National Security Overview - Australia
|
|
- Bruno Glenn
- 3 years ago
- Views:
Transcription
1 Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit s terms of reference in the area of national security with particular reference to policing and cyber security. Australian society s conception of security changed as it became richer and more technologically advanced over the last two decades or so. Today, security is no longer exclusively about existential threats like nuclear or major war, although these threats remain. A broader range of concerns now occupy our thinking, ranging from those posed by terrorism, crime and threats generated via the internet. This broadening of the concept of security introduces three new dynamics into Australia s political debates. These dynamics will continue to influence the priorities and resources of all Australian governments, and make closer cooperation necessary among them and with our international partners. The first dynamic concerns the broadening of the security agenda. During the Cold War, Australia policymakers grappled with the existential threat of nuclear war, and a very significant concern about how decolonisation in Asia might work against western interests. But this situation changed as the international community recognised China, Southeast Asian states became more internally coherent, and, ultimately, Soviet-US tensions reduced after These same changes also allowed different non-state and state actors to pursue their own interests with fewer constraints, leading to a number of internal wars and another round of international atomisation. As a consequence, Australia launched or participated in a number of overseas operations designed to meet political, economic and humanitarian objectives, and used a broad mix of national capabilities on these operations including diplomats, police, aid workers and the Australian Defence Force (ADF). The second major dynamic is the broader range of vulnerabilities inherent within today s society. Wealth, connectivity and convenience have increased the potential for disruptions to everyday life, and also the electorate s expectations of its government. Increasingly, the vulnerabilities of infrastructure critical for our highly-networked financial, energy, water and food systems are even harder to manage on a daily basis by their predominantly commercial operators. That these vulnerabilities can also be exploited by maleficent actors for political or economic gain, or by increasingly common and severe natural events, makes government s role essential. But demarcating the government s responsibility is difficult and far from objective as public expectations increase. The third major dynamic is the way security concerns can touch people, everyday. While the Australian people still remain affected by war and could be so again these relatively rare events have only required a little sacrifice from most. But today, and increasingly into the future, security threats such as organised crime, cyber-crime and the impact of border security challenges can and will present in Australian neighbourhoods and homes. Further, values, diasporas, increasing connectivity and the power of traditional and new media make 1
2 global problems more immediate. This dynamic makes security a mainstream concern and a regular not exceptional part of Australian political life. In short, people are looking to government to protect their way of life, and sometimes to advance their ideals, to a more individual and more immediate level. But our understanding of these dynamics, and importantly how Australian governments will work together to meet these challenges, is both not particularly well understood and only slowly evolving. What are Australia s key national security priorities? The first is to get a better understanding of how these dynamics affect Australia s interests. This means understanding change across the globe, across the region and within Australia itself. It requires detailed consideration of how information flows, technology, resources and money actually move. It also requires an ability to make a cold-eyed calculation about where change really affects Australia s security and an ability to explain why the latest problem should not consume our resources. At present, Australia s ability to perform this critical analysis is mature and generally very effective, although there is a bias towards understanding the interaction and intentions of nation-states over other important actors, especially sub-state groups who are not directly involved in conflict. Creating a twenty-first century response to these challenges is also important. Our constitution has proven relatively robust so far, in that it allows the Commonwealth government to act against most challenges. However, our national system of governance is proving less efficient and somewhat of a constraint when it comes to action. The crosscutting nature of contemporary security challenges means state and federal cooperation on security issues is even more important than ever. But the mechanisms for cooperation have grown in an ad-hoc, issue-by-issue way. This means we have a plethora of overlapping committees at the ministerial and officials levels, especially in the policy development space. It also means the Commonwealth must provide funds if the nation as a whole is to build security capabilities to manage these threats: it has done so in an inconsistent way to date. The need to develop consistent, nation-wide security capabilities can be seen in a number of key areas and Commonwealth leadership is essential. Today, we have a situation where criminals are able to exploit gaps in legislation among jurisdictions. Also, the ability of state and Commonwealth law enforcement and other relevant agencies to exchange information seamlessly is limited by technical, legislative and cultural barriers. While the state governments may show goodwill to change, they will be unlikely to take effective action without Commonwealth leadership. We ll return to this point later. The need for leadership is also clear in areas where the Commonwealth clearly has sole responsibility, such as in the cyber domain, coordination has been patchy at best. New thinking which builds national awareness, ensures capability is present to meet threats when and where needed, links the substantial criminal information holdings of Australian governments, and sensibly joins related challenges to enhance economies of effort, is needed. Also needed is a more effective way to engage the business and community sector in security efforts. There have been some good examples of this, especially in critical infrastructure protection, but the effort needs to come on a broader basis. This should see attention given to organised crime, as well as enhanced efforts in the cyber domain. Further efforts to counter violent extremism are also needed, and these need to be conducted in increasingly sophisticated ways. 2
