Despite having an Information warfare strategy since the mid '90s
Tim Lohman (Computerworld)
Despite growing concern about China’s cyber-warfare capabilities,
That’s the view of Desmond Ball, a professor in the Strategic and Defence Studies Centre at the
According to Ball,
[ With the increasing threat of cyber crimes, protect yourself and stay informed on the latest news with Computerworld's Security newsletter ]
“[
“They would be unable to systematically cripple selected command and control, air defence and intelligence networks and databases of advanced adversaries, or to conduct deception operations by secretly manipulating the data in these networks.”
According to Ball, the capability gap in anti-virus and network security applications between
“
In Ball’s view, and despite having an information warfare (IW) plan since 1995 and conducting cyber exercises since 1997,
“At best, [
“
In the Australian Security and Intelligence Organisation’s (ASIO) 2010-11 Annual Report, the agency noted that espionage by cyber means was emerging as a serious and widespread concern.
“ASIO is seeing increasingly both foreign state and non-state actors taking advantage of the access, relative anonymity and global reach of the internet,” the report reads. “From the comfort of wherever their computer terminal may be, they probe Australian information systems and data holdings for vulnerabilities and mine for valuable commercial, diplomatic and military intelligence — sometimes with success.
“Despite the rise of espionage through cyber means, ASIO has not seen any reduction in the intensity of other, more traditional forms of espionage — human spies are still being recruited and run and foreign intelligence agencies are still interfering covertly in the Australian community. Indeed, effective coordination between traditional, human-based espionage and computer network operations represents a potent threat to our most sensitive data and networks that are not connected to the Internet."
In July 2010, ASIO established a Cyber Espionage Branch to provide advice to government and business on the threat of cyber-espionage and to investigate increasingly sophisticated and frequent cyber-intrusions into computer networks.
For its part,
In the Department of Foreign Affairs and Trade’s (DFAT) 2010/11 Annual Report, the department said it had worked with the Department of the Prime Minister and Cabinet and other agencies on a framework for
“The department took the lead for
“The department also worked with the Department of Defence to strengthen cooperation with the
(http://www.computerworld.com.au/article/373798/aukmin_talks_lead_cyber_security_commitment/)
In a sign of the growing government acceptance of cyber-attacks as genuine threats to national security, the Australian government said it June that it would develop its first Cyber White Paper.
http://www.computerworld.com.au/article/388907/australia_draft_cybersecuity_strategy_paper/
Read more:
http://www.computerworld.com.au/article/405767/china_minimal_cyber_security_threat_paper/