Tag Archive for: Cyber

Australia and South Korea: leveraging the strategic potential of cooperation in critical technologies

Executive summary

Cooperation between Australia and the Republic of Korea (hereafter South Korea or the ROK) in a range of critical technology areas has grown rapidly in recent years. Underpinned by the Australia – South Korea Memorandum of Understanding (MoU) on Cyber and Critical Technology Cooperation signed in 2021, collaboration is currently centred around emerging technologies, including next-generation telecommunications, artificial intelligence (AI) and quantum computing. Such technologies are deemed to be critical due to their potential to enhance or threaten societies, economies and national security. Most are dual- or multi-use and have applications in a wide range of sectors.1

Intensifying geostrategic competition is threatening stability and prosperity in the Indo-Pacific region. Particularly alarming is competition in the technological domain. ASPI’s Critical Technology Tracker, a large data-driven project that now covers 64 critical technologies and focuses on high-impact research, reveals a stunning shift in research ‘technology leadership’ over the past two decades. Where the United States (US) led in 60 of the 64 technologies in the five years between 2003 and 2007, the US’s lead has decreased to seven technologies in the most recent five years (2019–2023). Instead, China now leads in 57 of those technologies.

Within the Indo-Pacific region, some countries have responded to those shifts in technology leadership through the introduction of policies aimed at building ‘technological sovereignty’. The restriction of high-risk vendors from critical infrastructure, the creation of sovereign industrial bases and supply-chain diversification are examples of this approach. But a sovereign approach doesn’t mean protectionism. Rather, many countries, including Australia and South Korea, are collaborating with like-minded regional partners to further their respective national interests and support regional resilience through a series of minilateral frameworks.

The Australia – South Korea technological relationship already benefits from strong foundations, but it’s increasingly important that both partners turn promise into reality. It would be beneficial for Australia and South Korea to leverage their respective strengths and ensure that collaboration evolves in a strategic manner. Both countries are leaders in research and development (R&D) related to science and technology (S&T) and are actively involved in international partnerships for standards-setting relating to AI and other technologies. Furthermore, both countries possess complementary industry sectors, as demonstrated through Australia’s critical-minerals development and existing space-launch capabilities on one hand, and South Korea’s domestic capacity for advanced manufacturing on the other.

This report examines four stages common to technological life cycles — (1) R&D and innovation; (2) building blocks for manufacturing; (3) testing and application; and (4) standards and norms. For each, we examine a specific critical technology of interest. Those four life-cycle areas and respective technologies—spanning biotechnologies-related R&D, manufacturing electric-battery materials, satellite launches and AI standards-setting—were chosen as each is a technology of focus for both countries. Furthermore, collaboration through these specific technological stages enables Australia and South Korea to leverage their existing strengths in a complementary manner (see Figure 1). Supporting the analysis of these four stages of the technological life cycle and selected critical technologies is data from ASPI’s Critical Technology Tracker and the Composite Science and Technology Innovation Index (COSTII) jointly released by South Korea’s Ministry of Science and ICT (MSIT) and the Korea Institute of Science & Technology Evaluation and Planning (KISTEP).

Informed by that examination, this report identifies a set of recommendations for strengthening cooperation that is relevant for different stakeholders, including government and industry.

Policy recommendations

Biotechnologies

Australia and South Korea can enhance knowledge-sharing in biotechnologies-related R&D through people-to-people exchanges. Links should be formalised through an MoU between relevant institutions—such as Australia’s Commonwealth Scientific and Industrial Research Organisation (CSIRO) and the Korea Research Institute of Bioscience and Biotechnology. An MoU could be used to implement initiatives such as a virtual mentoring program and long-term in-person exchanges (preferably at least 12 months in duration). Such exchanges would support immersive in-country interaction, enabling the transfer of specialised R&D expertise. Australian researchers could share knowledge about advances in early-stage clinical trials processes, while South Korean researchers could contribute insights into synthetic biology and AI tools in drug-discovery clinical-trial methodologies. Financial support from Australia’s National Health and Medical Research Council could facilitate the exchanges.2 There remains a need to address visa constraints impeding the free flow of researchers between both countries. While this report focuses on R&D, we suggest that there’s equal value in considering cooperation in the manufacturing stages of the biotechnologies value chain.

Recommendation 1: Formalise links between Australia’s and South Korea’s key biotechnologies R&D institutions by facilitating long-term people-to-people exchanges aimed at transferring specialised expertise. This includes in areas such as clinical trials, synthetic biology and AI integration in biotechnologies.

Electric batteries

Australian companies should consider the production of battery materials, including lithium hydroxide and precursor cathode active materials (pCAM), through joint ventures with South Korean battery manufacturers. Such ventures would benefit from jointly funded and owned facilities geographically close to requisite critical minerals. Since spodumene is needed for lithium hydroxide and nickel, cobalt and manganese are required for pCAM, Western Australia provides the ideal location for those facilities. Furthermore, BHP’s recent suspension of its Western Australian nickel operations provides an ideal opportunity for a South Korean battery company to purchase those operations— securing nickel sulphate supplies necessary for pCAM manufacturing.3 There’s also the potential for South Korea to invest in cathode active manufacturing (CAM) manufacturing in Australia by taking advantage of the co-location of mining and pCAM operations.

The provision of loans with relatively low interest rates from South Korean Government–owned banks,4 as well as tax credits and energy incentives provided by the Australian Government, would assist in offsetting the relatively high operational costs (including for labour and materials) associated with establishing joint battery-material plants in Australia instead of South Korea.5 Environmental regulations will need careful consideration in assessing such proposals, such as those covering the disposal of by-products. In the case of sodium sulphate, that by-product can be used in fertilisers and even recycled for future use in battery-material manufacturing.6

Recommendation 2: Consider the establishment of facilities in Australia under joint venture arrangements between Australian and South Korean companies to enable expanded production of battery materials (including lithium hydroxide and pCAM).

Space and satellite technologies

Australia and South Korea should establish a government-to-government agreement that would facilitate the launch of South Korean satellites from northern and southern locations in Australia. This would be similar to the Australia–US Technologies Safeguard Agreement. The agreement would increase the ease with which companies from both countries can pursue joint launches by streamlining launch permit application processes, export controls, taxation requirements and environmental regulations. The agreement can establish a robust framework for joint operations and continued R&D in space and satellite technologies while ensuring that both countries protect associated sensitive technologies. Any such agreement should prioritise consultations with community stakeholders to further inclusive decision-making focused on addressing the social and environmental impacts of space launches.7 Engaging with Indigenous landowners to ensure the protection of cultural heritage, sacred sites and traditional land stewardship is particularly key.8

Recommendation 3: Establish a government-to-government agreement similar to the Australia–US Technologies Safeguard Agreement to bolster the ease with which Australian and South Korean companies can conduct joint satellite launches on Australian soil.

Artificial intelligence technologies

Closer collaboration between Standards Australia and the Korea Standards Association in establishing international AI standards will be beneficial. The established positive record of Australian and South Korean stakeholders in relation to international norms and standards relating to critical technologies, and comparative regional strengths, provide a means to ensure that international AI standards continue to evolve in a way that fosters interoperability, innovation, transparency, diversity and security-by-design. One recommended body through which Australian and South Korean stakeholders could coordinate their respective approaches is the international, industry-led multistakeholder joint subcommittee (SC) created by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) known as the ISO/IEC Joint Technical Committee 1 Subcommittee 42 on AI (ISO/IEC JTC 1/SC 42).

Recommendation 4: Coordinate the approach of Standards Australia and the Korea Standards Association in establishing international AI standards in international technology standards bodies, for example, through ISO/IEC JTC 1/SC 42.

Full Report

For the full report, please download here.

The future of intelligence analysis: US-Australia project on AI and human machine teaming


Dr Alex Caples is Director of The Sydney Dialogue, ASPI’s annual summit for critical, emerging and cyber technologies.

Previously, she was Director of Cyber, Technology and Security at ASPI.

Alex is a former diplomat and national security official whose career spans over 20 years’ in Defence, the Office of National Intelligence, the Department of the Prime Minister and Cabinet and the Department of Foreign Affairs, including postings to Canada and Afghanistan.

Between 2019-2023, Alex was an Associate Director, Operations Advisory and Director, Policy Evaluation and Public Impact at professional services firm KPMG, supporting Commonwealth and State Governments on policy and program design and implementation.

Prior to this, Alex held various senior policy advisor roles in the Department of the Prime Minister and Cabinet’s National Security Division, including Director of Law Enforcement and Border Security, Director Cyber Security Policy and Director Crisis Management. In this capacity Alex provided advice to Government on a wide range of security legislation, policy and operations, including critical infrastructure security, foreign interference, cyberspace, telecommunications security, digital identity management, intelligence and border security.

During 2011-2012, Alex was a Senior Analyst for Transnational Issues at the Office of National Intelligence, where she provided senior executives and Ministers with all-source analysis on people smuggling, regional law enforcement and transnational crime.

Alex is an Australian Defence Force Academy Graduate. She holds a PhD in International Relations from Monash University (2007).

Negotiating technical standards for artificial intelligence

The Australian Strategic Policy Institute (ASPI) is delighted to share its latest report – the result of a multi-year project on Artificial Intelligence (AI), technical standards and diplomacy – that conducts a deep-dive into the important, yet often opaque and complicated world of technical standards.

At the heart of how AI technologies are developed, deployed and used in a responsible manner sit a suite of technical standards: rules, guidelines and characteristics that ensure the safety, security and interoperability of a product.

The report authors highlight that the Indo-Pacific, including Australia and India, are largely playing catch-up in AI standards initiatives. The United States and China are leading the pack, followed by European nations thanks to their size, scope and resources of their national standardisation communities as well as their domestic AI sectors.

Not being strongly represented in the world of AI governance and technical standards is a strategic risk for Indo-Pacific nations. For a region that’s banking on the opportunities of a digital and technology-enabled economy and has large swathes of its population in at-risk jobs, it’s a matter of national and economic security that Indo-Pacific stakeholders are active and have a big say in how AI technologies will operate and be used.

Being part of the conversations and negotiations is everything, and as such, governments in the Indo-Pacific – including Australia and India – should invest more in whole-of-nation techdiplomacy capabilities.

Authored by analysts at ASPI and India’s Centre for Internet and Society, this new report ‘Negotiating technical standards for artificial intelligence: A techdiplomacy playbook for policymakers and technologists in the Indo-Pacific’ – and accompanying website (https://www.techdiplomacy.aspi.org.au/) – explains the current state of play in global AI governance, looks at the role of technical standards, outlines how agreements on technical standards are negotiated and created, and describes who are the biggest ‘movers and shakers’.

The authors note that there are currently no representatives from Southeast Asia (except Singapore), Australia, NZ or the Pacific Islands on the UN Secretary-General Advisory Body on AI – a body that’s tasked to come up with suggestions on how to govern AI in a representative and inclusive manner with an eye to achieving the UN Sustainable Development Goals.

