals, saying that the VPNs were not licensed under Chinese law. More than 60 VPNs have been affected so far.

Singapore’s privacy commission has proposed changes to the country’s personal data protection laws to provide mandatory data breach notification. Data breaches have remained topical elsewhere in the world, as Sweden’s nationwide motor registry data breach crisis has claimed the jobs of two Swedish ministers, Interior Minister Andres Ygeman and Infrastructure Minister Anna Johansson, and has saddled the prime minister with the possibility of facing a vote of no confidence. Data breaches have affected television as well. HBO’s internal databases were breached (again) and 1.5 terabytes of data exfiltrated. It’s not clear whether the data includes yet-unreleased episodes from season 7 of the hit TV show Game of Thrones, but written material from next week’s fourth episode has been released online.

Elon Musk and Mark Zuckerberg have had a public disagreement about whether we should welcome or fear our new artificial intelligence (AI) ‘overlords’. While Zuckerberg has described Musk’s concerns of an AI-led apocalypse as ‘irresponsible’, Musk has fired back that Zuckerberg’s understanding of the subject is ‘limited’. Commentators have suggested that it’s more about a difference of time scales, or a difference of branding, than a difference of opinion. In what might be a point for Musk, Facebook has gone back to the drawing board on one of its AI projects after two chatbots in the projects began communicating in their own language consisting of shorthand English strung together nonsensically, to humans at least.

A New York Times piece has outlined how China is aiming to become a leader in AI technology research and development by 2030, and how its spending billions of dollars to foster innovation. By contrast, the US has yet to create a national strategy for continued innovation in AI. There are programs and projects no doubt, like this week’s announcement that the US Air Force is looking at using AI to monitor Twitter and social media networks, but there’s an increasing risk that the US might find itself on the wrong side of the innovation offset.

Innovation remains high on the agenda for the Australian government. The Digital Transformation Agency and the Australian Public Service Commission are currently looking to find and place 250 cadets and apprentices in Australian government agencies to start off their brilliant careers in IT. On the senior side of the career spectrum, the Department of Defence’s chief information officer, Peter Lawrence, has come to the end of his five-year term after steering the department through a number of major programs and reforms. The Australian Communications and Media Authority will be conducting a review of the NBN and its 21 contractors and subcontractors by compelling all of the companies involved to provide data about why the NBN has been underperforming. And the South Australian government is allegedly introducing laws that would compel child exploitation website operators to provide their passwords so that law enforcement can access personal data held in their computers or personal clouds. The news has ignited some concern, though details remain scarce.

Adobe is killing off its Flash media player by 2020. Most have speculated that the reason for the closure is security, as Flash has been an infamous (and growing) source of many critical vulnerabilities. The move has been long predicted, as the functions that Flash provided have largely been replaced by the more secure and well-developed standards. Several major tech companies, including Microsoft, Facebook, Apple, Google and Mozilla have laid out roadmaps for how they’ll be moving on from Flash, and it looks like the change won’t be a big deal.

It’s been a good week for any ‘mooches’ looking for some free but good anti-virus software. Cybersecurity company ESET is offering a free 12-month subscription to its internet security service in partnership with PC Tech Authority Australia; it’s available here. Similarly, Kaspersky has begun offering a free version of its anti-virus software. In addition to improving the baseline security of users, one of the reasons the company is offering the software for free is that free installs of the software that encounter malware will provide more data points to improve Kaspersky’s threat-intelligence machine-learning systems.

Cyber wrap

Today the Prime Minister will release the first annual review of Australia’s Cyber Security Strategy, which the PM foreshadowed in an op-ed for The Australian. The PM says that his government is ‘pleased with progress’, noting the success of the first Joint Cyber Security Centre in Brisbane, and higher levels of awareness amongst business leaders. The PM’s confidence in the growing maturity of Australian public and private sector cyber security awareness is supported by the Australian Cyber Security Centre’s 2016 Cyber Security Survey, also released today, which shows that 71% of surveyed organisations have an incident response plan, an increase of 11% on the 2015 result. Also keep an eye out tomorrow for the release of the Australian Cyber Security Growth Network’s Cyber Security Competitiveness Plan.

Kaspersky Lab has published its Cybersecurity Index for the second half of 2016, aggregating the results of 17,377 respondents across the world on their attitudes to cybercrime, their online activity and the cost of cybercrime. The report shows that more people are concerned about cyber security and are taking steps to protect themselves. Overall, 74% of those surveyed didn’t believe that they would be a target for cybercrime, a 5% drop on the result from the first half of 2016. Only 39% of respondents don’t take any cyber security measures on their devices. At the corporate level, new research from Oxford Economics has found that a company’s share price falls by an average of 1.8% on a permanent basis after a major cyber security breach. For a major UK FTSE100 firm this equates to a loss of £120 million.

