Australia Goes To Cyberwar With Islamic State

Australia is using offensive cyber capabilities to fight Islamic State in the virtual world.

Even as the war against ISIS intensifies on ground in both Iraq and Syria Australia has now said that it has been waging a cyber war against the world’s most dangerous terrorist group. 

Australian Prime Minister Malcolm Turnbull said in a message to the parliament recently that in addition to supporting allied forces in Iraq and Syria in the war against ISIS, Australia is using offensive cyber capabilities to fight the war in the virtual world.

Turnbull added that the country’s cyber war was making a real difference to operations in Syria and Iraq and was subject to international rules of engagement.

In April this year, Turnbull had launched the government’s $230 million Cyber Security Strategy under the guidance of the Australian Signals Directorate (ASD) to acknowledge its offensive cyber capabilities. 

No country in recent times has invested such a high amount in dealing with cyber threats. Even America, which has been targeted several times over the last few years, hasn’t invested such a huge amount to bolster its cyber defense.

Then in July, a massive recruitment drive was held to strengthen the unit.

Turnbull emphasized in a ministerial statement that all offensive cyber operations were “subject to stringent legal oversight” and “consistent with our support for the International rules-based order and our obligations under international law.”

He acknowledged the fact that cyber-warfare was fairly new but he believed it was of increasing importance.

Acknowledging the hurdles that have been faced, he said, “Increasingly widespread use of encrypted communications platforms makes the detection and interception of terrorist communications far more difficult. Human intelligence and the strong relationships and trust on which it depends are more important than ever.”

Domestically, the country has faced several cyber-attacks including a massive attack on its Defence, Meteorological Department and Austrade. Approximately, 1,095 security incidents on Government systems were recorded in the last financial year.

While opposition leader Bill Shorten agreed with the PM on neutralizing Islamic States’ cyber capabilities, he also called for improved cyber security in the domestic business sectors, especially the small and medium-sized businesses.  

“They need help in the way that's simple enough for them to incorporate it into their business and that they can afford. This means having the resources to design cyber defences for products, processes, and people,” Shorten said.

He further claimed that trust and collaboration should be present in every cybersecurity conversation as no government could act alone to combat threats.

"We must collaborate with the private sector, sharing information and strategies, learning from each other's successes and the failures," Shorten said.

Adding, “That is true for our collaboration with international peers, we must seek a new layer of engagement with our old allies and partners, recognizing the frameworks and treaties written for a Cold War world need to be updated for an age where people can Google bomb-making instructions and 3D print guns," he added.

As the global warfare has changed from hand-to-hand battle to cyber warfare, Australia’s advancement in cyber security is important to prevent the country's government and non-government agencies and institutions from attack, Shorten, stated.

While Turnbull called for intensified cyber warfare against ISIS, the Cyber Security Minister, Dan Tehan warned that the country’s defence against cyber-attacks needed improvement to keep up with growing online crimes and espionage. According to him, Australia is still vulnerable to serious cyber-attacks.

He said, “Cyber storms will continue to happen around the world. Malicious state actors are actively using cyber technology against our government and our businesses. Cyber-crime is growing; hackers are still trying to prove that no system is secure. Let's be under no illusion, a serious cyber-attack has the potential to cause the same damage as a terrorist attack.”

Greg Austin, a professor of cyber security at the University of New South Wales praised Tehan for his frank approach to the threats and said, “The Minister made a great breakthrough in public policy for Australia by being much more open with the Australian public about the threat about extreme cyber-attack. He called his address 'cyber storm', and that's the sort of understand that the Australian public needs about the type of threat we face.”

Ein News:               Australia Lagging in Cyber War:
 

« War In The Information Age
IBM’s Watson Will Use AI To Treat Cancer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

MindPoint Group

MindPoint Group

MindPoint Group is a specialist Information Security Consulting firm.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

CloudScale365

CloudScale365

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.