{"id":22605,"date":"2015-09-24T11:00:57","date_gmt":"2015-09-24T01:00:57","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=22605"},"modified":"2015-09-22T14:51:44","modified_gmt":"2015-09-22T04:51:44","slug":"australias-quiet-cyber-diplomacy-bears-fruit","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/","title":{"rendered":"Australia\u2019s quiet cyber diplomacy bears fruit"},"content":{"rendered":"

\"Australia\u2019s<\/a><\/p>\n

Beyond the occasional doom-laden and shouting headline about the coming \u2018cyber apocalypse\u2019, few column inches are devoted to the cyber policy and international security space. This is a shame, because if you were to look a little closer at our neighbourhood, what you\u2019d see is an undercurrent of effective, useful, middle-power cyber diplomacy quietly humming along.<\/p>\n

If you were to look even closer, you would see Australia driving a hefty part of this work, stepping into a leadership role that largely defies its shoe-string budget.<\/p>\n

On 6 August at the 22nd ASEAN Regional Forum Ministerial meeting in Kuala Lumpur, Malaysia, a deceptively small, but meaningful step forward was made to help ensure stability in cyberspace and our region.<\/p>\n

Among the many<\/a> agenda items that were reaffirmed, welcomed, underlined and adopted by the gaggle of foreign ministers and special representatives in the Malaysian capital was a joint Australian-Malaysian-Russian proposed ICT Work Plan<\/a>.<\/p>\n

The \u2018ARF Work Plan on Security of and in the Use of Information and Communications Technologies\u2019, often referred to by its pithier title \u2018the Work Plan\u2019, is the culmination of two years of quiet, Australian-led efforts by the Department of Foreign Affairs and Trade. This is a significant achievement, and it’s worth looking at how<\/em> it was done before we turn to what<\/em> was done. First, it builds on a relationship we\u2019ve been developing for years<\/a>\u2014those sorts of things don’t happen overnight.<\/p>\n

Second, the Work Plan was negotiated in partnership with Russia and Malaysia, who\u2014to put it mildly\u2014share different perspectives on how the internet should be managed compared to Australia. Australia\u2019s liberal approach to internet freedom is distant from Russia’s government-controlled approach. But through trust and intelligent leadership, all parties came together to agree on a program of work that will boost regional stability. It turns out that making practical progress doesn’t require agreement on all aspects of internet governance.<\/p>\n

In diplo-speak, the aim of the Work Plan is to \u2018promote a peaceful, secure, open and cooperative ICT environment and to prevent conflict and crises by developing trust and confidence between states.\u2019 Beyond the string of positive adjectives, the Work Plan is full of ideas to help prevent ICT-related squabbles from breaking out (either online or in the physical world), and if they do, it also contains plans to quell tensions and re-build trust amongst ARF member states.<\/p>\n

Ideas outlined in the Work Plan include the cross-border information sharing of information on cyber threats, the types of policies that can be used to tackle these threats and the different national organisational set-ups that are in place to do so.<\/p>\n

Included among its many goals is the intention to clear up confused terminology between countries\u2014for instance, what the term \u2018cyberspace\u2019 means to different people\u2014and support the establishment of rules, norms and principals of responsible state behaviour (what \u2018goes\u2019 and what doesn\u2019t online).<\/p>\n

Another key aim of the Plan is to develop a regional point of contact network to enable de-escalation talks when cyber issues balloon to the level of national security incidents. This list of \u2018who to call when things get hairy\u2019 is needed to help clarify from where attacks are originating and underpins wider confidence building measures.<\/p>\n

As a Forum, the ARF is almost purpose built for negotiating cyber issues and through its practical workshops<\/a> has emerged as the leading regional body that enables just that. While in the past the Australian government has voiced<\/a> a general preference for working through forums such as the East Asia Summit, DFAT has seen the benefits of pursuing our cyber agenda through the larger, more hands-on regional body.<\/p>\n