3 Resourcing national security The Commonwealth government s allocation of resources to their stated risk is currently heavily skewed towards defence spending. This is understandable given the long lead-times and increasing cost of defence capability. But the Commonwealth s own National Security Strategy shows that six of the seven major risks are not primarily some, not even slightly defence related. While we can t compare the risks objectively as there is no detail about either the likelihood or consequence of each, we can infer a two points that have a great importance for resource allocation across the national security community. Figure 1: The National Security Budget Foreign Affairs - 1 3% ASIO 1% ASIS 1% ONA 0% Federal Police 4% Foreign Aid 16% Defence 75% Source: Cost of Defence, ASPI Defence Budget Brief Firstly, national security risks with a primarily domestic focus receive only a small part of the Commonwealth s money. Indeed, it would be fair to infer that risks such as domestic terrorism, organised crime, critical infrastructure and cyber security might only account for three or four per cent of the Commonwealth s national security spending. Of course, state governments bear a reasonable share of the burden too in some risk areas. But any objective assessment of the risk is likely to find that these dimensions of security are not sufficiently resourced and therefore may not be addressed in a way that seeks to reduce the actual level of risk. It s also important to note that the language used in the paragraph above was heavily qualified. That s because the Commonwealth has not presented a clear explanation of the relative risk between each of the eight challenges listed in the National Security Strategy. This means it is impossible to identify whether resource allocations are actually following risk assessments, or whether these allocations remain bound by historic spending patterns. So the second major point is that better information would help to create more rational arguments for resourcing priorities. The National Commission of Audit might wish to consider asking for this assessment as its members consider where the Commonwealth can best place its emphasis in the security realm. 3
4 Policing and law enforcement One clear trend of the past century has been a steady expansion of the range of crimes that can be perpetrated against both the community and the nation. Australia s state governments were able to deal with most major crime areas at Federation: and most of these major crime areas still exist today. But the onward march of technology, Australia s increasing absolute and relative prosperity, and the growing irrelevance of domestic and international borders to criminal enterprise have increased the importance of the Commonwealth s role in law enforcement. This continuity and change has major implications for all Australian governments, and makes close cooperation among them essential for the continued development of Australia s society, economy, security and reputation. The change in the extent, vectors and nature of crime have made the Commonwealth s powers bought more directly relevant to law enforcement at the local level. For example, the Commonwealth s responsibility for telecommunications is now critical to combatting cyberfraud and identify theft; its corporations powers are used to prosecute major economic crimes; and its responsibility to protect the states from domestic violence has acted as a rallying-point in the national fight against terrorism. Less noted has been the generation of criminal intelligence, which is shared among the jurisdictions and is both an efficient and effective way of handling this delicate material. Also similarly efficient is the way the Commonwealth leads on overseas law enforcement partnership arrangements, and provides practical assistance to develop policing and legal capability for neighbours and others. These trends are unlikely to be reversed, and they may be accelerated in some places. In particular, the number of instances where the states may actually refer powers to the Commonwealth could increase as it becomes clear that new legal innovations such as unexplained wealth laws are best pursued from a national basis. There is also a pressing need for the Commonwealth to lead the multi-jurisdictional effort against organised crime by encouraging consistent, nation-wide policing capabilities. Overseas, the increasing fragility of some states, and the need to build effective rule of law in these, is likely to see governments wish to use their law enforcement instruments to achieve national policy objectives perhaps in place of, or at least in addition to, the traditional military contributions to these situations. While the Commonwealth should not seek new power unjustifiably, it must be alert to where its mandate and resources can be best used to ensure a national approach to fighting crime. One particularly important contribution that the Commonwealth government makes, and makes available to the state governments and international partners, is criminal intelligence. The Commonwealth has already made a major contribution to this function and product. Notably, the breadth of inputs to this intelligence is expanding, with the inclusion of taxation, immigration, customs and social security information. This kind of aggregation will require careful management, especially in relation to privacy, but it will provide an essential weapon for law enforcement officers. Yet the resources being devoted to this function, especially through the Australian Crime Commission, is decreasing. This is a false economy. Cyber Security In a globalised, world, the key that keeps much of our economies, infrastructures, lines of communication, defence, security, intelligence and social capital enabled is the cyber domain. Cyberspace has created intimate interdependencies between states and new 4
5 avenues for governments to achieve their policy objectives. As cyberspace empowers individuals, non-state actors and the private sector, a large-scale cooperative approach between public and private sector stakeholders is required. And as technology develops in quantum leaps, questions remain about how we should manage the cyber front both at home and abroad. The ability to leverage cyberspace is one of the twenty first century s most important sources of power. State and non-state actors can use this power to achieve financial, military, political, ideological or social objectives in cyberspace or the physical world. These objectives can be for both positive and negative purposes. Like most technologies, cyberspace is agnostic to politics and ideology, but is a powerful transfer mechanism for both. The twenty first century is going to be defined by the cyber domain. There will be a great responsibility to ensure that those that wish to exploit cyberspace for negative purposes are denied as much operating space as possible. This must be achieved without