{"id":14421,"date":"2014-06-18T12:15:35","date_gmt":"2014-06-18T02:15:35","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=14421"},"modified":"2014-06-19T09:35:59","modified_gmt":"2014-06-18T23:35:59","slug":"cyber-wrap-31","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>Cyber policy was on the table<\/a> at the 5th\u00a0Japan<\/i>\u2013Australia 2+2 Foreign and Defence Ministerial Consultations<\/i> in Tokyo last week. Building on Tony Abbott\u2019s April commitment<\/a> to hold a bilateral cyber dialogue, the consultation established that Canberra would host the inaugural event before the year\u2019s end. The dialogue will explore common cyber threats and look to strengthen cooperation at the regional and international levels. This news comes on the back of a $400,000 cash injection<\/a> from Japan and the US to the Association of Southeast Asian Nations (ASEAN), which will go toward developing ASEAN\u2019s cybercrime investigative capacities.<\/p>\n

Stateside, the net neutrality saga rages on. Last month, the Federal Communications Commission (FCC) proposed a new set of rules<\/a> to maintain net neutrality, which confusingly seem to allow the \u2018pay-for-priority deals\u2019 that are newly being investigated. This week it has launched an investigation<\/a> into recent deals between entertainment companies and Internet Service Providers (ISPs) to determine if they undermine the principle of net neutrality (whereby web traffic is treated equally by ISPs). The practice of content providers like Netflix agreeing to pay ISPs like Verizon and Comcast to guarantee faster delivery of their products has critics concerned that the Net will be divided into fast and slow lanes according to who can pay what, and that risks stifling competition from start-ups. US Congress have become involved in the issue overnight<\/a>, with the Democrats introducing a bill requiring the FCC to use whatever authority it deems necessary to stop \u2018paid prioritization agreements\u2019.<\/p>\n

If you\u2019re keen to get a better handle on the net neutrality issue, there\u2019s no more coherent, honest and amusing feature<\/a> than the one presented by John Oliver on Last Week Tonight <\/i>in early June. Oliver\u2019s diatribe resulted in the FCC\u2019s online comment system crashing<\/a> after he encouraged \u2018Internet commenters\u2019 to take advantage of the 120-day public consultation period to voice their concerns. If you\u2019re after a more detailed read on net neutrality, n+1<\/i> published an engaging and erudite examination<\/a> in its most recent issue.<\/p>\n

In case you missed it, the Danish Institute for International Studies<\/a> has published a working paper<\/a> that uses Carl von Clausewitz\u2019s On War<\/i> (1832) to explore the role that cyber attacks might play in war. While finding the text to be of great value in understanding that relationship, the author concludes that \u2018the effects are second-tier, especially when compared to conventional military weapons\u2019, with future warfare fought principally in cyberspace deemed unlikely. Rounding out our visit to cyber theory is the recent examination of cyber power<\/a> covered in the ‘Personal Theories of Power’<\/a> series being run by The Bridge<\/a> and the Center for International Maritime Security<\/a> (CIMSEC). The author recognises two forms of cyber power:<\/p>\n

First, cyber power extends and accentuates existing forms of military power. It helps shape the battlefield through intelligence collection and information operations. In some cases it facilitates military effects that were previously only achievable through kinetic means. Second, cyber power is a unique political instrument. Most military professionals are all too familiar with the elements of national power marched out during professional education courses: diplomatic, informational, military, and economic. Cyber power connects to each of these components but also offers new options. Stronger than diplomacy and sanctions, yet not to the level of Clausewitzean war, cyber power expands the spectrum of power projection available to policy-makers.<\/p><\/blockquote>\n

Congratulations to Professor Jill Slay and the team at the Australian Centre for Cyber Security<\/i> which launched this week<\/a> at the Australian Defence Force Academy campus of the University of New South Wales. The centre aims to link cyberwonks across government and academia to focus on five key research groups: \u2018computer\/network security, risk management, international politics\/ethics, law and big data analytics\u2019.<\/p>\n

All manner of regional cyber matters were up for discussion as ICPC\u2019s Kl\u00e9e Aiken was interviewed by ASPI\u2019s Natalie Sambhi for the latest instalment of Sea Control: Asia Pacific podcast for CIMSEC. Have a listen here<\/a>.<\/p>\n

Finally, the Atlantic Council\u2019s Jason Healey has written a call-to-arms<\/a> over at The National Interest<\/i> on the Internet as a lawless Wild West or perhaps a \u2018war-torn, failed Somalia\u2019. Healey registers his concerns that unsustainable cyber practices could jeopardise the Net\u2019s utility to social progress: \u2018How many future Renaissances or Enlightenments will never occur simply because we treated the Internet as a place for crime, spying and warfare (\u201ceveryone does it\u201d after all), rather than the most innovative and transformative product of human minds in five hundred years?\u2019 For those based in Canberra, Healey is in town for the ADM Cyber Security Summit<\/a> later this week and we look forward to welcoming him to ASPI tonight for a presentation and panel discussion on The Global Interconnections of Cyber Risk.<\/i> More information here<\/a>.<\/p>\n

David Lang is an intern in ASPI\u2019s International Cyber Policy Centre.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Cyber policy was on the table at the 5th\u00a0Japan\u2013Australia 2+2 Foreign and Defence Ministerial Consultations in Tokyo last week. Building on Tony Abbott\u2019s April commitment to hold a bilateral cyber dialogue, the consultation established that …<\/p>\n","protected":false},"author":207,"featured_media":12603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[17,679,777,135,662],"class_list":["post-14421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-australia","tag-clausewitz","tag-cyber-maturity","tag-japan","tag-net-neutrality"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Cyber policy was on the table at the 5th\u00a0Japan\u2013Australia 2+2 Foreign and Defence Ministerial Consultations in Tokyo last week. Building on Tony Abbott\u2019s April commitment to hold a bilateral cyber dialogue, the consultation established that ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-18T02:15:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-06-18T23:35:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Lang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Lang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg\",\"width\":1024,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/#primaryimage\"},\"datePublished\":\"2014-06-18T02:15:35+00:00\",\"dateModified\":\"2014-06-18T23:35:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2\",\"name\":\"David Lang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g\",\"caption\":\"David Lang\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/david-lang\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Cyber policy was on the table at the 5th\u00a0Japan\u2013Australia 2+2 Foreign and Defence Ministerial Consultations in Tokyo last week. Building on Tony Abbott\u2019s April commitment to hold a bilateral cyber dialogue, the consultation established that ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-06-18T02:15:35+00:00","article_modified_time":"2014-06-18T23:35:59+00:00","og_image":[{"width":1024,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","type":"image\/jpeg"}],"author":"David Lang","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"David Lang","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/03\/cyber-logo-1024x385.jpg","width":1024,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/#primaryimage"},"datePublished":"2014-06-18T02:15:35+00:00","dateModified":"2014-06-18T23:35:59+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-31\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/cf4ff2cfb006f536b2f5f3b363b47ee2","name":"David Lang","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c76694186876290e4bc2df2ebc462c6?s=96&d=mm&r=g","caption":"David Lang"},"url":"https:\/\/www.aspistrategist.ru\/author\/david-lang\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14421"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/207"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=14421"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14421\/revisions"}],"predecessor-version":[{"id":14430,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/14421\/revisions\/14430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/12603"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=14421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=14421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=14421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}