Australia Goes To Cyberwar With Islamic State

Australia is using offensive cyber capabilities to fight Islamic State in the virtual world.

Even as the war against ISIS intensifies on ground in both Iraq and Syria Australia has now said that it has been waging a cyber war against the world’s most dangerous terrorist group. 

Australian Prime Minister Malcolm Turnbull said in a message to the parliament recently that in addition to supporting allied forces in Iraq and Syria in the war against ISIS, Australia is using offensive cyber capabilities to fight the war in the virtual world.

Turnbull added that the country’s cyber war was making a real difference to operations in Syria and Iraq and was subject to international rules of engagement.

In April this year, Turnbull had launched the government’s $230 million Cyber Security Strategy under the guidance of the Australian Signals Directorate (ASD) to acknowledge its offensive cyber capabilities. 

No country in recent times has invested such a high amount in dealing with cyber threats. Even America, which has been targeted several times over the last few years, hasn’t invested such a huge amount to bolster its cyber defense.

Then in July, a massive recruitment drive was held to strengthen the unit.

Turnbull emphasized in a ministerial statement that all offensive cyber operations were “subject to stringent legal oversight” and “consistent with our support for the International rules-based order and our obligations under international law.”

He acknowledged the fact that cyber-warfare was fairly new but he believed it was of increasing importance.

Acknowledging the hurdles that have been faced, he said, “Increasingly widespread use of encrypted communications platforms makes the detection and interception of terrorist communications far more difficult. Human intelligence and the strong relationships and trust on which it depends are more important than ever.”

Domestically, the country has faced several cyber-attacks including a massive attack on its Defence, Meteorological Department and Austrade. Approximately, 1,095 security incidents on Government systems were recorded in the last financial year.

While opposition leader Bill Shorten agreed with the PM on neutralizing Islamic States’ cyber capabilities, he also called for improved cyber security in the domestic business sectors, especially the small and medium-sized businesses.  

“They need help in the way that's simple enough for them to incorporate it into their business and that they can afford. This means having the resources to design cyber defences for products, processes, and people,” Shorten said.

He further claimed that trust and collaboration should be present in every cybersecurity conversation as no government could act alone to combat threats.

"We must collaborate with the private sector, sharing information and strategies, learning from each other's successes and the failures," Shorten said.

Adding, “That is true for our collaboration with international peers, we must seek a new layer of engagement with our old allies and partners, recognizing the frameworks and treaties written for a Cold War world need to be updated for an age where people can Google bomb-making instructions and 3D print guns," he added.

As the global warfare has changed from hand-to-hand battle to cyber warfare, Australia’s advancement in cyber security is important to prevent the country's government and non-government agencies and institutions from attack, Shorten, stated.

While Turnbull called for intensified cyber warfare against ISIS, the Cyber Security Minister, Dan Tehan warned that the country’s defence against cyber-attacks needed improvement to keep up with growing online crimes and espionage. According to him, Australia is still vulnerable to serious cyber-attacks.

He said, “Cyber storms will continue to happen around the world. Malicious state actors are actively using cyber technology against our government and our businesses. Cyber-crime is growing; hackers are still trying to prove that no system is secure. Let's be under no illusion, a serious cyber-attack has the potential to cause the same damage as a terrorist attack.”

Greg Austin, a professor of cyber security at the University of New South Wales praised Tehan for his frank approach to the threats and said, “The Minister made a great breakthrough in public policy for Australia by being much more open with the Australian public about the threat about extreme cyber-attack. He called his address 'cyber storm', and that's the sort of understand that the Australian public needs about the type of threat we face.”

Ein News:               Australia Lagging in Cyber War:
 

« War In The Information Age
IBM’s Watson Will Use AI To Treat Cancer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Cyber Skyline

Cyber Skyline

Cyber Skyline is a revolutionary cloud platform to practice, develop, and measure your team's technical cybersecurity skills.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.