{"id":27425,"date":"2016-06-29T12:30:06","date_gmt":"2016-06-29T02:30:06","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=27425"},"modified":"2016-06-29T11:26:19","modified_gmt":"2016-06-29T01:26:19","slug":"cyber-wrap-126","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"Image<\/p>\n

According to a recent survey by<\/span> Tech London Advocates<\/span><\/a>, London\u2019s tech experts and cyber security professionals are \u2018<\/span>overwhelmingly opposed<\/span><\/a>\u2019 to the UK\u2019s recent<\/span> decision to leave the EU<\/span><\/a>. Mainland Europe represents an<\/span> \u00a0essential source of talent for the UK<\/span><\/a>, which suffers an \u2018alarming lack of digital skills\u2019, and Brexit will likely raise barriers to Europeans\u2019 freedom to work and travel in the UK. In fact, there are concerns that a potential dip in Britain\u2019s economy may result in a technological brain drain, with British cyber professionals<\/span> seeking higher pay<\/span><\/a> in countries such as the US. Negotiating the split will involve establishing whether British law enforcement will<\/span> continue to benefit from the information sharing<\/span><\/a> arrangements of Europol\u2019s European Cybercrime Centre (EC3), and whether it will continue to reflect the<\/span> privacy and data protection legislation<\/span><\/a> of the EU or develop its own regulation standards. The attractive benefits of the EU\u2019s \u2018<\/span>digital single market<\/span><\/a>\u2019 means it\u2019s<\/span> likely Britain will continue to adhere to the data standards<\/span><\/a> of its continental counterparts in order to facilitate the flow of data across the Channel.<\/span><\/p>\n

Staying with European data debates, the final changes to the US\u2013EU data sharing agreement, Privacy Shield, have been<\/span> agreed upon this week<\/span><\/a>. The new arrangement will regulate the transatlantic transfer of EU data by US companies,<\/span> replacing the \u2018Safe Harbour\u2019<\/span><\/a> model that was<\/span> struck down last October<\/span><\/a> by the European Court of Justice. The scheme features \u2018<\/span>a number of additional clarifications and improvements<\/span><\/a>\u2019 in response to concerns of US mass surveillance of European citizens. The new data transfer pact includes stronger restrictions and<\/span> establishes the role of a US ombudsman<\/span><\/a> to handle complaints over American misuse of EU data. The final version of Privacy Shield was sent to<\/span> European member states for review<\/span><\/a> this week, and the vote is expected to be held early next month.<\/span><\/p>\n

Russia\u2019s<\/span> new mass surveillance bill<\/span><\/a> will<\/span> require all messaging<\/span><\/a> services operating in Russia\u2014such as WhatsApp, Telegram and Viber\u2014to provide the Federal Security Service with backdoor access to citizens\u2019 personal communications. Pitched as a counterterrorism bill, the legislation will also<\/span> necessitate ISPs<\/span><\/a> to hold customers\u2019 metadata for three years and real communication records for up to six months. The legislation has been dubbed \u2018<\/span>the big brother law<\/span><\/a>\u2019 and companies that fail to comply will be<\/span> subject to fines<\/span><\/a> of up to one million Rubles (AU$20,000). Russia\u2019s lower house, the Duma, passed the bill last week and it\u2019s now<\/span> expected to move quickly<\/span><\/a> through Russia\u2019s Federal Council and the Kremlin, into law.<\/span><\/p>\n

China is also clamping down on data management, holding a<\/span> second reading<\/span><\/a> of controversial new draft rules this week. The cybersecurity law will require Chinese citizens\u2019 personal data be stored domestically, with any<\/span> request to transfer<\/span><\/a> the data overseas requiring a government security evaluation. Importantly, the legislation will<\/span> force network operators<\/span><\/a> to \u2018comply with social morals and accept the supervision of the government\u2019. While Chinese media outlets<\/span> state<\/span><\/a> that these measures as designed to \u2018protect the information infrastructure\u2019, the<\/span> bill is seen<\/span><\/a> internationally as \u2018internet censorship enshrined in legislation\u2019.<\/span><\/p>\n

