{"id":930,"date":"2012-08-28T06:00:01","date_gmt":"2012-08-27T20:00:01","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=930"},"modified":"2012-08-29T06:34:05","modified_gmt":"2012-08-28T20:34:05","slug":"taking-a-legal-approach-to-australias-cyber-threat","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/","title":{"rendered":"Taking a legal approach to Australia\u2019s cyber threat"},"content":{"rendered":"

Most discussions of cyber security are couched in terms of protecting computer systems, especially those belonging to government and managers of civilian infrastructure. No doubt the forthcoming government white paper on cyber security will also include that sort of discussion. Based on the earlier\u00a0public discussion paper<\/a>, it will probably also take the opportunity to begin a more nuanced discussion between the government and the wider population about the expected behaviour of each in cyberspace. In most walks of life there is a contract\u2014usually implicit\u2014between the government and the populace regarding service provision and law enforcement. Cyberspace will be no different, and some parts of any compact will be familiar. But the ubiquity of the internet and the zeal with which we\u2019ve all taken to it, there\u2019ll be some important differences.<\/p>\n

One interesting proposal of the cyber white paper is the agreement of a social contract tied to the concept of \u2018digital citizenship\u2019. It emphasises responsible use of the internet by encouraging people to respect rules of usage\u2014the digital social contract\u2014and assume responsibility for inappropriate behaviour.<\/p>\n

Here, I think, we should tread carefully because behind the concept of \u2018digital citizenship\u2019 is the complex issue of internet governance. Using laws in the real world as an analogy, I think legal instruments can be created to police the internet to a certain extent, while safeguarding the civil liberties of all Australians; though, this is no easy task, especially now there are clear overlaps and intersections between social, economic, and national cyber security. ISPs and law enforcement agencies could partner to block users who disregard basic rules of usage of the internet.<\/p>\n

For the government departments that already have large amounts of sensitive, personal data in their hands, the Cyber White Paper will look at how to make those systems more impregnable to cyber intrusions. This being said, there will be less innovation in the 2012 Cyber White Paper about this; the Privacy Act 1988<\/em> already stipulates government\u2019s role in protecting and using people\u2019s personal information. However, additional funding to hire more ICT specialists working for departments could be a simple solution.<\/p>\n

Other areas that will definitely draw significant benefits from this white paper are small-to-medium size businesses thanks to the new focus on government and private sector partnerships. I anticipate the creation of liaison groups between organisations like CERT Australia (Computer Emergency Response Team Australia) and private businesses to train them in the basics of risk-based cyber security and how to report cyber attacks to the appropriate authorities.<\/p>\n

Unlike the United States and the United Kingdom, Australia lacks the necessary legal tools to document cyber attacks outside the intelligence community, unless they are reported to the appropriate agencies. For instance, IT security specialists recognised that current systems controlling water, electricity, and trains can go offline for a month without being reported.<\/p>\n

Finally, in my view, a more robust legal framework is needed to ensure cyber crime is targeted and prosecuted. However, I do acknowledge that there are many caveats to the cyber security problem, and creating effective cyber security strategies is a balancing act. A common understanding about individual responsible behaviour has to be reached to view cyber security as it is: a cooperative effort between government, corporate Australia, not-for-profits, and members of the community.<\/p>\n

Bernardo Camejo is a student of International Security and Counter-terrorism at Murdoch University.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Most discussions of cyber security are couched in terms of protecting computer systems, especially those belonging to government and managers of civilian infrastructure. No doubt the forthcoming government white paper on cyber security will also …<\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[17,95,96],"class_list":["post-930","post","type-post","status-publish","format-standard","hentry","category-general","tag-australia","tag-cyber-security","tag-cyber-security-white-paper-2013"],"acf":[],"yoast_head":"\nTaking a legal approach to Australia\u2019s cyber threat | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Taking a legal approach to Australia\u2019s cyber threat | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Most discussions of cyber security are couched in terms of protecting computer systems, especially those belonging to government and managers of civilian infrastructure. No doubt the forthcoming government white paper on cyber security will also ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-27T20:00:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-08-28T20:34:05+00:00\" \/>\n<meta name=\"author\" content=\"Bernardo Camejo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bernardo Camejo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/\",\"name\":\"Taking a legal approach to Australia\u2019s cyber threat | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"datePublished\":\"2012-08-27T20:00:01+00:00\",\"dateModified\":\"2012-08-28T20:34:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/29c8ef09e3fd71aff4700e8b29bdafe1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Taking a legal approach to Australia\u2019s cyber threat\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/29c8ef09e3fd71aff4700e8b29bdafe1\",\"name\":\"Bernardo Camejo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d195cb9f599ba4c0c0651f76798a25b4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d195cb9f599ba4c0c0651f76798a25b4?s=96&d=mm&r=g\",\"caption\":\"Bernardo Camejo\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/bernardo-camejo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Taking a legal approach to Australia\u2019s cyber threat | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/","og_locale":"en_US","og_type":"article","og_title":"Taking a legal approach to Australia\u2019s cyber threat | The Strategist","og_description":"Most discussions of cyber security are couched in terms of protecting computer systems, especially those belonging to government and managers of civilian infrastructure. No doubt the forthcoming government white paper on cyber security will also ...","og_url":"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2012-08-27T20:00:01+00:00","article_modified_time":"2012-08-28T20:34:05+00:00","author":"Bernardo Camejo","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Bernardo Camejo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/","url":"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/","name":"Taking a legal approach to Australia\u2019s cyber threat | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"datePublished":"2012-08-27T20:00:01+00:00","dateModified":"2012-08-28T20:34:05+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/29c8ef09e3fd71aff4700e8b29bdafe1"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/taking-a-legal-approach-to-australias-cyber-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Taking a legal approach to Australia\u2019s cyber threat"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/29c8ef09e3fd71aff4700e8b29bdafe1","name":"Bernardo Camejo","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d195cb9f599ba4c0c0651f76798a25b4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d195cb9f599ba4c0c0651f76798a25b4?s=96&d=mm&r=g","caption":"Bernardo Camejo"},"url":"https:\/\/www.aspistrategist.ru\/author\/bernardo-camejo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/930"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=930"}],"version-history":[{"count":5,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/930\/revisions"}],"predecessor-version":[{"id":953,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/930\/revisions\/953"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}