- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on May 14, 2014 @ 12:45

[1]The 2014–15 Australian Federal Budget [2] was released last night, and many are still likely digesting its key points. Although criticised for going back on election promises after announcing deep spending cuts and more taxes, the Government did follow through on elevating the issue of cyber safety. According to the budget, the Government will provide [3] $10 million over four years to improve the protection of children online by creating online safety programmes for schools, research and information campaigns on online safety, and establishing the Office of the Children’s e‑Safety Commissioner. However, the National ICT Australia—Australia’s peak ICT research group—will lose [4] its $84.9 million funding after two years. Communications Minister Malcolm Turnbull stated that the organisation would then move to a ‘self-sustaining’ model.

In the US last week, Senator Patrick Leahy and Congressman James Sensenbrenner’s 2013 proposal [5] for the USA Freedom Act, [6] that prevents the NSA from collecting US phone and Internet metadata, passed unanimously in the House Judiciary Committee. According to the bill, ‘data [would remain] with the telephone and Internet companies and the NSA would only be authorised to approach those companies on an individual, case-by-case basis’ said [7] David Cole, Professor of Law at Georgetown University. At an April 2014 debate [8] at Johns Hopkins University on the NSA’s constitutionality, Cole quoted Stewart Baker, the former general counsel of NSA, as saying, ‘metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.’ Former NSA director Michael Hayden responded [9] at the debate saying that was ‘absolutely correct’, and—rather chillingly—‘we kill people based on metadata.’

Australia is having its own mass surveillance debate. ASIO officials will be asked to face a Senate inquiry into the comprehensive revision [10] of the Telecommunications (Interception and Access) Act 1979 later this month. The inquiry was initiated [11] by Greens Senator Scott Ludlam in December last year, to break what Ludlum called the ‘complicity of silence about surveillance in Australia’. News Corp spoke [12] recently with Professor Desmond Ball on the issue and the apparent ease with which phone data can be collected.

Across the Tasman, New Zealand is dealing with the controversial passage [13] into law of its 2013 Telecommunications (Interception Capability and Security) Act [14]. The Government Communications Security Bureau (GCSB) and National Cyber Security Centre released guidance for network operators [15] (PDF) last week. The guidance says that network operators are required to engage with the GCSB about changes to their networks and the ‘design, build or operation of public telecommunications networks and their interconnection to other networks both domestically and overseas’.

In Indonesia this week, the Indonesian military (TNI) has signed an agreement [16] with the Institut Teknologi Del to develop a cyber defence and warfare centre. Army Chief of Staff General Budiman and Dr Roberd Saragih signed the agreement, which covers [17] training and development of new offensive and defensive technologies to be used by the TNI in conducting cyber warfare operations.

Microsoft, through its Cyber Threat Intelligence Program, and the Australian Communication and Media Authority’s Australian Internet Security Initiative (AISI) have struck a new agreement [18] to fight cybercrime. The agreement involves real-time sharing of data on Australian computers identified as being infected with malware. ‘The AISI, which has operated since 2005, is recognised globally for its work in sharing threat information with local Internet Service Providers,’ said [19] Microsoft Australia chief security advisor, James Kavanagh.

The annual AusCERT information security conference [20] began on the Gold Coast this week. Michael Cerny, PwC Australia Partner, will speak [21] today at the conference about cyber security analytics and the need for organisations to build up a team of data scientists to complement their information security team. Broadly speaking, cyber security analytics aggregate [22] security functions and data analytics, making cybersecurity processes more timely, automated and accurate. FireEye, IBM and Symantec have all made recent investments in developing cybersecurity software architecture.

Finally, if you’re a long-time fan of the American TV show CSI: Crime Scene Investigation, and don’t mind the cringe-worthy title, the latest spinoff is CSI: Cyber [23], and will be aired on CBS this year. The series [24] will follow Avery Ryan, a special agent at the Cyber Crime Division of the FBI, tasked with solving ‘high-octane’ crimes.

Simon Hansen is an intern in ASPI’s International Cyber Policy Centre.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-27/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg

[2] 2014–15 Australian Federal Budget: http://www.budget.gov.au/2014-15/index.htm

[3] provide: http://www.budget.gov.au/2014-15/content/bp2/html/bp2_expense-06.htm

[4] lose: http://delimiter.com.au/2014/05/13/budget-2014-govt-chops-nicta-funds-two-years/

[5] proposal: http://www.politico.com/story/2013/10/leahy-sensenbrenner-nsa-reform-98953.html

[6] USA Freedom Act,: http://en.wikipedia.org/wiki/USA_Freedom_Act

[7] said: http://www.nybooks.com/blogs/nyrblog/2014/may/10/we-kill-people-based-metadata/?insrc=wbll

[8] debate: http://www.techdirt.com/articles/20140511/06390427191/michael-hayden-gleefully-admits-we-kill-people-based-metadata.shtml

[9] responded: http://justsecurity.org/2014/05/10/michael-hayden-kill-people-based-metadata/

[10] revision: http://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Legal_and_Constitutional_Affairs/Comprehensive_revision_of_TIA_Act

[11] initiated: http://scott-ludlam.greensmps.org.au/content/motions/revision-telecommunications-interception-and-access-act-1979

[12] spoke: http://www.news.com.au/national/asio-spies-want-greater-powers-to-target-communications-they-say-will-flush-out-suspected-terrorists-and-criminals/story-fncynjr2-1226912131874

[13] controversial passage: http://www.zdnet.com/nz-cyber-security-tsars-lay-down-rules-for-network-operators-7000029359/

[14] Telecommunications (Interception Capability and Security) Act: http://www.legislation.govt.nz/bill/government/2013/0108/5.0/DLM5177923.html

[15] guidance for network operators: http://www.ncsc.govt.nz/assets/TICSA/NCSC-Guidance-for-Network-Operators.pdf

[16] agreement: https://www.del.ac.id/?p=2234

[17] covers: http://www.janes.com/article/37782/indonesian-army-develops-cyber-warfare-centre

[18] agreement: http://www.smh.com.au/it-pro/security-it/acma-to-take-microsoft-infected-ip-feed-to-improve-fight-against-cybercrime-20140509-zr7e6.html

[19] said: http://www.arnnet.com.au/article/544806/microsoft_strikes_cybercrime_agreement_acma/

[20] conference: https://conference.auscert.org.au/

[21] speak: http://www.computerworld.com.au/article/544833/getting_cyber_security_analytics_mix_right/

[22] aggregate: http://www.networkworld.com/community/blog/emerging-cybersecurity-software-architecture

[23] CSI: Cyber: http://www.theverge.com/2014/5/12/5711260/csi-cyber-crime-spin-off-coming-2014-dark-net-crime-fighting

[24] series: http://www.independent.ie/entertainment/tv-radio/irishwoman-inspires-new-csi-spinoff-30265284.html

Copyright © 2022 The Strategist. All rights reserved.