The US recently held its fifth annual military network defence test,<\/span> Cyber Guard<\/span><\/a>, in Virginia with nearly 1,000 participants from the military, government, private sector, academia and allied countries. The exercise, led by the US Cyber Command, the FBI and the Department of Homeland Security,<\/span> required participants<\/span><\/a> to respond to a simulated network attack on US infrastructure. Over a week, participants were challenged by an active expert \u2018red team\u2019<\/span> to practice<\/span><\/a> inter-agency coordination, private sector cooperation and Five Eyes interoperability. Cyber Command is also working to establish a \u2018<\/span>Persistent Training Environment<\/span><\/a>\u2019\u2014a year-round cyber facility capable of simulating multiple scenarios simultaneously\u2014which is expected to reach initial operating capability in 2019.<\/span><\/p>\n

Closer to home, the Australian Department of Defence has announced a<\/span> $12 million contribution<\/span><\/a> to the Australian National University\u2019s new innovation centre for high performance computing, data analytics and cybersecurity. The<\/span> $45 million research facility<\/span><\/a> will house 70 students, academics and staff from the Australian Signals Directorate. The initiative is part of efforts to boost the study of STEM subjects and address Australia\u2019s cyber skills shortage.<\/span><\/p>\n

For some in-depth reading, check out the<\/span> Global Commission on Internet Governance: One Internet<\/span><\/i><\/a> report released by the<\/span> Centre for International Governance Innovation<\/span><\/a> and<\/span> Chatham House<\/span><\/a> this week. Notably, it proposes three potential outcomes for the internet: \u2018a dangerous and broken cyberspace\u2019, \u2018unequal gains\u2019 or \u2018broad unprecedented progress\u2019. Microsoft has also published a<\/span> new report<\/span><\/a> this week, proposing a cybersecurity norm development model for both nation states and ICT industry. The paper addresses offensive, defensive and industry norms, as<\/span> part of Microsoft\u2019s ongoing work<\/span><\/a> to \u2018advance trust in global ICT ecosystems\u2019. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

According to a recent survey by Tech London Advocates, London\u2019s tech experts and cyber security professionals are \u2018overwhelmingly opposed\u2019 to the UK\u2019s recent decision to leave the EU. Mainland Europe represents an \u00a0essential source of …<\/p>\n","protected":false},"author":390,"featured_media":27426,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1631,391,95,500],"class_list":["post-27425","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-brexit","tag-cyber","tag-cyber-security","tag-surveillance"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"According to a recent survey by Tech London Advocates, London\u2019s tech experts and cyber security professionals are \u2018overwhelmingly opposed\u2019 to the UK\u2019s recent decision to leave the EU. Mainland Europe represents an \u00a0essential source of ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-29T02:30:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-29T01:26:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/25392390163_b8392b85db_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"428\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/25392390163_b8392b85db_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/25392390163_b8392b85db_z.jpg\",\"width\":640,\"height\":428,\"caption\":\"Image courtesy of Flickr user WOCinTech Chat\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/#primaryimage\"},\"datePublished\":\"2016-06-29T02:30:06+00:00\",\"dateModified\":\"2016-06-29T01:26:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"According to a recent survey by Tech London Advocates, London\u2019s tech experts and cyber security professionals are \u2018overwhelmingly opposed\u2019 to the UK\u2019s recent decision to leave the EU. Mainland Europe represents an \u00a0essential source of ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-06-29T02:30:06+00:00","article_modified_time":"2016-06-29T01:26:19+00:00","og_image":[{"width":640,"height":428,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/25392390163_b8392b85db_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/25392390163_b8392b85db_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/06\/25392390163_b8392b85db_z.jpg","width":640,"height":428,"caption":"Image courtesy of Flickr user WOCinTech Chat"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/#primaryimage"},"datePublished":"2016-06-29T02:30:06+00:00","dateModified":"2016-06-29T01:26:19+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-126\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27425"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=27425"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27425\/revisions"}],"predecessor-version":[{"id":27428,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/27425\/revisions\/27428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/27426"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=27425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=27425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=27425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}