{"id":4638,"date":"2013-03-19T05:00:02","date_gmt":"2013-03-18T19:00:02","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=4638"},"modified":"2013-03-20T08:27:33","modified_gmt":"2013-03-19T22:27:33","slug":"cyber-goes-strategic","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/","title":{"rendered":"Cyber goes strategic"},"content":{"rendered":"

\"President<\/a>In my last blog post<\/a> I explored how the New York Times<\/em> hacking incident had raised the stakes in the cyber domain to an unprecedented degree. Having had time to reflect on this statement, I’ve reached the conclusion that we have entered a time when cyber issues have shifted from a technical, low priority matter to a strategic issue which not only carries significant risks but demands increased prioritisation and engagement from governments if it isn’t to become a significant hindrance to international relations.<\/p>\n

There’s now so much malicious cyber activity, a significant proportion of which can be reliably attributed to state-actors, that it’s becoming increasingly difficult for countries to not face up and seriously address the issue diplomatically. The need for action will only increase as pressure rises from the civilian population and the private sector companies who are currently suffering the most.<\/p>\n

The shift in the perception of everything cyber has been a slow one over the past two decades. We used to focus on cyber hackers, who were deemed nothing more than intelligent \u2018nerds\u2019 who spent more time than was healthy learning and typing malicious code in order to hack into increasingly difficult targets. However, their purpose was one of competition between one another, and ultimately humiliation of the target website\/organisation they targeted. However, by the turn of the century, governments had began to slowly wake up to the realisation that in many respects the \u2018horse had bolted\u2019 and that many of their computer systems and departments had already been subjected to some kind of attack, not just from individual ‘hacktivists’, but from state sponsored sources. Clearly there was an increasingly urgent need to secure those systems and create substantive policy to address the growing security risk posed, but movement on these fronts was slow. Now the bigger picture is becoming clearer, and the full extent of hacking, espionage and data theft across the public and private sectors is evidenced in the media almost daily. Only last week the Reserve Bank of Australia confirmed it had been hacked by \u2018Chinese\u2019 sources<\/a>. This relentless tempo of events demands action\u2014so what’s happening?<\/p>\n

The US has radically stepped up its pressure on China, whom it sees as the principle aggressor. In a recent address, the US National Security Advisor Thomas Donilon quite provocatively outlined what he felt was required from a US perspective<\/a>:<\/p>\n

Specifically with respect to the issue of cyber-enabled theft, we seek three things from the Chinese side\u2026 First, we need a recognition of the urgency and scope of this problem and the risk it poses\u2014to international trade, to the reputation of Chinese industry and to our overall relations. Second, Beijing should take serious steps to investigate and put a stop to these activities. Finally, we need China to engage with us in a constructive direct dialogue to establish acceptable norms of behaviour in cyberspace.<\/p><\/blockquote>\n

This is a potent statement and it comes at a time when Donilon is about to travel to China for bilateral discussions. This comment won’t have gone unnoticed in Beijing, and suggests that the cyber issue will take centre stage when he meets with his interlocutors there. It follows hot on the heels of US announcements of elements of its approach to the use of its offensive cyber capabilities, and the launching of an Executive Order<\/a> on Cyber Security which further coordinates its policy and practical approach.<\/p>\n

These efforts are clearly aimed at increasing the pressure on China to curb its malicious activity in cyberspace and to raise its diplomatic game. No longer will the cries of surprise, denial of involvement and claims of being the major victim of cyber-attacks rather than the instigator be sufficient response to the multiple accusations it receives.<\/p>\n

It appears that the Chinese message has also changed in recent weeks, and now acknowledges that increased international dialogue<\/a> is required, and that much progress is needed. We can only wait to see how the US\u2013China dialogue on this issue takes shape, as it has the capacity to further cool relations between the two nations if some form of agreement can\u2019t be made about what is and is not acceptable in cyberspace.\u00a0The fact that Obama\u2019s first phone conversation to new Chinese President Xi Jinping addressed the issue of cyber attacks and the expectation of nations adhering to international norms and rules, clearly underlines the transformation of the issue to one of strategic importance.<\/p>\n

