Nothing Found
Sorry, no posts matched your criteria
Sorry, no posts matched your criteria
Sorry, no posts matched your criteria
The communications demands of the Media Age are so diverse and complex that only a simple answer will suffice.
This is back-to-basics meets back-to-the future. Head to the bedrock of first principles while everything else in the Media Age goes into the flux capacitor.
Express the essence in six words: speak truth, always. Speak fast, always.
Maximum truth. Maximum speed. Always. Hyphenate the motto to show how the two concepts merge: truth-with-speed.
Truth up front, but speed nearly as important. The Media Age puts a rocket under the adage that a lie dashes round the world while truth is still pulling on its trousers.
Truth-with-speed sounds simple—a motherhood sentiment. But Defence’s default settings—and those of the Minister’s office—pull in the opposite direction.
The control imperative means the Minister and Defence want command over what truth is given and when and how; truth and speed are subject to ministerial approval! The current motto reads: defined truth, carefully decided, delivered slowly.
If Canberra embraced truth-with-speed it would alter the level and detail of Ministerial control over Defence’s release of information on operations. And it would force Defence to think more clearly about what to conceal and what must be done in the open. Those are big asks, challenging a lot of culture.
As a former Defence insider commented: ‘I think the aim of the game really was keeping the troops silent and preventing whistle blowers, rather than the Media as such.’
Truth-with-speed would strike at a lot of Defence boundaries.
How much truth can Canberra manage? The system understands—in theory—the benefits of openness.
Releasing the Cyber Security Strategy last month, Prime Minister Malcolm Turnbull pledged to be more explicit about cyber-crime successes and failures and hack attacks:
‘Only by acknowledging, explaining and analysing the problem can we hope to impose costs on perpetrators and empower our private citizens and government agencies and businesses to take effective security measures.’
The PM’s new cyber-security advisor, Alastair MacGibbon, recently posed the dilemma:
‘The question is how open a government can be about cyber-security without causing further damage and without hanging out all the government’s crown jewels?’
Across all the terrain of the Media Age, a balance has to be struck and tough choices confronted about where to draw the lines.
A good start is to be clear about the crown jewels. And separate those jewels from mere convenience or embarrassment or stuff up or political plays and bureaucratic comfort.
The distinction is between jewels and tawdry trinkets.
The need for truth-with-speed is accelerating as terrains merge. Rather than treating social media and traditional Media as different entities, see them as a continuum running right across the communications landscape. The borders evaporate.
You can’t have one message for a domestic audience and a different message for an international audience—they are one audience. And you have to give the Digital Citizen what once was reserved for journalists.
The hacks no longer control the news. Governments direct less of the information. Give the Press what you should give the People: hacks and Digital Citizens must be treated as equals, because in this new terrain they are the same. Truth-with-speed for all.
Technologically, new media are transformative, but many of the military-media issues recur: Exclude versus Engage; Control versus Communication.
Old lessons matter, even as the lines blur. The military instinct to control, censor and shut out is antediluvian in the Media Age.
Time to relearn some hard-won lessons about the relationship between journalists and the military—then apply them to lots of new players.
Here are three principles for use in the Media Age.
The prime directives draw on recommendations offered 30 years ago by the Centre for Journalism Studies, University College, Cardiff, in a study commissioned by Britain’s Ministry of Defence after the media policy shambles (and scrambles) of the Falklands War.
So the basic principles aren’t new, just hard to do. The burden of truth-with-speed is in the doing, not the pledging.
The prime directives of truth-with-speed:
Much would change if these became the driving principles.
For instance, the ‘Defence Instructions (General) on Public Comment and Dissemination of Information by Defence Members’ obsesses that any release of information must be ‘coordinated, agreed and authorised.’
The DI(G) would be turned on its head. Having clearly defined the crown jewels (what is to be secret), everything else would be authorised. The default setting can’t be that everything is secret unless decided otherwise.
Defence would expect the facts to be told fully and quickly. And the job would be done by those closest to the facts.
The strategic corporal would be joined by the Lieutenant who can speak and the Captain who can confirm and the Major who can explain, and so on up the line.
Instead of the Canberra-centric mantra of coordinated and agreed, this would be decentralised. When the ADF was in the field, the facts would come from the field. The Digital Citizens will report from the front, so should the ADF.
The Afghanistan lesson is to tell a lot more and the Media Age demand is to tell it quickly.
Defence would get confronting freedoms. Let off the ministerial leash, Defence would have to speak more openly and honestly about what it is and how it works.
