{"id":29648,"date":"2016-11-23T12:30:44","date_gmt":"2016-11-23T01:30:44","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=29648"},"modified":"2016-11-23T09:24:11","modified_gmt":"2016-11-22T22:24:11","slug":"cyber-wrap-144","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

The future of US cybersecurity policy remains uncertain as the Trump administration begins to take shape. On Friday Trump named<\/a> Michael Flynn, previous director of the Defense Intelligence Agency, as his national security advisor in the White House. The retired Lieutenant General has strong views on bolstering US offensive cyber capabilities and has been described as a \u2018cybersecurity hawk<\/a>\u2019. Meanwhile, Director of National Intelligence James Clapper handed in his resignation<\/a> last week, effective from 20 January 2017, after six years in charge of the 17 different agencies that make up the US Intelligence Community. His intention to call it quits at the end of President Obama\u2019s term was long expected<\/a> but the announcement represents another significant opportunity<\/a> for the president-elect to shape US posture in intelligence and cyber spheres. Concerns<\/a> have also been raised by cyber policy and tech professionals in light of Trump\u2019s campaign rhetoric foreshadowing increased barriers to digital trade.<\/p>\n

Fortunately, US tech and policy development appears to have strong momentum. This week, Elon Musk proposed<\/a> a network of satellites to provide global internet access and Microsoft announced<\/a> a doubled investment in quantum computing research. The US is taking rapid steps to keep abreast of such changes. For example, the National Institute of Standards and Technology recently released a new cybersecurity framework for small businesses<\/a> providing SMEs a step-by-step guide to protecting themselves online. The Federal Trade Commission has also just published a report<\/a> on the \u2018Sharing Economy\u2019 of app-based services such as Airbnb and Uber.<\/p>\n

Privacy concerns have prompted Facebook to stop collecting WhatsApp user data<\/a> from its European customers. Last month 28 European data collection authorities sent an open letter<\/a> to WhatsApp\u2019s CEO urging the company to pause the flow of user information to its parent company. Germany has already ordered that WhatsApp cease the data flow, which Facebook was ostensibly collecting for marketing and advertising purposes, and the UK, France and Italy are conducting their own investigations<\/a>. European regulators noted \u2018serious concerns\u2019 in their open letter over those changes to WhatsApp\u2019s Terms of Service, highlighting its contradiction with previous public statements that affirmed no data would be shared between the two companies.<\/p>\n

Google has also had a run-in with European regulators<\/a> after they were accused of using the Android operating system to \u2018crush rivals\u2019 by blocking them in online search advertising. The European Commission has been investigating Google for six years after complaints from competitors, and CEO Sandar Pichai met last Friday<\/a> with the EU\u2019s Competition Commissioner and the European Commissioner for Digital Economy and Society to discuss the problem after the company issued a formal rejection of the European’s claims earlier this month<\/a>.<\/p>\n

Things are looking more positive between Chinese regulators and industry with two of the country\u2019s biggest tech companies, Alibaba and Tencent, publically stating <\/a>their support for China\u2019s controversial new Cyber Security Law. Speaking at the 3rd World Internet Conference in Wuzhen, Alibaba\u2019s Vice President noted that the company is working with law enforcement agencies to monitor content, and a Tencent executive stated that company has removed 80,000 videos from its site this year. President Xi also addressed the conference, calling for improved cooperation between states on internet governance and respect for cyber sovereignty. Both public and private sector leaders at the conference emphasised the security risks of cyber terrorism and the cited proliferation of false news during the US election as justification for tighter national and international control<\/a> over the internet.<\/p>\n

Security concerns over Chinese company Lenovo have surfaced after the ABC revealed<\/a>\u00a0that the Australian National University\u2019s National Computational Infrastructure is planning to procure software and hardware from the company. ANU and Lenovo have both defended the plans, noting that the US government has approved Lenovo\u2019s US acquisitions and the US Department of Defense has no restrictions on Lenovo products. The National Computational Infrastructure describes itself as<\/a> \u2018home to the Southern Hemisphere\u2019s most highly-integrated supercomputer.\u2019<\/p>\n

And finally, a survey of 2,000 people in the US<\/a> has found that 40% would prefer to skip sex for a year if it meant their personal information was protected from hackers. While this seems a bit surprising, the finding that 41% would give up their favourite food for a month rather than reset all their account passwords indicates that laziness is probably equal to privacy concerns in the driving force behind American attitudes to cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"

The future of US cybersecurity policy remains uncertain as the Trump administration begins to take shape. On Friday Trump named Michael Flynn, previous director of the Defense Intelligence Agency, as his national security advisor in …<\/p>\n","protected":false},"author":364,"featured_media":29649,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,1428,300,728,215],"class_list":["post-29648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-donald-trump","tag-google","tag-hacking","tag-privacy"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The future of US cybersecurity policy remains uncertain as the Trump administration begins to take shape. On Friday Trump named Michael Flynn, previous director of the Defense Intelligence Agency, as his national security advisor in ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-23T01:30:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-22T22:24:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/23160263111_f552c97b3b_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/23160263111_f552c97b3b_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/23160263111_f552c97b3b_z.jpg\",\"width\":640,\"height\":425},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/#primaryimage\"},\"datePublished\":\"2016-11-23T01:30:44+00:00\",\"dateModified\":\"2016-11-22T22:24:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"The future of US cybersecurity policy remains uncertain as the Trump administration begins to take shape. On Friday Trump named Michael Flynn, previous director of the Defense Intelligence Agency, as his national security advisor in ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-11-23T01:30:44+00:00","article_modified_time":"2016-11-22T22:24:11+00:00","og_image":[{"width":640,"height":425,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/23160263111_f552c97b3b_z.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/23160263111_f552c97b3b_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/23160263111_f552c97b3b_z.jpg","width":640,"height":425},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/#primaryimage"},"datePublished":"2016-11-23T01:30:44+00:00","dateModified":"2016-11-22T22:24:11+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-144\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29648"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=29648"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29648\/revisions"}],"predecessor-version":[{"id":29650,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29648\/revisions\/29650"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/29649"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=29648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=29648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=29648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}