China’s Cyberspace Administration has released a new draft law on international data transfers. The legislation would require firms to submit to annual security reviews of their international data transfers, and prohibits the international transfer of data on economic, technological or scientific activities overseas that could damage national security. The draft law would also require companies to obtain the express permission of users before transferring their information overseas. According to the Cyberspace Administration the new rules are necessary to secure ‘personal information, the safety of data and to protect internet sovereignty and national security.’ However the vagueness of the draft law, and long-standing concerns about Chinese cyber protectionism and censorship, mean that many outside China interpret the move as another attempt by Beijing to restrict foreign access to the internet in China.

While China increasingly seeks to control access to cyberspace, the G7 issued a declaration last week that repeated its commitment to an ‘accessible, open… [i]nteroperable, reliable and secure cyberspace.’ The declaration on responsible states behaviour in cyberspace largely repeats previous statements from the G7 including commitments to online rights, the application of international law and the norms agreed by the 2015 UN Group of Governmental Experts and the 2015 G20 Leaders’ Communiqué. It also reiterated the G7’s support for the development of confidence building measures through regional forums including the OSCE and ASEAN Regional Forum such as crisis communications channels. Interestingly the declaration includes the statement that a state ‘is free to make its own determination in accordance with international law with respect to attribution of a cyber-act to another State.’ That runs counter to the calls from some, including Microsoft President Brad Smith for an international cyber attribution agency. Meanwhile RT has reported that Russia has provided a draft of a new international convention on cybercrime to the UN, to replace the 2001 Budapest Convention, which Russia hasn’t signed.

Last week’s failed North Korean missile test has prompted renewed speculation on the role of US cyber capabilities in undermining Pyongyang’s missile program, however the US declined to comment. The tensions with North Korea have also reportedly prompted the US Department of Defense to fund work on cyber protection of the US power grid, and the establishment of an emergency communications system. The Defense Advanced Research Projects Agency (DARPA) issued a statement last week on what it calls the ‘Rapid Attack Detection, Isolations and Characterisation System’ (RADICS). The System, being developed in cooperation with BAE Systems, seeks to protect national security capabilities dependent on the power grid. According to BAE Systems, RADICS, which won’t be ready until 2020, should detect attacks before they occur and isolate target networks, such as enterprise systems and power infrastructure, to disrupt malicious cyber attacks.

And in brief news, Europol and Brazil have signed a new agreement to cooperate on cybercrime, and Germany and Israel have taken steps to depend their cyber cooperation, with the first international chapter of the Cyber-Security Council of Germany opening in Israel last week. NASA’s CIO has told Bloomberg that she considers it a ‘matter of time’ before an object in space is hacked, and discussed the challenges of securing decades old equipment orbiting Earth from cyber threats. And in the UK it has been revealed that the Foreign Office has been subjected to a sophisticated phishing campaign by hackers dubbed the ‘Callisto Group’, which targeted personnel working on Eastern European and South Caucasus policy issues.

Cyber wrap

For the final two cyber wraps of 2016, ICPC will review some of the biggest cyber stories to make headlines over the last twelve months so that we can all laugh, cry and reflect on the year that was together.

On the home front, 2016 was a big year. Australia’s Cyber Security Strategy was released in April by Prime Minister Malcolm Turnbull. The Strategy committed a total of $230 million to new initiatives to strengthen Australia’s cyber security, in addition to the $400 million funding already allocated to cyber security efforts in the 2016 Defence White Paper. The Strategy also created a new ministerial position for cyber issues, with two new positions—a Special Adviser to the PM, and a Cyber Ambassador—joining the existing ACSC Coordinator. Work has commenced on new capital city threat sharing centres and academic Centres of Excellence, as have preparations to move the ACSC from within ASIO HQ to new digs that will be more accessible to private sector partners and cyber workers with lower levels of security clearance. While those are all promising signs for the implementation of the Strategy, there’s been some criticism from industry about the pace of implementation. Full steam ahead for 2017.

Australia’s offensive cyber capability, which is being housed in the Australian Signals Directorate HQ, was also announced in the Strategy. While there understandably isn’t much detail available, the PM revealed that Australia’s capabilities have been engaged against Daesh’s cyber efforts in the Middle East. Other Australian highlights for 2016 include the second annual ACSC Threat Report which revealed a state actor was behind the hack of the Australia’s Bureau of Meteorology which took place last year.

