{"id":13845,"date":"2014-05-14T12:45:18","date_gmt":"2014-05-14T02:45:18","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=13845"},"modified":"2014-05-15T10:26:16","modified_gmt":"2014-05-15T00:26:16","slug":"cyber-wrap-27","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>The 2014\u201315 Australian Federal Budget<\/a> was released last night, and many are still likely digesting its key points. Although criticised for going back on election promises after announcing deep spending cuts and more taxes, the Government did follow through on elevating the issue of cyber safety. According to the budget, the Government will provide<\/a> $10 million over four years to improve the protection of children online by creating online safety programmes for schools, research and information campaigns on online safety, and establishing the Office of the Children’s e\u2011Safety Commissioner. However, the National ICT Australia\u2014Australia\u2019s peak ICT research group\u2014will lose<\/a> its $84.9 million funding after two years. Communications Minister Malcolm Turnbull stated that the organisation would then move to a \u2018self-sustaining\u2019 model.<\/p>\n

In the US last week, Senator Patrick Leahy and Congressman James Sensenbrenner\u2019s 2013 proposal<\/a> for the USA Freedom Act,<\/a> that prevents the NSA from collecting US phone and Internet metadata, passed unanimously in the House Judiciary Committee. According to the bill, \u2018data [would remain] with the telephone and Internet companies and the NSA would only be authorised to approach those companies on an individual, case-by-case basis\u2019 said<\/a> David Cole, Professor of Law at Georgetown University. At an April 2014 debate<\/a> at Johns Hopkins University on the NSA\u2019s constitutionality, Cole quoted Stewart Baker, the former general counsel of NSA, as saying, \u2018metadata absolutely tells you everything about somebody\u2019s life. If you have enough metadata, you don\u2019t really need content.\u2019 Former NSA director Michael Hayden responded<\/a> at the debate saying that was \u2018absolutely correct\u2019, and\u2014rather chillingly\u2014\u2018we kill people based on metadata.\u2019<\/p>\n

Australia is having its own mass surveillance debate. ASIO officials will be asked to face a Senate inquiry into the comprehensive revision<\/a> of the Telecommunications (Interception and Access) Act 1979 later this month. The inquiry was initiated<\/a> by Greens Senator Scott Ludlam in December last year, to break what Ludlum called the \u2018complicity of silence about surveillance in Australia\u2019. News Corp spoke<\/a> recently with Professor Desmond Ball on the issue and the apparent ease with which phone data can be collected.<\/p>\n

Across the Tasman, New Zealand is dealing with the controversial passage<\/a> into law of its 2013 Telecommunications (Interception Capability and Security) Act<\/a>. The Government Communications Security Bureau (GCSB) and National Cyber Security Centre released guidance for network operators<\/a> (PDF) last week. The guidance says that network operators are required to engage with the GCSB about changes to their networks and the \u2018design, build or operation of public telecommunications networks and their interconnection to other networks both domestically and overseas\u2019.<\/p>\n

In Indonesia this week, the Indonesian military (TNI) has signed an agreement<\/a> with the Institut Teknologi Del to develop a cyber defence and warfare centre. Army Chief of Staff General Budiman and Dr Roberd Saragih signed the agreement, which covers<\/a> training and development of new offensive and defensive technologies to be used by the TNI in conducting cyber warfare operations.<\/p>\n

Microsoft, through its Cyber Threat Intelligence Program, and the Australian Communication and Media Authority\u2019s Australian Internet Security Initiative (AISI) have struck a new agreement<\/a> to fight cybercrime. The agreement involves real-time sharing of data on Australian computers identified as being infected with malware. \u2018The AISI, which has operated since 2005, is recognised globally for its work in sharing threat information with local Internet Service Providers,\u2019 said<\/a> Microsoft Australia chief security advisor, James Kavanagh.<\/p>\n

The annual AusCERT information security conference<\/a> began on the Gold Coast this week. Michael Cerny, PwC Australia Partner, will speak<\/a> today at the conference about cyber security analytics and the need for organisations to build up a team of data scientists to complement their information security team. Broadly speaking, cyber security analytics aggregate<\/a> security functions and data analytics, making cybersecurity processes more timely, automated and accurate. FireEye, IBM and Symantec have all made recent investments in developing cybersecurity software architecture.<\/p>\n

Finally, if you\u2019re a long-time fan of the American TV show CSI: <\/i>Crime Scene Investigation<\/i>, and don\u2019t mind the cringe-worthy title, the latest spinoff is CSI: Cyber<\/a><\/i>, and will be aired on CBS this year. The series<\/a> will follow Avery Ryan, a special agent at the Cyber Crime Division of the FBI, tasked with solving \u2018high-octane\u2019 crimes.<\/p>\n

Simon Hansen is an intern in ASPI\u2019s International Cyber Policy Centre.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

The 2014\u201315 Australian Federal Budget was released last night, and many are still likely digesting its key points. Although criticised for going back on election promises after announcing deep spending cuts and more taxes, the …<\/p>\n","protected":false},"author":214,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[120,391,8,811,73,500],"class_list":["post-13845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-budget","tag-cyber","tag-indonesia","tag-microsoft","tag-new-zealand","tag-surveillance"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The 2014\u201315 Australian Federal Budget was released last night, and many are still likely digesting its key points. Although criticised for going back on election promises after announcing deep spending cuts and more taxes, the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-14T02:45:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-05-15T00:26:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/#primaryimage\"},\"datePublished\":\"2014-05-14T02:45:18+00:00\",\"dateModified\":\"2014-05-15T00:26:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The 2014\u201315 Australian Federal Budget was released last night, and many are still likely digesting its key points. Although criticised for going back on election promises after announcing deep spending cuts and more taxes, the ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-05-14T02:45:18+00:00","article_modified_time":"2014-05-15T00:26:16+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/#primaryimage"},"datePublished":"2014-05-14T02:45:18+00:00","dateModified":"2014-05-15T00:26:16+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-27\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13845"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=13845"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13845\/revisions"}],"predecessor-version":[{"id":13855,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/13845\/revisions\/13855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=13845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=13845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=13845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}