SR26 Cyber Security
SR26 Cyber Security
Executive summary
risk facing us as a nation. This is due mainly
Cyber security has emerged as a critical issue to the incremental nature of government
on the national security agenda. The threat policy‑making which can’t keep up with the
to Australian interests, both strategic and speed of information and communications
economic, from the manipulation of electronic technology innovation, and more importantly,
data and information systems means that how such systems are abused.
cyber security is now a core national security
priority. The risk is not yet fully understood We argue, too, that industry self-regulation
by the public, and the current government has failed in the cyber security space. The
policy response is less than ideal. This paper paper calls for national leadership where
discusses the cyber threat environment and prompt but considered decisions are
suggests several policy recommendations for arrived at in partnership with industry. We
consideration by government. also recommend the establishment of an
internet crime reporting and analysis centre
The paper approaches the issue of cyber to coordinate the national response. These
security from a risk management perspective: decisions need to be carefully communicated
understanding that in the online space to the public, and privacy must continue to be
absolute security is unachievable. Unlike a central goal.
some other national security concerns
facing Australia, such as the possibility The global risk environment:
of conventional warfare between nation the UK and US
states, we are certain that there are criminal
In line with growing threat perceptions, both
exploitation and state-sponsored computer
Washington and London have embarked
network operations conducted against us
on major policy reviews of the cyber
now and that there will be in the future.
security environment.
This paper seeks to assist in our ability to
In October 2009, during cyber security month
understand the risks, manage them better,
in the United States (US), President Barack
mitigate them where possible, and thereby
Obama described the internet as offering
become a more resilient society.
both ‘great promise and great peril’, as being
There is a widening gap between the cyber a key component of US ‘military superiority
security problem and our national capacity and public safety’, and that the ‘internet
to deal with it, leaving a greater level of and e-commerce are keys to our economic
2 Special Report
Indeed, with the number of US agencies Defence Signals Directorate (DSD) in Australia,
involved in the cyber security space, and with Government Communications Headquarters
significant jurisdictional overlap between in the UK, and the Cyber Command within the
them, it is unlikely Australia would benefit US National Security Agency.
greatly from following current US practices
(but could gain from some of the principles Why e-Security matters in the
espoused in the review).
Australian National Security
In June 2009 UK Prime Minister context
Gordon Brown delivered the UK’s first Cyber
According to the Australian Bureau of
Security Strategy. The strategy concluded
Statistics there’s a continued rise in internet
with the following assessment:
use and access (see Figure 1). As of June
Just as in the nineteenth century we had to 2009 there were 8.4 million active internet
secure the seas for our national safety and subscribers in Australia.5
prosperity, and in the twentieth century
Consumer passion for the use of information
we had to secure the air, in the twenty first
and communications technologies (ICT),
century we also have to secure our position
the internet and mobile telephones in
in cyber space in order to give people and
particular, is matched by companies, and, to
businesses the confidence they need to
an almost equal extent, government agencies.
operate safely there. 4
Networked computer systems, laptops,
The strategy argues that economic removable storage media, mobile telephones
considerations alone make cyber security with the power of many personal computers,
a priority: 90 percent of offline purchases have all made information less physical and
use credit or debit cards relying upon thereby more susceptible to loss, redirection,
telecommunications systems; £50 billion in and outright theft.
e-commerce transactions occur each year. As
In the past decade the unauthorised
part of the strategy, the British Government
exploitation of online systems by criminals
has established an Office of Cyber Security
has evolved from a cottage industry
and appointed a Cyber Security Minister.
to a factory production line. Uptake of
UK government capabilities and policy technologies has outpaced our capacity to
developments have more in common with deal with the unintended cyber security
Australia than the US experience. In fact, the risks. Criminals break into computers to steal
UK program of work is almost identical to that information like credit card details, email
in Australia’s Attorney–General’s Department. addresses, passwords, and economic secrets,
A significant point of departure between the and use or sell it. There are well developed
British and Australian responses has been the global markets trading in this information.
notion of privacy which receives less attention
Governments have realised the benefits too,
in current Australian thinking.
developing computer network exploitation
It is also of note that in May 2009 capabilities to gather information from
Australia—and in June 2009 the US and the economic, military and government
UK—announced the formation of operational systems offshore.
cyber defence centres within their respective
Bad actors can use a compromised computer
signals intelligence agencies: the Cyber
to pretend to be the actual subscriber of a
Security Operations Centre as part of the
4 Special Report
Box 2: The government’s After its 2006 review, the ESNA priorities
became to:
policy today
• reduce the e-security risk to Australian
Since 2001 the E-Security National Government information and
Agenda (ESNA) has been the Australian communications systems
Government’s policy vehicle aimed at
• reduce the e-security risk to Australia’s
creating ‘a secure and trusted electronic
national critical infrastructure, and
operating environment.’