The capacity of the Indo-Pacific to engage in critical technology standards has historically been lower in comparison to other regions. However, given the rapid and global impact of AI and the crucial role of technical standards, the report authors argue that dialogue and greater collaboration between policymakers, technologists and civil society has never been more important.

It is hoped this playbook will help key stakeholders – governments, industry, civil society and academia – step through the different aspects of negotiating technical standards for AI, while also encouraging the Indo-Pacific region to step up and get more involved.

Australia’s semiconductor manufacturing moonshot: securing semiconductor talent

Semiconductors are a critical component in all modern technologies, from personal communication devices and medical devices to weapons systems. Crucial to producing semiconductors is the availability of a highly skilled workforce, managing clean-room facilities and highly specialised equipment to execute the hundreds of unique steps needed to manufacture a single wafer, depending on the complexity of the chip.

ASPI’s 2022 report, Australia’s semiconductor national moonshot, laid out the strategic reasons why Australia must embark on a capacity-building initiative to create a homegrown semiconductor manufacturing ecosystem. Every item on the Australian federal government’s List of Critical Technologies in the National Interest is dependent on semiconductors.

By committing to growing a semiconductor-manufacturing industry from a mature-process-scale baseline, policymakers would position Australia to manufacture chips relevant to the energy, transport, health, IT and defence sectors. Such an industry would enable Australia to execute long-term critical technology strategies in areas such as quantum computing and artificial intelligence, to mitigate supply-chain risk against disruption from conflict or natural disaster, and provide highly skilled jobs in affordable locations, enriching the Australian economy.

It’s important to note that both AUKUS Pillar 2 and the Albanese government’s April 2023 publication of the Defence Strategic Review reflect a shift in Australia’s strategic thinking on defence and national security, and the important correlation and greater cooperation between industry, education and defence priorities, particularly when it comes to technology. Delivering on that shift will be difficult and often costly, but this report provides a series of recommendations of what that correlation and cooperation could look like.

For Canberra, such an endeavour is of the same magnitude as America’s historic ‘moonshots’ during the 1960s and 1970s. It’s a once-in-a-generation challenge that will determine Australia’s place in the world, and human capital is central to ensuring success. Opting out of semiconductor manufacturing for the long term would severely constrain Australia’s growth as a technological nation and consign it to second-tier status.

This report expands on the recommendations made in the 2022 ASPI report for establishing a semiconductor-manufacturing capability in Australia and focuses on the importance of creating a talent pipeline that can support a scaled industry. Achieving a semiconductor moonshot requires stepping up Australia’s very respectable semiconductor device fabrication R&D to industry-compatible prototyping via a dedicated facility, together with attracting (through that capability and by government incentives) a semiconductor manufacturer to locate a mature-process-scale foundry in Australia—which will require support from an upskilled Australian talent pipeline. This is an ambitious move but is an essential step in growing such a capability.

The ability to grow and maintain a high-skilled workforce is a foundational challenge for Australia that can be addressed through close examination of trailblazing public–private partnerships (PPPs) that aim to provide talent-pipeline security in the US, Taiwan and Japan. Australian governments, industry and academia can emulate and engage with the examples highlighted through case studies in this report to attract semiconductor industry investment, boost talent-pipeline development and strengthen industry R&D. Australia’s states and territories all have varied capacity to o›er support to a semiconductor-manufacturing capability.

State-sponsored economic cyber-espionage for commercial purposes: tackling an invisible but persistent risk to prosperity

As part of a multi-year capacity building project supporting governments in the Indo-Pacific with defending their economic against the risk of cyber-enabled theft of intellectual property, ASPI analysed public records to determine the effects, the actual scale, severity and spread of current incidents of cyberespionage affecting and targeting commercial entities.

In 2015, the leaders agreed that ‘no country should conduct or support ICT-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.’

Our analyses suggests that the threat of state-sponsored economic cyberespionage is more significant than ever, with countries industrialising their cyberespionage efforts to target commercial firms and universities at a grander scale; and more of these targeted industries and universities are based in emerging economies.

“Strategic competition has spilled into the economic and technological domains and states have become more comfortable and capable using offensive cyber capabilities. Our analysis shows that the state practice of economic cyber-espionage appears to have resurged to pre-2015 levels and tripled in raw numbers.”

In this light, we issued a Briefing Note on 15 November 2022 recommending that the G20 members recognise that state-sponsored ICT-enabled theft of IP remains a key concern for international cooperation and encouraging them to reaffirm their commitment made in 2015 to refrain from economic cyber-espionage for commercial purposes. 

This latest Policy Brief, State-sponsored economic cyber-espionage for commercial purposes: tackling an invisible but persistent risk to prosperity, further suggests that governments should raise awareness by better assessing and sharing information about the impact of IP theft on their nations’ economies in terms of financial costs, jobs and competitiveness. Cybersecurity and intelligence authorities should invest in better understanding the extent of state sponsored economic cyber-espionage on their territories.

On the international front, the G20 and relevant UN committees should continue addressing the issue and emphasising countries’ responsibilities not to allow the attacks to be launched from their territories. 

The G20 should encourage members to reaffirm their 2015 commitments and consider establishing a cross-sectoral working group to develop concrete guidance for the operationalisation and implementation of the 2015 agreement while assessing the scale and impact of cyber-enabled IP theft.

‘With a little help from my friends’: capitalising on opportunity at AUSMIN 2022

The annual Australia-US Ministerial Consultations have been the primary forum for bilateral engagement since 1985. The Australian Minister for Defence and Minister for Foreign Affairs will meet with their American counterparts in Washington in 2022, in the 71st year of the alliance, and it’s arguably never been so important.

The Australian Strategic Policy Institute is proud to release ‘With a little help from my friends’: Capitalising on opportunity at AUSMIN 2022, a report featuring chapters from our defence, cyber and foreign policy experts to inform and guide the Australian approach to the 2022 AUSMIN consultations.

In this report, ASPI harnesses its broad and deep policy expertise to provide AUSMIN’s principals with tangible policy recommendations to take to the US. The following chapters describe Australia’s most pressing strategic challenges. The authors offer policy recommendations for enhancing Australian and US collaboration to promote security and economic prosperity.

The collection of essays covers topics and challenges that the US and Australia must tackle together: defence capability, foreign affairs, climate change, foreign interference, rare earths, cyber, technology, the Pacific, space, integrated deterrence and coercive diplomacy. In each instance, there are opportunities for concrete, practical policy steps to ensure cohesion and stability.”

Artificial intelligence: your questions answered

This collection of short papers developed by the Australian Institute for Machine Learning (AIML) at the University of Adelaide and the Australian Strategic Policy Institute (ASPI) offers a refreshing primer into the world of artificial intelligence and the opportunities and risks this technology presents to Australia.

AI’s potential role in enhancing Australia’s defence capabilities, strengthening alliances and deterring those who would seek to harm our interests was significantly enhanced as a result of the September 2021 announcement of the AUKUS partnership between the US, the UK and Australia. Perhaps not surprisingly, much public attention on AUKUS has focused on developing a plan ‘identifying the optimal pathway to deliver at least eight nuclear-powered submarines for Australia’.

This AIML/ASPI report is a great starting point for individuals looking to better understand the growing role of AI in our lives. I commend the authors and look forward to the amazing AI developments to come that will, we must all hope, reshape the world for a more peaceful, stable and prosperous future.

University of Adelaide, Australian Institute for Machine Learning - logo

Understanding Global Disinformation and Information Operations: Insights from ASPI’s new analytic website

ASPI’s International Cyber Policy Centre has launched the Understanding Global Disinformation and Information Operations website alongside this companion paper. The site provides a visual breakdown of the publically-available data from state-linked information operations on social media. ASPI’s Information Operations and Disinformation team has analysed each of the data sets in Twitter’s Information Operations archive to provide a longitudinal analysis of how each state’s willingness, capability and intent has evolved over time. Our analysis demonstrates that there is a proliferation of state actors willing to deploy information operations targeting their own domestic populations, as well as those of their adversaries. We find that Russia, Iran, Saudi Arabia, China and Venezuela are the most prolific perpetrators. By making these complex data sets available in accessible form ASPI is broadening meaningful engagement on the challenge of state actor information operations and disinformation campaigns for policymakers, civil society and the international research community

Producing policy-relevant China research and analysis in an era of strategic competition

This brief report explores the challenge of producing policy-relevant China research and analysis. Policy-relevant research is defined as work that drives action, affects decision-making, or both. It’s the kind of research think tanks seek to do, bridging the gap between academia and civil servants who work on policy.

This paper focuses on two key findings:

  1. There’s a distinction between conducting policy-relevant research and the process of disseminating it in a way that will effectively shape and influence the policy process in particular places by particular policy- and decision-makers. In practice, the difference between the two isn’t always clearly understood and perhaps not clearly taught.
  2. There’s limited training that prepares the China analytical community to deal with the challenges of producing policy-relevant research under conditions of restricted access to China. Researchers require more support in navigating the research environment and filling skill-set gaps.

The future of assistance to law enforcement in an end-to-end encrypted world

v

Domestic telecommunications companies assist law enforcement by the lawful interception of otherwise private communications when presented with a valid warrant.

This has been a powerful tool to combat crime. In the 2019–20 financial year, for example, 3,677 new warrants for telecommunications interception were issued, and information gained through interception warrants was used in 2,685 arrests, 5,219 prosecutions and 2,652 convictions. That was in the context of 43,189 custodial sentences in the same year.

But law enforcement and security officials assert that the usefulness of ‘exceptional access’, as it’s called in this paper, has declined over time as strong encryption has become increasingly common.

Australian Security Intelligence Organisation (ASIO) Director-General Michael Burgess has stated that encryption ‘damages intelligence coverage’ in 97% of ASIO’s priority counter-intelligence cases.

The problem of increasingly powerful encryption degrading the usefulness of exceptional access is often referred to as ‘going dark’.

The Australian Government has committed to the reform of Australia’s electronic surveillance legislative framework.5 Although its discussion paper mentions encryption only in passing,6 we can expect that encryption and going dark will be a topic of debate as reform is considered. This paper contributes to that debate by examining how firms that provide digital communications services can provide assistance to law enforcement even as strong encryption is increasingly common.

Although exceptional access is primarily concerned with evidence collection, it may be better in some cases to focus on crime prevention, when it comes to achieving society’s broader aim of safety and security. This may be especially true for serious offences that cause significant harms to individuals, such as child exploitation and terrorism.

Accordingly, in this paper I divide assistance to law enforcement into two broad types: 

  1. Building communications services so that criminal harm and abuse that occur on the service can be detected and addressed, or doesn’t even occur in the first place. Examples of harms that might be avoided include cyberbullying or child exploitation that occur online.
  2. Assisting law enforcement with exceptional access for crimes that are unrelated to the communications service. Examples of such crimes might include an encrypted messaging service being used to organise drug smuggling or corruption.