In an interesting turn of events, it appears that the 2014 Sony hack, February’s Bangladeshi bank heist and the attempted breach of a Vietnamese bank last year may all be linked. Vietnam’s Tien Phong Bank released a statement over the weekend saying it disrupted an attempted cyber heist valued at US$1.1 million at the end of last year. The thwarted incident and the breach of Bangladesh’s central bank in February are both thought to have targeted SWIFT, the central network for global financial transactions, with fraudulent transfer requests. SWIFT’s CEO has denied claims that vulnerabilities in the payment network facilitated the Bangladesh heist, with the company releasing a statement arguing that PDF-targeting malware was used to initiate fraudulent bank transfers. However, security firm BAE has just published a blog highlighting the ‘strong links’ between the methods used in those two bank incidents and the infamous hack of Sony Pictures in 2014. The similarities suggest that these events are part of a broader campaign that could be traced back to a single group of hackers.
To counter such breaches in the future, IBM’s super computer, Watson, is now being trained to combat cybercrime. The computing system already excels in many areas, including healthcare, cooking, finance, customer service and playing Jeopardy. IBM describes Watson as ‘a technology platform that uses natural language processing and machine learning to reveal insights from large amounts of unstructured data’. Now, eight universities across the US will be part of the effort to expand Watson’s knowledge on the topic of cybercrime. IBM will provide Watson with 15,000 annotated security documents per month, and expects it to attain an expert level of understanding of the cybersecurity landscape and the ability to monitor large scale trends, as well as the ability to detect potential threats. Watch a video explaining the process here.
The US Senate has asked President Obama to develop a national definition of cyberwar. Republican Senator Mike Rounds has proposed the Cyber Act of War Act 2016, which would ‘require the President to develop a policy for determining when an action carried out in cyberspace constitutes an act of war against the United States, and for other purposes’. Rounds’ suggestion has raised criticism, including this CFR article that describes the bill as ‘an ill-conceived proposal that deserves to die, quickly, in Congress’.
The US Department of Commerce’s National Telecommunications and Information Administration (NTIA) has published new research revealing that the ongoing encryption debate is eroding public confidence in the safety of the Internet. A survey of 41,000 households in the US revealed that nearly one in two individuals report that privacy and security concerns now prevent them from doing even simple things online. NTIA has raised concerns that this significant loss of trust may ‘reduce economic activity and hamper the free exchange of ideas online’, a trend that could be reversed by encouraging broad use of strong encryption technologies.
Last Wednesday, Chinese and US officials met in DC to discuss cyber issues for the first time since establishing some common cyber principles as part of a broader bilateral agreement in September last year. The first iteration of the new Senior Experts Group, included US representatives from the US Department of State, Department of Defense, and Department of Homeland Security, with Chinese representatives from the Ministry of Foreign Affairs, Ministry of National Defense, Cyberspace Administration of China, and the Ministry of Public Security. According to the Chinese Foreign Ministry’s spokesperson, the discussions took place in a ‘positive, in-depth and constructive way, touching upon norms for state behaviour and cyberspace-related international law and confidence-building measures’. The group is expected to meet twice a year, and represents an improvement of bilateral cyber relations after China withdrew from a similar initiative in response to the US indictment of five Chinese military officers in 2014.
Unfortunately, it’s not all good news in Sino–US cyber relations. The recent release of US Defense Department’s annual report to Congress, Military and Security Developments Involving the People’s Republic of China, offers a critical assessment of Chinese cyber posturing. It re-issues accusations of China’s attempts on US government networks, describing the use of ‘cyber capabilities to support intelligence collection against the US diplomatic, economic, and defense industrial base sectors that support US national defense programs’. Chinese Defence Ministry spokesman Yang Yujun denounced the report as having ‘deliberately distorted’ Chinese defence policies, while Chinese Foreign Ministry spokesman Hong Lei described it as ‘full of prejudice against China’. At the same time, The New York Times is reporting that Chinese authorities have been secretly reviewing the security features of tech products sold in China by overseas companies. The assessments are supposedly run by a committee within the Cyberspace Administration of China and are expected to create a ‘new front in an already tense relationship with Washington over digital security’.
Lastly, please join us in a moment of silence to honour the timely death of CSI: Cyber. Ok, that’ll do.
The Pakistani Foreign Office has reached out to the nation’s largest intel body, Inter-Services Intelligence (ISI), for assistance to boost its internal IT security. Government ministries in Pakistan are no strangers to targeted online campaigns (here and here), and the Ministry of Foreign Affairs is seeking to beef-up its cyber resilience in response. The Ministry has requested 80 million rupees in next year’s federal budget—a 130% increase on this year’s budget—to boost the resilience of its Islamabad headquarters and communications security across its network of foreign missions. The move has raised concerns internally that the new role will provide ISI with undue access to the Ministries’ communications, although that’s been dispelled by a government official who said ISI would only have ‘limited access’ and that the work of departments remain protected by ‘encryption codes’.
