FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks

Size: px
Start display at page:

Download "FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks"

Transcription

1 F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired by Four Corners on 27 May? Talking Points As a matter of longstanding principle and practice, the Government does not comment on specific cyber-related incidents, investigations or operations. However, I can say that Australia discusses cyber issues with a range of countries, including China. - Our approach is based on constructi:ve engagement aimed at achieving practical outcomes. A-21 - During her April visit to China, the Prime Minister raised a number of issues with Premier Li, including cyber security. I can also. say that improving cyber defence is a top national security priority for the Govermnent. The Prime Minister's National Security Strategy identifies defending ourdigital networks as one of three priorities over the next five years - a new Australian Cyber Security Centre will be set up to: enhance our understanding of cyber threats; make Australia a harder target for malicious cyber incidents; and bolster our ability to engage international and industry partners. The challenges of cyberspace are global, requiring increased international effort, including through multilateral and regional forums. There is a need for clearer "rules of the road" on what is acceptable behaviour in cyberspace. Australia believes the existing framework of international law, including the UN Charter and international humanitarian law, applies to cyberspace. 26/06/201309:53:34 AM Version 90 - STRICTLY FOR OFFICIAL USE ONLY 1

2 2 Australia is working with the international community, including China, to achieve cominon understandings on how international law applies. Background Cyber attacks, and their attribution to particular countries,.continue to be a focus of domestic and international media and other attention. On 27 May, ABC's Four Corners program made a number of claims about intrusions into Australian Government and commercial IT systems, including allegations that the plans for the new ASIO building were i:xfiltrated by Chinese hackers. It was alleged that sensitive information was extracted from DFAT's network, but no details were provided. Prime Minister Gillard told Parliament on 28 May that the Four Corners allegations of hacking were "unsubstantiated", affirming the Government's reiterated the Government's long standing practice of not commenting on specific intelligence matters. On 2 June, you (Senator Carr) told the Sky News Australian Agenda program that the Government has raised concerns about cyber attacks with China but you were unable to talk publicly about the extent of cyber attacks on Australian computer systems. 26/06/201309:53:34 AM Version 90 - STRICTLY FOR OFFICIAL USE ONLY 2

3 3 Prepared Bv: Senior Adviser - Cyber Policy Team ISD/SIB/CYS Phone.: Edit Date: 24 June :45:34 AM Cleared By: John Quinn Assistant Secretary ISD/SIB/ Phone: /06/201309:53:34 AM Version 90 - STRICTLY FOR OFFICIAL USE ONLY 3

4 4 F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the government not confronted China about cyber attacks including on DFAT, such as those aired by Four Comers on 27 May? Talking Points As a matter oflong standing principle and practice, the Government does not comment on specific cyber-related incidents, investigations or operations. A-27 However, I can say that improving cyber defence is a top national security priority for the Government which is also proactively engaging business and the wider community. The Prime Minister's National Security Strategy released on 23 January identifies defending our digital networks through integrated cyber policy and operations as one of three priorities over the next five years - a new AustralianCyber Security Centre will be set up to enhance our understanding of cyber threats; make Australia a harder target for malicious cyber incidents; and bolster our ability to engage international and industry partners. Austra.lia also discusses cyber issues with a range of countries, including China. - Our approach is based on constructive engagement aimed at achieving practical outcomes. The challenges of cyberspace are global and thus require increased international effort, including through multilateral and regional forums. Australia is working with the international community, including China, through a UN Expert Group, to develop common understandings on the application of existing international law, including the UN Charter, to cyberspace. Australia consults closely with the US, its alliance partner on cyber issues. Background 24/06/201303:37:22 PM Version 49 - STRICTLY FOR OFFICIAL USE ONLY 1

5 5 Cyber attacks, and their attribution to particular countries, continue to be a focus of domestic and international attention. The ABC's Four Corners program, aired on 27 May, made a number of claims about intrusions into Australian Government and commercial IT systems. The focus of the program was on two specific cases - allegations that the plans for the new ASIO building were ex filtrated by Chinese hackers and that Adelaide based communications company Codan had, as a result of cyber intrusions, lost commercially valuable intellectual property information and export contracts to Chinese competitors. Passing reference was made to allegations that sensitive infonnation was extractedfiom DFAT's network, butfew details were provided. Attorney-General Mark Dreyfus who was interviewed would not comment on the claims. Interviewees expressed mixed views about international efforts to address cyber threats, such as through new treaties. Prepared By: Senior Adviser - Cyber Policy Team lsd/sib/cys Phone: Edit Date: 28 May :50:27 AM Cleared By: John Quinn Assistant Secretary lsd/sib/ Phone: /06/201303:37:22 PM Version 49 - STRICTLY FOR OFFICIAL USE ONLY 2

