China Is A No Fly Zone For The Australian Prime Minister

The Australian PM Anthony Albanese’s booked trip to Beijing have been cancelled following security advice because his RAAF jet it could be hacked by Chinese spies. 

Albanese will use an alternative option when he travels to China later this year after these security concerns were raised about the RAAF plane that he presently uses for international trips. Other options being considered, includeone or more of the RAAF's smaller planes, or flying Mr Albanese to a another country, before switching planes for the final leg to Beijing.

The KC-30A air-to-air refueler which the Prime Minister usually uses for international flights is a working military aircraft, albeit, with a number of modifications. As a military plane, it also has advanced communications and navigation systems, in addition to electronic self-¬protection capabilities designed to protect against surface-to-air missile attacks.

The sensitive nature of many of the plane's capabilities is likely driving concerns from Defence, with the aircraft's security on the tarmac in Beijing presenting "risks" according to shadow home affairs minister James Paterson.

In 2017, a team of United States government and industry personnel demonstrated it was possible to hack a commercial plane remotely. While the RAAF systems are more secure, it is in theory possible the same methods could be applied to the Prime Minister's plane.There is also the risk of more direct interference with the aircraft, such as the planting of bugs or other monitoring devices.

Albanese will travel next to the Philippines, the first bilateral visit by an Australian leader in 20 years, after a period of renewed tension between the Philippines and China in waters they both claim in the South China Sea.

Sky News:    Sky News:    ABC:    Sydney Mornng Herald:    The Australian:   VOA:     Reuters:      

Image: Memory Catcher

You Might Also Read: 

Chinese Hackers Have Been Reading US Government Emails:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Garbage In / Garbage Out: Training AI Algorithms
Police Access To Passport Database 'risks public trust' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.