The Cyber Space Administration of China (CAC) recently launched an investigation into Chinese search engine Baidu, finding that the site has been inappropriately presenting sponsored links as organically generated search results. The CAC found that Baidu was ranking returned search results based upon the advertising spend received from companies, but neglected to make this clear to the user that the results were in fact sponsored.
Apple CEO Tim Cook is set to visit China this month to undertake talks with senior government and CCP representatives. The visit comes at a tumultuous time in the relationship between the tech giant and economic powerhouse, with Beijing recently suspending several of Apples online services on the mainland and concerns surrounding China’s new counterterrorism law.
Last month US General Vincent Brooks spoke to US Senate leaders about the online threat posed by North Korea. In news that won’t surprise readers of our 2015 Cyber Maturity Metric, Brooks rated North Korea’s online abilities as ‘among the best in the world and the best organized’. To counter the growing cyber threat from North Korea, last week the US and South Korea agreed to deepen cyber cooperation. Speaking in Seoul, Secretary of State John Kerry pointed the finger at Pyongyang for carrying out ‘provocative, destabilizing and repressive actions’ online and warned that North Korea will be ‘will be held accountable for their actions.’
The Canadian government is moving to block two Huawei employees from entering Canada on espionage concerns. Canadian border officials have advised the pair that their entry will be denied under section 31 (1) f of the country’s immigration act, with authorities holding ‘a reasonable belief’ that they are part of an organisation which may be engaged in acts of ‘espionage, subversion or terrorism.’ It’s extremely rare for applicants to be rejected for a Canadian visa based on espionage concerns. The workers and their employer deny any involvement in espionage. Huawei is frequently accused of state-sponsored espionage; the company was barred from tendering for the construction of Australia’s NBN in 2012 on national security grounds.
On the home front, the International Cyber Policy Centre recently welcomed senior Australian and Spanish public sector and business leaders to Canberra for a 1.5 track dialogue. Co-hosted with the Spain–Australia Council Foundation, discussions centered around national public and private sector perspectives on cyber security and sought to identify areas of possible cooperation between Australia and Spain. Spanish Secretary of State for Foreign Affairs Ignacio Ybañez opened the dialogue, noting that cyber security cooperation and private sector engagement was a significant area of potential growth in our bilateral relationship. He noted that geographic distance was no longer a barrier to the relationship between Spain and Australia given our networked and connected world. He emphasised shared values as an enabler of cooperation on issues such as norms, conflict risk reduction and cyber security incident response. The dialogue identified several areas of potential future cooperation between Spain and Australia—including CERT collaboration, best practice and threat information sharing for critical infrastructure protection and coordination of efforts in global cyber capacity building through shared membership in institutions such as the Global Forum on Cyber Expertise.
While last night’s Federal Budget is still being picked apart, it seems that Defence will be funding the lion’s share of the new cyber priorities announced as part of the recent Cyber Security Strategy. Of the $230 million announced as part of the Strategy, money reallocated from Defence will cover $122 million. A further $38 million was already committed as part of the National Innovation and Science Agenda, and the remaining cash comes from nine other portfolios. Defence will get $51 million of this money back to fund the relocation of the Australian Cyber Security Centre.
The World Summit on the Information Society forum (WSIS) has gathered in Geneva this week for its annual dialogue. WSIS, organised by the ITU, UNESCO, UNDP and UNCTAD, is the ‘largest annual gathering of the ICT for development community’. The 2016 forum is focusing on how information technologies can facilitate the implementation of the UN’s Sustainable Development Goals, with participation from representatives of government, the private sector, civil society, academia and international organisations. The forum wraps up on 6 May, so check in next week for some analysis of the outcomes.
It was at last year’s WSIS preparatory meeting that India declared its support for multi‑stakeholder governance of the Internet, which seeks to give governments, the private sector and civil society an equal voice in decision-making related to the Internet’s governance. India previously advocated a multilateral approach, under which governments operating through institutions like the UN are the ultimate decision-makers. However the communique from last month’s Russia–China–India foreign minister’s meeting makes it seem that India has now either jumped back on the multilateral bandwagon, or the two ministries responsible (External Affairs, and Communications and Information Technology) are pushing separate agendas. While the communique is filled with boiler plate language of the kind that Russia and China are well known for, for India it continues a history of indecision on this important issue.
Russia and China also held their first bilateral ‘Cyberspace Development and Security Forum’ on Wednesday last week. A significant part of the agenda was devoted to discussing the reliance on foreign IT firms and exploring possible ways to reduce the exposure to this ‘hidden danger’. One suggestion that China’s Cyberspace Administration had previously made was for the government to buy a financial stake in Chinese IT firms and take a seat on their boards.
