China Is A No Fly Zone For The Australian Prime Minister

The Australian PM Anthony Albanese’s booked trip to Beijing have been cancelled following security advice because his RAAF jet it could be hacked by Chinese spies. 

Albanese will use an alternative option when he travels to China later this year after these security concerns were raised about the RAAF plane that he presently uses for international trips. Other options being considered, includeone or more of the RAAF's smaller planes, or flying Mr Albanese to a another country, before switching planes for the final leg to Beijing.

The KC-30A air-to-air refueler which the Prime Minister usually uses for international flights is a working military aircraft, albeit, with a number of modifications. As a military plane, it also has advanced communications and navigation systems, in addition to electronic self-¬protection capabilities designed to protect against surface-to-air missile attacks.

The sensitive nature of many of the plane's capabilities is likely driving concerns from Defence, with the aircraft's security on the tarmac in Beijing presenting "risks" according to shadow home affairs minister James Paterson.

In 2017, a team of United States government and industry personnel demonstrated it was possible to hack a commercial plane remotely. While the RAAF systems are more secure, it is in theory possible the same methods could be applied to the Prime Minister's plane.There is also the risk of more direct interference with the aircraft, such as the planting of bugs or other monitoring devices.

Albanese will travel next to the Philippines, the first bilateral visit by an Australian leader in 20 years, after a period of renewed tension between the Philippines and China in waters they both claim in the South China Sea.

Sky News:    Sky News:    ABC:    Sydney Mornng Herald:    The Australian:   VOA:     Reuters:      

Image: Memory Catcher

You Might Also Read: 

Chinese Hackers Have Been Reading US Government Emails:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Garbage In / Garbage Out: Training AI Algorithms
Police Access To Passport Database 'risks public trust' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

Zanasi & Partners

Zanasi & Partners

Zanasi & Partners is a security research and advisory company active in the EU and MENA areas. Services focus on technology solutions.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

Gradient Cyber

Gradient Cyber

Gradient Cyber is a trusted cybersecurity partner specializing in small businesses and mid-market enterprises concerned about cybersecurity but lacking the staff to give it the attention it deserves.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.