{"id":15087,"date":"2014-08-06T14:30:39","date_gmt":"2014-08-06T04:30:39","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=15087"},"modified":"2014-08-07T11:23:58","modified_gmt":"2014-08-07T01:23:58","slug":"cyber-wrap-38","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"Anonymous<\/a><\/figure>\n

First up this week, Australia\u2019s mandatory data-retention scheme is inching closer to reality. The National Security Committee of Cabinet <\/span>reportedly<\/a> signed off on laws that will compel internet service providers to keep customer data for two years. Apart from counter-terrorism (new counter-terrorism <\/span>measures<\/a> (PDF) were announced yesterday), Tony Abbott <\/span>said<\/a> on ABC Radio this morning that data storage could also be used to fight \u2018general\u2019 crimes.<\/span><\/p>\n

Major telcos have raised concerns about consumers being slugged with extra fees as service providers pass on the cost of compliance to their customers\u2014a kind of \u2018surveillance tax\u2019<\/a>. Australia\u2019s second largest Internet Service Provider, iiNet, last week told<\/a> (PDF) a Senate committee hearing on the comprehensive revision of Telecommunications (Interception and Access) Act 1979 that it\u2019s uncomfortable with mandatory data-retention regimes turning commercial companies into \u2018unwilling agents of the state\u2019.<\/p>\n

On the research front, Assistant Minister for Defence Stuart Robert met<\/a> with Dr Reginald Brothers from the US Department of Homeland Security last week to discuss cybersecurity cooperation and national security research. \u2018The discussions with the US delegation have proved very valuable in informing our national security science and technology effort\u2019 Robert said. For a bit of context, in 2006, Australia and the US signed<\/a> (PDF) a Treaty on Cooperation in Science and Technology<\/a> (PDF), which extended and amended an earlier agreement in 1968.<\/p>\n

In Gaza, hacktivist group Anonymous continues<\/a> to protest Israel\u2019s military incursion by taking down a number of government sites, including those run by Mossad and the Israel Defense Forces. On Monday, the @AnonymousGlobo Twitter account announced<\/a> \u2018Yes, why not a cyberwar?\u2019 while simultaneously releasing usernames and passwords for Israeli routers. The intensity of distributed denial of service attacks usually fluctuates in response to significant events on the ground, but they rarely have a lasting impact. Even though attacks haven\u2019t translated into major political costs to the Israeli government, that hasn\u2019t deterred cyber attacks, and both the low barriers to entry and the cloak of anonymity mean they\u2019re likely to continue.<\/p>\n

Meanwhile Russia has brought Crimea more firmly into the fold this week. According to Renesys<\/a>, a company that monitors Internet traffic, Crimean internet service providers have started sending traffic through Russia on a new underwater Internet cable<\/a> across the Kerch Strait. On the strategic level, Doug Madory for Renesys wrote<\/a> that \u2018there is no turning back now in the process of Russia\u2019s infrastructure consolidation\u2019, and its growing control of Crimea. At the operational level, Leo Mirani in an article<\/a> on Quartz said that \u2018creating a domestic connection ensures security from snoopers and makes it faster for Crimean internet users to access content hosted in Russia.\u2019<\/p>\n

Japan\u2019s 2014 Defence White Paper\u2014released on Tuesday\u2014is available<\/a> online in English, and has a good overview of trends occurring in cyberspace (Chapter 2, Section 5). More broadly, ABC\u2019s North Asia correspondent Matthew Carney says the paper expresses<\/a> \u2018strong concern about China’s military build-up and its assertive moves in both the East and South China seas\u2019.<\/p>\n

What is the best means to protect data, and is it legal to \u2018actively\u2019 protect it? Jessica Woodall explores the \u2018legislative waters surrounding hacking back\u2019 here<\/a> on The Strategist<\/i>. On the ABC, Nawaf Bitar argues<\/a> that advanced cyber attackers necessitate an active defence, and \u2018the days of the castle and moat strategy, where companies invest heavily in large security stacks to block perimeter attacks should be long gone.\u2019<\/p>\n

The lead article<\/a> in the current edition of Survival, <\/i>\u2018Cyberwarfare and Sino-American crisis instability\u2019, explores how cyberwar would play out in an armed conflict between the great powers. The article addresses a debate around whether the prospect of cyber warfare, to which the US and China are increasingly committed, makes one side, or both, more inclined to strike first. In the end, \u2018the fear of war is trumped by fear of losing\u2019 write Gompert and Libicki. Also on cyberwar, Jason Healey says<\/a> on DefenseNews<\/i> that \u2018the Internet is a fierce domain and conflicts are common between nations. But deterrence has kept a lid on the worst.\u2019<\/p>\n

Finally, ICPC celebrated its first birthday last week! For the uninitiated, here\u2019s a video<\/a> from ICPC\u2019s Director and our website<\/a>.<\/p>\n

Simon Hansen is an intern in ASPI\u2019s International Cyber Policy Centre. Image courtesy of Flickr user Jacob Davis<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

First up this week, Australia\u2019s mandatory data-retention scheme is inching closer to reality. The National Security Committee of Cabinet reportedly signed off on laws that will compel internet service providers to keep customer data for …<\/p>\n","protected":false},"author":214,"featured_media":15106,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[52,391,95,713,750,240,714,31],"class_list":["post-15087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-china","tag-cyber","tag-cyber-security","tag-cyberattack","tag-data-retention","tag-israel","tag-ukraine","tag-united-states"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"First up this week, Australia\u2019s mandatory data-retention scheme is inching closer to reality. The National Security Committee of Cabinet reportedly signed off on laws that will compel internet service providers to keep customer data for ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-06T04:30:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-08-07T01:23:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Cyber-wrap-38.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Hansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Hansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Cyber-wrap-38.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Cyber-wrap-38.jpg\",\"width\":640,\"height\":426,\"caption\":\"Anonymous #36\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/#primaryimage\"},\"datePublished\":\"2014-08-06T04:30:39+00:00\",\"dateModified\":\"2014-08-07T01:23:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a\",\"name\":\"Simon Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g\",\"caption\":\"Simon Hansen\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"First up this week, Australia\u2019s mandatory data-retention scheme is inching closer to reality. The National Security Committee of Cabinet reportedly signed off on laws that will compel internet service providers to keep customer data for ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2014-08-06T04:30:39+00:00","article_modified_time":"2014-08-07T01:23:58+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Cyber-wrap-38.jpg","type":"image\/jpeg"}],"author":"Simon Hansen","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Simon Hansen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Cyber-wrap-38.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2014\/08\/Cyber-wrap-38.jpg","width":640,"height":426,"caption":"Anonymous #36"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/#primaryimage"},"datePublished":"2014-08-06T04:30:39+00:00","dateModified":"2014-08-07T01:23:58+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-38\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/eada7b8852348a8965f94bb6086ad45a","name":"Simon Hansen","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe0cd200df5391d8c047b6d99c49aaf5?s=96&d=mm&r=g","caption":"Simon Hansen"},"url":"https:\/\/www.aspistrategist.ru\/author\/simon-hansen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15087"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=15087"}],"version-history":[{"count":11,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15087\/revisions"}],"predecessor-version":[{"id":15141,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/15087\/revisions\/15141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/15106"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=15087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=15087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=15087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}