{"id":26385,"date":"2016-05-04T13:02:09","date_gmt":"2016-05-04T03:02:09","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=26385"},"modified":"2016-05-04T13:02:09","modified_gmt":"2016-05-04T03:02:09","slug":"cyber-wrap-118","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
\"\"<\/figure>\n

While last night\u2019s Federal Budget is still being picked apart, it seems<\/span> that Defence will be funding the lion\u2019s share<\/span><\/a> of the new cyber priorities announced as part of the recent Cyber Security Strategy. Of the $230 million announced as part of the Strategy, money reallocated from Defence will cover $122 million. A further $38 million was already committed as part of the National Innovation and Science Agenda, and the remaining cash comes from nine other portfolios. Defence will get $51 million of this money back to fund the relocation of the Australian Cyber Security Centre.<\/span><\/p>\n

The World Summit on the Information Society forum (WSIS) has gathered in Geneva this week for its annual dialogue. WSIS, organised by the<\/span> ITU<\/span><\/a>,<\/span> UNESCO<\/span><\/a>,<\/span> UNDP<\/span><\/a> and<\/span> UNCTAD<\/span><\/a>, is<\/span> the \u2018largest annual gathering of the ICT for development community\u2019<\/span><\/a>. The 2016 forum is focusing on how information technologies can facilitate the implementation of the UN\u2019s Sustainable Development Goals, with participation from representatives of government, the private sector, civil society, academia and international organisations. The forum wraps up on 6 May, so check in next week for some analysis of the outcomes.<\/span><\/p>\n

It was at last year\u2019s WSIS preparatory meeting that India declared its support for<\/span> multi\u2011stakeholder governance of the Internet<\/span><\/a>, which seeks to give governments, the private sector and civil society an equal voice in decision-making related to the Internet\u2019s governance. India previously advocated a<\/span> multilateral approach<\/span><\/a>, under which governments operating through institutions like the UN are the ultimate decision-makers. However the<\/span> communique<\/span><\/a> from last month\u2019s Russia\u2013China\u2013India foreign minister\u2019s meeting makes it seem that India has now either jumped back on the multilateral bandwagon, or the two ministries responsible (External Affairs, and Communications and Information Technology) are pushing separate agendas. While the communique is filled with boiler plate language of the kind that Russia and China are well known for, for India it<\/span> continues a history of indecision on this important issue<\/span><\/a>.<\/span><\/p>\n

Russia and China also held their first bilateral<\/span> \u2018Cyberspace Development and Security Forum\u2019<\/span><\/a> on Wednesday last week. A significant part of the agenda was devoted to discussing the reliance on foreign IT firms and exploring possible ways to reduce the exposure to this \u2018hidden danger\u2019.<\/span> One suggestion<\/span><\/a> that China\u2019s Cyberspace Administration had previously made was for the government to buy a financial stake in Chinese IT firms and take a seat on their boards.<\/span><\/p>\n

The University of Sydney\u2019s<\/span> Quantum Control Laboratory<\/span><\/a>\u2019s researchhas been boosted by a grant of an undisclosed sum from the US<\/span> Intelligence Advanced Research Projects Activity<\/span><\/a>, an organisation within the Office of the Director of National Intelligence. Across town, UNSW received a $26 million boost from the<\/span> National Innovation and Science Agenda<\/span><\/a> earlier this year, making Sydney an emerging centre for quantum computing research.<\/span><\/p>\n

In Thailand, one of eight dissidents arrested by the junta<\/span> last week<\/span><\/a> and charged under the country\u2019s Computer Crimes Act for<\/span> l\u00e8se-majest\u00e9<\/span><\/i><\/a>, has<\/span> claimed that the police showed him screenshots<\/span><\/a> of his Facebook Messenger chats during interviews. While it seems the dissidents believed they were safe using Facebook, Facebook\u2019s messaging service is<\/span> encrypted between the user\u2019s device and Facebook<\/span><\/a>, rather than being encrypted end-to-end, which means Facebook can provide private messages to a government if required by law. The Thai junta has been<\/span> engaged in a struggle with activists<\/span><\/a> online since the 2014 coup, and has previously requested help from service providers including Facebook to filter content that opposes the junta, and<\/span> once briefly blocked Facebook access<\/span><\/a> in the country.<\/span><\/p>\n

And finally, several months after<\/span> Wired<\/span><\/a> pointed to Australian businessman Craig Wright as the hitherto unknown founder of cryptocurrency BitCoin has<\/span> confirmed<\/span><\/a> that he indeed created the cryptocurrency and the<\/span> blockchain<\/span><\/a> technology behind it. Some currency experts<\/span> have expressed doubts<\/span><\/a> about Wright\u2019s claim, which he attempted to prove by using digital signatures known to be owned by BitCoin\u2019s founder,<\/span> but doubts remain<\/span><\/a>. While Wright\u2019s leadership may help<\/span> resolve a row over between the BitCoin community<\/span><\/a> over how to expand the currency, he may be hesitant to undertake such a role. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

While last night\u2019s Federal Budget is still being picked apart, it seems that Defence will be funding the lion\u2019s share of the new cyber priorities announced as part of the recent Cyber Security Strategy. Of …<\/p>\n","protected":false},"author":364,"featured_media":26387,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[686,391,95],"class_list":["post-26385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-bitcoin","tag-cyber","tag-cyber-security"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"While last night\u2019s Federal Budget is still being picked apart, it seems that Defence will be funding the lion\u2019s share of the new cyber priorities announced as part of the recent Cyber Security Strategy. Of ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-04T03:02:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/10867597623_83a10e6a84_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/10867597623_83a10e6a84_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/10867597623_83a10e6a84_z.jpg\",\"width\":640,\"height\":427},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/#primaryimage\"},\"datePublished\":\"2016-05-04T03:02:09+00:00\",\"dateModified\":\"2016-05-04T03:02:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"While last night\u2019s Federal Budget is still being picked apart, it seems that Defence will be funding the lion\u2019s share of the new cyber priorities announced as part of the recent Cyber Security Strategy. Of ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-05-04T03:02:09+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/10867597623_83a10e6a84_z.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/10867597623_83a10e6a84_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/05\/10867597623_83a10e6a84_z.jpg","width":640,"height":427},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/#primaryimage"},"datePublished":"2016-05-04T03:02:09+00:00","dateModified":"2016-05-04T03:02:09+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-118\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26385"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=26385"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26385\/revisions"}],"predecessor-version":[{"id":26404,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/26385\/revisions\/26404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/26387"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=26385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=26385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=26385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}