2016 also saw a major change in how the internet is managed worldwide, with the transition of the Internet of Assigned Numbers Authority (IANA) from a US Department of Commerce contract to a standalone multi-stakeholder-led institution. The move was the culmination of a policy plan which stretches back to the Clinton administration, which was spurred along by the Snowden disclosures and increasing international concern about the US’s role in internet governance. The transition was delayed several times as the multi-stakeholder community struggled to implement a plan to take on the function, and was nearly further delayed by court action initiated by US Senator Ted Cruz. However, the move was eventually successful on 1 October. While the average Internet user wouldn’t have noticed any difference, the transition is a win for proponents of the multi-stakeholder model of internet governance.

Several other countries released new cyber strategies in 2016, with Britain, Germany,  New Zealand and Singapore providing some interesting policy contrasts to Australia’s effort. Britain’s government is taking a stronger position in protecting its citizens online, Germany is increasingly concerned about privacy, New Zealand is focused on cybercrime and education, and Singapore remains set on maximising digital growth’s full potential.

Cyber security incidents also remained weekly news in 2016. The fallout from the Dyn DDoS incident back in October continues to reverberate as other attempts to exploit security vulnerabilities of IoT infrastructure have followed—including one affecting Germany’s Deutsch Telekom earlier last month. In the US, the revelation that Yahoo! had hidden a 2014 data breach complicated the planned Verizon takeover. Other big breaches this year include the DNC hack (which we’ll cover next week), the US$81 billion dollar compromise of the SWIFT network through Bangladesh’s Central Bank, and Australia’s largest ever data breach—when the Red Cross Blood Service accidentally leaked the personal information of more than 550,000 donors.

We’ll see you next Wednesday for part two of our wrap-up of the year that was!

Cyber maturity 2016: digital growth in our neighbourhood

The Asia–Pacific’s rapid online growth has contributed to its rise as the world’s new economic centre of gravity. With the majority of the world’s internet users now living in the Asia–Pacific, the region abounds with both digital opportunities and vulnerabilities. Asian governments are increasingly looking to cyberspace to facilitate better governance and critical national infrastructure delivery, and citizens are using it to connect with each other and new digital business opportunities. As individuals, businesses and governments in the Asia–Pacific become more reliant on the benefits of cyberspace, cybersecurity will become an essential ingredient for regional and international stability. As such, developing behavioural norms and confidence building measures for cyberspace, while also improving awareness of the regional threat landscape, must be a high priority for all parties concerned.

ASPI’s third annual cyber maturity report emphasises that countries in the Asia–Pacific are adopting markedly different approaches to cyber security, stability, crime and digital growth, and with varying levels of maturity in their comprehension of risks and opportunities.

The countries of the Asia–Pacific are unevenly developed, with many within their populations remaining illiterate and poor. There’s significant scope for new technologies to advance the rate at which the least-developed countries attain significant goals in the growth of their economy, the education of their people, and their ability to earn. However, many regional governments view the unimpeded flow of information across borders as a threat to their power and seek to constrain it in order to ensure a monopoly on information. Beyond the detrimental effect that has to freedom of expression, those regulations are also inhibiting the emergence of local digital economies, which harms the ability of many to work their way out of poverty.

For some countries, legacy fixed-line telecommunications infrastructure doesn’t have the footprint required to enable widespread internet access, however mobile connectivity brings cyberspace to more people each year. For example, in Cambodia, only 0.5% of people have a fixed broadband connection while 42% have a mobile broadband connection. The emergence of cheap handsets and new apps in local languages is assisting otherwise disconnected individuals to engage with cyberspace: a small step towards closing the digital divide. As access to cyberspace grows, first-time users will be exposed to the potential dangers that cyberspace poses to the uninformed or uneducated, and more work will be required to support the security of new internet users.

Unfortunately, the cost of connectivity remains prohibitive for many in the region and programs to enable cheaper access, such as Facebook’s Free Basics program, have been praised by some but opposed by others for violating principles of net neutrality. For example, the Solomon Islands’ size and remote location makes a submarine cable connection uneconomical for commercial operators. In its absence, expensive satellite connections remain the only option. In other countries, such as Bangladesh, substandard infrastructure is inhibiting digital growth, with unstable power supply leaving connections unreliable.