I start by exploring the justification for exceptional access and then examine how encryption has affected assistance to law enforcement, as well as the differences between transport encryption and end-to-end (E2E) encryption and the implications those differences have for law enforcement.

I examine encryption trends and discuss the costs and benefits of exceptional access schemes.

I then examine some of the approaches that can be used by service providers to provide these two different forms of assistance as E2E encryption becomes increasingly common. I also summarise some of the advantages and disadvantages of those different approaches.

A number of initiatives seek to embed safety and security into the design, development and deployment of services. They encourage industry to take a proactive and preventive approach to user safety and seek to balance and effectively manage privacy, safety and security requirements. Those initiatives have relatively few big-picture privacy or security drawbacks, but there are many issues on which there isn’t yet consensus on how to design platforms safely. Such initiatives may also need extensive resources for employee trust and safety teams.

Providing law enforcement access to E2E encrypted systems is very challenging. Proposals that allow access bring with them some potentially significant risks that exceptional access mechanisms will be abused by malicious actors.

Watch the launch webinar here.

Tag Archive for: Cyber

Exclusive: Inside Beijing’s app collecting information from Belt and Road companies

China’sMinistry of Foreign Affairs operates a secure digital platform that connects it directly with Chinese companies operating abroad, requiring participating companies to submit regular reports about their activities and local security conditions to the government, internal documents reveal.

The documents obtained and verified by ASPI’s China Investigations and Analysis team show how the platform, called Safe Silk Road (平安丝路), collects information from companies participating in the Belt and Road Initiative (BRI), Chinese leader Xi Jinping’s signature foreign policy initiative. The BRI has facilitated Chinese infrastructure projects and other investment in more than 100 countries, particularly developing regions. The Safe Silk Road platform was initially launched in 2017 and is now used by at least dozens of Chinese companies across several continents.

By tapping into the extensive network of Chinese companies engaged in projects around the world, the platform demonstrates how Beijing is finding new ways of improving its global information and intelligence collection to better assess risks, and ultimately protect its interests and its citizens, even in the most remote corners of the world. The Safe Silk Road platform is one more building block in the growing global infrastructure that seeks to place the Chinese government at the center of the Chinese experience abroad, and that replicates some of the structures of information collection and surveillance that have now become ubiquitous within China.

The MFA’s External Security Affairs Department (涉外安全事务司), which operates the Safe Silk Road, has said the platform is a direct response to the difficulty of obtaining information relevant to Chinese companies abroad. The information the app collects feeds into the department’s assessments. The platform is also part of a trend across Chinese government ministries of creating apps to facilitate some of the work they were already doing.

ASPI is the first organisation to report on the Safe Silk Road platform. It is mentioned on some regional Chinese government websites but has not been covered by Chinese state media. The platform operates through a website and an associated mobile app that can only be accessed with registered accounts.

The platform is not available for download in app stores. The documents state that the platform is only intended for companies’ internal use, and that users are strictly prohibited from circulating information about it online. Companies can apply for an account through the MFA’s External Security Affairs Department or their local consulate and, once approved, designate an official contact person within the company, called a ‘company liaison officer’ (公司联络员), who is authorized to submit reports and use the app’s full functionality. The MFA provides companies with a QR code to download the app and requires companies to use the platform’s bespoke VPN with the app and desktop version.

Companies are asked to submit quarterly reports through the app. Those reports include basic information such as the name, national ID number and contact information of the owner, the region in which the company operates, its sector or industry, the amount of investment in US dollars, the number of Chinese and local employees, and whether it has registered with a local Chinese embassy or consulate, according to internal company documents viewed by ASPI analysts.

The app has a feature called ‘one-click report’ for ‘sudden incidents’ (突发事件) that allows users to report local security-related incidents directly to the MFA, according to the documents and other materials. The reporting feature includes the following categories: war/unrest, terrorist attack, conflict between Chinese and foreign workers, protest, kidnapping, gun shooting, production safety accident, contagion/epidemic, flood, earthquake, fire, tsunami, and other. The user can then provide more information including date, location and other details about the incident.

The reporting form also asks the company to provide information about its ‘overseas rights protection object’ (海外权益保护对象) and ‘police resources database object’ (警务资源库对象). An ‘overseas rights protection object’ may refer to patents, trademarks, and copyrights held by the company; the Chinese government has made protecting the intellectual property of Chinese companies a key focus in recent years. ‘Police resources database object’ is a vague term that may refer to security contractors, Chinese overseas police activity, or physical assets or company personnel that need protecting.

Users can subscribe to real-time security updates for their region and register to attend online safety training classes. There is even a video-conference feature within the app that allows embassy officials to call the app user directly. It is common for foreign ministries to create digital services that provide information and security alerts for their citizens abroad—such as Australia’s ‘Smartraveller’, the US Smart Traveler Enrollment Program (STEP), and China’s own ‘China Consul’ (中国领事).

The Safe Silk Road platform, however, is different. It is not public-facing, it is tailored specifically for BRI companies and, most importantly, it asks for detailed information from those companies about their own activities and local conditions, rather than just offering helpful information. For some companies, participation may even be compulsory.

ASPI’s analysis of the Safe Silk Road platform underscores Beijing’s determination to safeguard its global infrastructure and investment power play under the BRI. As China’s investment in developing regions has grown, so has Beijing’s emphasis on protecting its citizens, companies, and assets abroad.

As of December 2023, about 150 countries had joined the BRI. According to the official Belt and Road Portal, China has 346,000 workers dispatched overseas. BRI-affiliated companies often run projects in regions with underdeveloped infrastructure, high poverty, poor governance, lack of quality medical care, domestic political instability, violent crime, and terrorist attacks. Private security contracting companies are increasingly offering their services to Chinese companies abroad. The number of Chinese private security contractors has expanded dramatically in recent years as BRI companies have faced growing security challenges.

Several events over the past few years, including the pandemic and a string of attacks in Pakistan in 2021 targeting Chinese nationals supporting BRI projects, have underscored to Beijing the need for better security measures. At the third Belt and Road symposium in 2021, Xi Jinping said China needed ‘an all-weather early warning and comprehensive assessment service platform for overseas project risks’. The External Security Affairs Department said the same year that ‘the difficulty of obtaining security information is one of the major problems faced by companies who “go out”’, referring to Chinese companies that invest overseas. To address this concern, the department ‘launched the Safe Silk Road website and the related mobile app to gather information about security risks in Belt and Road countries to directly serve company personnel engaged in projects overseas’. The department said that in 2021 the app was used to disseminate 13,000 pieces of information, including more than 2,800 early warnings.

More broadly, the platform is illustrative as a digital tool to help Beijing protect its interests abroad. The External Security Affairs Department was established in 2004 in response to a perceived increase in kidnappings and terrorist attacks targeting Chinese nationals abroad, but its role in China’s security policy has expanded since then.

The department’s leading role in ‘protecting China’s interests abroad’ (中国海外利益保护) meets an objective increasingly found in official Chinese Communist Party documents and Chinese law. This objective appears in China’s National Security Strategy 2021–2025, the new Foreign Relations Law 2023, and new regulations on consular protection and assistance passed in 2023. The party’s ability and readiness to protect China’s interests abroad is considered one of the historic achievements of the party, according to a resolution it passed in 2021.

But the exact scope of China’s interests abroad is still a matter of debate in the public commentary among Chinese national security and foreign policy academics and analysts. Are China’s interests just the physical security of Chinese nationals and commercial or strategic assets in foreign countries? Or do they also include ‘intangible interests’ (无形利益), such as protecting China’s national image and reputation, and anything else that should be within China’s national interest as a major global power? How the Chinese government currently defines China’s interests abroad is probably somewhere in the middle, and may broaden.

China has a widely recognised deficiency: gaps in its overseas intelligence collection capabilities. Safe Silk Road is part of the toolbox that the External Security Affairs Department uses to extend the range and effectiveness of Beijing’s information-gathering and to better understand the situation on the ground everywhere that China has interests.

Tag Archive for: Cyber

ASPI co-hosts Australia-ROK Critical Tech Track 1.5 in Seoul

On July 9, 2024, ASPI co-hosted the Australia-Republic of Korea Critical Technologies Track 1.5 Dialogue in Seoul with the Science & Technology Policy Institute (STEPI).

The Track 1.5 brought together Australian and Korean government, industry and research stakeholders for a dialogue about the role of critical technologies such as biotechnology, AI, quantum and space technologies for regional stability. The discussions focused on how Australia and the Republic of Korea can deepen cooperation on critical technologies, the role of broader regional engagement on technologies through multilateral bodies and how to prioritise which technologies are the most critical areas for cooperation.

The insights from the Track 1.5 will inform an upcoming ASPI report to be co-authored by ASPI’s Afeeya Akhand and Atitaya (Angie) Suriyasenee and will be launched by ASPI’s Executive Director, Mr Justin Bassi, in Canberra in November 2024. The Track 1.5 and report has been generously funded by the Korea Foundation.

ASPI’s The Sydney Dialogue – announcing new speakers!

ASPI  is delighted to announce that the following experts will join the speaker line up at The Sydney Dialogue, the premier Indo-Pacific policy summit for critical, emerging and cyber technologies, on 2-3 September 2024:

  • Dr Renato U. Solidum, Jr, Secretary, Department of Science and Technology, Republic of the Philippines
  • Lt Gen (Retd) Rajesh Pant, Chairman, India Future Foundation and India’s former National Cyber Security Coordinator
  • Dr Soichi Noguchi, Executive Chief Fellow, Institute for International Socio-Economic Studies
  • Damar Juniarto, Co-founder and Advisor at the Southeast Asia Freedom of Expression Network (SAFEnet)
  • Jason Healey, Senior Research Scholar, School of International and Public Affairs, Columbia University

They join other previously announced speakers including, the Hon Tim Watts MP, Australia’s Assistant Minister for Foreign Affairs, David van Weel, NATO’s Assistant Secretary General for Innovation, Hybrid and Cyber, Urvashi Aneja, Founder and Executive Director of Digital Futures Lab and Shigeru Kitamura, President and Chief Executive Officer of Kitamura Economic Security Inc.

This Sydney Dialogue is the only international forum that brings together the top thinkers and decision-makers from government, industry and civil society to explore the trends dominating international technology, national security and geopolitics.

This year’s event will discuss the technologies that are disrupting workforces, upending economic and strategic power, splintering supply chains and transforming militaries. We will tackle the increasingly sophisticated nature of cybercrime, online disinformation, hybrid warfare and electoral interference – risks to our societies that now benefit from the use of AI technologies. We will also address how technologies, when managed in partnership, could accelerate climate security and green energy transitions.

For more information on The Sydney Dialogue, including to view the program or new speaker announcements, visit tsd.aspi.org.au. You can also register your interest in attending the event here.

