{"id":18793,"date":"2015-03-04T14:30:19","date_gmt":"2015-03-04T03:30:19","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=18793"},"modified":"2015-03-05T09:22:16","modified_gmt":"2015-03-04T22:22:16","slug":"cyber-wrap-63","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>The cyber element has been a staple of global threat assessments for quite some time. Last week\u2019s Worldwide Threat Assessment<\/a> delivered by US Director of National Intelligence James Clapper was no exception. Testifying at the Senate Armed Services Committee, Clapper explicitly sidelined the often-hyped \u2018Cyber Armageddon\u2019 (aliases: Cyber Pearl Harbor, Cyber 9\/11) lingo, suggesting instead that the greatest cyber threat to the United States is \u2018an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on U.S. economic competitiveness and national security\u2019.<\/p>\n

That assessment comes as Washington ramps up its efforts concerning cyberspace. The President announced a range of executive actions in the lead-up to the State of the Union Address<\/a> including the formation of a new agency<\/a> to integrate intelligence about cyber threats, Congress<\/a> is poised to finally move on much-needed legislation, the CIA<\/a> is integrating cyber into its mission, the White House has proposed a new online privacy bill<\/a> and the FCC has approved net neutrality<\/a> rules.<\/p>\n

Australia has had its own, somewhat more modest, successes<\/a> recently, including the announcement of a 6-month cybersecurity review. The review has the potential be a great first step<\/a> to reinvigorate national cyber efforts.<\/p>\n

One primary issue the review will have to address is information sharing with and between the government and the private sector, a pervasive challenge for governments and businesses across the globe. The Department of Prime Minister & Cabinet can look to an interesting new report from the Atlantic Council\u2019s Cyber Statecraft Initiative for some ideas: Breaking the Cyber-Sharing Logjam<\/a> notes information sharing as one of the last great barter economies, and calls for market solutions to bridge the trust deficit and boost information sharing.<\/p>\n

But even if the review hits the info sharing nail on the head, will it be enough to ensure a safe, secure, and trusted cyber environment for Australia?<\/p>\n

Greg Austin<\/a>, visiting professor at the Australian Centre for Cyber Security, has suggested the government is overlooking the important link between national security, cybersecurity, and the digital economy. Austin writes that \u2018a cybersecurity strategy without a plan for globally competitive innovation in the digital economy is like building an ever-stronger wall while the building it protects gradually falls into disrepair\u2019.<\/p>\n

While the boom in cyber terms has resulted in some comic hashtags<\/a>, twitter handles<\/a>, and quizzes<\/a>, there are serious consequences to the use, misuse, and overuse of the term \u2018cyber<\/a>\u2019. Chief Information Security Office at Yahoo, Alex Stamos, has suggested that cyber-buzzwords are short-circuiting a debate on an important issue while Michael McNerney, former cyber policy adviser in the Office of the Secretary of Defense, has suggested the term \u2018means nothing,\u2019 covering everything from information security to robotics, virtual reality to cybersex. Jason Healey has suggested<\/a>\u00a0that the misuse of terms and clich\u00e9s \u2018accurately reflects the lack of deep thinking\u2019 in policy circles. But there are signs that the debate is maturing. With the Worldwide Threat Assessment as an exemplar, there are signs that officials are increasingly eschewing the use of the term \u2018cyberwar<\/a>.\u2019<\/p>\n

On the other hand, if you aren\u2019t sick of the proliferation of cyber, CSI:Cyber is finally hitting the small-screen. Just don\u2019t get your hopes up as reviews have called the latest in the CSI franchise \u2018a particularly tired exercise<\/a>.\u2019<\/p>\n

Kl\u00e9e Aiken<\/em><\/a> is an analyst in\u00a0ASPI\u2019s\u00a0<\/em>International Cyber Policy Centre<\/em><\/a>. Edited image courtesy of Flickr user A Syn<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

The cyber element has been a staple of global threat assessments for quite some time. Last week\u2019s Worldwide Threat Assessment delivered by US Director of National Intelligence James Clapper was no exception. Testifying at the …<\/p>\n","protected":false},"author":153,"featured_media":18795,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[176,391,95],"class_list":["post-18793","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-barack-obama","tag-cyber","tag-cyber-security"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The cyber element has been a staple of global threat assessments for quite some time. Last week\u2019s Worldwide Threat Assessment delivered by US Director of National Intelligence James Clapper was no exception. Testifying at the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-04T03:30:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-04T22:22:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/1698965040_6de0b33d1f_b.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"705\" \/>\n\t<meta property=\"og:image:height\" content=\"352\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kl\u00e9e Aiken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kl\u00e9e Aiken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/1698965040_6de0b33d1f_b.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/1698965040_6de0b33d1f_b.jpg\",\"width\":705,\"height\":352},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/#primaryimage\"},\"datePublished\":\"2015-03-04T03:30:19+00:00\",\"dateModified\":\"2015-03-04T22:22:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f\",\"name\":\"Kl\u00e9e Aiken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g\",\"caption\":\"Kl\u00e9e Aiken\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The cyber element has been a staple of global threat assessments for quite some time. Last week\u2019s Worldwide Threat Assessment delivered by US Director of National Intelligence James Clapper was no exception. Testifying at the ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-03-04T03:30:19+00:00","article_modified_time":"2015-03-04T22:22:16+00:00","og_image":[{"width":705,"height":352,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/1698965040_6de0b33d1f_b.jpg","type":"image\/jpeg"}],"author":"Kl\u00e9e Aiken","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Kl\u00e9e Aiken","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/1698965040_6de0b33d1f_b.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/03\/1698965040_6de0b33d1f_b.jpg","width":705,"height":352},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/#primaryimage"},"datePublished":"2015-03-04T03:30:19+00:00","dateModified":"2015-03-04T22:22:16+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-63\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/0b2cf82af9c5ffa5a44b13daf90f3f9f","name":"Kl\u00e9e Aiken","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f5557396a24a919df3f7396c9b60a7e?s=96&d=mm&r=g","caption":"Kl\u00e9e Aiken"},"url":"https:\/\/www.aspistrategist.ru\/author\/klee-aiken\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/18793"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=18793"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/18793\/revisions"}],"predecessor-version":[{"id":18808,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/18793\/revisions\/18808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/18795"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=18793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=18793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=18793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}