- The Strategist - https://aspistrategist.ru -

Cyber wrap

Posted By on January 22, 2014 @ 14:00

[1]Netizens are in an uproar as a DC Federal Court [2] has come down against the Federal Communications Commission’s (FCC) net neutrality rules. Verizon, the lead plaintiff in the case, petitioned for its right to ‘manage’ its infrastructure, potentially offering fast access ‘express lanes’ for a premium or charging high bandwidth services such as Youtube or Netflix fees for access. With the FCC stripped of its Open Internet rules, many advocates worry that business interest will run roughshod [3] over the common citizen, with fees stifling innovation and big business essentially dictating content. However there’s also some optimism as the court has left plenty of room for the FCC to shift the Internet from an information service into the regulated telecommunications world.

On the other hand, the MIT Technology Review [4] turns net neutrality upside down when looking at the issue from the perspective of emerging economies. With Internet accessibility limited, concerns over cost trump the ideals of net neutrality and free services like FacebookZero and Google Free Zone are largely the tools of choice. As these ‘seeker’ countries strive to improve ICT, they also face a growing rate of malware and other security threats. But there’s hope as Microsoft Security [5] has found a tipping point in cyber maturity, where developments in ICT cease to incubate cyber malfeasance and malware rates begin to drop.

Also in the news, a speech [6] by President Obama addressing a bit of controversy surrounding certain clandestine activities by the National Security Agency. The speech and its paired Presidential Directive [7] (PDF) offer a slew of reforms looking to assuage domestic and international outrage surrounding the NSA’s surveillance activities. With added levels of review, possible 3rd party data holding, and other measures, President Obama has offered some level of reform. However, the underlying message remains that these activities are necessary for national security.

Jumping from $114 million in 2010 to $212 million for 2013, the NSA’s (conjoined) sister organisation CYBERCOM has a sky rocketing [8] budget, however the US government’s efforts in critical infrastructure cybersecurity has been flailing. Cyber experts are calling the decade following 9/11 a ‘lost decade [9]‘, criticising talk from industry organisations and the White House as lacking the backing of substantive action. There may be a glimmer on the horizon as Congress, on a hiatus from passing major cyber policy since 2002, might just sign off on HR 3696 [10], which passed committee last Wednesday.

With Australia [11] ranking 8th in Asia for advanced persistent threats or targeted attacks, and the looming threat from malicious refrigerators [12], perhaps Australia should look to shake off the cobwebs from its own Cyber White Paper. But to close out our wrap on a happier note and to help you through the rest of the week, a few tunes [13] on cybersecurity and cyberwar courtesy of P.W. Singer.

Klee Aiken is an analyst in ASPI’s International Cyber Policy Centre [14].



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /cyber-wrap-13/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2013/07/cyber-logo.jpg

[2] DC Federal Court: http://thehill.com/blogs/hillicon-valley/technology/195360-court-strikes-down-net-neutrality-rules

[3] roughshod: http://www.technologyreview.com/news/523606/net-neutrality-quashed-new-pricing-schemes-throttling-and-business-models-to-follow/

[4] MIT Technology Review: http://www.technologyreview.com/news/523736/around-the-world-net-neutrality-is-not-a-reality/

[5] Microsoft Security: http://blogs.technet.com/b/security/archive/2014/01/16/the-cybersecurity-risk-paradox-measuring-the-impact-of-social-economic-and-technological-factors-on-cybersecurity.aspx

[6] speech: http://www.youtube.com/watch?v=Z5Zk2Fy_KDI

[7] Presidential Directive: http://www.fas.org/irp/offdocs/ppd/ppd-28.pdf

[8] sky rocketing: http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/15/cyber-commands-exploding-budget-in-1-chart/

[9] lost decade: http://www.csmonitor.com/USA/2014/0117/.UtxYg0yCivU.twitter

[10] HR 3696: http://www.scmagazine.com/critical-infrastructure-cyber-bill-gets-go-ahead-from-homeland-security-committee/article/329776/

[11] Australia: http://www.fireeye.com/blog/technical/malware-research/2014/01/targeted-attacks-in-2013-asia-pacific.html

[12] malicious refrigerators: http://qz.com/167817/someones-refrigerator-just-took-part-in-a-malicious-cyberattack/

[13] tunes: http://blog.oup.com/2014/01/cybersecurity-cyberwar-music-playlist/?utm_source=twitter&utm_medium=oupacademic&utm_campaign=oupblog

[14] International Cyber Policy Centre: http://cyberpolicy.aspistrategist.ru/

Copyright © 2024 The Strategist. All rights reserved.