{"id":13021,"date":"2014-03-25T12:30:37","date_gmt":"2014-03-25T01:30:37","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=13021"},"modified":"2014-03-25T12:27:52","modified_gmt":"2014-03-25T01:27:52","slug":"cyber-wrap-21","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>This week on the cyber wrap, it’s good guys versus bad guys as we ask the question: \u2018Who are the enemies of the Internet?\u2019<\/span><\/p>\n

A recent report<\/a> (PDF) by Reporters without Borders found that dubious honour belongs to the Centre for Development of Telematics in India, the Government Communications Headquarters (GCHQ) in the United Kingdom and the National Security Agency (NSA) in the United States. It’s not the first time<\/a>\u00a0these government agencies have come under fire for their mass surveillance methods. The report scrutinised the \u2018schizophrenic\u2019 nature of democratic governments that press for online freedoms while simultaneously adopting the very practices for which they’re criticising authoritarian regimes. The report also highlighted the problem of governments, both democratic and non-democratic, that were \u2018riding roughshod over fundamental freedoms\u2019 under the pretext of national security. China also featured in the report for its role in assisting the governments of Iran and Zambia to establish national Internets that are disconnected from the World Wide Web and under the complete control of the government.<\/p>\n

Pew Research Center has also published a report<\/a> on internet freedom this week. Their survey shows widespread opposition to internet censorship in emerging and developing nations. Perhaps unsurprisingly, support for internet freedom is especially strong in countries where a large percentage of the population is online. And, in most of the countries polled, people aged 18\u201329 were more likely to consider internet freedom a priority than those aged 50 or older. Former US President Bill Clinton has weighed in on the internet freedom debate saying<\/a> that if the US gives up oversight of ICANN\u2014the non-profit organisation responsible for managing Web domains and IP standards\u2014this will enable foreign governments to crack down on netizens. For an analysis of the ICANN debate, see Kl\u00e9e Aiken and David Lang\u2019s recent post<\/a> on The Strategist.<\/i><\/p>\n

Other bad guys of the Internet this week include tech titans Microsoft, Apple and Yahoo. Alex Hern at The Guardian<\/i> looked into<\/a> the terms of service and privacy policies of these webmail giants and found they reserve the right to read users\u2019 email if they believe that such access is necessary to protect their property. This story came only a few days after NSA general counsel Rajesh De told the Civil Liberties Oversight Board that tech companies \u2018knew what was going on\u2019<\/a> with NSA\u2019s spying activities, incurring further reputational costs for the big techs. Google, Facebook, Apple and Microsoft have all denied participating in PRISM, with Google CEO Larry Page stating<\/a> \u2018it\u2019s tremendously disappointing that our government did this and didn\u2019t tell us\u2019.<\/p>\n

A further blow to the US’ \u2018freedom of information\u2019 narrative has been the revelation<\/a> that the NSA had created its own backdoors into the Chinese telecommunications company Huawei. One objective of operation \u2018Shotgiant\u2019 was to link Huawei with the People\u2019s Liberation Army in order to show that Huawei\u2019s widespread infrastructure would provide China with SIGINT capabilities. Another more disquieting objective was to compromise Huawei, as \u2018many of [the US’] targets communicate over Huawei produced products, we want to make sure that we know how to exploit these products\u2019. Thomas Rid over at Kings of War <\/i>has some interesting take home points<\/a> on the saga, not least that Snowden is a gift that keeps on giving to China\u2019s leaders. The NSA backdoor into Huawei raises questions on the difference between political and economic cyber attacks. The norm that there is<\/i> a difference may be dead\u2014or at least blurred beyond distinction. A discussion of international norms on cyber attacks is happening here<\/a>.<\/p>\n

Locally, the Australian Securities and Investments Commission (ASIC) has announced<\/a> that cybercrime is a systemic and black swan<\/a> risk, in other words, a major event could happen at any time. Chairman Greg Medcraft opened the annual ASIC forum<\/a> that will host a panel discussion on how regulators can tackle cybercrime. One suggestion by the Commonwealth Director of Public Prosecutions, Robert Bromwich, and the Commissioner of the Australian Competition and Consumer Commission, Sarah Court, was that tough penalties, including the real risk of jail, has a powerful deterrent effect. That may be the case for domestic criminals<\/a>, but for offenders in R\u00e2mnicu V\u00e2lcea, Romania, aka \u2018Hackerville\u2019<\/a>, the risk is negligible.<\/p>\n

Finally, for a look at a look at cyber war with your own eyes, Kaspersky has revealed<\/a> an interactive map of online threats. The map is in real time with the option to check how infected each country is compared to others. Australia is currently the 23rd\u00a0most infected country.<\/p>\n

Simon Hansen is an intern at ASPI.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

This week on the cyber wrap, it’s good guys versus bad guys as we ask the question: \u2018Who are the enemies of the Internet?\u2019 A recent report (PDF) by Reporters without Borders found that dubious …<\/p>\n","protected":false},"author":214,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[52,391,169,713,736,692,649,499,215],"class_list":["post-13021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-china","tag-cyber","tag-cyber-crime","tag-cyberattack","tag-icann","tag-internet","tag-nsa","tag-prism","tag-privacy"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"This week on the cyber wrap, it’s good guys versus bad guys as we ask the question: \u2018Who are the enemies of the Internet?\u2019 A recent report (PDF) by Reporters without Borders found that dubious ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-25T01:30:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-03-25T01:27:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/#primaryimage\"},\"datePublished\":\"2014-03-25T01:30:37+00:00\",\"dateModified\":\"2014-03-25T01:27:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"This week on the cyber wrap, it’s good guys versus bad guys as we ask the question: \u2018Who are the enemies of the Internet?\u2019 A recent report (PDF) by Reporters without Borders found that dubious ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-03-25T01:30:37+00:00","article_modified_time":"2014-03-25T01:27:52+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/#primaryimage"},"datePublished":"2014-03-25T01:30:37+00:00","dateModified":"2014-03-25T01:27:52+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-21\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13021"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=13021"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13021\/revisions"}],"predecessor-version":[{"id":13025,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13021\/revisions\/13025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=13021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=13021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=13021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}