{"id":11202,"date":"2013-12-05T11:30:53","date_gmt":"2013-12-05T00:30:53","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=11202"},"modified":"2014-03-31T14:43:48","modified_gmt":"2014-03-31T03:43:48","slug":"cyber-wrap-9","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"\"<\/a><\/figure>\n

No rest for the weary as Australia is faced with another bout of damaging Snowden revelations. Latest documents<\/a> suggest that the Defence Signals Directorate (now the Australian Signals Directorate) offered to \u2018share bulk, unselected, unminimised metadata,\u2019 likely including data from Australian nationals. Following the revelations, Attorney-General George Brandis faced a grilling<\/a> on the floor of the Senate as various definitions of metadata were batted about. Canada came off quite well in the latest leak by imposing privacy restraints on data pooling, however word that it let the NSA spy on the 2010 G20 and G8 summits<\/a> has certainly soured moods.<\/p>\n

On The Strategist<\/em> our own Big Data debate rages on, with Anthony Bergin<\/a> questioning whether big data tactics can keep up with shifts in terrorist tactics and David Schaefer<\/a> introducing a new dimension to the discussion with metadata for cybersecurity. While ABC\u2019s Caro Meldrum-Hanna<\/a> questioned whether Australians should even be concerned with all the talk of mass surveillance, UN special rapporteur Ben Emmerson called metadata surveillance \u2018at the apex of public interest concern,\u2019 elevating the issue further by launching a UN investigation<\/a>.<\/p>\n

In early November, UK banks tested their cyber resilience with Operation Waking Shark II, which has turned out to be much more than a hypothetical exercise. The sharks have apparently been awake for quite some time, as a new report<\/a> from the Bank of England reveals numerous cyber-attacks resulting in financial losses for UK banks over the last six months.<\/p>\n

NATO tested its own mettle last week with it\u2019s largest-ever cyber exercise Cyber Coalition 2013<\/a>, bringing together around 400 experts and government officials for a three-day event involving over 30 countries. Turkey<\/a> meanwhile has taken its efforts beyond simple Alliance participation, as it\u2019s cyber stock is on the uptick. Turkey has doubled down on cybersecurity, welcoming numerous conferences and elevating cyber defense to an \u2018indispensable part of [it\u2019s] national defense.\u2019<\/p>\n

Finally looking ahead to 2014, predictions and premonitions are abound<\/a>. FireEye sees watering-hole attacks and social media targeting supplanting spear-fishing, Fortinet is banking on the biometrics trend, and Lancope sees an \u2018Internet of Everything\u2019 needing the \u2018Security of Everything.\u2019 Neohapsis forecasts a \u2018cyberwar redux,\u2019 Symantec is hopeful that people will finally actively protect private information while websense is a bit more pessimistic predicting offensive security mistakes due to misattribution.<\/p>\n","protected":false},"excerpt":{"rendered":"

No rest for the weary as Australia is faced with another bout of damaging Snowden revelations. Latest documents suggest that the Defence Signals Directorate (now the Australian Signals Directorate) offered to \u2018share bulk, unselected, unminimised …<\/p>\n","protected":false},"author":184,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[646,391,647,261,649],"class_list":["post-11202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-big-data","tag-cyber","tag-edward-snowden","tag-nato","tag-nsa"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"No rest for the weary as Australia is faced with another bout of damaging Snowden revelations. Latest documents suggest that the Defence Signals Directorate (now the Australian Signals Directorate) offered to \u2018share bulk, unselected, unminimised ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-12-05T00:30:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-03-31T03:43:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ASPI International Cyber Policy Centre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ASPI International Cyber Policy Centre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/#primaryimage\"},\"datePublished\":\"2013-12-05T00:30:53+00:00\",\"dateModified\":\"2014-03-31T03:43:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1\",\"name\":\"ASPI International Cyber Policy Centre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g\",\"caption\":\"ASPI International Cyber Policy Centre\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/aspi-international-cyber-policy-centre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"No rest for the weary as Australia is faced with another bout of damaging Snowden revelations. Latest documents suggest that the Defence Signals Directorate (now the Australian Signals Directorate) offered to \u2018share bulk, unselected, unminimised ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-12-05T00:30:53+00:00","article_modified_time":"2014-03-31T03:43:48+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"ASPI International Cyber Policy Centre","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"ASPI International Cyber Policy Centre","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/#primaryimage"},"datePublished":"2013-12-05T00:30:53+00:00","dateModified":"2014-03-31T03:43:48+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-9\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/b38dacb2587cd228c3920589339415d1","name":"ASPI International Cyber Policy Centre","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c2f94251efec0b05596ac2aeb3c952f?s=96&d=mm&r=g","caption":"ASPI International Cyber Policy Centre"},"url":"https:\/\/www.aspistrategist.ru\/author\/aspi-international-cyber-policy-centre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11202"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/184"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=11202"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11202\/revisions"}],"predecessor-version":[{"id":11230,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11202\/revisions\/11230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=11202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=11202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=11202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}