• enhance the protection of home users
ESNA has been the primary (but not and SMEs from electronic attacks
only) source of funding for Australia’s and fraud.
preparations against (criminal and
state‑sponsored) cyber attacks on In 2008 a further review of ESNA was
Australia’s National Information conducted. The ‘E-Security Review’
Infrastructure (NII). ESNA has also provided recommended several new core capabilities
for broader cyber security initiatives, and initiatives, including:
including specific funding for building • the creation of a national Computer
operational agencies’ capabilities in Emergency Response Team (CERT)
the areas of crime and intelligence, utilising (and building on) the
information sharing (under the auspices contracted services of AusCERT
of the Trusted Information Sharing • the establishment of a Cyber Security
Network) between government and Operations Centre within the
private companies owning and operating Department of Defence
critical infrastructure (water, electricity,
• the creation of an e-security code
telecommunications, food, etc), as well as
of practice for Internet Service
public and business education (including
Providers (ISPs)
E-Security Awareness Week).
• the development of a
Throughout the life of ESNA the whole‑of‑government international
Attorney–General’s Department has been engagement strategy for e-security.
the lead policy agency for cyber security.
ESNA policy priorities talk about reducing
One of the enduring arrangements risk and enhancing protection, but the
of ESNA has been the Joint Operating initiatives over the past 8 years have largely
Agreement between the Australian Federal been reactive, relating to information
Police, the Australian Security Intelligence sharing and investigation—with the
Organisation, and the Defence Signals exception of the ISP code of practice—not
Directorate allowing for information attempting to change the structural
sharing and investigations relating to NII settings in which cyber attacks occur.
incidents, threats and vulnerabilities. This is symptomatic of the “light touch”,
The ESNA was first reviewed in 2006. co-regulatory-based approach towards
One of the review’s findings was telecommunications of the era, which has
‘that because the online environment relied upon industry self-regulation and,
is highly interconnected, e-security largely, failed.
threats to different segments of the
Australian economy cannot be addressed
in isolation.’6
Cyber security: threats and responses in the information age 5
service or can add the compromised machine difficulty in absolute attribution—in the
to networks of other compromised computers online space that emboldens criminals.
called ‘botnets’. Botnets are controlled
The unfortunate reality of all types of online
remotely, and can be used to shut down
crime is that there is a very low likelihood
the internet activities of businesses and
of offenders being caught. This low risk of
governments through distributed denial of
apprehension or conviction combined with
service (DDOS) attacks, as well as to deliver
the profitability of activities has ensured a
spam emails, crack passwords, and a growing
steady supply of willing offenders and drives
number of other illegal activities.
lucrative ongoing criminal innovation.
In short, cyber security is a growing national
There is plenty of opportunity for online
security concern for three main reasons: the
crime, with over a billion internet users
threat posed to Australia’s economic interests;
globally, and millions of businesses and
the integrity of Australian Government
government agencies holding data in
information and systems; and the wellbeing
networked computer systems. Sometimes
of the Australian public.
users lack experience and understanding
Most importantly, the pace of change, of the consequences of their actions; other
the scale of the problem and its extended times the computer itself is vulnerable to
geographic nature necessitates national exploitation. Often it is both.
leadership and robust action consistent with
It is easy to see how problems can keep
other national security interests.
occurring. A March 2009 report by the
Australian Communications and Media
The drivers for wrongful online Authority, Australia in the Digital Economy
activity Report 1: Trust and Confidence highlights
the complacency of the Australian
One of the key factors driving increased
internet population—less than 50 percent
criminal behaviour online is that there is a
presumption of anonymity—and a real
Figure 1: Internet subscribers in Australia
Source: Australian Bureau of Statistics, Report on Household Use of Information Technology, Australia, 2007–08.
