- The Strategist - https://www.aspistrategist.org.au -
Cyber wrap
Posted By Simon Hansen on March 5, 2014 @ 12:15
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-18/
[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2014/03/cyber-logo-1024x385.jpg
[2] where are the cyberattacks?: http://www.csmonitor.com/World/Security-Watch/2014/0303/Where-are-the-cyberattacks-Russia-s-curious-forbearance-in-Ukraine
[3] Lawfare blog: http://www.lawfareblog.com/2014/03/the-russian-ukranian-cyber-conflict/
[4] this piece in Foreign Policy: http://www.foreignpolicy.com/articles/2014/03/03/hack_attackhttp:/www.foreignpolicy.com/articles/2014/03/03/hack_attack
[5] was declared head: http://news.xinhuanet.com/english/china/2014-02/27/c_133148273.htm?utm_source=The+Sinocism+China+Newsletter&utm_campaign=d96724e196-Sinocism02_27_14&utm_medium=email&utm_term=0_171f237867-d96724e196-3627837
[6] airing as one of the lead stories: http://news.cntv.cn/2014/02/27/VIDE1393500060002469.shtml?utm_source=The+Sinocism+China+Newsletter&utm_campaign=d96724e196-Sinocism02_27_14&utm_medium=email&utm_term=0_171f237867-d96724e196-3627837
[7] commentary: http://www.forbes.com/sites/adamsegal/2014/02/27/chinas-new-small-leading-group-on-cybersecurity-and-internet-management/
[8] protesting against: http://stream.aljazeera.com/story/201402252104-0023508
[9] the most contentious part: http://stream.aljazeera.com/story/201210030035-0022359
[10] similar debate: http://www.techinasia.com/cyber-law-twitter-libel-indonesia-guilty/
[11] drolly noting: http://www.eweek.com/security/rsa-2014-10-takeaways-from-a-show-overshadowed-by-fractured-trust.html#sthash.5WUoO4N6.dpuf
[12] observed: http://blogs.wsj.com/cio/2014/03/03/cybersecurity-and-the-trust-deficit/
[13] keynote address: http://www.youtube.com/watch?v=XrZYBNtZW4o
[14] available here: http://www.net-security.org/secworld.php?id=16466
[15] his statement: http://www.armed-services.senate.gov/imo/media/doc/Alexander_02-27-14.pdf
[16] International Cyber Policy Centre: http://cyberpolicy.aspi.org.au/