First speakers announced for ASPI’s Sydney Dialogue on 2-3 September

The Australian Strategic Policy Institute (ASPI) is pleased to announce the first speakers for the third Sydney Dialogue for critical, emerging and cyber technologies on 2-3 September 2024.

This year’s event builds on the strong lineup of speakers at the previous two dialogues and will include:

  • The Hon Tim Watts MP, Australia’s Assistant Minister for Foreign Affairs
  • David van Weel, Assistant Secretary General for Innovation, Hybrid and Cyber, NATO
  • Urvashi Aneja, Founder and Executive Director, Digital Futures Lab
  • Shigeru Kitamura, President and Chief Executive Officer of Kitamura Economic Security Inc.

Other leaders, innovators and top thinkers from across governments, industry and civil society will be announced in the lead-up to the event.

Australia’s Assistant Minister for Foreign Affairs, the Hon Tim Watts MP, said: “Building resilience to cyber threats is an urgent, global priority – both at home and in our region. Over the last two years, we’ve seen a series of significant cyber incidents across Australia and the region that have had major impacts on governments, economies and communities.

“Australia aims to foster a culture of collaboration, creativity, and resilience among its government, industry, academia and civil society partners. We must work in tandem with the region to build capacity and long-term resilience to cyber security threats.”

President and Chief Executive Officer of Kitamura Economic Security Inc, Shigeru Kitamura, said: “The world is experiencing a fundamental shift in the development and application of advanced technologies. Harnessing the potential of these technologies for collective economic prosperity and national security, while mitigating the risks, relies on frank and forward-looking discussion and debate.

“The Sydney Dialogue provides an excellent platform for this debate. I look forward to contributing to these important discussions in Sydney in September.”

David van Weel, NATO Assistant Secretary General for Innovation, Hybrid and Cyber, said: “Cyberspace is unique in its complexity and constant competition. Emerging disruptive technologies, such as AI and quantum computing, shape cyber defence. Individually, these technologies can have a significant impact on cyber defence. Combined they offer extraordinary potential to transform cyberspace.

“I look forward to discussing at the Sydney Dialogue how NATO harnesses these new technologies and leverages the nexus between cyber and emerging tech in a way that contributes to a stronger and more resilient Alliance and increased security for all.”

The Sydney Dialogue will forecast the technologies of the next decade that will change our societies, economies and national security. It will promote diverse views that stimulate real conversations about the best ways to seize opportunities and minimise risks.

Topics for discussion at this year’s event will include AI, the future technology landscape, digital connectivity, hybrid threats, cybersecurity, disinformation, future warfare, technology and intelligence, climate security and green tech, national resilience and more.

TSD 2024 will be held in person and will feature a mix of keynote addresses, conversation sessions, panel discussions, presentations, closed door meetings and media engagements.

For more information on the Sydney Dialogue, including to view the current program, visit tsd.aspi.org.au.

ASPI DC partners with Krach Institute for Tech Diplomacy on Tech Diplomacy Academy

ASPI DC is proud to be an official launch partner of the Krach Institute for Tech Diplomacy’s Tech Diplomacy Academy. The non-profit Tech Diplomacy Academy is the world’s first and only online education platform for learning about the intersection of emerging technology, business and foreign policy.

The Tech Diplomacy Academy offers short, one-hour, online, on-demand courses led by acclaimed technology experts, domestic and foreign policy practitioners, and multi-sector industry leaders.

ASPI DC Director Adam Leslie says, “Tech diplomacy is increasingly vital in bridging the gap between technological advancement and international relations. Challenging technology leaps in AI, cybersecurity, and data privacy, require global management.”

“The Krach Institute’s Tech Diplomacy Academy will play an important role in fostering coordinated and equitable tech policies, enhancing global stability and fostering international innovation partnerships.”

Learn more about the world first Tech Diplomacy Academy here.

Bronte Munro interviewed by Richard Aedy at the ABC about the opportunities and challenges of Central Bank Digital Currencies (CBDCs) and their potential impact on the global financial system.

Australia is ahead of a lot of nations when it comes to trialling the potential of digital money. Central Bank Digital Currencies (CBDC’s) could change the global financial landscape and the RBA is trying to ensure they work well for Australia.

Report: Australian CBDC Pilot for Digital Finance Innovation.

.auCheck: A free website and email security check tool

Today, the Australian Strategic Policy Institute (ASPI), in collaboration with the .au Domain Administration (auDA), is launching .auCheck‘: a free tool that helps users check their website, email and internet connection for use of the latest and most secure internet standards.

Standards form the technical heart of the internet and are fundamental to the security, reliability and resilience of websites and email communication. As these standards develop over time, it is crucial to remain up-to-date.

Checking if a website and email are set up correctly can be quite difficult; that’s why .auCheck was created. Its aim is to empower users, in particular Australian small businesses, to ask the right questions and choose the right level of services from their providers, including adequate security settings.

.auCheck will enable users to have an informed discussion with their IT support, internet service provider, domain registrar, web hosting company or IT contractor to improve the security standards of their website, email or internet connection and facilitate the adoption of best practice internet standards.

Standards that are checked by the .auCheck tool include:

  • Encryption methods (to ensure the secure transfer of information over the Internet);
  • Ways to authenticate website and mail servers (to ensure internet users are dealing with genuine website and email accounts);
  • Security of domain names (to allow domain names to be verified);
  • Security of website applications (to prevent insertion of malicious code or unauthorised access);
  • Protection against phishing through email from fake accounts.

Following the test, .auCheck offers users advice on additional steps they can take to bring their website and email domains up-to-standard.

Fergus Hanson, Director of ASPI’s International Cyber Policy Centre, believes .auCheck will be a valuable practical contribution to the work Australian governments, industry and internet organisations are already doing to raise awareness of the need to be cyber secure.

We hope .auCheck will give Australian businesses practical advice to improve the security and reliability of their online presence. The tool also empowers every Australian to check for themselves the security of the websites they visit.

The idea for .auCheck came from discussions with international partners in the UK and the Netherlands who pioneered similar tools. We’re very grateful to the Dutch Internet Standards Platform and for the support of auDA which allowed us to develop .auCheck in a way that fits the Australian context.

auDA CEO Rosemary Sinclair AM said auDA was pleased to support the development of .auCheck, noting the tool will provide Australian small businesses and consumers with information to empower them, boosting their online confidence and uplifting security standards by working with their IT support professionals.

auDA research shows cyber security is the top concern among Australian internet users. However, many Australian internet users and small business owners are unsure where to find trusted information and advice on cyber security. The .auCheck tool provides a free, independent and plain language assessment of online security standards, and will help empower users to be more confident managing their cyber security.

Over time, the aggregated test results will deliver an understanding of the security standards being used by individuals, businesses and organisations in Australia.

You can access .auCheck here

Mapping China’s Technology Giants: Covid-19, supply chains and strategic competition

Mapping China’s Technology Giants is a multi-year project by ASPI’s International Cyber Policy Centre that maps the overseas expansion of key Chinese technology companies. The project, first published in April 2019, is now being re-launched in June 2021 with new research reports, a new website and an enormous amount of new and updated content.

This data-driven online project – and the accompanying research products – fill a research and policy gap by building understanding about the global trajectory and impact of China’s largest companies working across the Internet, telecommunications, AI, surveillance, e-commerce, finance, biotechnology, big data, cloud computing, smart city and social media sectors.

Two new research reports accompany the re-launch

Mapping China’s Technology Giants: Supply Chains and the Global Data Ecosystem Most of the 27 companies tracked by our Mapping China’s Technology Giants project are heavily involved in the collection and processing of vast quantities of personal and organisational data. Their global business operations depend on the flow of vast amounts of data, often governed by the data privacy laws of multiple jurisdictions. The Chinese party-state is ensuring that it can derive strategic value and benefit from these companies’ global operations. We assess interactions between the People’s Republic of China’s political agenda-setting, efforts to shape international technical standards, technical capabilities, and use of data as a strategic resource. We argue this ‘Data Ecosystem’ will have major implications for the effectiveness of data protection laws and notions of digital supply-chain security.

Reining in China’s Technology Giants Since the launch of ASPI ICPC’s Mapping China’s Technology Giants project in April 2019, the Chinese technology companies we canvassed have gone through a tumultuous period. While most were buoyed by the global Covid-19 pandemic, which stimulated demand for technology services around the world, many were buffeted by an unprecedented onslaught of sanctions from abroad, before being engulfed in a regulatory storm at home. This report describes the effects of the Covid-19 pandemic, the growing China–US strategic and technological competition, and a changing Chinese domestic regulatory environment on the 27 Chinese Technology Giants we cover on our map.

New content and data

  • We’ve added four new companies to the project: Ant GroupInspurPing An Technology and Nuctech. The dataset now includes 27 companies.
  • Our Map includes over 1,400 new entries, totalling over 3,900 global entries. These are populated with up to 15 categories of data, totalling 38,000+ data points. Existing entries were updated to reflect new changes.
  • Our map tracks more than 130 donations80 of these are Covid-19 monetary and medical donations from ByteDance, Tencent and Alibaba.
  • Biotechnology company BGI saw profits surge in 2020 as Covid-19 spread around the world. Our map now contains 100 datapoints of presence for BGI including commercial partnerships, Covid-19 related donations, investments, joint ventures, MoU agreements, overseas offices, research partnerships and subsidiaries.
  • We have tracked the expansion of Hikvision, Dahua and Uniview as overseas demand for their temperature screening products increased during Covid-19. The map contains 65 data points of overseas presence relating to Covid-19 for these three companies, including donations, commercial partnerships, and surveillance equipment.
  • Our ‘Company Briefs’ include new ‘Privacy Policies’ and ‘Covid-19 Impact’ sections. We’ve also updated each existing overview, and of particular note are updates to the ‘Activities in Xinjiang’ and ‘Party-state Activities’ sections.
  • We’re introducing a new product: ‘Thematic Snapshots’. These combine company overview content across the four thematic areas named above. They are designed to serve as a user-friendly guide for the journalists, researchers, and policy makers who use our website. 

A new & better website 

Visitors can now explore our data in two ways, using either the Map or Data Listing pages. These display the same results in different formats depending on a users’ preference.

Click the ‘show Our Highlights Only’ to see the map entries ASPI staff have flagged as data points of particular interest. For these entries, we have undertaken additional analysis or recommend further investigation.

For more about this multi-year project visit the About page of the China Tech Map website.

The Team

The Mapping China’s Technology Giants research project is a huge team effort, comprising;

Cyber Norms translated videos

At the request of the Federal Department of Foreign Affairs of Switzerland, ASPI translated the graphics and videos on the UN cyber norms into three new languages. We have now added materials in French, German and Italian to our repository of downloadable materials.

Read here about Switzerland’s endeavours supporting the UN’s normative framework to promote responsible state behaviour in the digital space and promotes multilateral cooperation in this area.

