{"id":11986,"date":"2014-01-29T15:16:23","date_gmt":"2014-01-29T04:16:23","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=11986"},"modified":"2014-02-05T14:25:26","modified_gmt":"2014-02-05T03:25:26","slug":"cyber-wrap-11","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>This last week saw world leaders gathering in Davos in the Swiss Alps for the World Economic Forum\u2019s annual meeting. With the WEF releasing its Risk and Responsibility in a Hyperconnected World<\/i><\/a> and its Global Risks 2014<\/a> <\/i>report (which highlighted the threat of \u2018digital disintegration\u2019) \u00a0<\/i>within the previous <\/i>\u00a0month, cyber issues were high on the agenda. The Big Brother Problem<\/a> panel session was of particular note, bringing together a diverse range of perspectives on the topic du jour, digital surveillance.<\/p>\n

Ahead of the first Cybertech 2014<\/a> Conference in Israel, Prime Minister Benjamin Netanyahu used Davos to highlight<\/a> the \u2018innovation nation\u2019s\u2019 digital economy and cyber prowess. Meeting with top tech leaders earlier in the week, the Prime Minister\u2019s pitch wasn’t stalled by news<\/a> that Israel\u2019s defence systems were compromised by the Xtreme Rat<\/i> trojan, preliminarily attributed to Palestinian hackers.<\/p>\n

Israel is hardly alone in facing cyber threats, or so finds CrowdStrike\u2019s Global Threat Report<\/a> (PDF) released last Wednesday. The report found some interesting wider trends reflective of the changing cyber geography, including increased capabilities and operational tempo in the Middle East, with Syria being particularly active. It also reflected expectations that dropping hardware costs will increase the risk of hardware-based attacks. The report also found shifting tactics<\/a> in Russian cyber espionage, with the government allegedly channelling its inner dragon and resorting to Chinese style commercial espionage to keep its industries competitive.<\/p>\n

More overtly, Russia is also set to ratchet up its cyber surveillance<\/a> efforts ahead of the Sochi Winter Olympics set to kick off next week. To augment its ‘Iron Ring’ security plan on the ground, the government is expected to launch near total surveillance of communications and online activities during the games. While most acknowledge the seriousness of threats to security at the Olympics, the intrusiveness of government efforts and the potential surveillance ‘legacy’ of the games have raised serious privacy concerns among activists, local residents, visitors, the media, and even athletes.<\/p>\n

Despite the long weekend, Australia was also active on the cyber front. On her travels in the US, Foreign Minister Julie Bishop<\/a> gave a speech in which she accused Edward Snowden of \u2018treachery\u2019. But she has since also said that domestic intelligence reforms like those proposed by President Obama were not needed in Australia. On the other hand, the Department of Communications does see a need for reforms, at least in regards to cyber safety. Now open to public consultation<\/a>, the proposed changes include the establishment of a Children\u2019s e-Safety Commissioner, legislation to develop a \u2018complaint system\u2019 to remove \u2018harmful material\u2019, and reviewing cyberbullying offence legislation. While higher ups at Symantec Asia Pacific and Japan as well as Kaspersky Lab Australia have come out in support of effective cyber safety efforts, the Australian Interactive Media Industry Association, Microsoft, Yahoo!, Facebook, eBay, Google, Twitter, and other leading voices in the IT sector are strongly opposed<\/a> to these \u2018counter productive\u2019 measures.<\/p>\n

Kl\u00e9e Aiken is an analyst in ASPI\u2019s\u00a0International Cyber Policy Centre<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

This last week saw world leaders gathering in Davos in the Swiss Alps for the World Economic Forum\u2019s annual meeting. With the WEF releasing its Risk and Responsibility in a Hyperconnected World and its Global …<\/p>\n","protected":false},"author":153,"featured_media":7591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,95,647,667,665,500,666],"class_list":["post-11986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-cyber-security","tag-edward-snowden","tag-intelligence-reform","tag-julie-bishop","tag-surveillance","tag-wef"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This last week saw world leaders gathering in Davos in the Swiss Alps for the World Economic Forum\u2019s annual meeting. With the WEF releasing its Risk and Responsibility in a Hyperconnected World and its Global ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-29T04:16:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-02-05T03:25:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1130\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg\",\"width\":1130,\"height\":425},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/#primaryimage\"},\"datePublished\":\"2014-01-29T04:16:23+00:00\",\"dateModified\":\"2014-02-05T03:25:26+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"This last week saw world leaders gathering in Davos in the Swiss Alps for the World Economic Forum\u2019s annual meeting. With the WEF releasing its Risk and Responsibility in a Hyperconnected World and its Global ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-01-29T04:16:23+00:00","article_modified_time":"2014-02-05T03:25:26+00:00","og_image":[{"width":1130,"height":425,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/07\/cyber-logo.jpg","width":1130,"height":425},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/#primaryimage"},"datePublished":"2014-01-29T04:16:23+00:00","dateModified":"2014-02-05T03:25:26+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-11\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11986"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=11986"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11986\/revisions"}],"predecessor-version":[{"id":12008,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/11986\/revisions\/12008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/7591"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=11986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=11986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=11986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}