6 6 CYBER SECURITY OPERATIONS,General response For national security reasons, it is the long-standing practice of successive Australian Governments not to comment on operational security matters,, Can DFAT confirm that it was the subject of a cyber-attack by China which resulted in the loss of 'sensitive' documents as alleged in the recent,four Corners story? Consistent with statements made by the Attorney-General and Minister for Foreign Affairs about the Four Corners story, we do not intend to comment on hacking allegations made in the program, Are DFAT's cyber security defences, ICT systems and practices aligned with government security requirements? Yes they are: ' - DFAT works closely with the Government's protective security agencies, in particular ASD's Cyber Security Operations Centre, to strengthen our network. - DFAT's ICT systems are designed and maintained to ensure alignment with the Australian Government Information Security Manual (ISM) and the Protective Security Policy Framework (PSPF). DFAT is also enacting ASD's 35, Strategies for Mitigating Cyber Threats.

7 7 What measures are you taking to prevent future cyber-attacks? As part of the current Whole-of-Government cyber strategy, DFAT is.working to create a safer and more secure digital environment by: - working to improve resilience to cyber attacks, - maintaining cyber security policy to align with Whole-of- Government cyber initiatives and adapt to the changing cyber threat environment, - applying compliance audit processes to provide assurance that DFAT ICT systems and processes comply with the Government's mitigation strategies, and - overseeing DFAT cyber security activities through the recently established internal Cyber Security Governance Committee. Specifically, DFAT protects its classified secure network from attack by isolating it from the Internet: access to the network is confined to Australian Government authorised personnel with appropriate security clearances. In relation to the unclassified network, we apply a range of measures to prevent and detect attacks from outside: the network is designed and operated in accordance with government security policy and standards, including the conduct of regular threat and risk assessments, our gateway to the internet employs up-to-date intrusion detection devices, we apply Australian Signals Directorate's recommended cyber intrusion mitigation strategies, including the top four' mandatory measures, and actively participate in Whole-of Government cyber protection initiatives, and we conduct regular user-awareness training incyber security..

8 8 Background Recent allegations On 27 May, the ABC Four Corners program alleged hackers, working from locations overseas, targeted key Federal Government departments and major corporations in Australia, including obtaining blueprints of the new ASIO building. The program also alleged a highly sensitive DFAT document had been hacked by a foreign power - China. S 22 (1)(a)(ii) S 22 (1)(a)(ii) Prepared by: IMD I CMD Cleared by Division Heads: IMD/CMD/ISD Date: 31 May 2013 Date: 31 May 2013

9 9 CYBER - ISD Brief Why has the government not confronted China about cyber attacks including on DFA T, such as those aired by Four Corners on 27 May? As a matter of long standing principle and practice, the Government does not comment on specific cyber-re1ated incidents, investigations or operations. However, I can say that Australia discusses cyber issues with a range of countries, including China our approach is based on constructive engagement aimed at achieving practical outcomes. it would not be appropriate to go into the detail of such discussions. I can say also that improving cyber defence is atop national security priority for the Government which is also proactively engaging business and the wider community. The Prime Minister's National Security Strategy released on 23 January identifies defending our digital networks through integrated cyber policy and operations as one of three priorities over the next five years. a new Australian Cyber Security Centre is being set to enhance our understanding. of cyber threats; make Australia a harder target for malicious cyber incidents; and bolster our ability to engage international and industry partners.

10 RED TED

11 11 Background Cyber attacks, and their attribution to particular countries, continue to be a focus of domestic and international attention.