6 Special Report
of survey respondents have installed All IT security companies can show charts
anti-virus software, and even fewer had indicating near exponential growth in criminal
firewalls or other protective measures on attacks and exploits against computer
home computers. operating systems.
There is a strong link between bandwidth Below is a chart taken from the IBM Internet
and computer use: more of one leads to Security Systems X Force 2008 Trend and
more of the other. This holds true for misuse Risk Report published in January 2009 which
and victimisation. With the announcement shows the steady climb of vulnerability
of the National Broadband Network (NBN) disclosures in software.7 These vulnerabilities
to deliver 100 megabits of data per second are potentially used by criminals and state
to 90 percent of the Australian population, actors to attack the computer systems and
a step-change in safety and security must applications that we use.
be developed.
The McAfee Labs Blog8 (Figure 3) looks at the
Now is a unique opportunity for Australia unique attack tools used by criminals, which,
to redress some of the structural and policy as with the chart above, shows a rapid growth
weaknesses of the past and to establish global in the threat.
leadership in this field.
Oftentimes such malware is combined with
‘social engineering’, aimed at convincing users
Death by a thousand cuts to undertake activities they otherwise would
We have seen that malware—malicious not. It is this amalgam of devious software
criminal programs which perform functions and human trickery which has compounded
not authorised by the user like leaving a “back the problem, multiplying the vectors of attack
door” open to the computer or transmitting and making it much harder to reduce risk.
passwords or sequences of keystrokes to A tipping point occurred around 2003 with
online collection points—has proliferated. the advent of phishing, whereby criminals
Source: IBM Internet Security Systems X Force 2008 Trend and Risk Report.
Cyber security: threats and responses in the information age 7
the US, UK, Canada and New Zealand make it serve to solidify DSD’s information assurance
a more obvious target for attack. capacity and broaden its ability to assist
other agencies.
The Australian Security Intelligence
Organisation (ASIO) acknowledges that Although some progress is being made in
Australian Government and business improving resilience of government systems
computers have been the target of foreign and the practices of staff, there is still
intelligence agencies.10 The US Office of the significant discretion granted in the Australian
National Counterintelligence Executive in its Government Information Security Manual
2008 Annual Report to Congress on Foreign (formerly ASCI 33) to chief executives of
Economic Collection and Industrial Espionage government departments to issue waivers
gives more detail about attacks against the and to diverge from security best practices
US Government, and specifically identifies provided by DSD. Though it is interesting to
mobile telephones, particularly the Blackberry note in certain circumstances discretion is
and iPhone, as being of increasing importance being eroded, evidenced by the Australian
and concomitant risk.11 Open source reporting Government Information Management Office
indicates just how pervasive and damaging Instructions on the Allocation and Use of
attacks against mobile devices may become.12 Blackberry in the Australian Government.13
for offline cooperation are not suited to the Should the onus be on victims to know the
online environment. And there remain many bureaucratic processes of government, or the
countries where legal regimes are weak, or physical location of their internet attacker to
where there is a lack of will to impose the rule report an incident? On the whole, businesses
of law on criminal actors operating online. and consumers have been left to protect
themselves and to clean up the mess when
The 2008 e-Security Review recommended
things go wrong.
enhancing Australia’s international efforts.
Current efforts should be commended, but
they can go further. Just as the Australian A national response:
Federal Police have deployed liaison officers establishing an internet crime
to international drug crime hubs, and other reporting and analysis centre
locations to take the counter terrorism
Australia needs an internet crime reporting
fight offshore, appropriately skilled officers
and analysis centre for homes and businesses.
need to be deployed to internet crime
The relevant federal law enforcement and
troublespots: East Africa, Russia, and some
consumer protection agencies are not
of the more active former Soviet republics
constituted, staffed, or able to deal with the
at the least. They should also seek to have
often small and seemingly inconsequential
officers embedded in allied high-tech crime
incidents of fraud, spam, scams, data loss,
investigative agencies, particularly in the
inappropriate content, or sometimes IT
United Kingdom, Canada and the United
security incidents. We need an internet
States, to assist in information sharing and
‘shopfront’ approach. A place for people to
joint operations.
report matters, and to seek advice: a single,
Additionally, the efforts of AusAID need to be consumer-orientated destination, scaled
harnessed to build cyber crime fighting and for the internet, which takes a national
cyber security capacity in weaker regional whole‑of‑government approach.