At the other end of the spectrum, the region offers up some of the world’s most cyber-savvy and network-dependant countries. Japan and South Korea are among the most connected in the world, with over 100 mobile broadband connections per 100 people in both countries. The ubiquity of cyberspace and its importance to their citizens, government and economy, and the vulnerability of their geo-strategic situation means that those countries lead the region in the importance placed on attaining cybersecurity. Similarly, Singapore sits near the top of the rank table. The island nation’s mature cyber policies are informed not only by its understanding of online risks and opportunities, but also by a strategic culture of economic reliance on technology and strong defence posture that highlights the strategic benefits of cyberspace.

Cyberspace, with the potential it offers to enhance development and open new opportunities, will be a key enabler of a secure, stable and prosperous Asia–Pacific. Preserving regional cybersecurity will require coordinated efforts by capable like-minded countries to support emerging norms of behaviour and confidence building mechanisms for cyberspace. Capacity building in the form of providing policy, legislative and technical support to rapidly developing countries is also an essential endeavour for international partners. Creating a region that engages in cyberspace in a mature way is a daunting task, but one that’s increasingly critical to global security and must be led by the major economies of the region.

Cyber wrap

6046478725_b06ac48520_z

Following the high profile infiltration of the DNC’s email servers earlier in this year, the FBI’s now working to allay concerns that vote counting machines could be next on the hit-list of would-be saboteurs. FBI Director James Comey was quick to point out that a breach of these systems is pretty tough, pointing out the disjointed and ‘clunky as heck’ nature of the voting systems as the main barrier to malicious actors. ‘A lot of people have found that challenging over the years, but the beauty of that is it’s not exactly a swift part of the internet of things, and so it is hard for an actor to reach our voting process.’

Last week the White House announced that retired Air Force Brigadier General Gregory J. Touhill will become the US’s first federal Chief Information Security Officer (CISO). The creation of the post was foreshadowed by President Obama more than eight months ago via the Cybersecurity National Action Plan (CNAP). Touhill will make the shift from the Department of Homeland Security, where he currently serves as the deputy assistant secretary for cybersecurity and communications. According to the White House, the federal CISO will be responsible for ‘driving cybersecurity policy, planning, and implementation across the Federal Government’. In essence his role will largely be concerned with protecting government networks and the US’s critical infrastructure.

On the home front, Australia’s new Minister Assisting the PM for Cyber Security Dan Tehan has weighed in on the ‘information as a weapon’ discussion kicked off by the DNC hack. Tehan called the incident a ‘wake-up call’ and stressed that Australia must have ‘the proper protections in place’ to prevent similar incidents of what he terms ‘cyber influencing’ occurring here.

Singapore’s Cyber Security Agency (CSA) head David Koh has given a one-on-one interview with GovInsider, outlining the city-state’s approach to managing cyber threats, innovation, public outreach and promoting security by design. Koh, who’s led the CSA since it was formally established in April 2015, is currently overseeing the creation of a ‘competency skills framework’ developed with the private sector. Once complete, the framework should lay out specific career pathways available to IT experts in both technical and management streams. Koh also highlighted the importance of trust and assurance of data privacy to Singapore’s ‘Smart Nation’ vision, arguing that without a foundation of confidence there will be a reluctance amongst the population to share the data that gives the ambitious program its life.

Japan’s Financial Services Agency is set to host the country’s first cyber security exercise exclusively for financial institutions. The drill—scheduled to take place in October—will see 80 financial institutions come together to test their wares against fictitious malicious cyber actors. The exercise came about following the increase online attacks targeting financial institutions in the country. Participants will include local and major regional banks, with the drill seeking to expand and build upon on numerous existing info-sharing and collaborative agreements between several Japanese financial institutions.

Japan’s NEC Corporation has won a contract to roll-out a new 5,300 kilometre submarine cable in South East Asia. The Indonesia Global Gateway Cable System will connect the islands of Sumatra, Batam, Jawa, Bali, Kalimantan and Sulawesi with Singapore. It’ll also link Indonesia with two other major international cables, boosting connectivity, resilience and internet speeds across the country.

Cyber wrap

Following costly compromises in Bangladesh, Vietnam and Ecuador, Gottfried Leibbrandt, CEO of international bank settlement company Swift has told a conference in Brussels that cyber threats are his main source of anxiety. In his speech Leibbrandt outlined the organisation’s response to the cyber security breaches that have seen millions of dollars stolen. According to Leibbrandt, Swift plans to harden its security requirements, require certification for third party providers, assist members to identify suspicious behaviour, and develop security audit frameworks to ensure new security controls are properly implemented.

