Cyber intelligence
NARROWER TERMS
Report
AI localism in practice: examining how cities govern AI
The rapid growth of cities and advances in data has led to the growing adoption of artificial intelligence and other automated systems in cities across the world. This report aims to serve as a primer for policy-makers and practitioners to learn about current governance and...
Report
Many hands in the cookie jar
This study, conducted from March to November 2021, examines prior examples of state-sponsored cyber espionage to see what forms of response the U.S. government considered, what actions it took, and whether those actions changed adversary behaviour or affected other actors’ behaviour.
Policy report
Digital Southeast Asia
This report recommends Australia and India leverage their bilateral partnership in cyber and critical technologies to support inclusive digital development in Southeast Asia, and strengthen the foundations of Southeast Asia’s digital economy.
Report
Somebody might hear us: emerging communications security technologies
This report outlines the principles of secure communication, and uses some examples of emerging technologies to illustrate what the next generation of secure communications might look like.
Strategy
Australia's international cyber and critical technology engagement strategy
Based on three key pillars of values, security and prosperity, this framework will help to guide Australia's practical international engagement across cyber and critical technology issues, in order to create an environment that embraces the enormous opportunities of innovation, while mitigating against the risks.
Policy report
Cyber-enabled foreign interference in elections and referendums
Over the past decade, state actors have taken advantage of the digitisation of election systems, election administration and election campaigns to interfere in foreign elections and referendums. This research identified 41 elections and seven referendums between January 2010 and October 2020 where cyber-enabled foreign interference...
Report
Cyber information sharing: building collective security
Over the past 10 years, significant strides have been made in facilitating better cyber information cooperation and sharing, including the emergence of a number of different operating models. This report examines barriers to the progress of greater information that will support the security and resilience...
Report
The Internet of Bodies is here: tackling new challenges of technology governance
This paper looks at the broader ecosystem of connected technologies that is coming together to create the 'Internet of Bodies' (IoB). As with any area of emerging technology, the IoB is evolving rapidly and its future is unknown.
Report
COVID-19 disinformation and social media manipulation: automating influence on COVID-19
This report investigates a campaign of cross-platform inauthentic activity that relies on a high-degree of automation and is broadly in alignment with the political goal of the People’s Republic of China (PRC) to denigrate the standing of the United States.
Policy report
The China defence universities tracker
The Chinese Communist Party (CCP) is building links between China’s civilian universities, military and security agencies. Those efforts, carried out under a policy of leveraging the civilian sector to maximise military power (known as ‘military–civil fusion’), have accelerated in the past decade, according to the...
Policy report
A new Sino-Russian high-tech partnership
This paper is intended to start an initial mapping and exploration of the expanding cooperative ecosystem involving Moscow and Beijing. It will be important to track the trajectory and assess the implications of these Sino-Russian technological collaborations, given the risks and threats that could result...
Report
Incident report on the breach of the Australian National University's administrative systems
The ANU has released this comprehensive public report into the late-2018 data breach. The report is the culmination of months of investigation into the hack and has been shared with all ANU staff, students, alumni and wider community. It outlines the incredible level of sophistication...
Report
Implementation of the ‘Smith Review’ and progress in strengthening protective security procedures, practices and culture: 12 month followup review
This review considers progress to date in strengthening PM&C’s protective security procedures, practices and culture protective security culture. It also includes recommendations to guide ongoing efforts to mature protective security culture across the department and broader Australian Public Service.
Report
From board room to situation room: why corporate security is national security
This paper argues that the approach to national security planning should now include key companies and their supply chains: it’s time to rethink Australia's national security approach in a more complex, dynamic and interconnected world. The corporate sector is now a key component of the...
Report
Protecting critical national infrastructure in an era of IT and OT convergence
A lesson learned from IT security over the past decade is that impacts are severe unless security is considered up front and threats are managed proactively rather than reactively. As the convergence of IT and OT gathers pace in our critical national infrastructure, urgent action...
Strategy
New Zealand’s cyber security strategy 2019
The New Zealand Government's vision for cyber security is 'a country that is confident and secure in the digital world'. This document sets out the guiding principles and priority areas underpinning its new cyber security strategy.
Report
Cybersecurity of NATO’s space-based strategic assets
Almost all modern military engagements rely on space-based assets, but cyber vulnerabilities can undermine confidence in the performance of strategic systems. This paper evaluates the threats, vulnerabilities and consequences of cyber risks to strategic systems.
Report
Hacking democracies: cataloguing cyber-enabled attacks on elections
Trust in democratic and other key institutions has declined, and this is compounded by new capabilities of adversaries seeking to interfere in elections and to undermine people’s trust in those institutions. This policy brief explores areas where interference has been detected across the world and...
Report
Cyber insurance for civil nuclear facilities: risks and opportunities
This paper sets out a roadmap for how organisations in the civil nuclear sector can explore their options and review their cyber risk exposure.
Article
From drone swarms to modified E. Coli: say hello to a new wave of cyberattacks
Earlier this month, researchers created an AI-driven malware that can be used tohack hospital CT scans, generating false cancer images that deceived even the most skilled doctors.
Discussion paper
An Australian intellectual edge for conflict and competition in the 21st century
This paper provides insights into how the Australian Defence Force might apply its knowledge of a changing environment to more comprehensively address gaps in its software framework.
Guide
Cybersecurity, cybercrime and cybersafety: a quick guide to key internet links
This guide provides some brief background information on national measures to build cybersecurity and cybersafety and combat cybercrime, and includes links to relevant websites.
Article
Seven ways the government can make Australians safer – without compromising online privacy
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office, suggests Damien Manuel.
Book
Agenda for change 2019: strategic choices for the next government
This publication contains thirty short essays that cover a vast range of subjects, from the big geostrategic challenges of our times, through to defence strategy; border, cyber and human security; and key emergent technologies.
Briefing paper
Cyber security of consumer devices
This briefing looks at the cyber threats associated with consumer devices and their causes, as well as initiatives to improve device security, and the related challenges.