China Is A No Fly Zone For The Australian Prime Minister

The Australian PM Anthony Albanese’s booked trip to Beijing have been cancelled following security advice because his RAAF jet it could be hacked by Chinese spies. 

Albanese will use an alternative option when he travels to China later this year after these security concerns were raised about the RAAF plane that he presently uses for international trips. Other options being considered, includeone or more of the RAAF's smaller planes, or flying Mr Albanese to a another country, before switching planes for the final leg to Beijing.

The KC-30A air-to-air refueler which the Prime Minister usually uses for international flights is a working military aircraft, albeit, with a number of modifications. As a military plane, it also has advanced communications and navigation systems, in addition to electronic self-¬protection capabilities designed to protect against surface-to-air missile attacks.

The sensitive nature of many of the plane's capabilities is likely driving concerns from Defence, with the aircraft's security on the tarmac in Beijing presenting "risks" according to shadow home affairs minister James Paterson.

In 2017, a team of United States government and industry personnel demonstrated it was possible to hack a commercial plane remotely. While the RAAF systems are more secure, it is in theory possible the same methods could be applied to the Prime Minister's plane.There is also the risk of more direct interference with the aircraft, such as the planting of bugs or other monitoring devices.

Albanese will travel next to the Philippines, the first bilateral visit by an Australian leader in 20 years, after a period of renewed tension between the Philippines and China in waters they both claim in the South China Sea.

Sky News:    Sky News:    ABC:    Sydney Mornng Herald:    The Australian:   VOA:     Reuters:      

Image: Memory Catcher

You Might Also Read: 

Chinese Hackers Have Been Reading US Government Emails:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Garbage In / Garbage Out: Training AI Algorithms
Police Access To Passport Database 'risks public trust' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

ReformIT

ReformIT

ReformIT is a Managed IT Service and Security provider with many years experience helping companies find the right IT solutions to meet the needs of their businesses.