Experts Say Australia Is Ill-equipped For Cyberwar

China is rapidly expanding its capability for cyber-enabled war, as are other nations. A leading defence scholar said Australia is 'badly lagging'. We need to catch up. Fast. But Australia seems poorly equipped to face that challenge.

"For a quarter of a century, successive Australian governments have been unable to come to terms with the full import of the digital revolution transforming the world," wrote Professor Greg Austin in his report, Australia Rearmed: Future Capabilities for Cyber-enabled Warfare, released on recently.

"This has been particularly visible in the defence sector even though our major ally, the United States, began a clear transition in the mid-1990s," he wrote.

Australia has not yet embraced the military concept of "information dominance", largely a cyberspace strategy, preferring a doctrine of "information activities" based on decades-old concepts. Australia has also been reluctant to acknowledge the US doctrine of "prompt global strike" in the cyber realm.

"Until the appointment of Malcolm Turnbull as Prime Minister in September 2015, the last Australian prime minister before him to make a speech of any significance or depth on the information revolution had been Paul Keating in 1997, and he made that one year after he left office."

Now Austin does note Turnbull's vision, "in broad terms only so far", for a 21st-century government, along with the establishment of the Digital Transformation Office, and the announcement of the "growth centre" for innovation in cybersecurity.

Austin also notes that we'll soon see the new Cyber Security Strategy white paper, delayed from its original 2015 release date because Turnbull has taken a personal interest. Against that background, Wednesday's announcement of an annual Australia-US Cyber Security Dialogue seems promising.

But he also notes some wider factors that can't be fixed quickly.

"The concept of 'information society' as framed around the world does not seem to have as much life in Australia as in most developed countries. This has had a retarding effect on the country's digital preparedness for national security purposes," Austin writes.

"While the imminent Defence White Paper is likely to provide for elaboration of doctrines of cyber-enabled war in some fashion, the elaboration of a new doctrine can only be the start of a process of change. Such processes often need decades to implement and will remain hostage to the broader levels of social response (or lack of it) to the high potential of the information revolution.

"The essence of this revolution is how information is gathered, aggregated, redistributed and used relying on advanced artificial intelligence, radically different types of IT professionals, and new, purpose-designed organisations." he said.

"In 2015, the World Economic Forum ranked China at 25th in the world in terms of the importance of ICTs in government vision of the future. Australia was at 40th, behind countries like Azerbaijan, The Gambia, Indonesia, Macedonia and New Zealand (ranked 7th). Japan, the Republic of Korea, and Malaysia were ranked ahead of China and Australia in terms of government commitment to 'network readiness' and preparation for the information age."

Could national security factors finally turn Turnbull away from his oft-stated claim that 25 megabits per second is enough for most folks? Austin also notes that the Australian government hasn't been prepared to discuss these vital strategic matters in public. America's Department of Defense Cyber Strategy of 2015 "makes plain that any country intent on fighting a cyber capable adversary will be more effective the more it can talk publicly about the detail," writes Austin.

"By comparison, there has been no such recognition in Australian policy documents of the novel, arguably central role, of cyber-enabled warfare. There has also been no recognition of the value of public engagement in devising cyber war polices."

Indeed, as I've written previously, the first threat report from the Australian Cyber Security Centre (ACSC) was so devoid of concrete detail as to be meaningless. Certain public statements by a key ACSC executive and others about taking a more risk-based approach to secrecy seemed to be directed to their own defence and intelligence community as much as to us mug citizens.

The oft-quoted figure is that 90 percent of China's leaders are scientists or engineers, and education is king. "Today in China the most impressive buildings in poor provinces are schools. In the West, it is more likely to be a shopping center, and in Africa it would be the residence of the local governor," wrote Silicon Africa. "Transformational leaders even in the West are scientists like German Chancellor Angela Merkel who has a doctorate in physical chemistry, and, going back a little bit, Margaret Thatcher earned a degree in chemistry."

Compare that with our own depressing grab-bag of party-political also-rans and prehistoric relics that Australia is blessed with. Even in the more scientifically-literate parts of The Greens, discussions about defence matters rarely get past "It's all very, very bad."

Ein News: http://bit.ly/1VBD2do

« Hackers Steal $50 Million From Leading Aviation Design Company
The World’s Most Human Robot »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.

DefectDojo

DefectDojo

DefectDojo is a DevSecOps and vulnerability management tool.

ClamAV

ClamAV

ClamAV is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security.