{"id":13147,"date":"2014-04-01T13:00:38","date_gmt":"2014-04-01T02:00:38","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=13147"},"modified":"2014-04-02T06:58:25","modified_gmt":"2014-04-01T19:58:25","slug":"cyber-wrap-22","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>First up, a haiku on the Internet from the <\/span>New York Times <\/i>haiku generator<\/a>:
\n<\/span><\/p>\n

The Internet is \/\/\u00a0emotionally a very \/\/\u00a0flat experience.<\/em><\/p>\n

Many Turkish citizens would agree with that sentiment this week as they found YouTube access blocked for reasons of \u2018national security\u2019<\/a>\u2014after Twitter had been blocked the week before. Prime Minister Recep Tayyip Erdo\u011fan ordered a clamp down<\/a> on the social media sites after a leaked audio file<\/a> showed Turkish government and military leaders discussing a military strike on Syria. The PM has also been fighting off corruption charges that surfaced on those platforms. The ban on YouTube was made days before municipal elections, which Erdo\u011fan\u2019s party won comfortably<\/a>.<\/p>\n

China\u2019s no stranger to Internet censorship and surveillance of its netizens. It\u2019s also an exporter of technologies that assist other governments control opinion among their domestic populations. Human Rights Watch<\/i> have released a report<\/a> pointing a finger at China\u2019s role in facilitating the development of Ethiopia\u2019s surveillance networks. The report claims<\/a> that \u2018the technologies used to monitor telecom activity in Ethiopia have been provided by the Chinese telecom giant ZTE.\u2019 ZTE is a major player in the African telecom industry, playing a key role in the development of fledgling telecom networks.\u00a0Mark Clayton over at the CS Monitor<\/i> has an article<\/a> on the issue.<\/p>\n

There has been a lot of discussion in the past week about the future of US cyber policy. At the retirement ceremony for CYBERCOM commander General Keith Alexander, US Secretary of Defense Chuck Hagel said<\/a> that the US \u2018will maintain an approach of restraint to any cyber operations outside of U.S. government networks.\u2019 Framing future American cyberespionage and attack operations as \u2018limited\u2019 could be seen as a response to new Snowden revelations<\/a> about alleged NSA hacking of Huawei\u2019s networks. It also comes on the eve of Hagel\u2019s first visit to China. Chinese Defence Ministry spokesman Geng Yansheng has rebuked<\/a> the US about the recent NSA cyberespionage disclosures. \u00a0China has vowed<\/a> to boost its cybersecurity efforts.<\/p>\n

Hagel also flagged a boost in the recruitment of cybersecurity professionals during General Alexander\u2019s retirement ceremony. He said<\/a> that \u2018US reliance on cyberspace outpaces our cybersecurity\u2019, and that the Pentagon will boost its numbers of cyber professionals to 6000 by 2016\u2014a more than threefold increase of current levels. Japan has also announced<\/a> its own increases to its military cyber forces this week, launching a 90-person strong cybersecurity unit last Thursday.<\/p>\n

For more on the future of US cyber policy, Ian Wallace and Peter Singer at the Brookings Institution<\/i> have a podcast<\/a> with Richard Bejtlich and Ralph Langner, two fellows at the \u2018Brookings\u2019s Center for 21st Century Security and Intelligence\u2019. The interview has a number of key highlights including challenges for the next CYBERCOM-NSA commander and the risk of SCADA systems\u2014centralised systems which monitor and control entire sites, such as a water distribution system\u2014being seized by organised groups. For another perspective on the future of US cyber policy, Spiegel <\/i>has spoken<\/a> to former NSA director Michael Hayden on the future of the Internet.<\/p>\n

According to The Guardian,<\/i> Labor\u2019s deputy leader Tanya Plibersek has signalled<\/a> that she is open to giving intelligence agencies more tools to deal with domestic security threats. In a Sky News<\/i> interview on Sunday, Plibersek said she \u2018wants to give [intelligence] agencies the maximum ability to do their job well, within the bounds that people would expect.\u2019 This may include the mandatory collection of metadata currently being pushed<\/a> by the Australian Crime Commission, state and federal police, and intelligence agencies at the Senate committee review of the Telecommunications (Interception and Access) Act 1979<\/a>. On interception and storage of metadata, Plibersek stated<\/a> \u2018it has been an important tool in disrupting some very serious terrorist plots in Australia\u2019.<\/p>\n

Moving now to cybercrime, the RAND Corporation has released a report entitled \u2018Markets for cybercrime tools and stolen data\u2019<\/a>. One of the report\u2019s main findings is that \u2018the cyber black market has evolved from a varied landscape of discrete, ad hoc individuals into a network of highly organized groups, often connected with traditional crime groups\u2019.<\/p>\n

Finally, the Cyber Dialogue conference in Canada<\/a> <\/b>concluded yesterday, with discussion focusing on the Internet after Snowden. The conference\u2019s official website and blog can be found here<\/a>. An interesting development happened last night when whistleblower Thomas Drake challenged Joel Brenner\u2014former senior counsel at the NSA\u2014on the legality of access to individuals\u2019 data.<\/p>\n

Simon Hansen is an intern at ASPI.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

First up, a haiku on the Internet from the New York Times haiku generator: The Internet is \/\/\u00a0emotionally a very \/\/\u00a0flat experience. Many Turkish citizens would agree with that sentiment this week as they found …<\/p>\n","protected":false},"author":214,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[748,52,391,169,749,733,750,500,747],"class_list":["post-13147","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-censorship","tag-china","tag-cyber","tag-cyber-crime","tag-cyber-espionage","tag-cybercom","tag-data-retention","tag-surveillance","tag-turkey"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"First up, a haiku on the Internet from the New York Times haiku generator: The Internet is \/\/\u00a0emotionally a very \/\/\u00a0flat experience. Many Turkish citizens would agree with that sentiment this week as they found ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-01T02:00:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-04-01T19:58:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/#primaryimage\"},\"datePublished\":\"2014-04-01T02:00:38+00:00\",\"dateModified\":\"2014-04-01T19:58:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"First up, a haiku on the Internet from the New York Times haiku generator: The Internet is \/\/\u00a0emotionally a very \/\/\u00a0flat experience. Many Turkish citizens would agree with that sentiment this week as they found ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-04-01T02:00:38+00:00","article_modified_time":"2014-04-01T19:58:25+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/#primaryimage"},"datePublished":"2014-04-01T02:00:38+00:00","dateModified":"2014-04-01T19:58:25+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-22\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13147"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=13147"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13147\/revisions"}],"predecessor-version":[{"id":13157,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13147\/revisions\/13157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=13147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=13147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=13147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}