12 12. The ABC's Four Comers program, aired on 27 May, made a number of claims about intrusions into Australian Government and commercial. IT systems. The focus of the program was on two specific cases - allegations that the plans for the new ASIO building were exfiltrated by Chinese hackers and that Adelaide based communications company Codan had, as a result of cyber intrusions, lost commercially valuable intellectual property information and export contracts to Chinese competitors. Passing reference was made to allegations that sensitive information was extracted from DFAT's network, but few details were provided. Attorney-General Mark Dreyfus who was interviewed would not be drawn to comment on the claims. Interviewees expressed mixed views about the utility of international efforts to address cyber threats, such as through new treaties.. Senator Carr has refused to be drawn by the media into discussion of intelligence and security matters. In a Sky News interview on the morning of 28 May, he stated such cyber issues had 'absolutely no implications for a strategic partnership [with China]'. He declined to comment on whether Australia had raised these allegations with China through diplomatic channels. That evening on Lateline Senator Carr again refused to comment on intelligence and security matters and repeated comments made earlier in the day by the Prime Minister that the Four Comers report contained inaccuracies. Senator Carr also pointed to the need for the world to establish norms to govern cyber activity.. On 2 June, Senator Carr told the Sky News Australian Agenda program that the Government has raised concerns about cyber attacks with China but he was unable to talk publicly about the extent of cyber attacks on Australian computer systems. He also said "international agreements were needed", and that "we needed to get a situation where the world entrenches in treaty form conventions on how we approach it". He drew an analogy with agreements governing chemical and nuclear weapons. Negotiation of such a treaty for cyber would be a very long-term undertaking. During question time on 28 May, Prime Minister Gillard noted that the Four Comers allegations of hacking were "unsubstantiated". She reiterated the government's long standing practice of not commenting on specific intelligence matters. Former Defence Minister Fitzgibbon told Sky News PM Agenda program on 28 May that China was 'very busy' in its cyber activities, and that 'undoubtedly we are [involved in a cyber war]'. Chinese Foreign Ministry spokesman, Hong Lei, was reported by media on 29 and 30 Mayas saying the allegations against China were "groundless" and that "China opposes all forms of hacker attacks".

13 RED TED

14 RED TED

15 15 Media points Cyber Why has the government not confronted China about cyber attacks including on DFAT, such as those aired by Four Corners on 27 May? '. As a matter of long standing principle and practice, the Government does not comment on specific cyber-related incidents, investigations or operations. However, I can say that improving cyber defence is a top national security priority for the Government which is also proactively engaging business and the wider community. The Prime Minister's National Security Strategy released on 23 January identifies defending our digital networks through integrated cyber policy and operations as one of three priorities over the next five years a new Australian Cyber Security Centre is being set to enhance our understanding of cyber threats; make Australia a harder target for malicious cyber incidents; and bolster our ability to engage international and industry partners.

16 16 Background Cyber attacks, and their attribution to particular countries, continue to be a focus of domestic and international attention. The ABC's Four Comers program,. aired on 27 May, made a number of claims about intrusions into Australian Government and commercial IT systems. The focus of the program was on two specific cases - allegations that the plans for the new ASIO building were exfiltrated by Chinese hackers and.that Adelaide based communications company Codan had, as a result of cyber intrusions, lost commercially valuable intellectual property information and export contracts to

17 17 Chinese competitors. Passing reference was made to allegations that sensitive information was extracted from DFAT's network, but few details were prpvided. Attorney-General Mark Dreyfus who was interviewed would not comment on the claims. Interviewees expressed mixed views about international efforts to address cyber threats, such as through new treaties.

18 UNCLASSIFIED 18 Whole-of-government talking points Four Corners program - Hacked (27 May 2013) Whole of Government Talking Points If asked about the ASIO cyber attack We do not comment on operational or intelligen~e matters. General talking points The cyber threat is real and ever present. Australia is experiencing increasingly sophisticated attacks in the public and private sectors. A large number of incidents are considered routine in nature, such as compromised websites. Cyber security experts advise that the problem is significantly larger than the number of incidents detected or reported. To address this, government agencies are working with the public and private sector on a daily basis to better understand the cyber threat, and develop new detection and mitigation techniques. Purposes of cyber attacks There are a range of motives for cyber incidents, including o espionage o corporate attack o illicit financial gain UNCLASSIFIED