Australian Foreign Affairs: How Covid-19 & cyberspace are changing spycraft

ASPI’s Danielle Cave probes how data and technology have shaped espionage in a time of Covid-19 crisis and beyond in the July 2020 Australian Foreign Affairs issue Spy vs Spy: The New Age of Espionage:

Listen to the November 2020 Australian Foreign Affairs podcast: Spying in the age of Covid-19 featuring Danielle and ASPI’s Andrew Davies.

Read an excerpt of Danielle’s essay Data drive: How Covid-19 and cyberspace are changing spycraft;

Read Danielle’s opinion piece in The Australian newspaper: A chance to get smarter in cyber space of intelligence;

Watch the September 2020 launch of the issue hosted by ASPI and Australian Foreign Affairs;

US-China tension can give way to India-Australia partnerships on critical technology – opinion piece

Read an opinion piece written by ASPI’s Danielle Cave, Jocelinn Kang and Aakriti Bachhawat and co-authored with colleagues from India’s Observer Research Foundation Rajeswari Pillai Rajagopalan and Trisha Ray in Indian newspaper ThePrint. This article is based on the ASPI-ORF report: Critical technologies and the Indo-Pacific: A new India-Australia partnership:

“While the Covid-19 pandemic has damaged economies and profoundly affected people’s health and wellbeing, it has also highlighted our dependence on technology and the extent to which we’ll rely on the next wave of technologies to drive future prosperity.

Covid-19 has also accelerated strategic competition between nations, particularly the US and China. Much of that competition centres on technology and data: Who owns and controls it? How is it being used? What rules, norms and standards are different countries abiding by?

This competition is quickly spilling over into international forums, including standards-setting bodies, and it’s throwing up new challenges to global technology companies. It’s also leading to new partnerships and presenting opportunities to deepen existing partnerships, as countries find more commonalities in the multitude of technological challenges they face. More opportunities are arising—and arising quickly—for practical cooperation to help deal with these challenges.

One such opportunity—and partnership—is the India–Australia relationship, which is rapidly becoming one of the most important pillars of the Indo-Pacific.”

Read the article here.

Tag Archive for: Cyber

CrowdStrike glitch sounds a cybersecurity alarm we cannot ignore

The recent CrowdStrike outage was not just a technical hiccup; it was a seismic tremor that exposed the brittle foundations on which Australia’s digital economy stands. 

A faulty security update, a false positiveand suddenly thousands of businesses worldwide found their digital defences compromised. It wasn’t a cyberattack, but it provided a glimpse into the chaos that could follow if a widespread cyber attack were launched against critical infrastructure.

As such, the CrowdStrike incident exposed several glaring weaknesses in our current approach and has underscored the need for a fundamental shift in our cybersecurity culture. To mitigate these risks, Australia must adopt a proactive and multi-faceted approach to cybersecurity, moving beyond reactive measures and embracing a culture of resilience. 

Many organisations still underestimate the gravity of cyber threats, viewing them as an IT problem rather than a strategic business risk. This complacency is a dangerous luxury we can no longer afford. Cybersecurity is not just about firewalls and antivirus software; it’s about building a resilient organisation that can withstand and recover from cyberattacks.

CrowdStrike, a cybersecurity behemoth, found itself red-faced as its Falcon platform, designed to safeguard clients from cyber threats, ironically turned into the threat itself. The faulty update meant Falcon misidentified legitimate files as malicious, crippling endpoint protection and meaning clients could only continue operating if they disabled their security, which would leave them vulnerable to intrusions.

In Australia and around the world, airlines, financial services, supermarkets and ports were disrupted and in some cases forced temporarily to shut down.

This incident is far from an isolated event. In 2017, British Airways suffered a catastrophic IT failure that grounded flights worldwide, causing chaos for hundreds of thousands of passengers. The 2021 Fastly outage took down major websites, including Amazon, Reddit, and The New York Times, for hours. 

The CrowdStrike outage once again showed the vulnerability of our digital ecosystem. We are tethered to a complex web of interconnected systems, each with its potential points of failure.

Our digital economy, while a marvel of innovation and efficiency, is also a sprawling attack surface for malicious actors. The increasing sophistication of cyber threats, from ransomware attacks to state-sponsored espionage, demands a robust and multi-layered defence strategy.

The first clear problem is our over-reliance on a single vendor for critical security services. When that vendor stumbles, the impact can be disproportionate. The lack of redundancy and backup systems in many organisations leaves them vulnerable to operational paralysis in the event of a disruption.

We must dismantle this dangerous reliance on single vendors for critical services. Instead of putting all our eggs in one basket, we must diversify our cybersecurity providers to reduce the impact of any single vendor’s failure and also foster a more competitive and innovative market for security solutions. 

This could involve distributing critical functions across multiple providers, ensuring that a disruption in one doesn’t cripple the entire system.

We must invest heavily in redundancy and backup systems. Our critical infrastructure, from banking systems to power grids, should be designed with multiple layers of redundancy, ensuring that even if one component fails, the system can continue to operate seamlessly. Regular backups of data and critical applications are non-negotiable. This includes not just storing backups onsite but also maintaining secure off-site copies to protect against physical disasters or targeted attacks.

Second, the incident highlights the need for more comprehensive and agile incident response plans. Organisations need to be able to quickly identify and address disruptions, minimizing the impact on their operations and customers. 

They need comprehensive, well-documented plans that are regularly tested and refined. These plans should clearly delineate roles and responsibilities, establish robust communication channels, and detail escalation procedures for different types of incidents. The goal is to create a well-oiled machine that can spring into action at the first sign of trouble, minimizing downtime and mitigating damage.

Third, Australia needs to adopt a zero-trust approach to cybersecurity. This means assuming that every user and device, even those within the network perimeter, could be compromised. This approach necessitates continuous monitoring and verification of all users and devices, micro-segmentation of networks to limit lateral movement, and the use of multi-factor authentication to secure access to sensitive data.

Finally, we must foster a culture of cyber awareness that permeates all levels of society, from the boardroom to the classroom. This means educating not just IT professionals but also business leaders, policymakers, and the general public about the evolving cyber threat landscape. Regular training and awareness programs should be mandatory for all employees, emphasizing the importance of vigilance, secure practices, and prompt reporting of suspicious activity.

By embracing these measures, Australia can transform its digital economy from a house of cards into a fortress. We can create a system that is not just resilient to cyberattacks and technical glitches but also adaptable to the ever-evolving threat landscape. This is not just about protecting our economic interests; it’s about safeguarding our way of life in the digital age. 

The CrowdStrike outage is a wake-up call—a reminder that our digital economy is not invincible.  The question is not whether another incident will occur, but when. 

The time for complacency is over. We need to act now to safeguard our digital future.  The stakes are too high to ignore.

Australia needs to talk more openly about offensive cyber operations

Australia’s 2023 cybersecurity strategy makes clear that most of the things we need to do to protect ourselves in cyberspace are essentially defensive. The strategy is usefully organised according to six ‘shields’.

But sometimes we also need a sword. Offensive cyber is the pointy end of cybersecurity. It can be understood expansively as encompassing all the threats that defensive cyber is, in the strategy’s terms, trying to ‘block’. ASPI’s cyber, technology and security program defines offensive cyber as operations that ‘manipulate, deny, disrupt, degrade or destroy targeted computers, information systems or networks’. Offensive cyber is usually—but contestably—distinguished from operations whose main goal is to collect intelligence.

Offensive cyber is fraught with risk. The long list of unintended potential consequences includes spillovers, blowback and escalation. One of the earliest and most successful offensive cyber operations was the US–Israeli attack on Iran’s nuclear program. The Stuxnet virus destroyed Iranian centrifuges but probably went on to infect more than 100,000 computers around the world before it was stopped. The attack also accelerated the development—and destructive use—of Iran’s offensive cyber capabilities.

Liberal democracies are much more interested than states like Iran in preventing cyberspace from becoming a battlespace and, more broadly, in maintaining the integrity of the global information environment. The decisions they make about when and how to engage in offensive cyber operations involve fundamental questions about international order and the future of the digital information revolution. They demand extremely complex assessments of cause and effect.

Leading Western cyber powers are developing more sophisticated doctrines and concepts to guide these decisions. After Stuxnet, President Barack Obama’s administration put the United States Cyber Command on a tight leash. That was reversed by Donald Trump, who promulgated a defend-forward doctrine. Joe Biden’s administration has embraced that approach: USCYBERCOM’s more assertive posture probably blunted the Russian cyber offensive that accompanied the invasion of Ukraine. The UK is developing its own concept of responsible cyber operations accompanied by a doctrine of cognitive effects.

This work is unfinished. The issues are complex and consequential. Compelling arguments have been made that there’s no meaningful distinction between offensive and defensive cyber operations or even between information and cyber operations. Importantly, much of this discussion and debate is taking place in public.

Offensive cyber operations are usually undertaken covertly. But that’s precisely why democratic governments need to be clear with their citizens about how decisions to undertake them are made. Debating these matters publicly also allows for better consideration of the big issues involved, especially because a wider range experts can be engaged.

Australia shouldn’t be a bystander to these debates. The Australian Signals Directorate’s REDSPICE project, announced by the previous government, includes a tripling of Australia’s offensive cyber capability. The new cybersecurity strategy promises to ‘build world-class innovative offensive cyber capabilities that can deliver real world impact to deter, disrupt, degrade and deny cybercrime’. The strategy commits an additional $587 million from 2023 to 2030 for cybersecurity. That’s in addition to the $10 billion that REDSPICE will add to ASD’s budget over 10 years.

So, what is Australia’s concept of offensive cyber? Despite promising to make Australia a ‘world leader’ in cybersecurity, the strategy sheds little light. It commits to ‘transparency about the rights and obligations that govern’ the use of offensive cyber capabilities but doesn’t say much more than that Australia will comply with existing laws and help develop new ones. The best sources are the speeches of ASD’s directors-general. Since Prime Minister Malcolm Turnbull first revealed Australia’s offensive cyber capability in 2016, these speeches have incrementally disclosed more about what ASD does and why.

Australia frequently reiterates that its use of offensive cyber complies with international and domestic law. Notably, ASD’s current director-general, Rachel Noble, has emphasised that Australia defines offensive cyber operations conducted by other countries against Australia as criminal activity to which Australia may respond in kind. But international norms are unclear, are contested and lag rapid technological change. Saying that Australia complies with them therefore doesn’t reveal much about when and how it uses offensive cyber capabilities.

Following the release of ASD’s November 2023 threat report, Defence Minister Richard Marles was asked whether Australia was ‘striking back’ at cyber attackers. He responded only that, ‘We have a full range of capabilities in the Australian Signals Directorate and we’re making sure that we are as capable as we can be.’ He could have provided a much more useful and informative answer if Australia had, as the US and UK have done, developed a public offensive cyber doctrine. Australians should be told more.

The government’s public discussion of its approach to offensive cyber still falls well short of those of its Five Eyes partners. The charge that Australia has put ‘capability before concept’ in its decision to acquire nuclear-powered submarines can be more accurately applied to its approach to offensive cyber. But fixing this doesn’t require Australia to reinvent the wheel. It can and should build on intellectual work already undertaken by its Five Eyes partners.

