{"id":23326,"date":"2015-11-11T11:25:41","date_gmt":"2015-11-11T00:25:41","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=23326"},"modified":"2015-11-11T16:52:55","modified_gmt":"2015-11-11T05:52:55","slug":"cyber-wrap-96","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"\"<\/a>News this week that companies bidding to build Australia\u2019s next generation of submarines<\/a> could be targets of Russian and Chinese hackers hasn\u2019t surprised anyone. But it remains to be seen if Defence will adopt the suggestion of former Army Chief Peter Leahy and Senator Nick Xenophon<\/a> to return to typewriters and couriers to transmit classified information.<\/p>\n

What was surprising was the revelation that contractors to the US Defense Information Systems Agency (DISA) outsourced work on classified US military networks to uncleared Russian programmers<\/a>. The two firms involved, NetCracker and Computer Sciences Corporation, have both denied any liability, but have agreed to pay a combined US$12.75 million in civil penalties to close the investigation by the US Justice Department. The original whistle blower complaint, made in 2011 but withheld until now, stated that numerous viruses had been loaded onto DISA network by the Russian programmers.<\/p>\n

This experience hasn\u2019t caused the US to reconsider outsourcing offensive cyber capabilities to private industry partners. Defense One<\/em> reports<\/a> that a US$460 million contract will be offered to provide services to US Cyber Command including planning \u2018cyber fires\u2019 and \u2018cyberspace joint munition\u2019 assessments. The US is increasingly open about its plans for offensive cyber capabilities, however other countries generally remain reticent to discuss their plans for this sensitive capability development area.<\/p>\n

The hack of Sony last year unearthed \u00a0long-standing\u00a0questions<\/a> about what constitutes the use of force in cyberspace, and what a proportionate response to a cyber incident may be. Last week members of the US House Intelligence Committee\u2019s NSA and Cybersecurity Subcommittee requested<\/a> that the US Government pursue the development of binding international rules for cyberspace, stating that it\u2019s in the \u2018best interests of all nations\u2019 to have normative behaviour in cyberspace laid out in a cyber treaty, including answering questions regarding use of force in cyberspace.<\/p>\n

While not legally binding, the next edition of Tallinn Manual<\/a> will seek to address those same questions. The successor to the 2013 manual<\/a>, which focused on the application of international law to cyberspace during war,<\/em> the 2016 edition will reportedly focus on legal issues regarding cyber incidents below the threshold of cyber warfare. Those incidents are more common between states but harder to respond to in accordance with international law, and without escalating conflict unnecessarily.<\/p>\n

Last week saw the release of the full text of the Trans-Pacific Partnership<\/a> (TPP), which as part of its broad trade growth and liberalisation agenda seeks to create the conditions for the growth of digital trade in the Pacific. The TPP mandates<\/a> the use and acceptance of electronic signatures, paperless trading and specifically restricts data sovereignty and the ability of governments to demand software source code as a condition of sale. David Fidler from the Council on Foreign Relations has provided a good summary of the e-commerce chapter of the agreement<\/a>. He notes that the TPP provides a possible model for future agreements that preserves an open and global internet, and possibly counterbalances Chinese influence.<\/p>\n

The struggle to balance privacy concerns, government data collection requirements \u00a0and commercial continues this week. In the UK, the Government has released a bill to update its existing surveillance and oversight legislation<\/a>, within which the requirement for ISPs and telcos to retain two years of records on individual\u2019s internet activity has garnered the most attention<\/a>. Australia\u2019s own metadata retention scheme may be delayed due to the inability of most providers to actually collect and store the information, but our intelligence watchdog, the Inspector General of Intelligence and Security, has reportedly begun to recruit analysts to oversee intelligence agency compliance with the scheme<\/a>. On the other side of the scales, in Belgium Facebook has been ordered to stop tracking internet use of non-Facebook account holders<\/a> who use Facebook or be hit with a daily fine of \u20ac250,000.<\/p>\n","protected":false},"excerpt":{"rendered":"

News this week that companies bidding to build Australia\u2019s next generation of submarines could be targets of Russian and Chinese hackers hasn\u2019t surprised anyone. But it remains to be seen if Defence will adopt the …<\/p>\n","protected":false},"author":364,"featured_media":23329,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[52,391,1051,163,500,786],"class_list":["post-23326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-china","tag-cyber","tag-future-submarine-project","tag-russia","tag-surveillance","tag-tpp"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"News this week that companies bidding to build Australia\u2019s next generation of submarines could be targets of Russian and Chinese hackers hasn\u2019t surprised anyone. But it remains to be seen if Defence will adopt the ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-11T00:25:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-11-11T05:52:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/5822279836_484e945025_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/5822279836_484e945025_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/5822279836_484e945025_z.jpg\",\"width\":640,\"height\":360},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/#primaryimage\"},\"datePublished\":\"2015-11-11T00:25:41+00:00\",\"dateModified\":\"2015-11-11T05:52:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"News this week that companies bidding to build Australia\u2019s next generation of submarines could be targets of Russian and Chinese hackers hasn\u2019t surprised anyone. But it remains to be seen if Defence will adopt the ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-11-11T00:25:41+00:00","article_modified_time":"2015-11-11T05:52:55+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/5822279836_484e945025_z.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/5822279836_484e945025_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/11\/5822279836_484e945025_z.jpg","width":640,"height":360},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/#primaryimage"},"datePublished":"2015-11-11T00:25:41+00:00","dateModified":"2015-11-11T05:52:55+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-96\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23326"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=23326"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23326\/revisions"}],"predecessor-version":[{"id":23345,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/23326\/revisions\/23345"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/23329"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=23326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=23326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=23326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}