Cyber intelligence

NARROWER TERMS


Report

AI localism in practice: examining how cities govern AI

The rapid growth of cities and advances in data has led to the growing adoption of artificial intelligence and other automated systems in cities across the world. This report aims to serve as a primer for policy-makers and practitioners to learn about current governance and...
Report

Many hands in the cookie jar

This study, conducted from March to November 2021, examines prior examples of state-sponsored cyber espionage to see what forms of response the U.S. government considered, what actions it took, and whether those actions changed adversary behaviour or affected other actors’ behaviour.
Policy report

Digital Southeast Asia

This report recommends Australia and India leverage their bilateral partnership in cyber and critical technologies to support inclusive digital development in Southeast Asia, and strengthen the foundations of Southeast Asia’s digital economy.
Report

Somebody might hear us: emerging communications security technologies

This report outlines the principles of secure communication, and uses some examples of emerging technologies to illustrate what the next generation of secure communications might look like.
Strategy

Australia's international cyber and critical technology engagement strategy

Based on three key pillars of values, security and prosperity, this framework will help to guide Australia's practical international engagement across cyber and critical technology issues, in order to create an environment that embraces the enormous opportunities of innovation, while mitigating against the risks.
Policy report

Cyber-enabled foreign interference in elections and referendums

Over the past decade, state actors have taken advantage of the digitisation of election systems, election administration and election campaigns to interfere in foreign elections and referendums. This research identified 41 elections and seven referendums between January 2010 and October 2020 where cyber-enabled foreign interference...
Report

Cyber information sharing: building collective security

Over the past 10 years, significant strides have been made in facilitating better cyber information cooperation and sharing, including the emergence of a number of different operating models. This report examines barriers to the progress of greater information that will support the security and resilience...
Report

The Internet of Bodies is here: tackling new challenges of technology governance

This paper looks at the broader ecosystem of connected technologies that is coming together to create the 'Internet of Bodies' (IoB). As with any area of emerging technology, the IoB is evolving rapidly and its future is unknown.
Report

COVID-19 disinformation and social media manipulation: automating influence on COVID-19

This report investigates a campaign of cross-platform inauthentic activity that relies on a high-degree of automation and is broadly in alignment with the political goal of the People’s Republic of China (PRC) to denigrate the standing of the United States.
Policy report

The China defence universities tracker

The Chinese Communist Party (CCP) is building links between China’s civilian universities, military and security agencies. Those efforts, carried out under a policy of leveraging the civilian sector to maximise military power (known as ‘military–civil fusion’), have accelerated in the past decade, according to the...
Policy report

A new Sino-Russian high-tech partnership

This paper is intended to start an initial mapping and exploration of the expanding cooperative ecosystem involving Moscow and Beijing. It will be important to track the trajectory and assess the implications of these Sino-Russian technological collaborations, given the risks and threats that could result...
Report

Incident report on the breach of the Australian National University's administrative systems

The ANU has released this comprehensive public report into the late-2018 data breach. The report is the culmination of months of investigation into the hack and has been shared with all ANU staff, students, alumni and wider community. It outlines the incredible level of sophistication...
Report

Implementation of the ‘Smith Review’ and progress in strengthening protective security procedures, practices and culture: 12 month followup review

This review considers progress to date in strengthening PM&C’s protective security procedures, practices and culture protective security culture. It also includes recommendations to guide ongoing efforts to mature protective security culture across the department and broader Australian Public Service.
Report

From board room to situation room: why corporate security is national security

This paper argues that the approach to national security planning should now include key companies and their supply chains: it’s time to rethink Australia's national security approach in a more complex, dynamic and interconnected world. The corporate sector is now a key component of the...
Report

Protecting critical national infrastructure in an era of IT and OT convergence

A lesson learned from IT security over the past decade is that impacts are severe unless security is considered up front and threats are managed proactively rather than reactively. As the convergence of IT and OT gathers pace in our critical national infrastructure, urgent action...
Strategy

New Zealand’s cyber security strategy 2019

The New Zealand Government's vision for cyber security is 'a country that is confident and secure in the digital world'. This document sets out the guiding principles and priority areas underpinning its new cyber security strategy.
Report

Cybersecurity of NATO’s space-based strategic assets

Almost all modern military engagements rely on space-based assets, but cyber vulnerabilities can undermine confidence in the performance of strategic systems. This paper evaluates the threats, vulnerabilities and consequences of cyber risks to strategic systems.
Report

Hacking democracies: cataloguing cyber-enabled attacks on elections

Trust in democratic and other key institutions has declined, and this is compounded by new capabilities of adversaries seeking to interfere in elections and to undermine people’s trust in those institutions. This policy brief explores areas where interference has been detected across the world and...
Report

Cyber insurance for civil nuclear facilities: risks and opportunities

This paper sets out a roadmap for how organisations in the civil nuclear sector can explore their options and review their cyber risk exposure.
Article

From drone swarms to modified E. Coli: say hello to a new wave of cyberattacks

Earlier this month, researchers created an AI-driven malware that can be used tohack hospital CT scans, generating false cancer images that deceived even the most skilled doctors.
Discussion paper

An Australian intellectual edge for conflict and competition in the 21st century

This paper provides insights into how the Australian Defence Force might apply its knowledge of a changing environment to more comprehensively address gaps in its software framework.
Guide

Cybersecurity, cybercrime and cybersafety: a quick guide to key internet links

This guide provides some brief background information on national measures to build cybersecurity and cybersafety and combat cybercrime, and includes links to relevant websites.
Article

Seven ways the government can make Australians safer – without compromising online privacy

If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office, suggests Damien Manuel.
Book

Agenda for change 2019: strategic choices for the next government

This publication contains thirty short essays that cover a vast range of subjects, from the big geostrategic challenges of our times, through to defence strategy; border, cyber and human security; and key emergent technologies.
Briefing paper

Cyber security of consumer devices

This briefing looks at the cyber threats associated with consumer devices and their causes, as well as initiatives to improve device security, and the related challenges.