{"id":17382,"date":"2014-12-10T13:45:05","date_gmt":"2014-12-10T02:45:05","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=17382"},"modified":"2014-12-11T09:46:02","modified_gmt":"2014-12-10T22:46:02","slug":"cyber-wrap-54","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-54\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/a>It\u2019s been a busy week in cyber for ASPI with two publications calling for enhanced cyber cooperation under the auspices of the US\u2013Australia alliance.<\/p>\n In the first, Preserving the Knowledge Edge<\/em><\/a>, Stephan Fr\u00fchling, James Goldrick and Rory Medcalf argue for a strengthening of the C4ISR relationship:<\/p>\n US\u2013Australian C4ISR cooperation will be essential to the success of the US rebalance, but also to Australia\u2019s own immediate security in a strategic environment in which more and more countries operate high-technology platforms that once used to be the preserve of Australia and its allies.<\/p><\/blockquote>\n The priority is to make force structure adjustments that support a greater Australian contribution\u2014with cyber capabilities a clear option.<\/p>\n Building on this idea, in his own contribution to a new ASPI Strategy paper Expanding Alliance<\/em><\/a>, <\/em>Daniel Nichola writes that it \u2018makes sense for Australia to pursue new areas of cooperation with its US ally\u2014and to strengthen existing areas of alliance cooperation\u2014to support the regional position of the US\u2019. Coordinated investment, expanded information sharing and consistent messaging in the cyber domain will help to meet emerging security challenges facing both the US and Australia.<\/p>\n On the softer side of international cooperation, representatives from the US and EU met in Brussels last week for their inaugural cyber dialogue<\/a>. The participants discussed international security and the prospects for conflict in cyberspace while affirming the application o\u00adf international law to cyberspace. Other issues included capacity building, protection of human rights, working groups on cybercrime and cybersecurity, and internet governance developments. One commentator, speaking at the EastWest Institute\u2019s cyber summit<\/a> in Berlin, suggested that \u2018despite recent transatlantic tensions there are numerous possibilities for greater cooperation, and notions of cyber crime, cyber war and cyber espionage well defined\u2019.<\/p>\n Turning now to another area of cooperation, the US and China held the seventh Internet Industry Forum in Washington DC. Co-hosted by Microsoft and the Internet Society of China, the forum<\/a> saw Lu Wei, China\u2019s internet czar<\/a>, call for \u2018win-win cooperation\u2019 and \u2018respect of each other\u2019s cybersovereignty, internet governance, major concerns and cultural differences\u2019. For more on China\u2019s concept of cyber sovereignty, see this article<\/a> on China\u2013US Focus<\/em>. In a separate speech<\/a> at George Washington University, Lu described the differences between the US and China as accounting for only 10% of the picture, but said they reflect a more significant lack of trust that could be improved through more contact. \u2018I often say we can have disagreements, but we should always have communications\u2019 said Lu.<\/p>\n Also on Microsoft, the software multinational is looking more closely at nation-state activities in cyberspace with a recent report<\/a> that aims to prevent the emergence of a world where cyber conflict undermines trust. The authors outline six norms that could define state behaviour and reduce the possibility that ICT products and services are used, abused, or exploited by nation states as part of military operations. Paul Nicholas, senior director at Microsoft\u2019s Trustworthy Computing, argues that \u2018there are certain acts in cyberspace that, whatever the national or strategic aim, nation states should not pursue\u2019.<\/p>\n Meanwhile, Fairfax foreign news editor Chris Zappone explores<\/a> the \u2018anything goes\u2019 nature of cyber competition in relations between Taiwan and the PRC. He leaves readers with a perennial question, \u2018whether the cyber realm is a place where countries can come to agreement, or inevitably a scene of competition and a technological arms race built on faster computers and more devious coding\u2019.<\/p>\n Finally, for all those interested in\u2014and frustrated by\u2014pop-up and pop-under advertisements, its inventor, Ethan Zuckerman, tells the story<\/a> of its development on ReplyAll, a podcast series about the internet. And while he apologises for turning the internet into an ad-supported model, it\u2019s a little too late to chart another course; the price for freedom online is now the tacit permission from users that companies can collect personal data and pay-per-click ads.<\/p>\n Simon Hansen<\/em>\u00a0is a research intern in ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em>. Image courtesy of Flickr user KylaBorg<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":" It\u2019s been a busy week in cyber for ASPI with two publications calling for enhanced cyber cooperation under the auspices of the US\u2013Australia alliance. In the first, Preserving the Knowledge Edge, Stephan Fr\u00fchling, James Goldrick …<\/p>\n","protected":false},"author":214,"featured_media":17383,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[131,52,391,1025,168,484,392],"class_list":["post-17382","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-anzus","tag-china","tag-cyber","tag-european-union","tag-norms","tag-private-sector","tag-taiwan"],"acf":[],"yoast_head":"\n