19 UNCLASSIFIED 19 o o political and protest issues, and personal grievance - a disgruntled employee or customer. Cyber threats come from a range of sources, including o individuals o issue-motivated groups o organised criminal syndicates, and o the intellige'nce services of some foreign governments. How valuable a target is Australia? The cyber threat is real and ever present. Australia's security and intelligence agencies have stated publicly that we are experiencing increasingly sophisticated attacks on networks and systems in the public and private sectors. Every business, agency and nation connected to the internet is a target, especially those with valuable assets such as intellectual property and sensitive information. In this regard, Australia, like every other nation, is a target. If asked: What is the Government doing to protect government networks? The Australian Signals Directorate (ASD) developed the Strategies to Mitigate Targeted Cyber Intrusions to bolster the security of Australian government information systems. If the' first four mitigation strategies listed in this paper were implemented;this would have stopped at least 85% of targeted cyber intrusion techniques that ASD responds to. On Wednesday 23 January 2013, the Prime Minister announced the establishment of the Australian Cyber Security Centre as part of the launch of the National Security Strategy. The centre will be responsible for developing a comprehensive understanding of the threat to Australian Government networks and systems of national interest. This will include the nature and extent of the threat posed by the full spectrum of malicious cyber actors, from cyber criminals and lone hackers through to nation states. The ACSC will further the great work already undertaken by the ASD's Cyber Security Operations Centre by providing a whole-of-government approach to tackle the cyber threat. Response to attacks on government agencies and departments ASD,is the agency responsible for protecting government agencies. The agencies situated in the Cyber Security Operations Centre work closely together to share information to help protect all Australian assets. If asked: Is China targeting Australian networks? Defence will not identify any particular nation state so far as cyber security is concerned. As a matter of principle and long standing practice, the Government does not publically discuss specific cyber activities as it could impact on Australia's national security. If asked: Will the Government engage with China over these allegations? As a matter of long standing principle and practice, the Government does not comment on specific cyber-related incidents, investigations or operations. Australia discusses cyber issues with a range of countries, including China. Our approach is based on constructive engagement aimed at achieving practical outcomes. Australia is working with the international community, including China, through a UN Expert Group, to develop common understandings on the application of existing international law, including the UN Charter, to cyberspace. UNCLASSIFIED

Cyber security the facts

Cyber security the facts Cyber security the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present and every business is at risk. Australia s security and intelligence agencies

More information

Cyber Attacks: Securing Agencies ICT Systems

Cyber Attacks: Securing Agencies ICT Systems The Auditor-General Audit Report No.50 2013 14 Performance Audit Cyber Attacks: Securing Agencies ICT Systems Across Agencies Australian National Audit Office Commonwealth of Australia 2014 ISSN 1036 7632

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2015 All material presented in this publication

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

Contact Reporting Guidelines The Australian Government Contact Reporting Scheme

Contact Reporting Guidelines The Australian Government Contact Reporting Scheme Contact Reporting Guidelines The Australian Government Contact Reporting Scheme Version 1.0 Approved September 2010 Contents Introduction... 1 The role of ASIO... 1 Australian Government Contact Reporting

More information

FSDF SPATIAL INFORMATION MANAGEMENT POLICIES SECURITY

FSDF SPATIAL INFORMATION MANAGEMENT POLICIES SECURITY FSDF SPATIAL INFORMATION MANAGEMENT POLICIES SECURITY Objective: Securing the Foundation Spatial Data Framework. This document is presented by ANZLIC the Spatial Information Council, representing the Australian

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information

How To Protect Your Information Security From Cyber Threats

How To Protect Your Information Security From Cyber Threats 2015 Australian Government Information Security Manual PRINCIPLES 2015 Australian Government Information Security Manual PRINCIPLES Commonwealth of Australia 2015 All material presented in this publication

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2014 All material presented in this publication

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

The Protection and Security of Electronic Information Held by Australian Government Agencies

The Protection and Security of Electronic Information Held by Australian Government Agencies The Auditor-General Audit Report No.33 2010 11 Performance Audit The Protection and Security of Electronic Information Held by Australian Government Agencies Australian National Audit Office Commonwealth

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Security Awareness and Training

Security Awareness and Training T h e A u d i t o r - G e n e r a l Audit Report No.25 2009 10 Performance Audit A u s t r a l i a n N a t i o n a l A u d i t O f f i c e Commonwealth of Australia 2010 ISSN 1036 7632 ISBN 0 642 81115