The University of Sydney’s Quantum Control Laboratory’s researchhas been boosted by a grant of an undisclosed sum from the US Intelligence Advanced Research Projects Activity, an organisation within the Office of the Director of National Intelligence. Across town, UNSW received a $26 million boost from the National Innovation and Science Agenda earlier this year, making Sydney an emerging centre for quantum computing research.
In Thailand, one of eight dissidents arrested by the junta last week and charged under the country’s Computer Crimes Act for lèse-majesté, has claimed that the police showed him screenshots of his Facebook Messenger chats during interviews. While it seems the dissidents believed they were safe using Facebook, Facebook’s messaging service is encrypted between the user’s device and Facebook, rather than being encrypted end-to-end, which means Facebook can provide private messages to a government if required by law. The Thai junta has been engaged in a struggle with activists online since the 2014 coup, and has previously requested help from service providers including Facebook to filter content that opposes the junta, and once briefly blocked Facebook access in the country.
And finally, several months after Wired pointed to Australian businessman Craig Wright as the hitherto unknown founder of cryptocurrency BitCoin has confirmed that he indeed created the cryptocurrency and the blockchain technology behind it. Some currency experts have expressed doubts about Wright’s claim, which he attempted to prove by using digital signatures known to be owned by BitCoin’s founder, but doubts remain. While Wright’s leadership may help resolve a row over between the BitCoin community over how to expand the currency, he may be hesitant to undertake such a role.
The major cyber story of the week is the long-awaited release of Australia’s Cyber Security Strategy, the first document of its kind since 2009. The Strategy outlines $230 million of funding for enhanced cyber security efforts over four years, with a focus on five key themes. Specifically, significant investment will be funnelled into improving the cyber capabilities of the AFP, Crime Commission, Australian Signals Directorate and Australia’s Computer Emergency Response Team (CERT Australia).
The Strategy’s overarching principle of public–private sector partnership informs the establishment of a Cyber Security Growth Centre and Joint Cyber Threat centres in capital cities. The government will also relocate Australia’s Cyber Security Centre from the highly classified ASIO building to allow greater private-sector access.
The Strategy establishes new positions: a Minister Assisting the Prime Minister on Cyber Security, a Special Advisor on Cyber Security (to be filled by Alastair MacGibbon), and a Cyber Ambassador to be appointed by Julie Bishop. Further, the development of a sustainable cyber-savvy workforce will be encouraged through investment in STEM education and the creation of academic centres of excellence in universities.
Notably, the Strategy explicitly refers to Australia’s offensive cyber capabilities—a first in Australia’s rhetoric surrounding cyber security. At the launch, Turnbull stated than an ‘offensive cyber capability, housed in the Australian Signals Directorate, provides another option for the Government to respond’.
The Strategy has been hailed as ‘the most important and innovative government strategy yet written’. However, there has been criticism of the document’s language not addressing the seriousness of contemporary cyber threats strongly or directly enough. Others are concerned that this underestimation is reflected in the funding on offer, which falls short in comparison to the billions being spent by Australia’s peers. Last year, the UK announced plans to invest £1.9 billion (A$3 billion) in cybersecurity, while the US has recently upped its spending by US$5 billion to a total of US$19 billion (A$24.8 billion). Check out some in-depth analysis of the new Strategy from the ICPC team here, here and here.
In the US, tech firms have banded together to oppose a bill that would effectively outlaw end-to-end encryption and require companies to help the government decrypt customer data. A coalition of companies—including Apple, Facebook, Google, Netflix, Microsoft and Twitter—wrote an open letter to the sponsors of the new bill, Senators Richard Burr and Dianne Feinstein. The tech giants warn against the ‘unworkable policies around encryption that would weaken the very defences we need to protect us from people who want to cause economic and physical harm’.
In an amusing concurrent development, popular instant messaging service Viber just announced it will make end-to-end encryption the default for its 700 million users. The company stated that it’s ‘proud that our users can confidently use Viber without war of their messages being intercepted’. This comes only a few weeks after WhatsApp made the same transition.
This week also brought an exciting development in Artificial Intelligence (AI) technology. Scientists from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL), in partnership with machine learning start-up PatternEx, have developed a hybrid machine that can learn how to identify 85% of cyber attacks. The findings, which merge state-of-the-art AI and analyst intuition, were published in a paper titled AI2: Training a big data machine to defend. The initiative works on an active learning system, where artificial intelligence network assessments are verified by an analyst, and any corrections are integrated back into the machine as a feedback loop that continues to improve its detection accuracy. The system can reportedly reduce false positives by a factor of five and is about three times more accurate than comparable technologies—a major development in the potential of AI for cybersecurity.
