Australia Goes To Cyberwar With Islamic State

Australia is using offensive cyber capabilities to fight Islamic State in the virtual world.

Even as the war against ISIS intensifies on ground in both Iraq and Syria Australia has now said that it has been waging a cyber war against the world’s most dangerous terrorist group. 

Australian Prime Minister Malcolm Turnbull said in a message to the parliament recently that in addition to supporting allied forces in Iraq and Syria in the war against ISIS, Australia is using offensive cyber capabilities to fight the war in the virtual world.

Turnbull added that the country’s cyber war was making a real difference to operations in Syria and Iraq and was subject to international rules of engagement.

In April this year, Turnbull had launched the government’s $230 million Cyber Security Strategy under the guidance of the Australian Signals Directorate (ASD) to acknowledge its offensive cyber capabilities. 

No country in recent times has invested such a high amount in dealing with cyber threats. Even America, which has been targeted several times over the last few years, hasn’t invested such a huge amount to bolster its cyber defense.

Then in July, a massive recruitment drive was held to strengthen the unit.

Turnbull emphasized in a ministerial statement that all offensive cyber operations were “subject to stringent legal oversight” and “consistent with our support for the International rules-based order and our obligations under international law.”

He acknowledged the fact that cyber-warfare was fairly new but he believed it was of increasing importance.

Acknowledging the hurdles that have been faced, he said, “Increasingly widespread use of encrypted communications platforms makes the detection and interception of terrorist communications far more difficult. Human intelligence and the strong relationships and trust on which it depends are more important than ever.”

Domestically, the country has faced several cyber-attacks including a massive attack on its Defence, Meteorological Department and Austrade. Approximately, 1,095 security incidents on Government systems were recorded in the last financial year.

While opposition leader Bill Shorten agreed with the PM on neutralizing Islamic States’ cyber capabilities, he also called for improved cyber security in the domestic business sectors, especially the small and medium-sized businesses.  

“They need help in the way that's simple enough for them to incorporate it into their business and that they can afford. This means having the resources to design cyber defences for products, processes, and people,” Shorten said.

He further claimed that trust and collaboration should be present in every cybersecurity conversation as no government could act alone to combat threats.

"We must collaborate with the private sector, sharing information and strategies, learning from each other's successes and the failures," Shorten said.

Adding, “That is true for our collaboration with international peers, we must seek a new layer of engagement with our old allies and partners, recognizing the frameworks and treaties written for a Cold War world need to be updated for an age where people can Google bomb-making instructions and 3D print guns," he added.

As the global warfare has changed from hand-to-hand battle to cyber warfare, Australia’s advancement in cyber security is important to prevent the country's government and non-government agencies and institutions from attack, Shorten, stated.

While Turnbull called for intensified cyber warfare against ISIS, the Cyber Security Minister, Dan Tehan warned that the country’s defence against cyber-attacks needed improvement to keep up with growing online crimes and espionage. According to him, Australia is still vulnerable to serious cyber-attacks.

He said, “Cyber storms will continue to happen around the world. Malicious state actors are actively using cyber technology against our government and our businesses. Cyber-crime is growing; hackers are still trying to prove that no system is secure. Let's be under no illusion, a serious cyber-attack has the potential to cause the same damage as a terrorist attack.”

Greg Austin, a professor of cyber security at the University of New South Wales praised Tehan for his frank approach to the threats and said, “The Minister made a great breakthrough in public policy for Australia by being much more open with the Australian public about the threat about extreme cyber-attack. He called his address 'cyber storm', and that's the sort of understand that the Australian public needs about the type of threat we face.”

Ein News:               Australia Lagging in Cyber War:
 

« War In The Information Age
IBM’s Watson Will Use AI To Treat Cancer »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

FortifyData

FortifyData

FortifyData is the next generation of cyber risk management–a comprehensive platform that continuously evaluates your third-party, internal and people risks.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

Cyviation

Cyviation

Cyviation's mission is to mitigate ever-growing and menacing Cyber Security threats, focusing on aircraft, airlines and airports.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.