Swift has also criticised some members for being slow to report cyber security incidents affecting the network. Internationally, data breach notification requirements are inconsistent and there is disagreement about whether mandatory breach reporting has value. In The Wall Street Journal, Denise Zheng from CSIS and Andrea Castillo from George Mason University have discussed the case for and against mandatory data breach notifications. Zheng says that requiring companies to disclose breaches improves collective cyber security responses, but Castillo believes that regulating breach disclosure could weaken the ability of companies to properly investigate and respond to cyber threats. In Australia, the Privacy Amendment (Notifications of Serious Data Breaches) Bill is expected to be introduced into Parliament later this year. The Bill includes mandatory data breach disclosures and notifications for customers whose data is lost in cyber security incidents.

James Clapper, the US Director of National Intelligence, told Congress back in 2015 that Russia had surpassed China as the US’s principal cyber threat, even though Russian hackers have been notoriously hard to detect. This week Switzerland’s CERT.ch has revealed that one of the country’s top defence, aerospace and technology firms, Ruag, had been compromised for at least two years by an APT, most likely linked to the Russian Turla APT. CERT.ch was apparently monitoring the breach for some time to gather evidence about the APT’s tactics and techniques, but this was cut short after a media leak earlier this month. CERT.ch characterised the actor responsible as extremely patient and deliberate, moving carefully through the company’s network and identifying individuals so that they could specifically target only those with valuable information. System logs revealed at least five occasions last year when significant amounts of Ruag’s data was exfiltrated using proxy servers.

Not to be outdone, a Chinese APT dubbed ‘Ke3chang’ by FireEye has reappeared two and a half years after it was first detected targeting European foreign ministries just before the G20 summit. Palo Alto’s Unit42 has found evidence that Ke3chang has reengineered a remote access tool into a new tool called TidePool in order to target 30 Indian embassies around the world. Ke3chang distributes TidePool by spoofing emails from other embassy employees to induce their targets to open infected attachments. The vulnerability used (CVE-2015-2545) has also recently been used by another hacker group against anti-China protesters in Hong Kong.

Moving across the ditch, Andrew Hampton, the new head of New Zealand’s signals intelligence organisation GCSB, has told stuff.co.nz that one of the ‘more disturbing revelations’ of his first month at the helm was the scale of the cyber threat that his agency deals with. Hampton revealed that GCSB detects an average of seven serious cyber incidents per month, in addition to about 12 reports from other agencies of less serious incidents. He characterised the actors responsible as ‘foreign sourced, complex and persistent’. Hampton is a career public servant, but unusually for his role has no previous experience in intelligence or security.

And finally, the status of the US Cyber Command is again under examination, as Congress debates a measure in the National Defense Authorisation Act (NDAA) that would elevate Cyber Command to the status of Unified Combatant Command, equivalent to Pacific Command or Central Command. The measure was passed by the House, but is absent from the Senate’s version of the Bill, and the White House has opposed its inclusion in the NDAA. Cyber Command is currently a Sub-unified Command of Strategic Command, while its commander Admiral Mike Rogers is dual-hatted as Director of the NSA. Rogers has lobbied for Cyber Command to be taken out of Strategic Command as it would allow more control over its strategic priorities and budget measures which he believes  will allow it to better respond to cyber threats.

Pushing a new model for public–private cyber partnerships

At the heart of the new Australian Cyber Security Strategy is a new paradigm for public–private engagement on cyber security. Business has been elevated from ‘partner’ to ‘co-leader’ in the new ‘National Cyber Partnership’ to jointly drive implementation of the Strategy. The Strategy quite rightly appreciates the criticality of engaging the combined skills, expertise and capabilities of the public and private sectors to manage cyber threats and reap the economic rewards of connectivity.

In the 2009 Cyber Security Strategy, the Government claimed leadership of national cyber security, noting that it was best placed to ‘identify the strategic threats and emerging challenges of Australia’s cyber security’. The 2016 Strategy has retreated from this hubristic statement and introduced new language that invites business to co-lead and co-design initiatives such as new voluntary standards, jointly operate new cyber threat sharing centres, and undertake combined cyber incident exercises. It reflects a more sophisticated approach to engaging the owners and operators of the majority of Australia’s cyber infrastructure.

The Government has already taken steps to enable digital growth, digital innovation and expansion of the national cyber security industry through initiatives such as the previously announced Cyber Security Growth Centres. This Strategy links with the National Innovation and Science Agenda by engaging the private and research sectors to design courses that produce work-ready graduates and attract more people to cyber security and related careers.

