{"id":18051,"date":"2015-01-28T14:56:50","date_gmt":"2015-01-28T03:56:50","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=18051"},"modified":"2015-01-29T12:40:35","modified_gmt":"2015-01-29T01:40:35","slug":"cyber-wrap-59","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"\"<\/a><\/figure>\n

The use of social media by extremist groups continues to trouble policymakers and police forces across the globe. The sophisticated use of online platforms by groups such as ISIS have spurred governments in Europe to call on US tech companies to pre-emptively filter<\/a> terrorist-related material. \u2018Online jihad 3.0\u2019 has drawn serious government concern about freedom of speech, as well as liability, and more creative solutions<\/a> might be prudent. For instance, social media users in Japan<\/a> have taken to mocking ISIS\u2019 attempt to hijack Japanese hashtags following the kidnapping of two Japanese citizens.<\/p>\n

Although its links to ISIS remain dubious, the self-proclaimed Cyber Caliphate has made Malaysia Airlines<\/a> its latest high-profile victim by hacking the company\u2019s website. While such attacks can be brushed off as a cosmetic inconvenience, the hacks can have serious consequences for a company\u2019s bottom line and reputation, as well as for consumer confidence. More serious cases have included hacks of CENTCOM<\/a>, the Tennessee Valley Authority, and the White House<\/a>. And although directed at third or fourth party platforms<\/a>, those attacks fed at fear of cyber vulnerability in the military and energy infrastructure. It\u2019s critical that supply-chain and third-party cyber security is considered when assessing cyber risk and such high profile attacks highlight the tricky cost\u2013benefit balance of trusting one\u2019s public face to external platforms.<\/p>\n

While the controversial NETmundial Initiative<\/a> launch was scrapped from this year\u2019s World Economic Forum meeting in Davos, Internet Governance<\/a> and cyber policy<\/a> remained prominently on the agenda. With last year\u2019s string of hacks against major corporations, that top-level executives now take notice of cyber issues is an expected, and much needed<\/a>, development. However the rights and responsibilities of businesses in regards to security in cyberspace remain murky. In response, major banks<\/a> represented at Davos called for free reign to actively defend themselves against cyber criminals\u2014a tactic with questionable merits<\/a>.<\/p>\n

Some remain sceptical about North Korea\u2019s culpability<\/a> in the Sony hack, but Dennis Rodman\u2019s defensive prowess might not extend to cyberspace. Regardless of attribution, state reactions should be watched closely: each escalation of tension could set a dangerous precedent<\/a> for future cyber activities.<\/p>\n

Speaking of which, the United States is certainly watching the cyber policy space closely, with Chairman of the Joint Chiefs of Staff General Martin Dempsey<\/a> highlighting cybersecurity among his highest priorities and calling for information-sharing legislation. This echoed the calls made by his Commander-in-Chief the previous evening during the annual State of the Union Address<\/a>. The President urged lawmakers to \u2018finally pass legislation we need to better meet the evolving threat of cyber attacks\u2019 and integrate \u2018intelligence to combat cyber threats, just as we have done to combat terrorism.\u2019 With the US continuing the push for major cyber initiatives, it\u2019s prudent to ask whether Australia is keeping up\u2026<\/p>\n

At a recent event at the Brookings Institute, Foreign Minister Julie Bishop<\/a> spoke of cyber as a shared challenge for the US and Australia. At the same event US Undersecretary for Defense for Policy Christine Wormuth<\/a> praised the US\u2013Australia alliance, including cooperation including \u2018a variety of initiatives in the cyber domain.\u2019 On Australia\u2019s cyber activism, a recent article<\/a> went so far as to suggest that Australia has launched \u2018cyber-weapons in global counter-terrorist operations.\u2019 Although this allegation isn\u2019t fully fleshed out, there\u2019re plenty of signs<\/a> that Australia is highly capable on the technical front.<\/p>\n

However, on thE policy-side ICPC analyst Jessica Woodall<\/a> suggests \u2018we are falling behind our \u00adallies.\u2019 Although the launch of a cybersecurity review is a solid first step<\/a>, she argues that \u2018not having an updated strategy inhibits us from forward planning\u2019 and under-defined roles and responsibilities create confusion both within government and for the private sector and international partners.<\/p>\n

Kl\u00e9e Aiken<\/em><\/a> is an analyst in\u00a0ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Image courtesy of Twitter user @JulieBishopMP<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

The use of social media by extremist groups continues to trouble policymakers and police forces across the globe. The sophisticated use of online platforms by groups such as ISIS have spurred governments in Europe to …<\/p>\n","protected":false},"author":153,"featured_media":18052,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[95,713,728,731,86],"class_list":["post-18051","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber-security","tag-cyberattack","tag-hacking","tag-internet-governance","tag-north-korea"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The use of social media by extremist groups continues to trouble policymakers and police forces across the globe. The sophisticated use of online platforms by groups such as ISIS have spurred governments in Europe to ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-28T03:56:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-29T01:40:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/B75mtBSCUAE5RvQ.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/B75mtBSCUAE5RvQ.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/B75mtBSCUAE5RvQ.jpg\",\"width\":640,\"height\":426},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/#primaryimage\"},\"datePublished\":\"2015-01-28T03:56:50+00:00\",\"dateModified\":\"2015-01-29T01:40:35+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The use of social media by extremist groups continues to trouble policymakers and police forces across the globe. The sophisticated use of online platforms by groups such as ISIS have spurred governments in Europe to ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-01-28T03:56:50+00:00","article_modified_time":"2015-01-29T01:40:35+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/B75mtBSCUAE5RvQ.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/B75mtBSCUAE5RvQ.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/01\/B75mtBSCUAE5RvQ.jpg","width":640,"height":426},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/#primaryimage"},"datePublished":"2015-01-28T03:56:50+00:00","dateModified":"2015-01-29T01:40:35+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-59\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/18051"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=18051"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/18051\/revisions"}],"predecessor-version":[{"id":18073,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/18051\/revisions\/18073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/18052"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=18051"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=18051"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=18051"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}