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Reporting incidents and conducting security investigations Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Report to the Public Accounts Committee on mitigation of cyber attacks. October 2013

Report to the Public Accounts Committee on mitigation of cyber attacks. October 2013 Report to the Public Accounts Committee on mitigation of cyber attacks October 2013 REPORT ON MITIGATION OF CYBER ATTACKS Table of contents I. Introduction and conclusion... 1 II. How government bodies

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

The Management of Physical Security

The Management of Physical Security The Auditor-General Audit Report No.49 2013 14 Performance Audit Australian Crime Commission Geoscience Australia Royal Australian Mint Australian National Audit Office Commonwealth of Australia 2014 ISSN

More information

National Cyber Security Strategy 2015-2017

National Cyber Security Strategy 2015-2017 National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.

More information

Records Authority. Australian Security Intelligence Organisation

Records Authority. Australian Security Intelligence Organisation Records Authority Australian Security Intelligence Organisation This is an accurate reproduction of the authorised records authority content, created for accessibility purposes CONTENTS INTRODUCTION 3

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

立 法 會 Legislative Council

立 法 會 Legislative Council 立 法 會 Legislative Council LC Paper No. CB(4)1212/14-15(04) Ref. : CB4/PL/ITB Panel on Information Technology and Broadcasting Meeting on 17 July 2015 Updated background brief on information security Purpose

More information

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework Edith Cowan University Research Online Australian Counter Terrorism Conference Security Research Institute Conferences 2012 Cyberterrorism: Addressing the Challenges for Establishing an International Legal

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits CYBER CRIME & SECURITY SURVEY REPORT 2013 Foreword Malicious cyber activity is on the increase and every business with an online presence is at risk. This may involve the loss of critical data and consumer

More information

RUSSIA CHINA NEXUS IN CYBER SPACE

RUSSIA CHINA NEXUS IN CYBER SPACE RUSSIA CHINA NEXUS IN CYBER SPACE E. Dilipraj Associate Fellow, CAPS On May 08, 2015 Russia and China inked an important agreement in the field of cyber security. This bilateral agreement is the latest

More information

Physical security management guidelines

Physical security management guidelines Physical security management guidelines Event security Approved 13 December 2011 Version 1.0 i Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Australian Government Information Security Manual EXECUTIVE COMPANION

Australian Government Information Security Manual EXECUTIVE COMPANION 2015 Australian Government Information Security Manual EXECUTIVE COMPANION 2015 Australian Government Information Security Manual EXECUTIVE COMPANION Commonwealth of Australia 2015 All material presented

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

Chapter 4. Evidence in support of the current legislative and regulatory framework

Chapter 4. Evidence in support of the current legislative and regulatory framework Chapter 4 Evidence in support of the current legislative and regulatory framework 4.1 This chapter considers the evidence to the committee in support of the current legislative and regulatory framework.

More information

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson jfeigelson@debevoise.com WASHINGTON, D.C. Satish M. Kini smkini@debevoise.com Renee

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Department of the Premier and Cabinet Circular. PC030 Protective Security Policy Framework

Department of the Premier and Cabinet Circular. PC030 Protective Security Policy Framework Department of the Premier and Cabinet Circular PC030 Protective Security Policy Framework February 2012 PROTECTIVE SECURITY MANAGEMENT FRAMEWORK TABLE OF CONTENTS TABLE OF CONTENTS 2 1. PURPOSE 3 2. SCOPE

More information

The Danish Cyber and Information Security Strategy

The Danish Cyber and Information Security Strategy February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives

More information

Information and Communications Technology Security: Management of Portable Storage Devices

Information and Communications Technology Security: Management of Portable Storage Devices The Auditor-General Audit Report No.18 2011 12 Performance Audit Information and Communications Technology Security: Australian National Audit Office Commonwealth of Australia 2011 ISSN 1036 7632 ISBN

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

How To Protect Your Business From A Cyber Attack

How To Protect Your Business From A Cyber Attack Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It

More information

Research Note Engaging in Cyber Warfare

Research Note Engaging in Cyber Warfare Research Note Engaging in Cyber Warfare By: Devin Luco Copyright 2013, ASA Institute for Risk & Innovation Keywords: Cyber War, Cyber Warfare, Cyber Attacks, Cyber Threats Abstract This research note defines

