Australia Goes To Cyberwar With Islamic State

Australia is using offensive cyber capabilities to fight Islamic State in the virtual world.

Even as the war against ISIS intensifies on ground in both Iraq and Syria Australia has now said that it has been waging a cyber war against the world’s most dangerous terrorist group. 

Australian Prime Minister Malcolm Turnbull said in a message to the parliament recently that in addition to supporting allied forces in Iraq and Syria in the war against ISIS, Australia is using offensive cyber capabilities to fight the war in the virtual world.

Turnbull added that the country’s cyber war was making a real difference to operations in Syria and Iraq and was subject to international rules of engagement.

In April this year, Turnbull had launched the government’s $230 million Cyber Security Strategy under the guidance of the Australian Signals Directorate (ASD) to acknowledge its offensive cyber capabilities. 

No country in recent times has invested such a high amount in dealing with cyber threats. Even America, which has been targeted several times over the last few years, hasn’t invested such a huge amount to bolster its cyber defense.

Then in July, a massive recruitment drive was held to strengthen the unit.

Turnbull emphasized in a ministerial statement that all offensive cyber operations were “subject to stringent legal oversight” and “consistent with our support for the International rules-based order and our obligations under international law.”

He acknowledged the fact that cyber-warfare was fairly new but he believed it was of increasing importance.

Acknowledging the hurdles that have been faced, he said, “Increasingly widespread use of encrypted communications platforms makes the detection and interception of terrorist communications far more difficult. Human intelligence and the strong relationships and trust on which it depends are more important than ever.”

Domestically, the country has faced several cyber-attacks including a massive attack on its Defence, Meteorological Department and Austrade. Approximately, 1,095 security incidents on Government systems were recorded in the last financial year.

While opposition leader Bill Shorten agreed with the PM on neutralizing Islamic States’ cyber capabilities, he also called for improved cyber security in the domestic business sectors, especially the small and medium-sized businesses.  

“They need help in the way that's simple enough for them to incorporate it into their business and that they can afford. This means having the resources to design cyber defences for products, processes, and people,” Shorten said.

He further claimed that trust and collaboration should be present in every cybersecurity conversation as no government could act alone to combat threats.

"We must collaborate with the private sector, sharing information and strategies, learning from each other's successes and the failures," Shorten said.

Adding, “That is true for our collaboration with international peers, we must seek a new layer of engagement with our old allies and partners, recognizing the frameworks and treaties written for a Cold War world need to be updated for an age where people can Google bomb-making instructions and 3D print guns," he added.

As the global warfare has changed from hand-to-hand battle to cyber warfare, Australia’s advancement in cyber security is important to prevent the country's government and non-government agencies and institutions from attack, Shorten, stated.

While Turnbull called for intensified cyber warfare against ISIS, the Cyber Security Minister, Dan Tehan warned that the country’s defence against cyber-attacks needed improvement to keep up with growing online crimes and espionage. According to him, Australia is still vulnerable to serious cyber-attacks.

He said, “Cyber storms will continue to happen around the world. Malicious state actors are actively using cyber technology against our government and our businesses. Cyber-crime is growing; hackers are still trying to prove that no system is secure. Let's be under no illusion, a serious cyber-attack has the potential to cause the same damage as a terrorist attack.”

Greg Austin, a professor of cyber security at the University of New South Wales praised Tehan for his frank approach to the threats and said, “The Minister made a great breakthrough in public policy for Australia by being much more open with the Australian public about the threat about extreme cyber-attack. He called his address 'cyber storm', and that's the sort of understand that the Australian public needs about the type of threat we face.”

Ein News:               Australia Lagging in Cyber War:
 

« War In The Information Age
IBM’s Watson Will Use AI To Treat Cancer »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Acuity RM Group

Acuity RM Group

Acuity RM Group helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

SubRosa Cyber Solutions

SubRosa Cyber Solutions

SubRosa Cyber Solutions solves its clients’ most tenacious information security, risk and compliance challenges through a multitude of information technology services and expertise.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

Noerr

Noerr

Noerr is one of the top European law firms with 500 professionals in Germany, Europe and the USA. We provide solutions to complex and sophisticated legal matters including cyber risks.

BlastWave

BlastWave

BlastWave deliver Operational Technology Cybersecurity solutions that minimize the available attack surface and protect against the rising tide of AI-powered cyber attacks.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Cyderes

Cyderes

Cyderes (Cyber Defense and Response) is a global, pure-play, full life-cycle cyber security services provider formed from the merger of Herjavec Group and Fishtech Group in 2022.