It’s been unclear to many on the outside looking in exactly who in Government they should be talking to, and when, about cyber security. The Strategy has sought to address this with the creation of two new leadership positions, the Minister Assisting the PM and the Special Advisor to the PM on Cyber Security. These positions will be critical for leading the successful implementation of the Strategy, and their ability and willingness to meaningfully engage with the private sector will be significant factor in its eventual success or failure. The additional funding to the tune of $21.5 million over five years for CERT Australia is also a welcome boost to the important work CERT Australia does in engaging Australian business and critical infrastructure operators.

When the creation of the ACSC was announced in 2013, it was heralded as an opportunity to engage the private sector in government’s cyber security operations, however its location in ASIO’s secure building was less than inspired. The announcement of the transfer of the ACSC to a new facility in Canberra promises to unlock its unmet potential for greater private sector interaction. The new cyber threat sharing centres in capital cities and the online cyber threat sharing portal should also assist in integrating public and private sector information. To be truly successful they will require government to provide meaningful, actionable information in a timely manner, and the private sector to also engage in a constructive exchange of information.

Other initiatives announced in the Strategy will also better enable the private sector to manage cyber threats and embrace opportunities for digital economic growth. Voluntary Cyber Security Governance ‘health checks’ for ASX 100 companies will seek to provide constructive organisational change and make cyber security a board-level issue. While small businesses received less focus than the top-end of town, they’ve received a small boost with promised funding for pen testing. That will not only encourage small businesses to be more resilient to cyber threats, but also help further develop the Australian cyber security industry. This industry offers significant export opportunities for Australia and the Strategy supports its growth in several ways—including the growth of a skilled workforce.

While the initiatives announced in the Strategy promise a new era of public–private partnership on cyber security in Australia, there are some old hurdles that must be overcome. Business has often lost interest in engaging with government, as the cost often appears to outweigh the benefits. Without clear articulation of government’s policy goals it’s hard for business to stay engaged in the often laborious processes that government imposes on itself (PDF). The success of the new Strategy and its promised new partnership with the private sector will rely on government clearly stating its policy intent and purpose, and sustaining engagement with the private sector now that the review process has concluded.  

Embracing the private sector to share in decisions that shape the national approach to cyber security will create better overall outcomes for both sectors, and should also provide for better co-investment in cyber initiatives. The Strategy has opened the door to a new model for the public–private partnership to enhance Australia’s cyber security to reap the economic benefits that lay in wait in cyberspace. It’s now up to cross-sectoral leadership to deliver the goods.

Apple versus the State: the end of the beginning

Image courtesy of Flickr user Eric Fidler

With a war of words akin to the build-up to a heavyweight boxing match, the highly anticipated courtroom battle between Apple and the FBI was called off, leaving fight fans without a clear cut understanding of who had won or lost. Just hours before the court case was to commence, the US Department of Justice announced that they postponed due to a ‘third party’ demonstrating a viable technique for accessing the iPhone that belonged to one of the San Bernardino shooters.

Despite some headlines stating that the ‘encryption battle’ was now over, the opposite is true. We’re only at the beginning of what is shaping up to be a second crypto war. The fall out of this incident will be drawn out and messy, with clear cut winners hard to identify.

The first and most obvious outcome is that relations between the US law enforcement community and the US tech industry are going to be fragile at best, insurmountably riven at worst. Post-Snowden, it’s taken a great deal of effort to re-establish trust and rebuild productive relationships. Clearly relationships between the private sector and US government have been tarnished by the case. With so many companies strongly supporting Apple’s stance, it’s difficult to imagine that they will be less wary of future US government requests for assistance.

What did Apple’s relationship with the State look like before the court case? While Apple haven’t highlighted their previous cooperation with the FBI and the White House, they have at times enjoyed strong collaboration, especially—and ironically—when working together to persuade China against adopting strong new anti-encryption policies. The FBI has agents assigned to work with Apple. Tim Cook had contributed money to both of Obama’s presidential campaigns, and has met with White House officials at least 14 times since 2010. It’s hard to envisage such a degree of cooperation returning for some time.

Second, it’s likely that the quality and standard of encryption will be raised by the tech industry. The public’s increased awareness of what encryption is and its benefits for their privacy will further complicate the government’s access to encrypted data. Having found a way into the iPhone, the FBI have shown that they can circumvent Apple’s much-lauded security. You can guarantee that Apple’s finest minds are attempting to decipher how the FBI hacked the phone in order to ‘plug’ that hole quickly. And now that we know that a security vulnerability exists, it’s certain that the world’s white and black hat hacker communities and private sector entities are also focused on finding it.

