- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on July 9, 2014 @ 14:30

[1]Bilateral relations between great powers have been shaken by cybersecurity troubles over the last week. US-Germany relations have deteriorated after Germany arrested an employee of its own Federal Intelligence Service, accusing him of spying for the US. If the allegations are confirmed, ‘then that is really a gamble with friendship and a close alliance’, said [2] President Joachim Gauck. In a show of displeasure, Germany summoned [3] US Ambassador John Emerson to the Foreign Ministry on the fourth of July for ‘swift clarification’, moments before the US Embassy Independence Day celebrations. This is a new blow to a relationship still recovering from the Snowden fallout last year, when the NSA was accused [4] of monitoring millions of Germans’ electronic data, including Chancellor Angela Merkel’s mobile phone.

Another great-power relationship in a state of measured repair is the US-China one, as they begin the sixth Strategic and Economic Dialogue in Beijing today. In the past, the dialogue has been a platform for both countries to address bilateral, regional and global challenges, including cybersecurity cooperation, and this year’s meeting comes at a critical time to stabilise the bilateral relationship. The spanner in the works is China’s suspension of the cybersecurity working group after the US Department of Justice indicted five PLA officials in May this year. While China has indicated [5] that talks will resume once the indictments are revoked, US Treasury Secretary Jacob Lew has signalled [6] that the US will continue to broach cybersecurity issues at the dialogue. Experts over at Brookings have a ‘what you need to know’ [7] discussion piece about the meeting.

Big-data research in Australia has had a significant boost with the opening [8] of an $88 million big-data research and development centre in Adelaide last week. The Data to Decisions Cooperative Research Centre [9] (D2D CRC) looks at how defence and national security agencies can use big data to predict cyber and physical threats to Australia. ‘Addressing big-data challenges and applying high-performance analytics can make the difference between predicting a threat and reacting to a catastrophic aftermath’ said chair Tim Scully [10].

In London, the ICANN50 [11] meeting has come and gone. Two major initiatives were outlined by Theresa Swinehart, Senior Advisor to the ICANN President on Global Strategy, in her closing reflections [12]: enhancing ICANN’s accountability [13] mechanisms in light of its changing historical relationship with the US administration; and transitioning [14] National Telecommunications and Information Agency’s stewardship of the Internet Assigned Numbers Authority functions. Our own Klée Aiken has tackled [15] both issues of accountability and the transition. His take: this ‘rocky start doesn’t bode well for Internet governance reform’.

Cybersecurity myths are tall as they are plentiful. Over at Wired, Peter W. Singer and Allan Friedman have set out [16] to debunk five myths, starting with myth #1: cybersecurity is unlike any challenge we have faced. Rachel King is busting her own myths on the Wall Street Journal blog, arguing [17] that ‘air gaps’ [18] (isolating networks from unsecured networks) aren’t the extraordinarily safe network security measure they’re made out to be. Finally, Cora Currier at the Columbia Journalism Review addresses [19] the issue of misusing the ‘cyber’ prefix, leading to under-analysis of cybersecurity related issues and a vast conflation of supposed ‘cyber’ problems.

And on a lighter note, Australian actor Chris Hemsworth is set to play the Good Hacker in the upcoming Michael Mann film [20] out in January 2015. In the yet-to-be-titled thriller, Hemsworth will work with Chinese pop sensation Leehom Wang to take out those wicked Bad Hackers.

Simon Hansen is a research intern in ASPI’s International Cyber Policy Centre.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-34/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg

[2] said: http://www.nytimes.com/2014/07/07/world/europe/germans-demand-us-response-to-spy-allegation.html?_r=0

[3] summoned: http://online.wsj.com/articles/u-s-in-fresh-german-spying-scandal-1404479002

[4] accused: http://www.theguardian.com/world/2014/jun/04/germany-inquiry-nsa-tapping-angela-merkel-phone

[5] indicated: http://usa.chinadaily.com.cn/epaper/2014-05/22/content_17533404.htm

[6] signalled: http://insidecybersecurity.com/Cyber-General/Cyber-Public-Content/lew-us-will-broach-cybersecurity-issues-at-upcoming-beijing-meeting/menu-id-1089.html

[7] ‘what you need to know’: http://www.brookings.edu/blogs/up-front/posts/2014/07/07-us-china-strategic-economic-dialogue

[8] opening: http://www.cio.com.au/article/548938/_88m_big_data_research_centre_opens_south_australia/

[9] Data to Decisions Cooperative Research Centre: http://www.d2dcrc.com.au/

[10] said chair Tim Scully: http://www.law.unsw.edu.au/news/2014/03/new-crc-tackle-big-data-and-national-security

[11] ICANN50: https://london50.icann.org/en/

[12] reflections: https://www.icann.org/news/blog/thank-you-icann-community-reflections-from-thursday-at-icann50

[13] accountability: http://london50.icann.org/en/schedule/thu-enhancing-accountability

[14] transitioning: http://london50.icann.org/en/schedule/thu-iana-stewardship-transition

[15] has tackled: http://www.aspistrategist.org.au/governing-the-net-wine-makes-france-aggressive/

[16] set out: http://www.wired.com/2014/07/debunking-5-major-cyber-security-myths/

[17] arguing: http://blogs.wsj.com/cio/2014/07/03/why-air-gaps-dont-always-work-in-cybersecurity/

[18] ‘air gaps’: http://en.wikipedia.org/wiki/Air_gap_(networking)

[19] addresses: http://www.cjr.org/behind_the_news/cybersecurity_cyber_cyber_cybe.php

[20] film: http://www.latimes.com/entertainment/movies/moviesnow/la-et-mn-michael-mann-chris-hemsworth-wang-leehom-cyber-blackhat-story.html

Copyright © 2016 The Strategist. All rights reserved.