{"id":13597,"date":"2014-04-29T12:15:00","date_gmt":"2014-04-29T02:15:00","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=13597"},"modified":"2014-04-30T10:36:22","modified_gmt":"2014-04-30T00:36:22","slug":"cyber-wrap-25","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>First up, on the domestic front this week a couple of reports have elevated the issue of government cybersecurity standards, or lack thereof.<\/p>\n

Australian Financial Review<\/i> sources allege<\/a> that the Chinese intelligence agencies that penetrated Australia’s parliamentary computer network in 2011 may have been inside the system for up to a year (much longer than previously assumed). It\u2019s suspected the email system used by federal MPs, their advisers, electorate staff and parliamentary employees was breached. Independent senator Nick Xenophon has since called for<\/a> an inquiry as a matter of national security. Chinese Foreign Ministry spokesman Qin Gang has said<\/a> \u2018we hope that the relevant Australian media can deal with this with a responsible, constructive attitude and not stir up things up (sic) for no reason\u2019. The potential value of any information gleaned by China is uncertain, but the penetration does suggest China\u2019s cyber espionage activities are increasingly focused on revealing political intentions and associations. In June last year it was revealed<\/a> that Chinese hackers had gained access to the computer networks of Barack Obama and John McCain during the 2008 presidential election.<\/p>\n

On another issue, information security consultant Troy Hunt told<\/a> the Sydney Morning Herald<\/i> that the controls used to protect myGov\u2014the site providing access to essential government services like Medicare and Centrelink\u2014were \u2018irresponsible\u2019. The risk of financial and personal information being exploited will increase from the middle of the year, when the government makes it compulsory for Australians to use the my.gov.au<\/a> website to lodge their electronic tax returns. In response, the Department of Human Services general manager Hank Jongen said<\/a>, \u2018as technology evolves the department will continue to ensure the service meets community security expectations\u2019.<\/p>\n

Heading overseas, American netizens are in an uproar after the Wall Street Journal<\/i> scoop<\/a> that the Federal<\/em> Communications Commission is allegedly drafting new net neutrality rules, allowing ISPs to give certain traffic special access. The basic principle of net neutrality is that access to all websites and web services should be equal and that Internet providers shouldn\u2019t be able to block or discriminate between\u00a0legal Internet traffic. Internet activists and lawmakers have panned<\/a> FCC Chairman Wheeler\u2019s proposal, which would let ISPs sell \u2018express lanes\u2019 to Internet content providers willing to pay a premium. The FCC has subsequently issued a statement<\/a>, calling reports that it\u2019ll gut the Open Internet rule<\/a> \u2018flat out wrong\u2019. The political damage might already be done, though, with accusations from New Republic<\/a> that President Obama has effectively back-flipped on his 2008 and 2012 campaign promises to enforce net neutrality.<\/p>\n

In Brazil last Friday, ICANN President Fadi Chehad\u00e9 used Twitter to entreat followers to \u2018focus on implementation of #netmundial Roadmap based on #netmundial2014 Principles driven by our newly born NETmundial spirit\u2019.<\/p>\n

Platitudes aside, nothing this week has been quite so consequential for the future of the Internet as the Global Multi-stakeholder Meeting on the Future of Internet Governance<\/a> event in Sao Paulo. Brazil\u2019s President Dilma Rousseff opened<\/a> the two-day NETmundial conference, where over 850 government officials, academics, and tech heads gathered to debate a new model of Internet governance. The goal of the conference was to agree on a set of principles<\/a> that outline an \u2018inclusive, multi-stakeholder, and evolving Internet governance framework\u2019. The result is the NETmundial Multi-stakeholder Statement<\/a>. According to the Electronic Frontier Foundation, the conference became a \u2018battle between high hopes, user rights, anti-surveillance activism, and the forces of compromise\u2019. For a comprehensive analysis of the lead-up to conference, see the Governing the Net<\/a> series here on \u2018The Strategist\u2019, which breaks down the actors, aims and Australia\u2019s position. (The final piece, addressing the NETmundial session, will be posted on Thursday.)<\/p>\n

Finally, in Beijing last week ASPI and its International Cyber Policy Centre jointly held a roundtable meeting<\/a> on cybersecurity issues with the China Institute of International Studies\u2014a think tank associated with the Ministry of Foreign Affairs. The meeting addressed the September 2013 ASEAN Regional Forum cyber confidence building measures workshop, Cyber Maturity in the Asia-Pacific Region 2014<\/a>, and Australia-China cybersecurity relations.<\/p>\n

Simon Hansen is an intern in ASPI’s International Cyber Policy Centre.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

First up, on the domestic front this week a couple of reports have elevated the issue of government cybersecurity standards, or lack thereof. Australian Financial Review sources allege that the Chinese intelligence agencies that penetrated …<\/p>\n","protected":false},"author":214,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,391,749,777,95,736,731,662,770],"class_list":["post-13597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyber","tag-cyber-espionage","tag-cyber-maturity","tag-cyber-security","tag-icann","tag-internet-governance","tag-net-neutrality","tag-netmundial"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"First up, on the domestic front this week a couple of reports have elevated the issue of government cybersecurity standards, or lack thereof. Australian Financial Review sources allege that the Chinese intelligence agencies that penetrated ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-29T02:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-04-30T00:36:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/#primaryimage\"},\"datePublished\":\"2014-04-29T02:15:00+00:00\",\"dateModified\":\"2014-04-30T00:36:22+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"First up, on the domestic front this week a couple of reports have elevated the issue of government cybersecurity standards, or lack thereof. Australian Financial Review sources allege that the Chinese intelligence agencies that penetrated ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-04-29T02:15:00+00:00","article_modified_time":"2014-04-30T00:36:22+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/#primaryimage"},"datePublished":"2014-04-29T02:15:00+00:00","dateModified":"2014-04-30T00:36:22+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-25\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13597"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=13597"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13597\/revisions"}],"predecessor-version":[{"id":13614,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13597\/revisions\/13614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=13597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=13597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=13597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}