While FBI officials have outlined their thinking on when they decide to disclose a flaw, they are clearly in no hurry to share their discovery with Apple, demonstrated by the fact that they have already offered to unlock another iPhone belonging to two teenagers accused of murder.

All of this points towards a competition between the private sector and the FBI in relation to encryption, which surely can’t be a healthy platform from which to reach any sort of consensus and cooperation in the future.

Third, the second crypto war is now coming squarely to the attention of the US Congress who are now taking their first steps towards providing a legal framework around the issue. Since December 2015, Senators have been drafting an encryption bill that would apparently authorise federal judges to order tech companies to provide encrypted data to law enforcement. But with the way that encryption is heading, there are questions around whether compliance will even be possible. Other efforts in the House of Representatives have been made to study the intricacies of encryption in order to understand the unintended consequences of legislative responses. That of all points towards an energised political debate and a Congress that’s looking to act.

As Obama so sagely advised in a recent talk, now’s the time to be thinking about appropriate legislative changes. He rightly stated that in the wake of major terrorist attacks or major acts of crime, the public’s positon sways in favour of strong law enforcement agencies and could result in ‘sloppy’ and poorly crafted legislation on encryption being pushed through the political cycle. We can be absolutely certain that this is unlikely to be the last time a law enforcement agency tries to compel a tech company to help bypass security measures.

So what’s happening in Australia in relation to this issue? Both of Australia’s major political parties explicitly rejected a Senate motion calling on the Government to support public use of strong encryption technologies, in a move that coincided with the Apple case in March. The Attorney-General George Brandis also spoke on the issue, stating that he would ‘expect that all order of courts should be obeyed by any party which is the subject of a lawful order by a court.’ Yet he acknowledged that encryption’s ability to make certain evidence inaccessible is a serious problem for law enforcement. We know that Prime Minister Turnbull himself is a fan of encrypted communications, however he’s also fully cognisant of the challenges that face the national security community. So it’s hard to know exactly where he might fall on the issue.

What’s certain is that we need to have a focused debate on what will be a key security issue over the coming years, between public and private sectors: a conversation that ASPI’s ICPC will support and facilitate.

Cyber wrap

Bangkok Ultraviolet Project

Last week, the US Senate approved the CISA or Cyber Security Information Sharing Act. Among the bill’s main provisions is a proposal to expand liability protections to companies that voluntarily share threat information with the government. The bill managed to evade a series of last minute privacy amendments, passing with strong bipartisan support in a 74–21 vote. Congress will now have to work to reconcile the differences between CISA and a similar, earlier version of the bill, the Protecting Cyber Networks Act, which passed the House in April. Once the two have been merged, the White House is expected to rubber stamp the finished product.

The New York Times has published an interesting piece on the issue of export controls on surveillance technology. Last month two men were fined by the US Department of Commerce for illegally exporting surveillance technology to Syria via an elaborate Middle East distribution network. The US has enacted specific bans on the export of American surveillance technology to both Syria and Iran, where it’s feared they can be deployed to crackdown on dissidents and opposition parties. But moves to introduce a wider licencing arrangement for the export of surveillance technology have been met with stiff resistance by the US tech sector. Other countries including Germany and Switzerland successfully passed mandatory licensing laws on the export of surveillance technology earlier this year, and in September the European Parliament agreed to a non-binding resolution calling for similar tech safeguards.

Japan’s Minister in charge of the Tokyo Olympic and Paralympic Games recently met with the head of the London Olympics organising committee, Sebastian Coe. The get-together aimed to share insights into the types of cyber-attacks tackled during the 2012 games and to communicate lessons learnt with the Tokyo 2020 organising committee. The meet follows the announcement that the Tokyo Metropolitan government will establish its own computer security incident response team (CSIRT) to assist in the protection of critical infrastructure in the lead-up to and during the games.

Chinese hackers behind the breach were motivated by a desire to understand how the US delivers health care, say insiders close to the investigation of the Anthem health insurance hack. The Chinese government has vowed to provide universal access to healthcare by 2020 but there’s widespread frustration domestically as to the quality, availability and cost of care. While Chinese intelligence agencies might have been interested in US government employee information, it’s believed that the theft of intellectual property and trade secrets was the main target for the infiltration. A US government official told the Financial Times, ‘Knowledge is power. How is it set up? What are they insuring? Why is this procedure covered but not that one? All of that is useful information.’

