Experts Say Australia Is Ill-equipped For Cyberwar

China is rapidly expanding its capability for cyber-enabled war, as are other nations. A leading defence scholar said Australia is 'badly lagging'. We need to catch up. Fast. But Australia seems poorly equipped to face that challenge.

"For a quarter of a century, successive Australian governments have been unable to come to terms with the full import of the digital revolution transforming the world," wrote Professor Greg Austin in his report, Australia Rearmed: Future Capabilities for Cyber-enabled Warfare, released on recently.

"This has been particularly visible in the defence sector even though our major ally, the United States, began a clear transition in the mid-1990s," he wrote.

Australia has not yet embraced the military concept of "information dominance", largely a cyberspace strategy, preferring a doctrine of "information activities" based on decades-old concepts. Australia has also been reluctant to acknowledge the US doctrine of "prompt global strike" in the cyber realm.

"Until the appointment of Malcolm Turnbull as Prime Minister in September 2015, the last Australian prime minister before him to make a speech of any significance or depth on the information revolution had been Paul Keating in 1997, and he made that one year after he left office."

Now Austin does note Turnbull's vision, "in broad terms only so far", for a 21st-century government, along with the establishment of the Digital Transformation Office, and the announcement of the "growth centre" for innovation in cybersecurity.

Austin also notes that we'll soon see the new Cyber Security Strategy white paper, delayed from its original 2015 release date because Turnbull has taken a personal interest. Against that background, Wednesday's announcement of an annual Australia-US Cyber Security Dialogue seems promising.

But he also notes some wider factors that can't be fixed quickly.

"The concept of 'information society' as framed around the world does not seem to have as much life in Australia as in most developed countries. This has had a retarding effect on the country's digital preparedness for national security purposes," Austin writes.

"While the imminent Defence White Paper is likely to provide for elaboration of doctrines of cyber-enabled war in some fashion, the elaboration of a new doctrine can only be the start of a process of change. Such processes often need decades to implement and will remain hostage to the broader levels of social response (or lack of it) to the high potential of the information revolution.

"The essence of this revolution is how information is gathered, aggregated, redistributed and used relying on advanced artificial intelligence, radically different types of IT professionals, and new, purpose-designed organisations." he said.

"In 2015, the World Economic Forum ranked China at 25th in the world in terms of the importance of ICTs in government vision of the future. Australia was at 40th, behind countries like Azerbaijan, The Gambia, Indonesia, Macedonia and New Zealand (ranked 7th). Japan, the Republic of Korea, and Malaysia were ranked ahead of China and Australia in terms of government commitment to 'network readiness' and preparation for the information age."

Could national security factors finally turn Turnbull away from his oft-stated claim that 25 megabits per second is enough for most folks? Austin also notes that the Australian government hasn't been prepared to discuss these vital strategic matters in public. America's Department of Defense Cyber Strategy of 2015 "makes plain that any country intent on fighting a cyber capable adversary will be more effective the more it can talk publicly about the detail," writes Austin.

"By comparison, there has been no such recognition in Australian policy documents of the novel, arguably central role, of cyber-enabled warfare. There has also been no recognition of the value of public engagement in devising cyber war polices."

Indeed, as I've written previously, the first threat report from the Australian Cyber Security Centre (ACSC) was so devoid of concrete detail as to be meaningless. Certain public statements by a key ACSC executive and others about taking a more risk-based approach to secrecy seemed to be directed to their own defence and intelligence community as much as to us mug citizens.

The oft-quoted figure is that 90 percent of China's leaders are scientists or engineers, and education is king. "Today in China the most impressive buildings in poor provinces are schools. In the West, it is more likely to be a shopping center, and in Africa it would be the residence of the local governor," wrote Silicon Africa. "Transformational leaders even in the West are scientists like German Chancellor Angela Merkel who has a doctorate in physical chemistry, and, going back a little bit, Margaret Thatcher earned a degree in chemistry."

Compare that with our own depressing grab-bag of party-political also-rans and prehistoric relics that Australia is blessed with. Even in the more scientifically-literate parts of The Greens, discussions about defence matters rarely get past "It's all very, very bad."

Ein News: http://bit.ly/1VBD2do

« Hackers Steal $50 Million From Leading Aviation Design Company
The World’s Most Human Robot »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

ComoNExT Innovation Hub

ComoNExT Innovation Hub

ComoNExT is a Digital Innovation Hub and a startup incubator with a focus on the issues of digital transformation and Industry 4.0.

Com Laude

Com Laude

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.