{"id":12867,"date":"2014-03-18T12:15:40","date_gmt":"2014-03-18T01:15:40","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=12867"},"modified":"2014-03-20T11:30:25","modified_gmt":"2014-03-20T00:30:25","slug":"cyber-wrap-20","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>Welcome to the cyber wrap for another week. Just to mix things up, we\u2019ll be coming to you each Tuesday for the next little while. Now for an update on all things cyber:<\/p>\n

Offensive cyber campaigns continued to be waged by patriotic hackers and other forces in Russia and Ukraine in the lead up to the Crimean referendum last weekend. On Thursday, an unidentified Ukrainian network was rocked by a powerful Distributed Denial of Service (DDoS)<\/a> attack traced to Russia, that was said to be 32 times larger than the most significant attack directed toward Georgia in the 2008 Russia\u2013Georgia war. NATO was also faced with a DDoS attack that saw several of its websites taken down. Hackers from Ukraine said to be aggrieved by alleged NATO interference in Ukrainian affairs later claimed responsibility<\/a>.<\/p>\n

The big news was out of America this week where the US Department of Commerce (DoC) set the stage to relinquish its oversight<\/a> of the Internet Corporation for Assigned Names and Numbers (ICANN), the LA-based not-for-profit that controls internet domain names and IP numbers. The National Telecommunications & Information Administration, an agency of DoC, has requested a proposal for the new stewardship of ICANN be developed at a meeting of global stakeholders in Singapore<\/a> next week. This announcement is sure to have a significant impact on the global internet governance debate, and particularly on the NETmundial conference<\/a> slated for Brazil next month, which will seek to address perceived US dominance in this space. We\u2019ll be kicking off a series of blog posts on this decision and other internet governance issues starting on The Strategist <\/i>this Thursday. In the meantime, ICPC International Fellow Samir Saran has highlighted some meta-trends<\/a> affecting the internet governance debate in India and internationally.<\/p>\n

Western politicians are responding to the sentiment of their constituents as Snowden\u2019s revelations continue<\/a> to whet the public appetite for reform in the area of personal data management. The European Parliament has voted in favour of data protection reforms<\/a> built around consumer consent and control including \u2018the right to be forgotten\u2019. The reforms would see a sole arbiter enforce pan-European data protection laws on all companies doing businesses across the EU regardless of where they are based. In the States, the top Democrat on the House Intelligence Committee, Rep. Dutch Ruppersberger has proposed<\/a> that US phone records be held by phone companies rather than the NSA, whose analysts would have to seek a court order to be granted access. While Ruppersberger has been a staunch defender of the NSA, his plan effectively echoes part of the surveillance reforms announced by President Obama in January, an exercise that Ruppersberger sees as necessary to regain public confidence in the intelligence agency.<\/p>\n

The confirmation process for the next NSA and US Cyber Command (CYBERCOM) boss Vice Admiral Michael S. Rogers got underway in Washington last week. As confirmations go, the first day was far from bruising, with commentators noting<\/a> his mastery of \u2018the NSA’s ability to pay lip-service to transparency, while publicly saying very little\u2019. When it came to American cyber capabilities<\/a>, Rogers was more forthcoming, stating that all major combat commands in the United States military will soon be complemented by dedicated offensive cyber forces. Current double-hatted chief General Keith Alexander followed up the next day<\/a> with testimony that CYBERCOM is likely to be elevated to the status of a full combatant command citing its growth under parent US Strategic Command since 2010.<\/p>\n

Finally, the ICPC wishes a happy birthday to the Internet! It has been 25 years since Tim Berners-Lee wrote his first proposal for what would become the World Wide Web, which at the time his boss deemed \u2018vague but exciting\u2019<\/a>. Berners-Lee used the anniversary to call for a digital bill of rights in every country<\/a>, highlighting his desire \u00a0for the openness, security and neutrality of the Internet to be strengthened. Find out more information on the Web We Want campaign here<\/a>.<\/p>\n

David Lang is an intern at ASPI\u2019s International Cyber Policy Centre.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Welcome to the cyber wrap for another week. Just to mix things up, we\u2019ll be coming to you each Tuesday for the next little while. Now for an update on all things cyber: Offensive cyber …<\/p>\n","protected":false},"author":207,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,713,733,732,731,649,110,163,714],"class_list":["post-12867","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-cyberattack","tag-cybercom","tag-ddos-attack","tag-internet-governance","tag-nsa","tag-reform","tag-russia","tag-ukraine"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Welcome to the cyber wrap for another week. Just to mix things up, we\u2019ll be coming to you each Tuesday for the next little while. Now for an update on all things cyber: Offensive cyber ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-18T01:15:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-03-20T00:30:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Lang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Lang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/#primaryimage\"},\"datePublished\":\"2014-03-18T01:15:40+00:00\",\"dateModified\":\"2014-03-20T00:30:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2\",\"name\":\"David Lang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g\",\"caption\":\"David Lang\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/david-lang\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Welcome to the cyber wrap for another week. Just to mix things up, we\u2019ll be coming to you each Tuesday for the next little while. Now for an update on all things cyber: Offensive cyber ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-03-18T01:15:40+00:00","article_modified_time":"2014-03-20T00:30:25+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"David Lang","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"David Lang","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/#primaryimage"},"datePublished":"2014-03-18T01:15:40+00:00","dateModified":"2014-03-20T00:30:25+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-20\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2","name":"David Lang","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g","caption":"David Lang"},"url":"https:\/\/www.aspistrategist.ru\/author\/david-lang\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12867"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/207"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=12867"}],"version-history":[{"count":7,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12867\/revisions"}],"predecessor-version":[{"id":12919,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/12867\/revisions\/12919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=12867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=12867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=12867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}