states to reduce their ability to provide safe
This would not just bring Australia into
harbour for network abuse.
line with the UK, which has announced the
The small nature of many individual online formation of the National Fraud Reporting
incidents means that much of the time they Centre to tackle all fraud and online crime
go unnoticed even if reported. One individual complaints, but would go to the next logical
act may be spread across many jurisdictions step of delivering services covering safety and
and be replayed against thousands of security for the end user in one place.
victims, all of whom have a small loss that
An internet crime reporting and analysis
combined becomes something of much
centre would be most successful as a
greater magnitude. The fragmented and
public-private-partnership which could allow
often opaque nature of incident reporting
real-time information flow between the
prevents law enforcement, regulatory and
government’s CERT Australia and the Cyber
security agencies from seeing a true picture.
Security Operations Centre, giving Australia
Often it is unclear if there is a logical place for
a more holistic view of Australia’s internet
reports to be made; agencies accept reports
health, and improving our ability to respond
only when they fall into (sometimes narrow)
to threats and rebound.
interpretations of jurisdiction, reducing the
likelihood of successful intervention and
identification of perpetrators.
12 Special Report
An internet crime reporting and analysis networks (by building on the existing
centre would deliver significant benefits, Australian Communications and Media
including an ability to: Authority (ACMA)-managed Australian
• aggregate complaints to better determine Internet Security Initiative). It also highlights
the scope of crime, and to pass on that the role of consumer education.
information to relevant agencies to But because it will be an industry code
investigate those responsible created under the co-regulatory regime of
• gather intelligence and trends on scams, the Broadcasting Services Act 1992, it notes
illegal content, crime, and IT security ‘the measures recommended in the Code
attacks from Australian households should not adversely affect the commercial
and businesses viability of the parties and the services
• provide a single point of education and they make available’.20 Even when the
remediation for Australians code is finally registered with ACMA, and
therefore enforceable, it is unlikely ACMA will
• give a sense of redress to victims, reducing
proactively check for compliance across ISPs:
feelings of helplessness and frustration
all part of industry self-regulation.
• pass on relevant information to other
countries for their action It is time for Australia to consider whether the
current ‘light touch’ approach towards the
• reduce individual victimisation and losses
internet has served its use-by date. It allowed
• provide information back to industry to Australia to develop its internet capacity in a
reduce further victimisation. relatively unfettered and competitive way, but
Importantly, a rationalisation of existing at the cost of safety and security, which may
resources within individual agencies already now be inhibiting future growth.
tasked with such reports should make A final—and more prescriptive—code needs
this a relatively inexpensive exercise, with to be registered with ACMA, and enforced. It
significant upside in terms of output. is inappropriate that backyard ISPs—providing
such essential services to the community—
A time for shared should be allowed to provide limited safety
responsibility and security measures to their customers.
Internet Service Providers (ISPs) play a crucial As the NBN begins to roll out next year
role in connecting Australians to the internet, the government-owned NBN Company
as do others in the internet industry such as will eventually become the dominant
registrars (who issue domain names), and they wholesale broadband ISP for Australia. Proper
could play a much greater role in protecting consideration must be given to policies that
us. But for a long time many of them have enhance the end-point security of users so
argued that as providers of a commercial that computers connecting to the network
service, they are unable to assist. have adequate IT security protection, are
patched, and pose a lesser threat to other
The government-backed draft Internet
internet users and themselves. Even Microsoft
Industry ISP Code of Conduct for e-security is
has realised that it is better for the internet at
a good first step in recognising how ISPs can
large to allow security updates to install even
help reduce e-security threats.
on pirated copies of Windows,21 a marked
The draft code covers issues such as detection change of policy for the company.
and removal of ‘zombie’ computers on
Cyber security: threats and responses in the information age 13
Registrars are those who issue internet And online businesses need to offer safer
addresses (domain names) that we rely upon services, where education, security and
for a healthy internet. We need to have some encryption are built into the product,
comfort that we are visiting the website rather than—sometimes—added as an
we think we are. The registrar business is a afterthought. In fact, any organisation
volume business, not one which spends a which collects information and stores it
great deal of time determining if an applicant electronically has to build security in, as they
for a domain name is who they claim to be. It are not immune from compromise.
is about time that Australia instituted a ‘know
While the Department of Broadband,
your customer’ regime for registrars, just as
Communications and the Digital Economy
we have for financial and other services.