Regionally there’s a need for Australia to build on some of the work it conducts in capacity building<\/a>, countering cyber crime<\/a>, and to play a more proactive role in creating regional consensus on cyber norms of behaviour. Through the Australia in the Asian Century White Paper<\/a>\u00a0(PDF), the National Security Strategy and the 2009 Cyber Security Strategy<\/a>\u00a0(PDF), there are mentions of engaging regionally and creating cyber norms of behaviour. Now is the time to drive those commitments with increased conviction and produce some concrete outcomes. Australia needs to place increased diplomatic pressure on China to enter a constructive dialogue on this issue and to become more responsible and accountable in cyberspace. If China aspires to be a major influence on the world scene and create a more convincing \u2018soft power\u2019 approach, it needs to build trust. This would be an excellent place to start.<\/p>\n

Tobias Feakin is a senior analyst at ASPI. Image courtesy of Flickr user The White House<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

In my last blog post I explored how the New York Times hacking incident had raised the stakes in the cyber domain to an unprecedented degree. Having had time to reflect on this statement, I’ve …<\/p>\n","protected":false},"author":49,"featured_media":4643,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[17,52,169,95,388,168],"class_list":["post-4638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-australia","tag-china","tag-cyber-crime","tag-cyber-security","tag-hactivism","tag-norms"],"acf":[],"yoast_head":"\nCyber goes strategic | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber goes strategic | The Strategist\" \/>\n<meta property=\"og:description\" content=\"In my last blog post I explored how the New York Times hacking incident had raised the stakes in the cyber domain to an unprecedented degree. Having had time to reflect on this statement, I’ve ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-18T19:00:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-03-19T22:27:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/8554017745_e6f10bbd9d_z.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tobias Feakin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tobias Feakin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/8554017745_e6f10bbd9d_z.jpeg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/8554017745_e6f10bbd9d_z.jpeg\",\"width\":640,\"height\":427,\"caption\":\"President Barack Obama confers with Chief of Staff Denis McDonough as he talks on the phone in the Oval Office, Feb. 6, 2013.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/\",\"name\":\"Cyber goes strategic | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/#primaryimage\"},\"datePublished\":\"2013-03-18T19:00:02+00:00\",\"dateModified\":\"2013-03-19T22:27:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber goes strategic\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd\",\"name\":\"Tobias Feakin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g\",\"caption\":\"Tobias Feakin\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber goes strategic | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/","og_locale":"en_US","og_type":"article","og_title":"Cyber goes strategic | The Strategist","og_description":"In my last blog post I explored how the New York Times hacking incident had raised the stakes in the cyber domain to an unprecedented degree. Having had time to reflect on this statement, I’ve ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2013-03-18T19:00:02+00:00","article_modified_time":"2013-03-19T22:27:33+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/8554017745_e6f10bbd9d_z.jpeg","type":"image\/jpeg"}],"author":"Tobias Feakin","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tobias Feakin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/8554017745_e6f10bbd9d_z.jpeg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2013\/03\/8554017745_e6f10bbd9d_z.jpeg","width":640,"height":427,"caption":"President Barack Obama confers with Chief of Staff Denis McDonough as he talks on the phone in the Oval Office, Feb. 6, 2013."},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/","url":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/","name":"Cyber goes strategic | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/#primaryimage"},"datePublished":"2013-03-18T19:00:02+00:00","dateModified":"2013-03-19T22:27:33+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-goes-strategic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber goes strategic"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/84f461839f3f37e79509040ae4eeedcd","name":"Tobias Feakin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8346dd3562a4d00483b16ff7e8b8df6?s=96&d=mm&r=g","caption":"Tobias Feakin"},"url":"https:\/\/www.aspistrategist.ru\/author\/tobias-feakin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/4638"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=4638"}],"version-history":[{"count":7,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/4638\/revisions"}],"predecessor-version":[{"id":4641,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/4638\/revisions\/4641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/4643"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=4638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=4638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=4638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}