Given the melting pot of cyber perspectives and approaches in the Asia\u2013Pacific, fewer voices rather than more may seem like an easier, more amenable route to achieve harmony. But this approach overlooks the rationale behind transparency and confidence building measures. It\u2019s not those who we agree with that we need to build trust with.<\/p>\n

International cyber policy will continue to be seen as a niche issue, but it\u2019s a diplomatic area in which Australia does well, and one that the region has let us pick up the ball and run with.<\/p>\n

Our friends in North Asia, Europe and North America have already identified the diplomatic leadership opportunity the cyber policy elements of international security presents, devoting hefty budgets and resources towards it; often targeted at our very neighbourhood.<\/p>\n

The opportunity exists for the government to maintain Australia\u2019s leadership role and build on the strong foundations we have laid though the ICT Work Plan and further the diplomatic work we\u2019ve carried out in the past<\/a>. It will be interesting to see if there\u2019s recognition of this opportunity in Australia\u2019s impending cyber security strategy<\/a> and if there will be any new resourcing to bolster our emerging leadership role.<\/p>\n","protected":false},"excerpt":{"rendered":"

Beyond the occasional doom-laden and shouting headline about the coming \u2018cyber apocalypse\u2019, few column inches are devoted to the cyber policy and international security space. This is a shame, because if you were to look …<\/p>\n","protected":false},"author":133,"featured_media":22606,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[189,391,95,294,102,163],"acf":[],"yoast_head":"\nAustralia\u2019s quiet cyber diplomacy bears fruit | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Australia\u2019s quiet cyber diplomacy bears fruit | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Beyond the occasional doom-laden and shouting headline about the coming \u2018cyber apocalypse\u2019, few column inches are devoted to the cyber policy and international security space. This is a shame, because if you were to look ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-24T01:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-09-22T04:51:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/7939040382_00daf581e5_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Woodall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Woodall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/7939040382_00daf581e5_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/7939040382_00daf581e5_z.jpg\",\"width\":640,\"height\":427,\"caption\":\"Australia\u2019s quiet cyber diplomacy bears fruit\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/\",\"name\":\"Australia\u2019s quiet cyber diplomacy bears fruit | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/#primaryimage\"},\"datePublished\":\"2015-09-24T01:00:57+00:00\",\"dateModified\":\"2015-09-22T04:51:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Australia\u2019s quiet cyber diplomacy bears fruit\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556\",\"name\":\"Jessica Woodall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g\",\"caption\":\"Jessica Woodall\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Australia\u2019s quiet cyber diplomacy bears fruit | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/","og_locale":"en_US","og_type":"article","og_title":"Australia\u2019s quiet cyber diplomacy bears fruit | The Strategist","og_description":"Beyond the occasional doom-laden and shouting headline about the coming \u2018cyber apocalypse\u2019, few column inches are devoted to the cyber policy and international security space. This is a shame, because if you were to look ...","og_url":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-09-24T01:00:57+00:00","article_modified_time":"2015-09-22T04:51:44+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/7939040382_00daf581e5_z.jpg","type":"image\/jpeg"}],"author":"Jessica Woodall","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Jessica Woodall","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/7939040382_00daf581e5_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/09\/7939040382_00daf581e5_z.jpg","width":640,"height":427,"caption":"Australia\u2019s quiet cyber diplomacy bears fruit"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/","url":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/","name":"Australia\u2019s quiet cyber diplomacy bears fruit | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/#primaryimage"},"datePublished":"2015-09-24T01:00:57+00:00","dateModified":"2015-09-22T04:51:44+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/australias-quiet-cyber-diplomacy-bears-fruit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Australia\u2019s quiet cyber diplomacy bears fruit"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/9bd8dbe30fb509c3b05d23eebc948556","name":"Jessica Woodall","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68050b949391d6c3e7143b759a15ebaa?s=96&d=mm&r=g","caption":"Jessica Woodall"},"url":"https:\/\/www.aspistrategist.ru\/author\/jessica-woodall\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22605"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=22605"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22605\/revisions"}],"predecessor-version":[{"id":22607,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22605\/revisions\/22607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/22606"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=22605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=22605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=22605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}