Staying stateside, a Bloomberg report has revealed that a US$12 billion tactical mobile Internet network used by the US Army suffers significant cyber security vulnerabilities. The Warfighter Information Network-Tactical Increment 2, or WIN-T, uses satellite and radio technology to offer secure voice, video and data communications to troops on the move. The network is deployed to 11 of the Army’s combat brigades and is already in use in Iraq and Afghanistan. However, an assessment conducted by Johns Hopkins University and the Army Research Laboratory recommended ‘improvement to user training techniques and hardware and software enhancements to harden against the cyberthreat’. In light of those findings, the US Army and General Dynamics are undertaking efforts to upgrade systems already in use and line-up improvements that will be deployed through 2028.
Notwithstanding its apparently flawed military cyber defences, the US has been having fun with its offensive cyber rhetoric this week. Check out this piece from The New York Times to understand what US Deputy Defense Secretary Roger Work really means when he says the US is dropping ‘cyberbombs’ on ISIS.
Last August during a speech in Sydney, DFAT Secretary Peter Varghese claimed that ‘all foreign policy starts at home’. This sentiment is echoed in Australia’s brand new Cyber Security Strategy, which firmly establishes ‘global responsibility and influence’ as one the five key themes of the paper.
Our last home-grown cyber strategy, released in 2009, revealed little about our thinking around the key international debates of the day, such as cyber security norms of behaviour, the applicability international law and internet governance. It also lacked any concrete plan for how Australia could shape and creatively engage the region on cyber issues, as a result Australia missed a golden opportunity to influence regional thinking on cyber matters.
Yesterday morning, Prime Minster Malcolm Turnbull changed all of that when he launched the highly anticipated update to Australia’s cyber security strategy (PDF). This most recent effort offers plenty of detail on Australia’s approach to international cyber policy and sets out a sensible working agenda for the next four years.
Most importantly, it lays out a coherent manifesto on Australia’s ideal view of cyberspace and how we should use our diplomatic tools to pursue, persuade and convince others in our near region of the advantages of our approach and strength of our perspectives.
Briefly summarised, this view calls for an internet that’s open, free and secure based on our values of freedom of speech, right to privacy and rule of law. It supports a multistakeholder internet and the applicability of international law to cyberspace, and argues that closing the digital divide is in everyone’s interest.
To help achieve those new clear and prominent foreign policy goals, the Foreign Minister will soon appoint Australia’s first Cyber Ambassador. Many of Australia’s key partners including the US, the Netherlands and Japan have successfully placed experts in Ambassador-esque roles to help drive their cyber values and agendas overseas.
The creation of such a role is a smart move, and will serve as a quick and sensible way to elevate the profile of cyber issues within DFAT and on the international stage.
The new Ambassador will have a challenging and multifaceted role, with tasks ranging from navigating complex norms work within the UNGGE, to continuing already fruitful work within the ASEAN Regional Forum, to supporting trade promotion efforts and helping reach a resolution on the red hot internet governance agenda. The Ambassador will need to hit the ground running to engage with the many departments and agencies within the APS that work internationally on cyber issues to ensure they’re all singing from the same song sheet.
Pleasingly, the new strategy brings a focus to capacity building in our region. Such forward-leaning activities help to underpin almost the full gamut of international cyber issues, from confidence building and norm formation, to economic exchange, cyber security and incident response. If the staffing, subject matter expertise and infrastructure don’t exist in our neighbourhood, neither does effective international discourse, closing the digital divide or effective network protection.
Over the next four years, the government has allocated $6.7 million to sustain such work. This will be drawn from the government’s $230 million total cyber package. While it’s a significant improvement on DFAT’s existing shoestring budget for cyber work, it remains a modest figure, particularly when compared to the budgets of our key partners, such as the UK’s AU$14.3 million four year commitment to international cyber engagement and capacity building . Without a doubt, the budget allocation should continue to rise in order to keep pace with our lofty international ambitions.
The Cyber Ambassador will also have a key role to play in crafting Australia’s first public international cyber strategy, also announced by Turnbull yesterday. A good International Cyber Strategy will pick up where the new national strategy left off, by laying out a more detailed position on key international debates, presenting a carefully considered plan for international engagement, and integrating the private sector into our international strategic thinking. That won’t be an easy task by any stretch of the imagination.
The international focus of Australia’s new cyber strategy is encouraging. It presents a clear national position on our values and goals in cyberspace, and a roadmap for how we should go about reaching our destination. The challenge our new Cyber Ambassador will face is in implementing such a diverse international program on a slender budget.
