New Zealand’s Defence Is Playing Catch Up

Not Before Time: The New Zealand Defence Force will begin to be equipped with a cyber warfare capability.

Several months behind schedule, the New Zealand Defence White Paper has been released . It has earmarked funding of around NZ$20 billion (US$14 billion) over 15 years for defense, which will be used, among other things, to replace frigates and aircraft and to provide the New Zealand Defence Force with a cyber warfare capability.

This investment is the equivalent of one percent of New Zealand’s GDP, or around half the proportion of GDP spent by Australia and the United Kingdom on defense, and as such is small by international standards. Nevertheless, it adds an extra NZ$1.3 billion per year to the budget of the country’s defense forces.

The increase is seen by many as conservative in light of modest military spending by the New Zealand Government in recent decades. According to Waikato University law professor Alexander Gillespie, “We’re keeping pace with what we’ve got, we’re not expanding the base. We haven’t got a military strike wing, like the Australians have and haven’t got submarines like the Australians have, so we’re still keeping up but we’re not expanding.”

According to the opposition Labour Party’s defense spokesperson, Phil Goff, “much of what the Government is intending to spend is simply catch up.” His comments focus on personnel numbers, which at 11,440 (regular forces) he says are down eight percent on 2009. “The Auditor-General has reported that it will take the Army 11 years and the Navy 16 years to recover the capabilities they had in 2008/09,” he stated in a media release.

While this measured increase is perhaps in line with the White Paper’s assessment that there is presently no direct military threat to New Zealand, Prime Minister John Key commented that factors such as the growth in military spending by Southeast Asian nations makes defense more important and complex than ever. “The emergence of ISIL, heightened tensions in the east and south China seas, and the rapid evolution and spread of cyber threats are just a few examples. New Zealand’s geological no longer provides the protection it once did,” he said at the White Paper’s launch.

Widely seen as a big change in this White Paper from the previous paper published in 2010 is its focus on cybersecurity in terms of both national resilience and the protection of defense systems. Noting the threat posed by increasing reliance on networked technology, it stated that New Zealand has an interest in “contributing to international cyberspace and space efforts to protect this infrastructure from being exploited or disrupted.”

While not providing specifics in relation to what a cyber warfare capability may look like, Defense Minister Gerry Brownlee stated that “it will be a significant number of people who are deployed into the armed forces or from the armed forces who will specialize, to a greater extent, in this sort of deterrent.” In a television interview subsequent to the White Paper release, Brownlee indicated that this would include a capability to defend and to offensively retaliate against cyber-attacks.

However, enhanced cyber capability – like much of what is listed in the White Paper – is also widely seen as merely a “catch up” measure. Cybersecurity, in general, is an area in which New Zealand has been seen as complacent at a national, government, and enterprise level.

It was only last month that Communications Minister Amy Adams announced the government would invest NZ$20 million over four years on a new national Computer Emergency Response Team (CERT) to combat cyber-attacks and cybercrime. Over 100 countries already have CERTs, and Australia’s – just next door – has been operating for more than two decades. With NZ$257 million lost to cyber-attacks last year, the move has been criticized by some cyber security experts in New Zealand as a case of too little too late.

With the White Paper now committing billions to the process of “catching up,” time will now tell whether it can ultimately deliver adequate and timely outcomes.

Ein News: 

« Cyber Insurance Is Changing How We Look At Risk
A Nano Generator To Power New Smart Cities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Edureka

Edureka

Edureka is an online technology training provider with the most effective learning system in the world. We help professionals learn trending technologies for career growth.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.