Australia Goes To Cyberwar With Islamic State

Australia is using offensive cyber capabilities to fight Islamic State in the virtual world.

Even as the war against ISIS intensifies on ground in both Iraq and Syria Australia has now said that it has been waging a cyber war against the world’s most dangerous terrorist group. 

Australian Prime Minister Malcolm Turnbull said in a message to the parliament recently that in addition to supporting allied forces in Iraq and Syria in the war against ISIS, Australia is using offensive cyber capabilities to fight the war in the virtual world.

Turnbull added that the country’s cyber war was making a real difference to operations in Syria and Iraq and was subject to international rules of engagement.

In April this year, Turnbull had launched the government’s $230 million Cyber Security Strategy under the guidance of the Australian Signals Directorate (ASD) to acknowledge its offensive cyber capabilities. 

No country in recent times has invested such a high amount in dealing with cyber threats. Even America, which has been targeted several times over the last few years, hasn’t invested such a huge amount to bolster its cyber defense.

Then in July, a massive recruitment drive was held to strengthen the unit.

Turnbull emphasized in a ministerial statement that all offensive cyber operations were “subject to stringent legal oversight” and “consistent with our support for the International rules-based order and our obligations under international law.”

He acknowledged the fact that cyber-warfare was fairly new but he believed it was of increasing importance.

Acknowledging the hurdles that have been faced, he said, “Increasingly widespread use of encrypted communications platforms makes the detection and interception of terrorist communications far more difficult. Human intelligence and the strong relationships and trust on which it depends are more important than ever.”

Domestically, the country has faced several cyber-attacks including a massive attack on its Defence, Meteorological Department and Austrade. Approximately, 1,095 security incidents on Government systems were recorded in the last financial year.

While opposition leader Bill Shorten agreed with the PM on neutralizing Islamic States’ cyber capabilities, he also called for improved cyber security in the domestic business sectors, especially the small and medium-sized businesses.  

“They need help in the way that's simple enough for them to incorporate it into their business and that they can afford. This means having the resources to design cyber defences for products, processes, and people,” Shorten said.

He further claimed that trust and collaboration should be present in every cybersecurity conversation as no government could act alone to combat threats.

"We must collaborate with the private sector, sharing information and strategies, learning from each other's successes and the failures," Shorten said.

Adding, “That is true for our collaboration with international peers, we must seek a new layer of engagement with our old allies and partners, recognizing the frameworks and treaties written for a Cold War world need to be updated for an age where people can Google bomb-making instructions and 3D print guns," he added.

As the global warfare has changed from hand-to-hand battle to cyber warfare, Australia’s advancement in cyber security is important to prevent the country's government and non-government agencies and institutions from attack, Shorten, stated.

While Turnbull called for intensified cyber warfare against ISIS, the Cyber Security Minister, Dan Tehan warned that the country’s defence against cyber-attacks needed improvement to keep up with growing online crimes and espionage. According to him, Australia is still vulnerable to serious cyber-attacks.

He said, “Cyber storms will continue to happen around the world. Malicious state actors are actively using cyber technology against our government and our businesses. Cyber-crime is growing; hackers are still trying to prove that no system is secure. Let's be under no illusion, a serious cyber-attack has the potential to cause the same damage as a terrorist attack.”

Greg Austin, a professor of cyber security at the University of New South Wales praised Tehan for his frank approach to the threats and said, “The Minister made a great breakthrough in public policy for Australia by being much more open with the Australian public about the threat about extreme cyber-attack. He called his address 'cyber storm', and that's the sort of understand that the Australian public needs about the type of threat we face.”

Ein News:               Australia Lagging in Cyber War:
 

« War In The Information Age
IBM’s Watson Will Use AI To Treat Cancer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.