{"id":10446,"date":"2013-10-31T13:30:26","date_gmt":"2013-10-31T02:30:26","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=10446"},"modified":"2013-11-01T11:04:31","modified_gmt":"2013-11-01T00:04:31","slug":"cyber-wrap-7","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"German<\/a>This week the fallout from the leak of classified NSA documents continued, as German Chancellor Angela Merkel expressed her outrage<\/a> at the revelation the US had been tapping her phone for up to ten years, telling reporters that \u2018Spying against friends is not acceptable against anyone.’ However, Spiegel Online<\/em> questioned<\/a> Merkel\u2019s sincerity, as it emerged that Merkel had resisted the passage of EU-wide data protection framework that would fine companies found to be passing data to intelligence agencies.<\/p>\n

US intelligence agencies have continued to justify their activities, and are facing mounting opposition, including from usual ally Senator Dianne Feinstein<\/a>, the chair of the Senate Intelligence Committee.<\/p>\n

The Director of National Intelligence James Clapper defended<\/a> the tapping of world leader\u2019s communications, telling the House of Representatives Intelligence Panel that \u2018Leadership intentions is kind of a basic tenet of what we collect and analyse\u2018. NSA chief General Keith Alexander testified that reports that the NSA collected intelligence on European citizens was \u2018Completely false\u2018, and that much of the data cited as being so was actually provided by European intelligence services to the US.<\/p>\n

Some world leaders have been circumspect; New Zealand\u2019s Defence Minister Jonathan Coleman joked<\/a> that anyone from NSA listening to private New Zealand Government conversations would quickly fall asleep.<\/p>\n

However Coleman may have more to worry about than just the NSA listening in, with Chinese telco provider Huawei a major supplier of equipment for NZ\u2019s Ultra-Fast Broadband Network. In Australia, Attorney-General George Brandis has ruled out<\/a> a review of the previous government\u2019s decision to ban Huawei\u2019s participation in the National Broadband Network (NBN) after he received an updated briefing from ASIO Director\u2011General David Irvine and Ian McKenzie, Director of the Australian Signals Directorate (ASD). This came despite an apparent push from Communications Minister Malcolm Turnbull and Trade Minister Andrew Robb for a review of the decision, and questions in the Australian Financial Review about why<\/a> Huawei could not be involved at the edges of the NBN without compromising critical access points. The cost of the ban is likely to have been at the front of Andrew Robb\u2019s mind, considering the statement of Chinese Economic and Commercial Consul Peng Geng in Sydney who warned<\/a> that the Huawei ban would deter other Chinese companies investing in Australia.<\/p>\n

Opposition Leader Bill Shorten has also sought a briefing on developments regarding Huawei from Irvine and McKenzie, but he may end up receiving the briefing from ASD\u2019s new Director, Dr Paul Taloni. Taloni has been announced<\/a> as the replacement for the retiring McKenzie, who is departing after six years at the helm of ASD. Taloni, former Chief of Staff to Stephen Smith and Deputy Director of the Defence Intelligence Organisation, will take over the reins in November.<\/p>\n

Not wanting to let states have all the fun, Microsoft has outlined its Five Principles for Shaping Cyber Security Norms<\/a>, in the wake of October\u2019s International Conference in Cyberspace in Seoul. It notes that while governments have a role in building confidence and cooperation in cyberspace, many of the measures and policies for effective international cybersecurity practices rely on the private sector.<\/p>\n

Post from the ASPI International Cyber Policy Centre<\/a>. Image courtesy of Wikimedia Commons<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

This week the fallout from the leak of classified NSA documents continued, as German Chancellor Angela Merkel expressed her outrage at the revelation the US had been tapping her phone for up to ten years, …<\/p>\n","protected":false},"author":184,"featured_media":10447,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391],"class_list":["post-10446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This week the fallout from the leak of classified NSA documents continued, as German Chancellor Angela Merkel expressed her outrage at the revelation the US had been tapping her phone for up to ten years, ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-31T02:30:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-11-01T00:04:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/10\/768px-Angela_Merkel_10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ASPI International Cyber Policy Centre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ASPI International Cyber Policy Centre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/10\/768px-Angela_Merkel_10.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/10\/768px-Angela_Merkel_10.jpg\",\"width\":768,\"height\":768},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/#primaryimage\"},\"datePublished\":\"2013-10-31T02:30:26+00:00\",\"dateModified\":\"2013-11-01T00:04:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1\",\"name\":\"ASPI International Cyber Policy Centre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g\",\"caption\":\"ASPI International Cyber Policy Centre\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/aspi-international-cyber-policy-centre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"This week the fallout from the leak of classified NSA documents continued, as German Chancellor Angela Merkel expressed her outrage at the revelation the US had been tapping her phone for up to ten years, ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-10-31T02:30:26+00:00","article_modified_time":"2013-11-01T00:04:31+00:00","og_image":[{"width":768,"height":768,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/10\/768px-Angela_Merkel_10.jpg","type":"image\/jpeg"}],"author":"ASPI International Cyber Policy Centre","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"ASPI International Cyber Policy Centre","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/10\/768px-Angela_Merkel_10.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/10\/768px-Angela_Merkel_10.jpg","width":768,"height":768},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/#primaryimage"},"datePublished":"2013-10-31T02:30:26+00:00","dateModified":"2013-11-01T00:04:31+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1","name":"ASPI International Cyber Policy Centre","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g","caption":"ASPI International Cyber Policy Centre"},"url":"https:\/\/www.aspistrategist.ru\/author\/aspi-international-cyber-policy-centre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10446"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/184"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=10446"}],"version-history":[{"count":7,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10446\/revisions"}],"predecessor-version":[{"id":10452,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/10446\/revisions\/10452"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/10447"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=10446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=10446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=10446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}