- The Strategist - https://www.aspistrategist.org.au -

Cyber wrap

Posted By on December 10, 2014 @ 13:45

Privacy? [1]It’s been a busy week in cyber for ASPI with two publications calling for enhanced cyber cooperation under the auspices of the US–Australia alliance.

In the first, Preserving the Knowledge Edge [2], Stephan Frühling, James Goldrick and Rory Medcalf argue for a strengthening of the C4ISR relationship:

US–Australian C4ISR cooperation will be essential to the success of the US rebalance, but also to Australia’s own immediate security in a strategic environment in which more and more countries operate high-technology platforms that once used to be the preserve of Australia and its allies.

The priority is to make force structure adjustments that support a greater Australian contribution—with cyber capabilities a clear option.

Building on this idea, in his own contribution to a new ASPI Strategy paper Expanding Alliance [3], Daniel Nichola writes that it ‘makes sense for Australia to pursue new areas of cooperation with its US ally—and to strengthen existing areas of alliance cooperation—to support the regional position of the US’. Coordinated investment, expanded information sharing and consistent messaging in the cyber domain will help to meet emerging security challenges facing both the US and Australia.

On the softer side of international cooperation, representatives from the US and EU met in Brussels last week for their inaugural cyber dialogue [4]. The participants discussed international security and the prospects for conflict in cyberspace while affirming the application o­f international law to cyberspace. Other issues included capacity building, protection of human rights, working groups on cybercrime and cybersecurity, and internet governance developments. One commentator, speaking at the EastWest Institute’s cyber summit [5] in Berlin, suggested that ‘despite recent transatlantic tensions there are numerous possibilities for greater cooperation, and notions of cyber crime, cyber war and cyber espionage well defined’.

Turning now to another area of cooperation, the US and China held the seventh Internet Industry Forum in Washington DC. Co-hosted by Microsoft and the Internet Society of China, the forum [6] saw Lu Wei, China’s internet czar [7], call for ‘win-win cooperation’ and ‘respect of each other’s cybersovereignty, internet governance, major concerns and cultural differences’. For more on China’s concept of cyber sovereignty, see this article [8] on China–US Focus. In a separate speech [9] at George Washington University, Lu described the differences between the US and China as accounting for only 10% of the picture, but said they reflect a more significant lack of trust that could be improved through more contact. ‘I often say we can have disagreements, but we should always have communications’ said Lu.

Also on Microsoft, the software multinational is looking more closely at nation-state activities in cyberspace with a recent report [10] that aims to prevent the emergence of a world where cyber conflict undermines trust. The authors outline six norms that could define state behaviour and reduce the possibility that ICT products and services are used, abused, or exploited by nation states as part of military operations. Paul Nicholas, senior director at Microsoft’s Trustworthy Computing, argues that ‘there are certain acts in cyberspace that, whatever the national or strategic aim, nation states should not pursue’.

Meanwhile, Fairfax foreign news editor Chris Zappone explores [11] the ‘anything goes’ nature of cyber competition in relations between Taiwan and the PRC. He leaves readers with a perennial question, ‘whether the cyber realm is a place where countries can come to agreement, or inevitably a scene of competition and a technological arms race built on faster computers and more devious coding’.

Finally, for all those interested in—and frustrated by—pop-up and pop-under advertisements, its inventor, Ethan Zuckerman, tells the story [12] of its development on ReplyAll, a podcast series about the internet. And while he apologises for turning the internet into an ad-supported model, it’s a little too late to chart another course; the price for freedom online is now the tacit permission from users that companies can collect personal data and pay-per-click ads.

Simon Hansen is a research intern in ASPI’s International Cyber Policy Centre. Image courtesy of Flickr user KylaBorg [13].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/cyber-wrap-54/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/12/12887906353_524f4a5d08_z.jpg

[2] Preserving the Knowledge Edge: https://www.aspi.org.au/publications/preserving-the-knowledge-edge-surveillance-cooperation-and-the-usaustralia-alliance-in-asia

[3] Expanding Alliance: https://www.aspi.org.au/publications/expanding-alliance-anzus-cooperation-and-asiapacific-security

[4] cyber dialogue: http://eeas.europa.eu/statements-eeas/2014/141205_05_en.htm

[5] cyber summit: http://www.ewi.info/idea/paving-way-forward-breakthroughs-cyber-cooperation

[6] forum: http://english.gov.cn/news/top_news/2014/12/03/content_281475018769197.htm

[7] China’s internet czar: http://www.nytimes.com/2014/12/02/world/asia/gregarious-and-direct-chinas-web-doorkeeper.html?_r=0

[8] article: http://www.chinausfocus.com/peace-security/the-wuzhen-summit-and-chinese-internet-sovereignty/

[9] speech: http://gwtoday.gwu.edu/china%E2%80%99s-head-cyberspace-discusses-how-build-mutual-trust-us

[10] report: http://blogs.microsoft.com/cybertrust/2014/12/03/proposed-cybersecurity-norms/

[11] explores: http://www.theage.com.au/it-pro/security-it/taiwan-a-canary-in-the-coalmine-of-cyber-warfare-20141208-120v73.html

[12] story: https://soundcloud.com/replyall/01-3-i-didnt-mean-to-break-the-internet

[13] KylaBorg: https://www.flickr.com/photos/kylaborg/12887906353

Copyright © 2016 The Strategist. All rights reserved.