Experts Say Australia Is Ill-equipped For Cyberwar

China is rapidly expanding its capability for cyber-enabled war, as are other nations. A leading defence scholar said Australia is 'badly lagging'. We need to catch up. Fast. But Australia seems poorly equipped to face that challenge.

"For a quarter of a century, successive Australian governments have been unable to come to terms with the full import of the digital revolution transforming the world," wrote Professor Greg Austin in his report, Australia Rearmed: Future Capabilities for Cyber-enabled Warfare, released on recently.

"This has been particularly visible in the defence sector even though our major ally, the United States, began a clear transition in the mid-1990s," he wrote.

Australia has not yet embraced the military concept of "information dominance", largely a cyberspace strategy, preferring a doctrine of "information activities" based on decades-old concepts. Australia has also been reluctant to acknowledge the US doctrine of "prompt global strike" in the cyber realm.

"Until the appointment of Malcolm Turnbull as Prime Minister in September 2015, the last Australian prime minister before him to make a speech of any significance or depth on the information revolution had been Paul Keating in 1997, and he made that one year after he left office."

Now Austin does note Turnbull's vision, "in broad terms only so far", for a 21st-century government, along with the establishment of the Digital Transformation Office, and the announcement of the "growth centre" for innovation in cybersecurity.

Austin also notes that we'll soon see the new Cyber Security Strategy white paper, delayed from its original 2015 release date because Turnbull has taken a personal interest. Against that background, Wednesday's announcement of an annual Australia-US Cyber Security Dialogue seems promising.

But he also notes some wider factors that can't be fixed quickly.

"The concept of 'information society' as framed around the world does not seem to have as much life in Australia as in most developed countries. This has had a retarding effect on the country's digital preparedness for national security purposes," Austin writes.

"While the imminent Defence White Paper is likely to provide for elaboration of doctrines of cyber-enabled war in some fashion, the elaboration of a new doctrine can only be the start of a process of change. Such processes often need decades to implement and will remain hostage to the broader levels of social response (or lack of it) to the high potential of the information revolution.

"The essence of this revolution is how information is gathered, aggregated, redistributed and used relying on advanced artificial intelligence, radically different types of IT professionals, and new, purpose-designed organisations." he said.

"In 2015, the World Economic Forum ranked China at 25th in the world in terms of the importance of ICTs in government vision of the future. Australia was at 40th, behind countries like Azerbaijan, The Gambia, Indonesia, Macedonia and New Zealand (ranked 7th). Japan, the Republic of Korea, and Malaysia were ranked ahead of China and Australia in terms of government commitment to 'network readiness' and preparation for the information age."

Could national security factors finally turn Turnbull away from his oft-stated claim that 25 megabits per second is enough for most folks? Austin also notes that the Australian government hasn't been prepared to discuss these vital strategic matters in public. America's Department of Defense Cyber Strategy of 2015 "makes plain that any country intent on fighting a cyber capable adversary will be more effective the more it can talk publicly about the detail," writes Austin.

"By comparison, there has been no such recognition in Australian policy documents of the novel, arguably central role, of cyber-enabled warfare. There has also been no recognition of the value of public engagement in devising cyber war polices."

Indeed, as I've written previously, the first threat report from the Australian Cyber Security Centre (ACSC) was so devoid of concrete detail as to be meaningless. Certain public statements by a key ACSC executive and others about taking a more risk-based approach to secrecy seemed to be directed to their own defence and intelligence community as much as to us mug citizens.

The oft-quoted figure is that 90 percent of China's leaders are scientists or engineers, and education is king. "Today in China the most impressive buildings in poor provinces are schools. In the West, it is more likely to be a shopping center, and in Africa it would be the residence of the local governor," wrote Silicon Africa. "Transformational leaders even in the West are scientists like German Chancellor Angela Merkel who has a doctorate in physical chemistry, and, going back a little bit, Margaret Thatcher earned a degree in chemistry."

Compare that with our own depressing grab-bag of party-political also-rans and prehistoric relics that Australia is blessed with. Even in the more scientifically-literate parts of The Greens, discussions about defence matters rarely get past "It's all very, very bad."

Ein News: http://bit.ly/1VBD2do

« Hackers Steal $50 Million From Leading Aviation Design Company
The World’s Most Human Robot »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

BCN Group

BCN Group

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

The CyberWire

The CyberWire

The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

Twilio

Twilio

Twilio are the customer layer for the internet, powering the most engaging interactions companies build for their customers. We provide simple tools that solve hard problems.

Prefactor

Prefactor

Prefactor was built because the problem of authenticating and authorizing users continues to be a battle engineers face globally.