Australia will be compelled by an increasingly complex and contested world to compete more in the grey zone. Decision-makers will face tough choices. A stronger and more public offensive cyber doctrine would keep them tethered to Australia’s values and interests as they make those decisions.

Shields beyond the horizon: landing Australia’s 2023 cybersecurity strategy

Australia’s new cybersecurity strategy is all but released. Home Affairs Minister Clare O’Neil and National Cyber Security Coordinator Darren Goldie have familiarised the government and industry with the strategy’s six ‘cyber shields’ and timeline of two-year ‘horizons’ out to 2030.

The six shields remix the 2009 strategy’s seven ‘strategic priorities’, the 2016 strategy’s five ‘themes’ and 2020’s 16 ‘key themes’. That’s not a bad thing. Over these four iterations, Australia has avoided pigeonholing cybersecurity as only a national security issue and correctly characterised it as a whole-of-nation problem that needs multistakeholder solutions.

Strategies are hard to write, but they’re even harder to land. Cyber is a contested space—every person and their dog have opinions about what should and shouldn’t be included. The process of developing a coherent and actionable strategy thus becomes one of cruel prioritisation—not only excluding things from the strategy’s scope, but making hard, clear decisions on where the government’s responsibility starts and ends. This makes O’Neil’s push to have the new strategy ready for release less than a year after its announcement all the more impressive.

Once the strategy is released, the real work begins. A good strategy has actions and an implementation plan. The next step is real-world scoping, resourcing and scheduling of those actions. It’s one thing to say that agency X will deliver action Y by year Z. It’s another to put people to work and make it happen. The new strategy needs make a soft landing and keep momentum across the vagaries of agency restructures and future governments.

To steer and propel the strategy after its release, O’Neil and Goldie should focus on three communication themes: merge, maintain and modify.

First, communications around the strategy should merge cyber’s national security importance with a compelling vision that speaks to the average Australian. Cybersecurity is a whole-of-nation effort. The strategy should seek to recruit all Australians into this conversation.

Any national cybersecurity strategy must have defence and national security at its core. But outside the Canberra bubble, these ideas tend to be unfamiliar and irrelevant. In a recent survey of Australians by market research firm Ipsos, defence ranked 17th among the 19 top issues, falling from its average of 14th place over the past 12 years. Surveys by universities and a polling company support that finding.

This isn’t about the government seeking the community’s social licence to manage aspects of cybersecurity. It’s about our ability to improve cybersecurity depending in large part on the community’s informed participation. Everyone has a phone in their pocket, everyone has data, everyone has a role to play in cybersecurity. Communications around the strategy should avoid selling cyber as only a national security issue and instead illustrate a concept that’s more familiar and positive.

The concept of public health gives Australians a recognisable and compelling vision for cybersecurity. The public health metaphor has hovered for years around the edges of cybersecurity discourse. It’s time to centre it. Like health, cyber is a problem we can’t entirely solve, only manage. And like with health, there’s a whole-of-nation system paired with personal accountability. Communicating Australia’s cybersecurity strategy through a public health lens will help explain roles, responsibilities and structures.

Second, O’Neil and Goldie should focus on how they will maintain the strategy through shifting governments, agencies and budgets. Cybersecurity strategy in Australia has been plagued by short‑term thinking, fluctuating policy, on-and-off official positions and reactionary regulatory regimes. The 2023 strategy’s three horizons over seven years are a welcome early peek at a structured, long‑term view.

Undoubtedly, the strategy will be supported by the ongoing funding of $9.9 billion over 10 years for the Australian Signals Directorate’s REDSPICE program announced in 2022. That alone gives some certainty. But public assessment and communication of how well the government is using this funding will further boost its effectiveness. In other words, regular evaluation will help the government maintain the new strategy.

Evaluation builds transparency, keeps the conversation alive and adds to the evidence base that supports better cyber policy and strategy. The 2016 strategy had one public evaluation with its first (and only) annual update. The 2020 strategy did better, with its industry advisory committee releasing annual reports in 2021 and 2022 that evaluated progress on the 19 actions. These were excellent products. They delivered much-needed specifics—such as metrics and accountabilities for actions—and held the government to account.

The 2023 strategy should reproduce a similar arrangement for annual reviews and add major strategy updates in 2026 and 2029 at the dawns of horizons two and three. However, evaluation should be on more than just how well it is implementing its actions. It should also be clear about how well the actions improve our cybersecurity. While that may be technically difficult and politically fraught, it is essential to understanding whether the new strategy has put us on the right path.

This brings us to the third communication theme. O’Neil and Goldie should state publicly that they will modify the strategy when necessary. The 2023 strategy should be able to maintain a steady strategic focus and be able to react to changes in the technology and security environments.

Seven years is a long time in cyber. Accelerating technologies such as artificial intelligence, ambient computing and brain–computer interfaces will radically shift the meaning of cybersecurity over the strategy’s three horizons. Like the concept of public health, cybersecurity is a broad, complex concept in constant flux. The strategy should look to include new concepts and actions that help us get better outcomes, while keeping cruel prioritisation front of mind. Scope creep is the enemy. The government cannot and should not be at the centre of every cybersecurity issue.

In many ways, the 2023 strategy finds itself with the easiest job of the four national cyber strategies Australia has developed over the past 14 years. Yes, cyber threats are more dangerous, technology more pervasive, personal data more vulnerable and the strategic environment more turbulent. But over those 14 years, cybersecurity has become a mainstream political issue. Our cyber policies and organisational architecture have matured. And REDSPICE funding will fuel ongoing cyber capability growth. Careful narrative building and implementation vigilance will help ensure we don’t miss the opportunity this presents.

Walking the artificial intelligence and national security tightrope

Artificial intelligence (AI) presents Australia’s security as many challenges as it does opportunities. While it could create mass-produced malware, lethal autonomous weapons systems, or engineered pathogens, AI solutions could also prove the counter to these threats. Regulating AI to maximise Australia’s national security capabilities and minimise the risks presented to them will require focus, caution and intent.

One of Australia’s first major public forays into AI regulation is the Department of Industry, Science and Resources (DISR)’s recently released discussion paper on responsibly supporting AI. The paper notes AI’s numerous positive use cases if it’s adopted responsibly—including improvements in the medical imagery, engineering, and services sectors—but also recognises its enormous risks, such as the spread of disinformation and harms of AI-enabled cyberbullying.

While national security is beyond the scope of DISR’s paper, any general regulation of AI would affect its use in national security contexts. National security is a battleground comprised of multiple political, economic, social and strategic fronts and any whole-of-government approach to regulating AI must recognise this.

Specific opportunities for AI in national security include enhanced electronic warfare, cyber offence and defence, as well as improvements in defence logistics. One risk is that Australia’s adversaries will possess these same capabilities, and another is that AI could be misused or perform unreliably in life or death national security situations. Inaccurate AI-generated intelligence, for instance, could undermine Australia’s ability to deliver  effective and timely interventions, with few systems of accountability currently in place for when AI contributes to mistakes.

Australia’s adversaries will not let us take our time pontificating, however. Indeed, ASPI’s Critical Technologies Tracker has identified China’s primacy in several key AI technologies, including machine learning and data analytics—the bedrock of modern and emerging AI systems. Ensuring that AI technologies are auditable, for instance, may come at strategic disadvantage. Many so-called ‘glass box’ models, though capable of tracing the sequencing of their decision-making algorithms, are often inefficient compared to ‘black box’ options with inscrutable inner workings. The race for AI supremacy will continue apace regardless of how Australia regulates it, and those actors less burdened by ethical considerations could gain a lead over their competitors.

Equally though, fears of China’s technological superiority should not lead to cutting corners and blind acceleration. This would exponentially increase risk the likelihood of incurring AI-induced disasters over time. It could also trigger an AI arms race, adding to global strategic tension.

Regulation should therefore adequately safeguard AI whilst not hampering our ability to employ it for our national security.

This will be tough and may overlap or contradict other regulatory efforts around the world. While their behaviour often raises eyebrows, big American tech companies’ hold over most major advances in AI is at the core of strategic relationships such as AUKUS. If governments ‘trust bust’, fragment or restrict these companies, they must also account for how a more diffuse market could contend with China’s ‘command economy’.

As with many complex national security challenges, walking this tightrope will take a concerted effort from government, industry, academia, civil society and the broader public. AI technologies can be managed, implemented and used safely, efficiently and securely if regulators find a balance that is neither sluggish adoption nor rash acceleration. If they pull it off, it would be the circus act of the century.

Policy, Guns and Money: Cyber conflict, competition and cooperation

In this episode, ASPI’s executive director, Justin Bassi, speaks with Jason Healey, a senior research scholar at Columbia University’s School of International and Public Affairs specialising in cyber conflict, competition and cooperation.

Jason wrote and edited the book A fierce domain: cyber conflict, 1986–2012 and has held a number of senior cybersecurity roles, including in the Pentagon as a founding member of Joint Task Force—Computer Network Defense, and as director for cyber infrastructure protection in the White House from 2003 to 2005.

Bassi and Healey discuss the importance of understanding the implications of cyberspace on security and society and explain why cyber needs to be at the heart of national security.

Quad’s ransomware commitment could help shore up regional software supply chains 

The Indo-Pacific’s importance to the security of Australia and regional allies continues to dominate public discourse. Last month, the Quad foreign ministers from Australia, India, Japan and the United States released a joint statement on ransomware, recognising that vulnerabilities in cyberspace are compromising the security of critical national infrastructure and economic continuity in the region.

The statement is an important acknowledgement that ransomware is a transnational threat that can’t be mitigated purely through domestic policy. The rise of ransomware attacks on software supply chains demonstrates this much. The multistakeholder approach that the Quad statement highlights is key to addressing the vulnerabilities that enable this type of ransomware attack.

Ransomware is a highly profitable and disruptive cyberattack technique that serves both criminal and state actors alike. Companies in the information and communication technology sector are at particular risk because they are critical infrastructure providers that also hold rich data troves that can be exploited as leverage or for profit on the dark web.

Since the Covid-19 pandemic, ransomware attacks have increased dramatically worldwide. The latest annual report on the state of ransomware, by cybersecurity firm Sophos, indicated a 78% rise in attacks globally between 2020 and 2021. Nearly two-thirds of the organisations surveyed reported having been affected.

Australia is the most targeted ransomware victim in the Indo-Pacific region, and the third most cyberattacked nation globally. The likelihood of an attack is high and, as recently as September, Australian telecoms provider Optus was successfully targeted in the largest ever national data breach. Outside of critical-infrastructure providers, ransomware targets are typically large organisations that have the capacity to pay high ransom demands due to their extensive operations. Australian-owned multinationals providing ICT products and services to domestic and regional clients that require regular software updates and installations fall into this category and have a high chance of being hit by supply-chain attacks.