The release of the Panama Papers this week has set a new record for the largest volume of data that has ever been leaked. The 2.6 terabytes of data, consisting of 11.5 million documents previous leaks such as WikiLeaks by a significant margin. The leak was provided to news outlets through encrypted channels by an unknown source.
This week another US health care company has fallen victim to ransomware, only a month after a Los Angeles hospital was held to ransom by cyber criminals. Electronic health records at 10 hospitals owned by MedStar Health in Maryland and Washington DC were encrypted on Tuesday last week and held ransom by unidentified hackers causing significant disruption to services. MedStar reported that it had restored 90% of its network by last Saturday, but it’s not clear if the company paid the US$18,500 ransom request. The Washington Post noted that hospitals and other health and insurance providers are obvious targets for hackers as they maintain sensitive personal information, but the industry hasn’t kept up with the financial and retail sectors efforts for cyber security and resilience.
In Japan, planning for the 2020 Tokyo Olympics has prompted the government to implement a program to train a further 1000 cybersecurity analysts within government. A preferential pay system and new senior leadership positions for cybersecurity are intended to boost cybersecurity awareness and skills across the government before the games kick off in four years.
The UK Ministry of Defence (MoD) has announced that it’ll spend £40 million on its new Cyber Security Operations Centre (CSOC), previously announced as part of the UK’s cyber security strategy. The Centre will be located at the MoD Information Systems and Services branch at Corsham in Wiltshire, formerly the location of the UK government’s nuclear war bunker. The CSOC will monitor and defend MoD’s networks, and is part of a larger £1.9 billion investment over five years by the UK in defensive and offensive cyber capability by MoD and GCHQ. The UK also announced last Friday at the Nuclear Security Summit in the US that it will be undertaking joint drills with the US to test the cybersecurity of nuclear power plants in both countries.
It appears that there’s still confusion in the US Department of Defense (DoD) about who’s responsible for leading the charge when responding to a cyber emergency in the US. It seems that both Northern Command and Cyber Command (CYBERCOM) believe that they’d take the lead for DoD assistance to domestic cyber crises, and Pacific Command is of the opinion that it’d take responsibility for responding to cyber incidents in its area of responsibility. The Government Accountability Office (GAO) has warned that until roles and responsibilities of DoD’s various different components are clearly established, it ‘may not be positioned to effectively employ its forces and capabilities to support civil authorities’.
This problem isn’t isolated or new, with the GAO issuing a report back in 2013 that stated that roles and responsibilities for cybersecuirty at the national level also need to be more clearly defined. In a separate interview, the Pentagon’s head of cyber policy Aaron Hughes noted that one of the key accomplishments so far in implementing the DoD Cyber Strategy has been exercises to refine CYBERCOM collaboration with the FBI and Homeland Security—suggesting that work is underway towards overcoming the problems identified by GAO. .
Following the indictment of seven Iranian hackers by the US last week, Iran watchers have been working to scope the country’s cyber capability. Majid Rafizadeh from Harvard notes that while Iran hasn’t yet reached the cyber sophistication of China and Russia, its capability is advancing at a rate that warrants security concern, particularly as the Iranian regime perceives cyberspace as an environment in which it can ‘advance its ideological, geopolitical, and strategic ambitions… by inflicting damage on their major state institutions and infrastructures’. The National Council of Resistance of Iran, a Paris-based shadow Iranian government, has also published a review of Iran’s cyber capability.
And finally, the American Foreign Policy Council has released a primer on cyber security, including briefs on US, Chinese, Russian, Iranian and North Korean cyber capabilities.
The US Department of Justice is reportedly preparing an indictment against a set of Iranian hackers who allegedly infiltrated a small New York dam in 2013. While the attack only managed to penetrate the dam’s administration network, and not its SCADA operating system, the possible indictment highlights how seriously attacks against critical national infrastructure are handled within the US system.
The impending Iranian indictments will likely largely be seen as a political move, but beyond this, they’ll serve as an important tool to reinforce norms agreed upon at the UN Group of Governmental Experts. In particular, it’ll reinforce the norm that states shouldn’t conduct or knowingly support ICT activity that intentionally damages critical infrastructure. In 2014 when the US Government sought to underline another norm, that the state-backed hacking of secrets for economic gain was off limits, it issued five indictments against Chinese nationals for attacks against American industry, gaining widespread international attention.
Also in the US, news site ThirdCertainty has compiled a useful cheat sheet on the 2016 Presidential candidates’ views on key cybersecurity issues. That includes their positions on hot topics such as the CISA, hacking-back, the encryption debate and the Snowden leaks. The candidates were also graded on their positions by two IT professionals, with recent drop-out Marco Rubio and Bernie Sanders coming out on top—albeit with the scores of B- and C+ respectively.