reducing the openness and freedom that the cyber domain has enabled. Cyber power is attractive to the whole spectrum of actors, be they large nation states, or small non-state actors, primarily because of its low relative cost, high potential impact and general lack of transparency. Powerful actors can combine cyber power with existing military capabilities, economic assets. Less powerful actors states, organisations, individuals, can gain asymmetrically in cyberspace by inflicting extensive damage on vulnerable targets. For a relatively small investment, networks can be bought down, valuable information stolen and interfered with. The threats in cyberspace are crossing multiple national jurisdictions with increasing frequency. This places stress upon the state to be able to cope with the cross-boundary nature of the threat, and requires states to cooperate with other to achieve mutually beneficial outcomes. It is up to the different levels of government to work with counterparts in other jurisdictions to achieve success in the prevention and alleviation of cyber insecurity. Australian Context Cybersecurity is rapidly emerging as a high-priority policy challenge for the Australian Government. The National Security Strategy released in January 2013 listed malicious cyber activity as the third of seven key national security risks and called for closer partnerships with the business community to develop a more effective response. One of the problems inherent in cybersecurity is the sheer number of government and private sector entities that have a legitimate interest in the field. This adds enormously to the complexity of cyber policy development. The Australian Government s 2009 Cyber Security Strategy lists nine agencies, units or committees with critical cybersecurity responsibilities, but the number s really much larger and growing. i The Intelligence Services Act 2001, which governs DSD s operations, gives the agency responsibility for information security across all government operations, not simply Defence. DSD s Cyber Security Operations Centre was established in 2009 to create a single gathering and reporting point for information on detecting and defeating cyberthreats. Within the Attorney-General s Department (AGD), a computer emergency response team was rebranded in 2010 as CERT Australia, to provide a single point of contact on cybersecurity information for Australian businesses and individuals. 5
6 In January 2013, the then Prime Minister announced the creation of the ACSC, which, she said: will be the hub of the government s cyber security efforts. It will include, in one place, cyber security operational capabilities from the Defence Signals Directorate, Defence Intelligence Organisation, Australian Security Intelligence Organisation, the Attorney-General s Department s Computer Emergency Response Team Australia, Australian Federal Police and the Australian Crime Commission. These measures point to a consolidation of cyber functions, particularly at the operational level, where information technology specialists detect cyber intrusions and deploy countermeasures. The bulk of government investment in strengthening cyber capability has happened at that highly technical level. The ACSC also aims to build stronger, practically focused links with the private sector. The goal to have the new stand-alone facility operating by the end of 2013 looks unlikely to be achieved, but the focus on practical technical matters is one important part of a holistic policy response. Sadly, the story is much less positive at the level where governments, agencies and businesses develop cyber policy the handling strategies needed to support good-quality decision-making on cyber matters. As cyber lifts in national priority, the need is to ensure that our policy development capacities also increase. In the past few years, however, responsibility for cyber policy has been shifted between no fewer than three departments. The most recent organisational reshuffles in cyber policy were announced in May in the 2013 Defence White Paper with the renaming of DSD to the Australian Signals Directorate, and in the announcement of the creation of the ACSC in January The white paper said that the Centre will be overseen by a Board, led by the Secretary of the Attorney-General s Department, with a mandate to report regularly to the National Security Committee of Cabinet. ii In effect, we ve returned to the situation that applied in 2009: AGD has the lead in reporting cybersecurity issues to government, this time through a board rather than through the Cyber Security Policy and Coordination Committee. Most concerning, though, is that the drive for a Cyber White Paper has been lost and the skill base for policy work in the major departments has been eroded through constant changes of role. The new ACSC will focus on operational matters rather than on policy, so AGD will report to government on cyber incidents rather than on shaping policy choices. The answer to the question Who owns cyber policy? is that no department or agency has a strong grasp on that area right now. It s not surprising that the Business Council of Australia s submission on the Digital Economy White Paper rather sharply said that the white paper should present a coherent government strategy to deal with cyber security, drawing together multiple existing initiatives. iii 6
7 i Australian Government, Cyber Security Strategy, 2009, available from %20for%20website.pdf. ii DoD, Defence White Paper 2013, para. 2.90, p. 21, available from iii Business Council of Australia, Submission to the Department of the Prime Minister and Cabinet regarding the Digital Economy White Paper, January 2013, available from 7
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
More informationE-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
More informationCommonwealth Organised Crime Strategic Framework: Overview
Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart
More informationCyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationBusiness Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
More informationHearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
More informationSPECIAL REPORT. Essential and underappreciated The contribution of law enforcement to national security
SPECIAL REPORT March 2014 Essential and underappreciated The contribution of law enforcement to national security David Connery ASPI is pleased to introduce its new Strategic Policing and Law Enforcement
More informationS. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
More informationFOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks
F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired
More informationAustralian Government Cyber Security Review
Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and
More informationESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
More informationGood morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.
Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND
More informationCyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
More informationTHE WHITE HOUSE Office of the Press Secretary
FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly
More informationHow To Get A Security Degree In Australia
Security and intelligence postgraduate 2015 INNOVATIVE AND CUTTING-EDGE PROFESSIONAL DEGREES THAT COMBINE THEORY WITH POLICY AND PRACTICE IN COUNTER TERRORISM, INTELLIGENCE, SECURITY AND STRATEGIC POLICING.
More informationOf Citadels And Sentinels: State. Tim Legrand and Jeff Malone
Of Citadels And Sentinels: State Strategies For Contesting Cyber-terror Tim Legrand and Jeff Malone 4 key issues and challenges 1. A cyber architecture designed for efficiency, not security 2. Private
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationHome Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
More informationNational Cyber Security Strategies: United States
National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies
More informationSafeguarding your organisation against terrorism financing. A guidance for non-profit organisations
Safeguarding your organisation against terrorism financing A guidance for non-profit organisations Safeguarding your organisation against terrorism financing A guidance for non-profit organisations ISBN:
More informationCYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
More informationTechnology Strategy April 2014
Technology Strategy April 2014 Contents Overview 1 Our environment 1 Why change? 2 Our vision for technology what success looks like 3 Our approach 7 Transformation shifts how will we know we have been
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationTestimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
More informationDECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationViewpoint: Implementing Japan s New Cyber Security Strategy*
Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released
More informationAction Plan 2010-2015 for Canada s Cyber Security Strategy
Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated
More informationStanding Council on Police and Emergency Management
Standing Council on Police and Emergency Management Communiqué 29 June 2012 The Standing Council on Police and Emergency Management (SCPEM) met in Melbourne today, chaired by the Hon Peter Ryan MLA, Deputy
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More information(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
More informationCyber security the facts
Cyber security the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present and every business is at risk. Australia s security and intelligence agencies
More informationCYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
More informationRationale for a Cloud Services Framework
Rationale for a Cloud Services Framework AIIA response to Draft Paper for Consultation January 2015 T 61 2 6281 9400 E W info@aiia.com.au www.aiia.comau About AIIA The Australian Information Industry Association
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationRecords Authority. Australian Security Intelligence Organisation
Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationCyber Security Strategy
Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient
More informationCyber-safety for Senior Australians. Inquiry Submission
SUBMISSION NO. 32 Cyber-safety for Senior Australians Inquiry Submission The AISA Response to the Parliament s Joint Select Committee s call for submissions Date 23 March 2012 Page 1 Executive Summary:
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationCYBER SECURITY THREATS AND RESPONSES
CYBER SECURITY THREATS AND RESPONSES AT GLOBAL, NATION-STATE, INDUSTRY AND INDIVIDUAL LEVELS Heli Tiirmaa-Klaar* Although cyber security has accompanied the ICT sector since the first computer systems
More informationDevelopments in cybercrime and cybersecurity
Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their
More informationThe European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
More informationBIG DATA AND CYBERSECURITY:
BIG DATA AND CYBERSECURITY: Multi Stakeholder Threats and Opportunities A US Speakers Program Embassy of the United States, Serbia September 20-25, 2015 Anne C. Bader Founder The International Cybersecurity
More informationFinancial Crimes Enforcement Network
Fiscal Years 2008 2012 Financial Crimes Enforcement Network Table of Contents Message from the Director 1 Introduction 3 The Bank Secrecy Act 4 The Nation s Financial Intelligence Unit 5 Mission Statement
More informationSecond Cyber Security Summit, November 11, 2013 in Bonn Final communique
Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference
More information1 FOCUS Foresight Security Scenarios
New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military
More informationFAQs Organised Crime and Anti-corruption Legislation Bill
FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationOn the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation
More informationEmerging risks for internet users
Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber
More informationFor Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
More informationCybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
More informationGOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
More informationU.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationCRIME PROFILE SERIES ORGANISED CRIME IN PROFESSIONAL SPORT
Threats to the integrity of professional sport in Australia Organised criminal groups currently have a limited presence in professional sports in Australia. However, there are vulnerabilities within the
More informationAISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK
1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association
More informationSecurity Council. United Nations S/2008/434
United Nations S/2008/434 Security Council Distr.: General 3 July 2008 Original: English Special report of the Secretary-General pursuant to Security Council resolution 1806 (2008) on the United Nations
More informationCompetition Policy Review. SUBMISSION by the OFFICE OF THE AUSTRALIAN SMALL BUSINESS COMMISSIONER
SUBMISSION by the OFFICE OF THE AUSTRALIAN SMALL BUSINESS COMMISSIONER JUNE 2014 We are writing to provide some observations on small business aspects of the competition policy review. Importance & challenges
More informationFighting Terrorism at its Source
The Auditor-General Audit Report No.30 2011 12 Performance Audit Australian Federal Police Australian National Audit Office Commonwealth of Australia 2012 ISSN 1036 7632 ISBN 0 642 81237 3 COPYRIGHT INFORMATION
More informationRUSSIA CHINA NEXUS IN CYBER SPACE
RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest
More informationNational Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
More informationCYBER SECURITY STRATEGY AN OVERVIEW
CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without
More informationCyber crime: Police Roles and Responsibilities Within a Collaborative Framework
Executive Report to the CACP Board of Directors from CACP Global 2015 Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework In the fall of 2014, the CACP Board of Directors assigned
More information2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy
Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April
More informationASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More information(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationInquiry into the ability of Australian law enforcement authorities to eliminate gun-related violence in the community
Senate Legal and Constitutional Affairs Committee Inquiry into the ability of Australian law enforcement authorities to eliminate gun-related violence in the community Attorney-General s Department Submission
More informationCORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity
FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the
More informationGLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT
GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT Introduction 1. On 16 and 17 April 2015 representatives of governments, international organisations, businesses, civil society, academia and the technical
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationRemarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
More informationCONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
More informationCyber Attacks: Securing Agencies ICT Systems
The Auditor-General Audit Report No.50 2013 14 Performance Audit Cyber Attacks: Securing Agencies ICT Systems Across Agencies Australian National Audit Office Commonwealth of Australia 2014 ISSN 1036 7632
More informationCyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
More informationHMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationUnderstanding the significance of the Asian Century. Andrea Haefner and Professor Andrew O Neill Griffith Asia Institute, Griffith University
Understanding the significance of the Asian Century Andrea Haefner and Professor Andrew O Neill Griffith Asia Institute, Griffith University Griffith MBA Values If you undertake the Griffith MBA you will
More informationPriority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
More informationRUAG Cyber Security. More security for your data
RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making
More informationCouncil of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling
Council of the European Union Brussels, 26 January 2016 (OR. en) 5481/1/16 REV 1 LIMITE JAI 50 MIGR 7 DROIPEN 14 GENVAL 8 COSI 10 JAIEX 7 RELEX 49 COMIX 43 NOTE From: To: Subject: Presidency Delegations
More informationCybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge
Cybercrime Bedrohung, Intervention, Abwehr BKA-Herbsttagung vom 12. - 13. November 2013 Cybersecurity strategic-political aspects of this global challenge Full version Michael Daniel Special Assistant
More informationCybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
More informationCyber Security Strategy
Cyber Security Strategy MINISTER S FOREWORD Australians have been quick to embrace the Internet in their lives and businesses. For most of us it is now part of our daily routine for talking to our friends
More informationSeoul Communiqué 2012 Seoul Nuclear Security Summit
Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to
More informationW H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s
W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai
More informationPatrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview
More information