A software supply-chain attack exploits the trust relationship between the vendor and client. A common scenario is when a vulnerability is exploited that enables hackers to compromise the provider’s source code with malicious malware. Software updates containing malicious code are then unwittingly installed by users, infecting their networks. This is also known as a downstream attack.

Effective cybersecurity programs require assessment of third-party vulnerabilities; however, they can’t always identify or mitigate source code compromises in software because they’re hard to detect and can evade firewalls when disguised within trusted code. Detection and prevention of this type of attack are best managed at the source by the software vendor itself.

This is where the multistakeholder approach emphasised by Quad ministers comes into play. Cyber policy that aims to secure critical national infrastructure needs to recognise that third-party vulnerabilities—or links in the supply chain—are often the points most prone to compromise. Governments need to work collaboratively to identify the links between critical-infrastructure providers in their jurisdictions and organisations in the region. From there, domestic policy in each nation needs to reinforce the efforts of regional counterparts to ensure that baseline security standards, vulnerability reporting mechanisms and ransomware mitigation and response practices are comparable, if not interoperable.

The Kaseya ransomware attack in 2021 is an example of how the effects of supply-chain attacks can go beyond the intended victim. Kaseya was targeted by a Russia-based ransomware group called REvil that leveraged a vulnerability in the company’s software. Kaseya provides ‘virtual system administrator’, or VSA, software products—remote monitoring and management products that use cloud technology to handle a range of activities for businesses. The VSA software that was compromised had a high degree of trusted access to client systems. When the software was automatically updated, the ransomware infected clients in 17 countries. Customers included small businesses such as supermarkets, as well as schools and pharmacies. REvil then demanded a ransomware payment from Kaseya. While Kaseya was a US company operating under California law, the ransomware attack had downstream supply-chain consequences globally.

A ransomware attack on an Australian business with downstream supply-chain relationships like Kaseya’s would have significant ramifications for regional stability and Australia’s broader national security interests, particularly if the business were held to ransom for an extended period.

State actors could easily leverage this technique for disruptive or coercive purposes, particularly since sophisticated attacks can ensure that malicious code is programmed to stop operating when it is uploaded to a network with specific language settings. This enables more refined and accurate targeting by adversaries and mitigates the risk of cyber fratricide.

Economic productivity and supply chains will be disrupted in the region if businesses are repeatedly taken offline. Such attacks could also damage Australian providers’ reputation for reliability and security, resulting in regional business seeking similar services from other major providers in the region. Australia’s economy would suffer, and adversaries could be given more control of digital trade. The reputational damage could also extend to diplomatic partnerships.

While these concerns have been framed in an Australian context, other Quad members are vulnerable to the same scenarios. The implications of a supply-chain attack are therefore significant for both Australia and regional partners. The importance of the Quad’s ransomware statement shouldn’t be lost. Public pressure should be placed on governments to keep them accountable to the Quad’s call for states to uphold the shared responsibility of assisting each other when faced with malicious cyber activity, particularly when ransomware threatens critical national infrastructure.

As a starting point, the Australian parliament should review the proposed amendments to the Security Legislation Amendment (Critical Infrastructure) Bill 2021 in this context and take it as an opportunity to demonstrate Australia’s commitment to combating regional cybersecurity risks to critical national infrastructure. There is also an opportunity to apply the lessons learned from the recent Optus and Medicare ransomware attacks.

It’s time for Canberra to step up its leadership in this area and help spearhead the formulation of robust, consistent and enduring ransomware mitigation and response policies and practices that can be developed and emulated by regional partners. Only through collaboration can the threat of instability that ransomware poses be managed.

Former US Cyber Command and NSA chief makes the case for a cyber competition strategy

Cyber threats to national security and prosperity are today better understood, better prioritised and far better resourced than in decades past. Cyber as a domain, as a threat and as a key opportunity is now a firmly established and essential element of military strategy and capability.

Yet today, state, non-state and individual cyber actors have greater capability, capacity and willingness to use cyber tools aggressively for malicious purposes, and their tolerance for risk has grown.

In the view of former US National Security Agency and US Cyber Command boss Mike Rogers, despite the positives, the overall picture of the cyber domain is one of increased threat and complexity.

Most countries, even if they leverage all the power and capability of their military and defence cyber sectors, can’t effectively respond to this complex threat environment alone. Many nations, Western and non-Western, democratic and non-democratic alike, now understand that their national capabilities and their private sectors are engaged in a competition that is fundamentally unfair.

For decades, countries with market-based economies, such as the United States, have sought to create national frameworks that enable their research and development ecosystems and free-market private sectors to pursue global competitive advantage, largely by keeping government out of their way.

The assumption that market-based economies by their nature could continue to enable the private sector to out-compete and out-innovate their rivals has been disproven. Rogers notes that the approach of an enabled and unencumbered free market served the US well for a time after the end of the Cold War; it led to the invention and dominance by the US and other Western nations of key capability areas like stealth technology, the internet and wireless connectivity.

But between the fourth and fifth generation of these technologies, the playing field has definitively tilted in favour of actors that exploit highly controlled, centralised and coordinated strategies leveraging all the resources and capability in their private and public sectors, including intelligence and espionage capabilities.

China—now openly described as a peer competitor and strategic rival to most Western countries—has assessed that cyber and a range of critical and emerging technologies are game-changers with both domestic and international implications. Cyber is considered by China (and the US and others) as being among a range of technologies that can offer decisive strategic advantages for future prosperity and security.

The Chinese state has poured, and continues to pour, billions of dollars into building its cyber capabilities. Its strategy includes blatant theft of advanced Western intellectual property and excessive requirements for technology transfer from the West as a precondition for access to the lucrative Chinese market, and to the billions of dollars of Chinese state investment.

No company, R&D outfit, or sector of companies operating under free-market principles and on the assumption of a level playing field can compete with China’s strategy. Competing under these circumstances requires a team approach bringing together government and the private sector, and working with partners and allies across national boundaries.

In no way should a team strategy between like-minded players emulate what China has done. Competing effectively doesn’t necessitate cyber-enabled IP theft, the employment of state espionage capabilities to unfairly benefit Chinese state-owned and ‘private’ companies, or forced technology transfer. But it does require policy settings that protect innovation and cutting-edge technology developed and commercialised in the US and other centres of technological excellence and dynamism (including and especially in the Indo-Pacific).

It also requires export-control and inward-investment regimes that differentiate between international actors with which technological cooperation is a strategic imperative and those that present significant strategic risks.

It certainly involves a clear articulation that competition—fair competition with clear rules for acceptable and unacceptable behaviour—is the strategy. And it involves action to create a policy environment that enables competition in a way that protects and extends existing rules and norms and that safeguards IP and key sources of innovation.

It also requires forums and mechanisms that bring together the perspectives, incentives and imperatives that drive the activities of governments, the technology sector and civil society. These communities don’t yet talk to one another effectively, don’t harness their collective power for shared benefit, and don’t align on common interests in a way that produces superior outcomes for them all.

The need to get to that is urgent. The Sydney Dialogue, an ASPI initiative, brings government, private-sector and civil-society leaders together at the highest levels and provides a platform for enhanced cooperation between international actors. It offers a constructive space for the urgent conversation needed to enable stronger, fairer, more integrated competitive strategies between countries that share a commitment to the rule of law and a vision for the use of existing and future technologies in the global good.

Rogers discussed the need for better, more integrated strategies to compete with China in key technology areas. He delved into the implications of the use of cyber capabilities in the Russian invasion of and ongoing war against Ukraine, and described it as a ‘watershed’ moment. The growing reality of, and increasing calls for, decoupling of cyber and other technologies from China, Russia and other actors is also explored.

Importantly, Rogers talked about the enormous potential of the technology priorities and objectives of the AUKUS partnership. Australia, the UK and the US have a real opportunity to demonstrate and enhance their ability to achieve effective integration between government, industry and civil society, and to work across national borders through a joined up, multi-sectoral technology strategy for national security.

To meet the objectives of partnerships like AUKUS, there’s a need to move beyond cooperation to integration, including between parts of our systems that have operated independently for good reasons in the past. We must preserve the best and most productive characteristics of our free and open systems. But government, the private sector and civil society must also be brought into closer alignment for the benefit of all. It is past time to move beyond understanding the problem and start organising more effectively for the geostrategic technology competition that we know we’re now in.

The policy challenges posed by critical, emerging, cyber and space technology require a new approach. That starts with answering a key question Rogers asks: ‘What is our vision of the key technologies, the most critical sectors that are really going to drive economic advantage … and [that] if placed at risk would cause us harm, [and] what are the policies we need to create advantage for ourselves?’

A new cybersecurity strategy based on what is required to become and remain competitive, secure and resilient should focus on this central question.

Artificial intelligence isn’t that intelligent

Late last month, Australia’s leading scientists, researchers and businesspeople came together for the inaugural Australian Defence Science, Technology and Research Summit (ADSTAR), hosted by the Defence Department’s Science and Technology Group. In a demonstration of Australia’s commitment to partnerships that would make our non-allied adversaries flinch, Chief Defence Scientist Tanya Monro was joined by representatives from each of the Five Eyes partners, as well as Japan, Singapore and South Korea. Two streams focusing on artificial intelligence were dedicated to research and applications in the defence context.

‘At the end of the day, isn’t hacking an AI a bit like social engineering?’

A friend who works in cybersecurity asked me this. In the world of information security, social engineering is the game of manipulating people into divulging information that can be used in a cyberattack or scam. Cyber experts may therefore be excused for assuming that AI might display some human-like level of intelligence that makes it difficult to hack.

Unfortunately, it’s not. It’s actually very easy.

The man who coined the term ‘artificial intelligence’ in the 1950s, cybernetics researcher John McCarthy, also said that once we know how it works, it isn’t called AI anymore. This explains why AI means different things to different people. It also explains why trust in and assurance of AI is so challenging.

AI is not some all-powerful capability that, despite how much it can mimic humans, also thinks like humans. Most implementations, specifically machine-learning models, are just very complicated implementations of the statistical methods we’re familiar with from high school. It doesn’t make them smart, merely complex and opaque. This leads to problems in AI safety and security.

Bias in AI has long been known to cause problems. For example, AI-driven recruitment systems in tech companies have been shown to filter out applications from women, and re-offence prediction systems in US prisons exhibit consistent biases against black inmates. Fortunately, bias and fairness concerns in AI are now well known and actively investigated by researchers, practitioners and policymakers.

AI security is different, however. While AI safety deals with the impact of the decisions an AI might make, AI security looks at the inherent characteristics of a model and whether it could be exploited. AI systems are vulnerable to attackers and adversaries just as cyber systems are.

A known challenge is adversarial machine learning, where ‘adversarial perturbations’ added to an image cause a model to predictably misclassify it.

When researchers added adversarial noise imperceptible to humans to an image of a panda, the model predicted it was a gibbon.

