AI localism in practice: examining how cities govern AI
The rapid growth of cities and advances in data has led to the growing adoption of artificial intelligence and other automated systems in cities across the world. This report aims to serve as a primer for policy-makers and practitioners to learn about current governance and...
Many hands in the cookie jar
This study, conducted from March to November 2021, examines prior examples of state-sponsored cyber espionage to see what forms of response the U.S. government considered, what actions it took, and whether those actions changed adversary behaviour or affected other actors’ behaviour.
Digital Southeast Asia
This report recommends Australia and India leverage their bilateral partnership in cyber and critical technologies to support inclusive digital development in Southeast Asia, and strengthen the foundations of Southeast Asia’s digital economy.
Somebody might hear us: emerging communications security technologies
This report outlines the principles of secure communication, and uses some examples of emerging technologies to illustrate what the next generation of secure communications might look like.
Australia's international cyber and critical technology engagement strategy
Based on three key pillars of values, security and prosperity, this framework will help to guide Australia's practical international engagement across cyber and critical technology issues, in order to create an environment that embraces the enormous opportunities of innovation, while mitigating against the risks.
Cyber-enabled foreign interference in elections and referendums
Over the past decade, state actors have taken advantage of the digitisation of election systems, election administration and election campaigns to interfere in foreign elections and referendums. This research identified 41 elections and seven referendums between January 2010 and October 2020 where cyber-enabled foreign interference...
Cyber information sharing: building collective security
Over the past 10 years, significant strides have been made in facilitating better cyber information cooperation and sharing, including the emergence of a number of different operating models. This report examines barriers to the progress of greater information that will support the security and resilience...
The Internet of Bodies is here: tackling new challenges of technology governance
This paper looks at the broader ecosystem of connected technologies that is coming together to create the 'Internet of Bodies' (IoB). As with any area of emerging technology, the IoB is evolving rapidly and its future is unknown.
COVID-19 disinformation and social media manipulation: automating influence on COVID-19
This report investigates a campaign of cross-platform inauthentic activity that relies on a high-degree of automation and is broadly in alignment with the political goal of the People’s Republic of China (PRC) to denigrate the standing of the United States.
The China defence universities tracker
The Chinese Communist Party (CCP) is building links between China’s civilian universities, military and security agencies. Those efforts, carried out under a policy of leveraging the civilian sector to maximise military power (known as ‘military–civil fusion’), have accelerated in the past decade, according to the...
A new Sino-Russian high-tech partnership
This paper is intended to start an initial mapping and exploration of the expanding cooperative ecosystem involving Moscow and Beijing. It will be important to track the trajectory and assess the implications of these Sino-Russian technological collaborations, given the risks and threats that could result...
Incident report on the breach of the Australian National University's administrative systems
The ANU has released this comprehensive public report into the late-2018 data breach. The report is the culmination of months of investigation into the hack and has been shared with all ANU staff, students, alumni and wider community. It outlines the incredible level of sophistication...
Implementation of the ‘Smith Review’ and progress in strengthening protective security procedures, practices and culture: 12 month followup review
This review considers progress to date in strengthening PM&C’s protective security procedures, practices and culture protective security culture. It also includes recommendations to guide ongoing efforts to mature protective security culture across the department and broader Australian Public Service.
From board room to situation room: why corporate security is national security
This paper argues that the approach to national security planning should now include key companies and their supply chains: it’s time to rethink Australia's national security approach in a more complex, dynamic and interconnected world. The corporate sector is now a key component of the...
Protecting critical national infrastructure in an era of IT and OT convergence
A lesson learned from IT security over the past decade is that impacts are severe unless security is considered up front and threats are managed proactively rather than reactively. As the convergence of IT and OT gathers pace in our critical national infrastructure, urgent action...
New Zealand’s cyber security strategy 2019
The New Zealand Government's vision for cyber security is 'a country that is confident and secure in the digital world'. This document sets out the guiding principles and priority areas underpinning its new cyber security strategy.
Cybersecurity of NATO’s space-based strategic assets
Almost all modern military engagements rely on space-based assets, but cyber vulnerabilities can undermine confidence in the performance of strategic systems. This paper evaluates the threats, vulnerabilities and consequences of cyber risks to strategic systems.
Hacking democracies: cataloguing cyber-enabled attacks on elections
Trust in democratic and other key institutions has declined, and this is compounded by new capabilities of adversaries seeking to interfere in elections and to undermine people’s trust in those institutions. This policy brief explores areas where interference has been detected across the world and...
Cyber insurance for civil nuclear facilities: risks and opportunities
This paper sets out a roadmap for how organisations in the civil nuclear sector can explore their options and review their cyber risk exposure.
From drone swarms to modified E. Coli: say hello to a new wave of cyberattacks
Earlier this month, researchers created an AI-driven malware that can be used tohack hospital CT scans, generating false cancer images that deceived even the most skilled doctors.
An Australian intellectual edge for conflict and competition in the 21st century
This paper provides insights into how the Australian Defence Force might apply its knowledge of a changing environment to more comprehensively address gaps in its software framework.
Cybersecurity, cybercrime and cybersafety: a quick guide to key internet links
This guide provides some brief background information on national measures to build cybersecurity and cybersafety and combat cybercrime, and includes links to relevant websites.
Seven ways the government can make Australians safer – without compromising online privacy
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office, suggests Damien Manuel.
Agenda for change 2019: strategic choices for the next government
This publication contains thirty short essays that cover a vast range of subjects, from the big geostrategic challenges of our times, through to defence strategy; border, cyber and human security; and key emergent technologies.
Cyber security of consumer devices
This briefing looks at the cyber threats associated with consumer devices and their causes, as well as initiatives to improve device security, and the related challenges.