More information

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

National Security Overview - Australia

National Security Overview - Australia Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit s terms

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Microsoft Office Macro Security

Microsoft Office Macro Security Microsoft Macro Security March 2016 Introduction 1. Microsoft applications can execute macros to automate routine tasks. However, macros can contain malicious code resulting in unauthorised access to sensitive

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached

More information

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Cyber Security Solutions

Cyber Security Solutions Cyber Security Solutions Defending the Enterprise General Dynamics Information Technology defends mission-critical systems including government, health, finance, defence, large-enterprise and national

More information

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows 24 February 2015 Callum Sinclair Faith Jayne Agenda Top 10 legal need-to-knows, including: What is cyber

More information

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Audit summary of Security of Infrastructure Control Systems for Water and Transport V I C T O R I A Victorian Auditor-General Audit summary of Security of Infrastructure Control Systems for Water and Transport Tabled in Parliament 6 October 2010 Background Infrastructure critical to the

More information

ACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services

ACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services ACT Auditor-General s Office Performance Audit Report Whole-of-Government Information and Communication Technology Security Management and Services Report No. 2 / 2012 PA 09/03 The Speaker ACT Legislative

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements

UNCLASSIFIED UNCONTROLLED-IF-PRINTED. Public. 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Defence Security Manual DSM Part 2:51 Outsourced Offshore and Cloud Based Computing Arrangements Version 1 ation date July 2105 Amendment list 23 Optimised for Screen; Print; Screen Reader Releasable to

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

Additional Security Considerations and Controls for Virtual Private Networks

Additional Security Considerations and Controls for Virtual Private Networks CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES

More information

Defense Security Service

Defense Security Service Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED Defense Security Service DSS Mission DSS Supports national security and the warfighter,

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015 Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine

More information

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:

More information

CYBER SECURITY STRATEGY AN OVERVIEW

CYBER SECURITY STRATEGY AN OVERVIEW CYBER SECURITY STRATEGY AN OVERVIEW Commonwealth of Australia 2009 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Protective Security Governance Policy. Outlines ANAO protective security arrangements

Protective Security Governance Policy. Outlines ANAO protective security arrangements Protective Security Governance Policy Outlines ANAO protective security arrangements Version 2.0 Effective JULY 2012 Document management Document identification Document ID Document title Release authority

More information

Cyber Security. Protecting the UK water industry

Cyber Security. Protecting the UK water industry Cyber Security Protecting the UK water industry In today s connected world, cyber attacks are a daily occurrence. These attacks can have potentially disastrous consequences for water companies and the

More information

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.

More information

Cyber Security for audit committees

Cyber Security for audit committees AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have

More information

The Recover Report. It s business. But it s personal.

The Recover Report. It s business. But it s personal. The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE. CSCSS CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE The early 21st century has been defined by the Internet,

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013 Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,

More information

A specification for security-minded building information modelling, digital built environments and smart asset management

A specification for security-minded building information modelling, digital built environments and smart asset management Introduction to PAS 1192-5:2015 A specification for security-minded building information modelling, digital built environments and smart asset management Introduction PAS 1192-5:2015 is a specification

More information

peace, Security and Development in BRICS

peace, Security and Development in BRICS BRICS ACADEMIC FORUM 2014: THE ELEPHANT IN THE ROOM: PEACE AND SECURITY IN THE BRICS PARTNERSHIP TOWARDS THE 6 TH BRICS SUMMIT Dr Candice Moore Senior Researcher (ACCORD) and Research Associate (UJ, Faculty

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

THE CASE FOR AN INDIA-US PARTNERSHIP IN CYBERSECURITY

THE CASE FOR AN INDIA-US PARTNERSHIP IN CYBERSECURITY DISCUSSION DOCUMENT July 14, 2010 THE CASE FOR AN INDIA-US PARTNERSHIP IN CYBERSECURITY Srijith K Nair EXECUTIVE SUMMARY The rapid development and the increasing reliance on information and communication

More information

COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA

COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA 09/1 8/2009 version UNCLASSIFIED//FOR OFFICIAL USE ONLY Cl VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA DEFINING COUNTERINTELLIGENCE

More information