- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Simon Hansen on August 6, 2014 @ 14:30
First up this week, Australia’s mandatory data-retention scheme is inching closer to reality. The National Security Committee of Cabinet reportedly [2] signed off on laws that will compel internet service providers to keep customer data for two years. Apart from counter-terrorism (new counter-terrorism measures [3] (PDF) were announced yesterday), Tony Abbott said [4] on ABC Radio this morning that data storage could also be used to fight ‘general’ crimes.
Major telcos have raised concerns about consumers being slugged with extra fees as service providers pass on the cost of compliance to their customers—a kind of ‘surveillance tax’ [5]. Australia’s second largest Internet Service Provider, iiNet, last week told [6] (PDF) a Senate committee hearing on the comprehensive revision of Telecommunications (Interception and Access) Act 1979 that it’s uncomfortable with mandatory data-retention regimes turning commercial companies into ‘unwilling agents of the state’.
On the research front, Assistant Minister for Defence Stuart Robert met [7] with Dr Reginald Brothers from the US Department of Homeland Security last week to discuss cybersecurity cooperation and national security research. ‘The discussions with the US delegation have proved very valuable in informing our national security science and technology effort’ Robert said. For a bit of context, in 2006, Australia and the US signed [8] (PDF) a Treaty on Cooperation in Science and Technology [9] (PDF), which extended and amended an earlier agreement in 1968.
In Gaza, hacktivist group Anonymous continues [10] to protest Israel’s military incursion by taking down a number of government sites, including those run by Mossad and the Israel Defense Forces. On Monday, the @AnonymousGlobo Twitter account announced [11] ‘Yes, why not a cyberwar?’ while simultaneously releasing usernames and passwords for Israeli routers. The intensity of distributed denial of service attacks usually fluctuates in response to significant events on the ground, but they rarely have a lasting impact. Even though attacks haven’t translated into major political costs to the Israeli government, that hasn’t deterred cyber attacks, and both the low barriers to entry and the cloak of anonymity mean they’re likely to continue.
Meanwhile Russia has brought Crimea more firmly into the fold this week. According to Renesys [12], a company that monitors Internet traffic, Crimean internet service providers have started sending traffic through Russia on a new underwater Internet cable [13] across the Kerch Strait. On the strategic level, Doug Madory for Renesys wrote [12] that ‘there is no turning back now in the process of Russia’s infrastructure consolidation’, and its growing control of Crimea. At the operational level, Leo Mirani in an article [14] on Quartz said that ‘creating a domestic connection ensures security from snoopers and makes it faster for Crimean internet users to access content hosted in Russia.’
Japan’s 2014 Defence White Paper—released on Tuesday—is available [15] online in English, and has a good overview of trends occurring in cyberspace (Chapter 2, Section 5). More broadly, ABC’s North Asia correspondent Matthew Carney says the paper expresses [16] ‘strong concern about China’s military build-up and its assertive moves in both the East and South China seas’.
What is the best means to protect data, and is it legal to ‘actively’ protect it? Jessica Woodall explores the ‘legislative waters surrounding hacking back’ here [17] on The Strategist. On the ABC, Nawaf Bitar argues [18] that advanced cyber attackers necessitate an active defence, and ‘the days of the castle and moat strategy, where companies invest heavily in large security stacks to block perimeter attacks should be long gone.’
The lead article [19] in the current edition of Survival, ‘Cyberwarfare and Sino-American crisis instability’, explores how cyberwar would play out in an armed conflict between the great powers. The article addresses a debate around whether the prospect of cyber warfare, to which the US and China are increasingly committed, makes one side, or both, more inclined to strike first. In the end, ‘the fear of war is trumped by fear of losing’ write Gompert and Libicki. Also on cyberwar, Jason Healey says [20] on DefenseNews that ‘the Internet is a fierce domain and conflicts are common between nations. But deterrence has kept a lid on the worst.’
Finally, ICPC celebrated its first birthday last week! For the uninitiated, here’s a video [21] from ICPC’s Director and our website [22].
Simon Hansen is an intern in ASPI’s International Cyber Policy Centre. Image courtesy of Flickr user Jacob Davis [23].
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-38/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2014/08/Cyber-wrap-38.jpg
[2] reportedly: http://www.theaustralian.com.au/business/latest/mandatory-data-retention-scheme-inches-closer-to-reality/story-e6frg90f-1227013855548
[3] measures: http://media.crikey.com.au/wp-content/uploads/2014/08/14-08-05-Joint-Press-Release-with-the-Attorney-General-copy.pdf
[4] said: http://www.smh.com.au/federal-politics/political-news/data-storage-could-be-used-to-fight-general-crime-tony-abbott-says-20140806-3d78h.html
[5] ‘surveillance tax’: http://www.smh.com.au/federal-politics/political-news/internet-tax-may-fund-new-spy-laws-20140729-3cs4g.html
[6] told: http://www.iinet.net.au/about/mediacentre/papers-and-presentations/010414-iinet-submission-comprehensive-revision-of-the-tia-act.pdf
[7] met: http://www.minister.defence.gov.au/2014/07/24/assistant-minister-for-defence-us-delegation-discusses-national-security-research-with-australia/
[8] signed: http://www.industry.gov.au/science/Documents/ListofTreatiesandAgreements.pdf
[9] Treaty on Cooperation in Science and Technology: http://www.gc.noaa.gov/documents/2012/sci_agree_australia_022806.pdf
[10] continues: http://www.ibtimes.co.uk/anonymous-continues-cyber-attacks-israeli-government-websites-knocking-mossad-idf-offline-1459689
[11] announced: https://twitter.com/AnonymousGlobo/status/496130886723985410
[12] Renesys: http://www.renesys.com/2014/07/no-turning-back-russia-crimea/
[13] cable: http://www.gizmodo.com.au/2014/08/a-new-underwater-internet-cable-directly-connects-crimea-and-russia/
[14] article: http://qz.com/243619/crimea-just-switched-over-to-the-russian-internet/
[15] available: http://www.mod.go.jp/e/publ/w_paper/2014.html
[16] expresses: http://www.abc.net.au/news/2014-08-05/japan-releases-2014-defence-white-paper/5650536
[17] here: https://aspistrategist.ru/vigilantism-on-the-cyber-frontier/
[18] argues: http://www.abc.net.au/technology/articles/2014/08/01/4058780.htm
[19] article: https://www.iiss.org/en/publications/survival/sections/2014-4667/survival--global-politics-and-strategy-august-september-2014-838b/56-4-02-gompert-and-libicki-04fc
[20] says: http://www.defensenews.com/article/20140730/DEFFEAT05/307300017/Commentary-Cyber-Deterrence-Working
[21] video: https://www.youtube.com/watch?v=u2VpyqfJM5I&list=PL0-bcfeS6XTeJbAsT1NPK3dO28q3B-FRM&index=6
[22] website: https://www.aspistrategist.ru/icpc
[23] Jacob Davis: https://www.flickr.com/photos/jacobdavis/2493692058/in/photostream/
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.