Information technology--Security measures

Report

3 Aug 2017

This report provides a high-level analysis of how big data capabilities can be used and managed by Australia’s national security community.

The associated resource, ‘ Big Data in National Security - o nline resource’, provides policy makers and the public with a detailed analysis...

Research report

6 Jan 2017

On December 9, 2016, President Barack Obama directed the Intelligence Community to conduct a full review and produce a comprehensive intelligence report assessing Russian activities and intentions in recent U.S. elections. We have completed this report and briefed President Obama as well as President-elect Trump...

Research report

24 Nov 2016

The Australian Government’s new paradigm of online engagement and services for Australians is not coming. It’s already here.

Government’s response to the eCensus events of 9 August 2016 provides an opportunity to change the conversation about cyber security: to one of trust and confidence...

Research report

24 Nov 2016

On 31 August 2016, the Senate referred the 2016 Census to the Senate Economics References Committee for inquiry and report by 24 November 2016. The terms of reference include the following matters:

The 2016 Census, with particular reference to:

a) the preparation, administration...

Commentary

Article

11 Oct 2016

Enabled by exponential technological advancements in data storage, transmission and analysis, the drive to ‘datify’ our lives is creating an ultra-transparent world where we are never free from being under surveillance.

Increasing aspects of our lives are now recorded as digital data that are...

Commentary

Article

3 Oct 2016

Australia is collecting more metadata per capita and issuing more warrants to intercept communications than the U.S, UK and Canada, according to a new report.

University of NSW business law lecturer and research fellow Dr Rob Nicholls has collected and analysed publicly available data...

Audio interview

29 Sep 2016

The Federal Health Department has removed a previously public set of data from the internet, after researchers discovered they could identify medical information.

The researchers found that information systems experts could break the anonymity of the Medicare Benefits Schedule and Pharmaceutical Benefits Scheme datasets....

Research report

23 Aug 2016

Avid Life Media Inc. (ALM) is a company that operates a number of adult dating websites. The largest website operated by ALM is Ashley Madison, which is targeted at people seeking a discreet affair. ALM is headquartered in Canada, but its websites have a global...

Audio interview

Audio program

16 Aug 2016

Investigations are continuing into what went wrong at the Australian Bureau of Statistics over the botched online census. But there's fresh scrutiny of the computer giant IBM, which has been blamed for failing to take adequate pre-emptive steps to deal with the denial of service...

Audio interview

Audio program

12 Aug 2016

Over 400,000 households have completed the online Census since the website was restored yesterday afternoon. The chief statistician of the Australian Bureau of Statistics, David Kalisch, says new security measures have been put in place in the wake of Tuesday's 'denial of service' attack and...

Research report

11 Aug 2016

Although fraud has been practiced throughout history, the advent of the internet has created new and effective avenues for targeting potential victims. Victims of online fraud experience substantial financial and other harms, resulting in annual losses in Australia of more than $2b, significant organisational disruption...

Commentary

Article

10 Aug 2016

Many Australians were unable to complete the Census on August 9 due to the Census website failing.

The Australian Bureau of Statistics (ABS) chief statistician has blamed a deliberate ‘denial of service attack’ for the failure.

Like many government information systems, the Census...

Audio interview

Audio program

10 Aug 2016

Last night, the national census ended in disaster, after the Australian Bureau of Statistics website crashed, leaving millions of frustrated people unable to lodge their census forms.

The bureau's chief statistician, David Kalisch, says the site was taken down after four separate cyber attacks...

Blog post

27 Jul 2016

This article asks what the economic argument is for and against privacy, or managing data flows. It argues that privacy has a role to play in whether data will be used in a way which changes the allocation of economic surplus, or whether data will...

Research report

18 May 2016

In GAO's survey of 24 federal agencies, the 18 agencies having high-impact systems identified cyber attacks from “nations” as the most serious and most frequently-occurring threat to the security of their systems. These agencies also noted that attacks delivered through e-mail were the most serious...

Book

30 Apr 2016

Martin Moore, Senior Research Fellow at King's College London, examines the new and growing phenomenon of global tech giants, their increasing civic power, and what this means for democracies. The study aims to open debate about the role of the tech giants – notably Google,...

Research report

21 Apr 2016

Australia’s Cyber Security Strategy sets out the federal government’s philosophy and program for meeting the dual challenges of the digital age—advancing and protecting our interests online. A secure cyberspace provides trust and confidence for individuals, business and the public sector to share ideas and information...

Research report

1 Mar 2016

As journalists around the world have become more vulnerable, their need for security tools has grown exponentially. There is no question that the digital world has made journalism a riskier profession. But it can also make it safer. Digital technology can offer tools to minimize...

Research report

17 Dec 2015

The purpose of this study is to shed light on the problem of medical data loss—how it is disclosed, who is causing it and what can be done to combat it. This is a far-reaching problem that impacts not only organizations that are victims of...

Transcript

5 May 2015

Abstract

This paper sets out the topics and themes to be examined at the second and final workshop (hosted by the National Security Council) which discussed the challenges to Australian research and development in cyber security.

The three main topics are:...