(DBCDE) has the responsibility under
But it isn’t just ISPs and registrars who need ESNA for educating home users and SMEs
to shoulder more of the burden. There is a in e-security, ACMA has funding and
greater role for those whom we entrust with responsibility for online safety education. It
our information: business and government. is time to consolidate these efforts. It is time
They need to have strong incentive to collect to build greater resilience into the Australian
and store less information and better protect internet population through an effective
the information they do collect. Some of ‘public health’ style campaign designed to
this change can be brought about by the change user behaviour.
government acting on the data disclosure
It is time to weave internet citizenship
changes suggested by the Australian Law
education seamlessly into the school system.
Reform Commission in its review of the
Children should not just be taught how to use
Privacy Act 1988. In particular, the need for
technology, they must be taught how to use it
businesses to notify individuals if data is lost,
wisely, safely and securely.
the Privacy Commissioner, and—perhaps—
the proposed new internet crime reporting
and analysis centre. Real cyber security for Key recommendations for
individuals will not be possible without strict government
adherence to these privacy considerations. • Establish an internet crime reporting and
analysis centre for homes and businesses.
End user responsibility • Enact data disclosure changes suggested
by the Australian Law Reform Commission
Individual end users will need to be more
in its review of the Privacy Act 1988.
responsible in reducing their own e-security
risk. We have failed as a society in how we • Consolidate the online safety and
actualise that responsibility. The mantra of security education efforts of DBCDE
end user responsibility has often been taken and ACMA and undertake ‘public health’
as an opportunity for governments and style campaigns designed to change
businesses to play a minimalist role. If nothing user behaviour.
else, it has allowed both to invest very little in • Partner with home users and SMEs to
preventative risk management. help them understand how they can
help themselves.
What is needed is governments and business
partnering with home users to help them • Provide internet citizenship education
understand how they can help themselves. in schools.
14 Special Report
• Deploy appropriately skilled AFP officers all of whom contain useful information or
to internet crime troublespots as well as may be used as springboards to carry out
embedded in allied nations’ high-tech further attacks.
crime investigative agencies. 2. The pace at which the attacks have
• Build cyber crime fighting capacity in multiplied and evolved in line with
weaker regional states. society’s increased use of technology
• Develop policies that enhance the and bandwidth.
end-point security of users connecting to 3. The jurisdictional conundrum that these
the NBN. activities present to nations, where
• Enforce a ‘know your customer’ regime for criminals and foreign countries can attack
internet registrars. systems using computers from a third, or
even within the target country, and where
• Reduce the discretionary powers of
the perpetrators can reside outside the
individual departmental chief executives
geographic region and reasonable legal
within the Information Security Manual,
reach of the nation.
while increasing the authority of DSD.
4. The problem of identity, which means
• Introduce a mechanism to measure
malicious actions can be passed off as
and report on Australian Government
committed by others.
agencies’ cyber security health.
5. The indivisible link between individual
• Provide a cohesive and comprehensible
vulnerabilities and our national security
set of information assurance policies,
interests: where seemingly trivial
recommendations, and guidelines to
annoyances mix with malignant actions of
Australian businesses to ensure that
nation states.
reasonable best practices are encouraged
in businesses. 6. The pervasiveness of the information
which may be compromised, or misused.
• Increase the scope and frequency of
intelligence briefings to Australian The 2008 recommendations of the E-Security
businesses on the types of activities and Review are logical next steps in capacity
threats they may encounter. building and reflect a recognition that
• Develop cyber warfare doctrine and critical information is spreading further into
concepts for the military. the community.
7 http://www-935.ibm.com/services/us/iss/ 20 http://iia.net.au/images/resources/pdf/
xforce/trendreports/xforce-2008-annual- esecurity_code_consultation_version.pdf
report.pdf p.18
21 http://windowsteamblog.com/blogs/
8 http://www.avertlabs.com/research/blog/ windowssecurity/archive/2009/04/27/
index.php/2009/07/22/malware-is-their- who-gets-windows-security-updates.aspx
businessand-business-is-good/
9 http://www.theregister.co.uk/2009/10/26/
guardian_jobs_data/