The Australian Government’s excellent Stay Smart Online alert service shared news last week of malware targeting ‘leading Australian and New Zealand banks’. The software, which affects Android banking applications, has the ability to intercept the SMS communications many banks use for two-factor authentication. The malware masquerades as an Adobe Flash application which could be inadvertently downloaded by users. For more information head here.
Al-Monitor has an interesting story this week on Palestine’s burgeoning hacking underground. While politically motivated attacks against Israel have been happening online for years, according to the article an increasing amount of skilled technologists are using their talents for economic gain by hacking personal credit cards and corporate networks around the world.
The Singaporean Government has fired the latest shot in the ongoing IT skills battle, establishing a new program designed to lure overseas-based Singaporean talent back to the city-state. The Smart Nation Fellowship Programme, created by the Infocomm Development Authority (IDA), aims to draw overseas-based experts home for three to six month stints working alongside IDA engineers on ‘smart nation’ projects aimed at improving the provision of services to the public in areas including transport and healthcare.
If you’re in Tasmania you might have noticed a dramatic slowing in your internet speeds. The Basslink submarine cable, which brings both telecommunications and electricity from the mainland, was cut late last week as operators attempted to find the location of a fault that has plagued the cable since last December. The cut has all but stopped the connection of several ISPs to the island—including iiNet and Internode—and many are questioning why arrangements weren’t made in advance to route traffic through Telstra’s submarine cables, which remain unaffected.
Wrapping up this week, our friends at the Observer Research Foundation have launched a new paper that assesses the Indian government’s cyber organisational structures and makes recommendations for improved co-ordination, resilience and response.
Western Australia’s parliament was hacked last Tuesday with a computer virus forcing the shutdown of its telecommunications systems. According to Speaker Michael Sutherland, the attack impeded a number of house operations including, ‘Hansard publications, the preparation and processing of questions on notice and answers to questions on notice’. Fortunately, the breach didn’t prevent Parliament sitting as usual.
The incident comes following a 2015 audit of sections of the WA government’s digital infrastructure. The assessment found that some agencies didn’t adequately protect information to prevent unauthorised access and data loss. Specifically, it noted the lack of basic controls over passwords, patching, setting of user privileges, copies of sensitive information across systems and poorly configured databases. Cyber security within state governments in Australia often lags behind best practice, but news last week that Queensland is establishing its own cybersecurity unit can be taken as a welcome sign that this trend may soon reversed.
Last week’s ruling that Apple must assist the FBI to unlock an iPhone linked to San Bernardino gunmen Syed Farook has reignited the smouldering discussion on encryption and the difficult balance between privacy and public safety. More public figures have recently come out on one side of the debate or the other. NSA chief Admiral Mike Rogers surprisingly came out on the side of encryption, saying that it’s ‘foundational to the future’, while Microsoft founder Bill Gates has chastised Apple CEO Tim Cook for opposing the court order. Surveys of public opinion in the US have found that there’s a roughly 50/50 split between support for the FBI or Apple. This is significant as Apple will reportedly seek to propel the case out of the courts this week and into the hands of Congress to decide.
Also in the US, the Hollywood Presbyterian Medical Centre in LA has paid 40 bitcoins (equivalent to US$17,000 in ransom to retrieve access to its patient files after a malware attack. The attack prevented access to the computer systems and restricted the ability to share communications electronically, successfully forcing the hospital to return to manual paper and pen patient submissions. Ransomware locks computer systems through file encryption which then demands a ransom payment in exchange for the decryption key.
Japanese companies have been targeted by a highly skilled and well financed state actor according to cyber security firm Cylance. The campaign, named Operation Dust Storm, previously targeted major industry in Japan, South Korea the US, Europe and South East Asia, but has now narrowed its target set to Japanese organisations. The intent of the hackers appears to be long term presence on networks to exfiltrate data, particularly from electricity, oil, gas and transpiration companies. Japan is a frequent target for hackers, however security consultants to Japanese firms and the government continue to highlight weaknesses in corporate culture that views breaches as a loss of face, preventing disclosure and cooperation on common threats.
The Australian Government recently announced plans to invest $26 million in the development of quantum computing technology as part of the National Innovation and Science Agenda (NISA). Prime Minister Turnbull has argued that NISA is part of a new ‘ideas boom’ designed to ‘create a modern, dynamic and 21st century economy for Australia’. It emphasises quantum computing as an important area for government investment based on its ability to produce ‘jobs and economic growth’. And while this industry could certainly be ‘worth billions’, it offers much more than financial prosperity: quantum technologies could play a significant role in our future defence and security.