Last week Thai military chiefs publically called for the creation of a whole-of-government body to help ensure ‘cyber readiness’ at the national level. Special adviser to the permanent secretary for the Defence Ministry General Bunjerd Tientongdee warned that Thailand only maintained preparedness within the military and the Information and Communications Technology Ministry. Deputy chief of the Air Forces’ Cyber Warfare Division called for the creation of a ‘one-stop service’ to handle national cybersecurity issues. Earlier in the week Prime Minister General Prayut Chan-o-cha moved to distance Thailand’s military cyber set-up from the controversial ‘single gateway’ proposal after new questions were raised by the public surrounding the militaries involvement in domestic surveillance.

Cyber wrap

iOS apps

Following up on last week’s cliffhanger, the Safe Harbour agreement was deemed invalid by the European Court of Justice. For the last 15 years, this agreement has allowed the transfer of EU data across the Atlantic by US businesses, based on corporate self-regulation. EU concerns over the US approach to data privacy were exacerbated by the Snowden saga, and undoubtedly contributed to the recent decision. This verdict has potentially significant implications for the more than 3,000 businesses in Europe and the US that depended on the agreement.

In the wake of last month’s historic agreement on cyber security between the US and China, the Washington Post reported this week that China has arrested several suspected hackers at the request of the US. The US identified the culprits as guilty of stealing US commercial secrets and they were arrested by the Chinese two weeks before Xi Jinping’s visit to Washington DC. This move is a far cry from the normal denials; however it’s unclear whether the arrests demonstrate a lasting policy change or simply a short-term strategy to avoid Obama’s threatened sanctions.

In a Clinton-esque move, new PM Malcolm Turnbull has come under fire for sending official emails from a private server, separate to Parliamentary systems. Greens Senator Scott Ludlum has called for an audit of the server, and criticised the PM for making the role of Government cyber security experts more difficult. Commentators have drawn parallels between this scandal and Hillary Clinton’s use of a private server to handle classified information during her time as Secretary of State. Keenly aware of cyber security threats, Turnbull has denied his communication involved restricted information. The Parliamentary network has in the past been the subject of numerous attempts by hackers to extract sensitive data from members and ministers.

The Internet of Things promises to change the way people interact with cyberspace. Harbor Research has produced a handy infographic which illustrates the potential impact of the growing ubiquity of digital sensors in everyday items.

Cisco researchers have successfully disrupted a group of cyber criminals operating the infamous Angler Exploit Kit. One of the most advanced ransomware on the market, Angler EK restricts a user’s access to their system, often through encryption, demanding payment in exchange for data restoration. The investigators at the company’s Talos Security Unit noticed that the majority of Angler victims were connected to a Limestone Networks server and after a process of server examination with the cooperation of Limestone it was discovered that the operation was exploiting up to 90,000 users every day. The exposed operation was responsible for up to half of all Angler Exploit Kit activity and is estimated to have been generating up to US$30 million of revenue every year.

The recent spotlight on automotive cybersecurity hasn’t gone unnoticed in Canada. The Canadian Government is making moves to secure its cars by offering a contract for the fortification of the electronic control units (ECUs) of government and military vehicles against cyber threats. A Tender Notice titled ‘Cybersecurity of Automotive Systems’ was released last week, emphasising the ‘need to study the security of automotive vehicles, including understanding their vulnerabilities and assessing the potential mitigation measures’. Defence Research and Development Canada is offering up to US$825,000 for the job.

The Great Firewall seems to still be up and running, with Apple News being blocked in China. The new app, officially launched in the US and under testing in the UK and Australia, can be accessed around the world by travelling iPhone users, even in Hong Kong. However, when connecting from within mainland China, the app presents the message: ‘Story Unavailable: News isn’t supported in your current region’. The source of the block is unclear, however it’s being suggested that Apple is self-censoring in order to comply with China’s restrictive media laws. China is Apple’s second largest consumer and made sales of over US$13 billion in the third quarter.

It’s been an interesting week for smartphone cyber hygiene. Apple has cleaned out its iOS App store of several programs that were capable of disrupting the encrypted connections between servers and users. The nefarious apps install root certificates in smartphones, enabling the monitoring of personal data. Apple has urged its users to delete these apps in order to protect their privacy, however has neglected to disclose the apps’ names, making this advice difficult to follow. In Washington, the White House has decided not to pursue legislation that would force tech companies to install ‘backdoors’ in their encryption software. The overruling of this law is seen as a victory for privacy advocates; however this fight between law enforcement imperatives and customer privacy has been going on since the mid-90s and is far from over.