In another study, a 3D-printed turtle had adversarial perturbations embedded in its surface so that an object-detection model believed it to be a rifle. This was true even when the object was rotated.

I can’t help but notice disturbing similarities between the rapid adoption of and misplaced trust in the internet in the latter half of the last century and the unfettered adoption of AI now.

It was a sobering moment when, in 2018, the then US director of national intelligence, Daniel Coats, called out cyber as the greatest strategic threat to the US.

Many nations are publishing AI strategies (including Australia, the US and the UK) that address these concerns, and there’s still time to apply the lessons learned from cyber to AI. These include investment in AI safety and security at the same pace as investment in AI adoption is made; commercial solutions for AI security, assurance and audit; legislation for AI safety and security requirements, as is done for cyber; and greater understanding of AI and its limitations, as well as the technologies, like machine learning, that underpin it.

Cybersecurity incidents have also driven home the necessity for the public and private sectors to work together not just to define standards, but to reach them together. This is essential both domestically and internationally.

Autonomous drone swarms, undetectable insect-sized robots and targeted surveillance based on facial recognition are all technologies that exist. While Australia and our allies adhere to ethical standards for AI use, our adversaries may not.

Speaking on resilience at ADSTAR, Chief Scientist Cathy Foley discussed how pre-empting and planning for setbacks is far more strategic than simply ensuring you can get back up after one. That couldn’t be more true when it comes to AI, especially given Defence’s unique risk profile and the current geostrategic environment.

I read recently that Ukraine is using AI-enabled drones to target and strike Russians. Notwithstanding the ethical issues this poses, the article I read was written in Polish and translated to English for me by Google’s language translation AI. Artificial intelligence is already pervasive in our lives. Now we need to be able to trust it.

Cybersecurity rulings important for all Australian businesses

The world of cybersecurity is overflowing with principles. Principles about patching, passwords and people. Principles about physical security, phishing and firewalls. But until recently, there has been little legal precedent supporting these principles—and without such precedent, principles can be difficult to enforce.

However, the past month has served up two landmark cases that will help establish a new level of precedent for cybersecurity in Australia—one in the Federal Court and one in the ACT Civil and Administrative Tribunal. Both cases deserve utmost attention from senior management, boards and directors as our nation navigates a new era of cybersecurity uplift. These cases should not be dismissed as just technical ‘principles’.

After years of legal wrangling, on 5 May the Federal Court released its highly anticipated judgement into action brought by the Australian Securities and Investments Commission in 2020 against RI Advice Group. ASIC claimed RI Advice had inadequate cybersecurity controls in place, which the company failed to remedy despite being aware of the issues. This resulted in sensitive client information being compromised multiple times over a six-year period, a brute-force ransomware attack and one client losing $50,000.

It its judgement, the court found that RI Advice had contravened the Corporations Act ‘as a result of its failure to have documentation and controls in respect of cybersecurity and cyber resilience in place that were adequate to manage risk in respect of cybersecurity and cyber resilience’.

While the judgement’s level of detail was reasonably limited given a settlement had been reached, RI Advice was ordered to pay a contribution towards ASIC’s costs, totalling $750,000, and to undertake a comprehensive cybersecurity overhaul, to be monitored by the court, within a month of the judgement.

Importantly, in the judgement, Justice Helen Rofe highlighted the critical role of organisational cybersecurity, stating: ‘Cybersecurity risk forms a significant risk connected with the conduct of the business and provision of financial services. It is not possible to reduce cybersecurity risk to zero, but it is possible to materially reduce cybersecurity risk through adequate cybersecurity documentation and controls to an acceptable level.’

Ultimately, this judgement highlights that ASIC will be paying close attention to the cybersecurity practices of organisations that fall under its remit—and is prepared to take action. More broadly, it is a clear signal to all organisations right across the economy that the Corporations Act will be enforced as it relates to cybersecurity and it’s only a matter of time before more cybersecurity-related actions are brought before the courts.

The second case, a civil dispute between a vendor and a customer in the ACT Civil and Administrative Tribunal, is pertinent to all businesses, but small and medium-sized enterprises should pay careful attention. They are a prime target for cybercriminals and generally have lower cyber protections—the soft underbelly of Australia’s cybersecurity ecosystem.

The case involved a machine supply company (the applicant) and a diesel-fitting business (the respondent).  Their relationship began when the respondent sought to purchase a machine from the applicant. A deal was struck and bank details for the $5,499 purchase exchanged.

Unfortunately, the respondent’s emails had been compromised by a cybercriminal. Within hours the criminal sent a fake email informing the buyer that the bank account details had changed, with the funds to be deposited in a different account. By the time both parties realised what had happened, the money was long gone.

This type of crime, known as business email compromise, or BEC, is on the rise. According to the Australian Cyber Security Centre, Australians reported more than 4,600 BECs equating to $81 million in thefts in 2020–21.

In this case, the applicant brought the matter to the tribunal to recover the $5,499 owing. The respondent argued that payment had been made in good faith and therefore there was no case to answer, despite the money being stolen by a cybercriminal and the applicant never receiving the funds.

Ultimately, the tribunal ruled in favour of the applicant, finding that ‘responsibility for correct payment rests with the respondent and it was incumbent upon the respondent to exercise care in ensuring payment was made. The money was paid into an account that did not belong [to] the applicant and it remains unpaid.’

As Australia races towards an increasingly digitised economy and more businesses, large and small, house valuable data on internet-facing systems—which is a good thing—unfortunately cases like these may become more prevalent. But they don’t have to.

While there’s no perfect solution to the cybersecurity puzzle and no silver bullet to prevent cybercrime, there are steps all organisations can and should be taking to bolster their cyber defences. There are also a range of incentives that small businesses in particular can take advantage of, like the instant write-off for cyber uplift and training announced in this year’s federal budget.

And while principles are essential, there are three key concepts upon which all organisational approaches to cybersecurity should rest: risk, resilience and recovery.

Know what the key risks are and manage them appropriately in a way that uniquely suits your organisation. There is no one-size-fits-all approach. Cyber risk cannot be eliminated but can be effectively managed.

Build up cyber resilience to deal with identified risks, but also ensure that people are central to resilience. Make cybersecurity intrinsic to your organisation’s culture.

And finally there’s recovery, because when things do go wrong you need to have a plan. Organisations with a clear continuity plan can recover more quickly, potentially reduce the impacts of a cyber incident, and get back to business.

Despite budget boost, more resources needed for Australia’s cyber defence

The federal government’s 2022–23 budget allocates $9.9 billion for boosting Australia’s cyber defence capabilities. The expansion forms part of the government’s commitment to the AUKUS pact, building out the military workforce to support its objectives.

The successful deployment of critical technologies—cyber, artificial intelligence and quantum computing—into Australia’s defence and national security assets can’t be achieved solely through off-the-shelf acquisition from our allies. The government must partner with Australia’s technology and broader ICT sector to provide capabilities where we already have them, rather than simply buying from overseas.

The need for local capability is critical. With cyber, AI and quantum, data moves from being a supporting asset to a core component—effectively becoming the fuel that powers these capabilities. As with fuel, data storage and transmission will continue to be central to the operation of Australia’s critical infrastructure providers.

Conversations in this arena will ramp up as regional tensions continue to seep into the virtual world and our data infrastructure becomes an attractive target for adversaries.

Over the past year we have witnessed a raft of sophisticated attacks launched against all levels of government, as well as health, utilities, food and critical supply chains.

The Australian Cyber Security Centre’s latest annual cyber threat report found that 35% of cyberattacks reported in 2020–21 were launched against government agencies.

Australia has become too reliant on foreign suppliers to store and protect our data assets, undermining our ability to ensure that defence and other government data is entirely under Australia’s jurisdictional control.

In July, the parliament passed legislation allowing electronic data held offshore to be accessed for local law enforcement and national security purposes. This was yet another push towards the establishment of a bilateral agreement with the US under its Clarifying Lawful Overseas Use of Data (CLOUD) Act, a move that would enable unfettered data access between countries and raise concerns over privacy.

The Australian ICT industry already has the capability to deliver many of the data storage and protection services we need, to world-class standards, while also being genuinely sovereign to Australia.

Australia boasts its own burgeoning local cloud industry. It has been expanding for years and was supercharged by the Covid-19 pandemic, as organisations, government agencies and industries digitised activities en masse. The growth has been assessed by local analyst firm Telsyte, which predicts the local cloud market will be worth over $3 billion by 2025.

Further, the demand for local and sovereign data centres to store information has led to Australia’s emergence as one of the fastest-growing data centre locations, with the country now occupying one-tenth of data centre space in the world.

There’s no reason why the Department of Defence or any other government agency should be contracting these services to foreign-owned companies and, in the process, offshoring our data protection and storage. There are wholly sovereign Australian companies that provide the full suite of ICT services governments require.

This is not simply an argument for government to ‘buy Australian’. To be effective partners, ICT businesses need clear guidelines on what areas government will support, including the building of local capabilities, and what should be delivered by allies or other international partners.

In the absence of clear guidelines, businesses are often left second-guessing where to invest to best support the government’s technology needs. Even with the best and most well-informed intentions, those investments may not align with the government’s requirements.

What’s needed is an overarching whole-of-government ICT strategy and policies that specify and prioritise the sovereign technological capabilities we will need for a future-proof digital Australia.

The good news is that we have a ready-made framework currently in use to support defence materiel procurement that can be easily adapted to serve our ICT and critical technology needs.

The defence sovereign industrial capability priorities include AI, robotics and cyber technologies, and imbue Australian businesses looking to partner with the government in these areas with the confidence they need to invest and innovate, knowing it will align with Defence’s procurement policy requirements.

The government should adapt and apply this methodology to ICT and critical technologies so that all government agencies can make procurement decisions based on utilising Australian capability first.

This does not mean the capabilities of our allies are left out in the cold. It simply means we look first in our own cupboard for a solution, and in the event that we lack a specific capability, we then turn to our allies and partners.

This is not asking for ICT to get special treatment. Rather, it is a recognition of the ubiquity of ICT in our economy.

ICT is essential to each of our sectors, including defence and national security. It contributes as much as finance and insurance, and more than four times as much as agriculture. In fact, according to recent research by Accenture for the Technology Council of Australia, the technology sector contributed $167 billion to Australia’s GDP in 2020–21.

More importantly, ICT is not just a core dependency of Australia’s critical infrastructure, but is critical infrastructure itself.

Australian businesses are playing a major role in building the sovereign capabilities required to meet the challenges and opportunities of a cyber-oriented future. They have invested heavily in the development of talent, infrastructure and intellectual property, and demonstrated both technological and strategic capabilities.

The $9.9 billion injection demonstrates that the government understands the critical nature of cyber defence, but industry needs to participate. The local sector wants to work with Defence as its partner, and to help design a roadmap for sovereign ICT and critical technology.

A clear strategy that sets out our national priorities will benefit not only Australian technology businesses, but also government and the entire economy.