The search found 14 results in 0.067 seconds.
This article examines the 2015 Anzac Day terror plot and traces how the Melbourne-based perpetrator received online instructions on four components of the intended attack: choosing targets, making tactical preparations, maintaining commitment, and ensuring publicity.
The menace presented by Islamic State’s (IS) self-proclaimed ‘caliphate’ is uniquely challenging on a number of levels. Tactically, its military operations demand lateral thinking, since the group exists as a nebulous, swarming network constantly seeking to expand its reach. Strategically, too, it...
The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for malicious activities even if they do not think the information held...
This report aims to give insight into the wealth of cyber perspectives across the Asia–Pacific and amplify the regional voice on the key themes and questions of the Global Conference on CyberSpace 2015 in April 2015.
The Asia-Pacific region incorporates some...
This article explores how internet surveillance in the name of counterterrorism challenges privacy.
International terrorism poses serious threats to the societies it affects. The counter-terrorism measures adopted since 2001 have sought to limit the advance of terrorism but, in the process,...
With the Syrian civil war entering its third year, drawing an increasing number of young Westerners into the fray, this report sought to discover how audiences respond to government-sponsored and community-generated online efforts to counter violent extremism.
Prepared by the Australian...
In a time of endless globalised information flows, Australia must defend its democratic political discussion.
This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others.
Governments and society are...
These papers assess whether China is waging an economic war in cyberspace, and examine China’s internal mechanisms for delivering and protecting cyberpower.
The Australian Cyber Security Centre (ACSC) Threat Report continues to reflect the experience, focus, and mandates of the ACSC's member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new...