Quantum technology harnesses the obscure properties of subatomic matter to achieve computing processes unobtainable with classic computers. Today’s computers run on binary digits, or bits, which exist as either 1s or 0s. In contrast, quantum bits, or qubits, exploit the bizarre principle of ‘superposition’ that enables them to occupy all possible states (both 1 and 0) at the same time. This allows quantum computers to undertake multiple calculations in parallel, unlocking unprecedented processing power that could ‘solve problems that would take conventional computers centuries’.
Another important quantum quality, ‘entanglement’, means two qubits can become inextricably linked, such that a change in one causes a change in the other. The qubits can remain connected even when separated across large distances. This delicate connection can be used for instantaneous communication, and its vulnerability to interference means the act of eavesdropping fundamentally alters the transmission, rendering it provably secure.
NISA asserts that those technological tricks will have a ‘transformational impact on Australian and global businesses’ but fails to mention the revolutionary role they could play in improving Australia’s defence force in three key areas.
Efficiency
The ability of quantum computers to undertake multiple calculations at once makes them an enormous asset for the optimisation of defence logistics. A quantum computer could examine all possible strategies and quickly identify the most rapid or low-energy solution, in order to determine the military’s preferable travel path, which is likely to increase the efficiency and speed of military operations.
Increasingly complex weapons systems also rely on ever-growing volumes of activation software. For example, the F-35 Joint Strike Fighter now requires more than 20 million lines of code to be fully operational. The brute force of quantum computers could offer a strategic advantage by improving the efficiency of code validation where defence assets are deployed in time-sensitive scenarios.
Intelligence
Quantum computers are most infamous for their potential to decrypt communications and other data. Current encryption models rely on the limited computing power available to hackers (both state and non-state) and the unreasonable amount of time required to solve long encryption keys. However, the immense processing power of quantum computers will be able to solve those previously impossible problems in little to no time, eventually rendering the majority of the world’s information security frameworks completely useless. The ability to hack an adversary’s (previously secret) communications would provide a government with access to incredibly sensitive intelligence and a decisive strategic advantage.
The accuracy of a military’s positioning, navigation and timing intelligence could also be improved through the precision of quantum sensor technologies. The old and expensive Global Positioning System (GPS) is increasingly unreliable and vulnerable to denial and sabotage. However, quantum location technologies are expected to be near impossible to jam and ‘1,000 times more accurate’ than today’s systems.
Security
While the advent of quantum computing may mean ‘some widespread and crucial encryption methods will be rendered obsolete’, quantum technology also promises a whole new generation of secure communication. The quantum property of ‘entanglement’ makes ‘Quantum Key Distribution’ possible, providing the basis of an ‘un-hackable’ encryption model that’s ‘impervious to eavesdroppers’, even quantum computers. With quantum computers potentially ushering in a ‘cryptopocalypse’, investing in enduring information security is a sensible insurance policy.
In light of these strategic applications, it’s not only the familiar tech giants such as Intel, IBM, Microsoft and Google racing to harness the power of quantum mechanics, governments worldwide are investing in this area to maintain or obtain strategic advantage.
The US Defense Undersecretary Frank Kendall recently stated that ‘quantum science is an area that could yield fundamental changes in military capabilities’. As such, the US Army, Navy and Air Force are working together with a $45 million grant to establish a secure long-distance quantum communication network ‘for the war-fighter’.
Quantum science also ‘figures centrally in the objectives of the Chinese military’, with the technology having been a focus of the National University of Defense Technology and the People’s Liberation Army’s University of Science and Technology for several years now. In fact, a Chinese project is underway to establish the longest quantum communication network in the world, stretching 2,000km between Shanghai and Beijing and including the world’s first quantum-enabled satellite.
The UK’s National Strategy for Quantum Computing argues that quantum technologies will have a ‘major impact’ on the defence industry, and the Defence Science and Technology Laboratory was already showcasing new quantum navigation technologies early last year.
The good news is that Australia’s quantum technology research is ‘world leading’. The Centre for Quantum Computing and Communications (CQC2T), recipient of the NISA grant, recently made breakthrough proof of concept for silicon quantum computing. In fact, lead scientist Michelle Simmons expects the centre to develop a scalable quantum computer within the next five years. The government’s recent investment is a great step in ensuring Australia’s continued efforts in this field.
There’s no doubt this industry promises enormous economic benefits. However, we mustn’t become complacent by thinking about quantum technology in purely economic terms. It’s also an essential national investment in the context of an ‘international race’ to quantum pre-eminence and the strategic advantage it’s likely to afford. The Australian government must continue to invest in this technology, while broadening its view to see the many benefits that quantum research and innovation brings to our national defence and security.