Experts Say Australia Is Ill-equipped For Cyberwar

China is rapidly expanding its capability for cyber-enabled war, as are other nations. A leading defence scholar said Australia is 'badly lagging'. We need to catch up. Fast. But Australia seems poorly equipped to face that challenge.

"For a quarter of a century, successive Australian governments have been unable to come to terms with the full import of the digital revolution transforming the world," wrote Professor Greg Austin in his report, Australia Rearmed: Future Capabilities for Cyber-enabled Warfare, released on recently.

"This has been particularly visible in the defence sector even though our major ally, the United States, began a clear transition in the mid-1990s," he wrote.

Australia has not yet embraced the military concept of "information dominance", largely a cyberspace strategy, preferring a doctrine of "information activities" based on decades-old concepts. Australia has also been reluctant to acknowledge the US doctrine of "prompt global strike" in the cyber realm.

"Until the appointment of Malcolm Turnbull as Prime Minister in September 2015, the last Australian prime minister before him to make a speech of any significance or depth on the information revolution had been Paul Keating in 1997, and he made that one year after he left office."

Now Austin does note Turnbull's vision, "in broad terms only so far", for a 21st-century government, along with the establishment of the Digital Transformation Office, and the announcement of the "growth centre" for innovation in cybersecurity.

Austin also notes that we'll soon see the new Cyber Security Strategy white paper, delayed from its original 2015 release date because Turnbull has taken a personal interest. Against that background, Wednesday's announcement of an annual Australia-US Cyber Security Dialogue seems promising.

But he also notes some wider factors that can't be fixed quickly.

"The concept of 'information society' as framed around the world does not seem to have as much life in Australia as in most developed countries. This has had a retarding effect on the country's digital preparedness for national security purposes," Austin writes.

"While the imminent Defence White Paper is likely to provide for elaboration of doctrines of cyber-enabled war in some fashion, the elaboration of a new doctrine can only be the start of a process of change. Such processes often need decades to implement and will remain hostage to the broader levels of social response (or lack of it) to the high potential of the information revolution.

"The essence of this revolution is how information is gathered, aggregated, redistributed and used relying on advanced artificial intelligence, radically different types of IT professionals, and new, purpose-designed organisations." he said.

"In 2015, the World Economic Forum ranked China at 25th in the world in terms of the importance of ICTs in government vision of the future. Australia was at 40th, behind countries like Azerbaijan, The Gambia, Indonesia, Macedonia and New Zealand (ranked 7th). Japan, the Republic of Korea, and Malaysia were ranked ahead of China and Australia in terms of government commitment to 'network readiness' and preparation for the information age."

Could national security factors finally turn Turnbull away from his oft-stated claim that 25 megabits per second is enough for most folks? Austin also notes that the Australian government hasn't been prepared to discuss these vital strategic matters in public. America's Department of Defense Cyber Strategy of 2015 "makes plain that any country intent on fighting a cyber capable adversary will be more effective the more it can talk publicly about the detail," writes Austin.

"By comparison, there has been no such recognition in Australian policy documents of the novel, arguably central role, of cyber-enabled warfare. There has also been no recognition of the value of public engagement in devising cyber war polices."

Indeed, as I've written previously, the first threat report from the Australian Cyber Security Centre (ACSC) was so devoid of concrete detail as to be meaningless. Certain public statements by a key ACSC executive and others about taking a more risk-based approach to secrecy seemed to be directed to their own defence and intelligence community as much as to us mug citizens.

The oft-quoted figure is that 90 percent of China's leaders are scientists or engineers, and education is king. "Today in China the most impressive buildings in poor provinces are schools. In the West, it is more likely to be a shopping center, and in Africa it would be the residence of the local governor," wrote Silicon Africa. "Transformational leaders even in the West are scientists like German Chancellor Angela Merkel who has a doctorate in physical chemistry, and, going back a little bit, Margaret Thatcher earned a degree in chemistry."

Compare that with our own depressing grab-bag of party-political also-rans and prehistoric relics that Australia is blessed with. Even in the more scientifically-literate parts of The Greens, discussions about defence matters rarely get past "It's all very, very bad."

Ein News: http://bit.ly/1VBD2do

« Hackers Steal $50 Million From Leading Aviation Design Company
The World’s Most Human Robot »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

Cyberint

Cyberint

Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.