We’re not ready for a looming cyber-emergency

  Last updated October 18, 2019 at 3:11 pm

Topics:  

We haven’t been able to keep up with advancing technologies, and the cyber-threat they pose to our security.


cyber cybersecurity cyber safety




Why This Matters: We need to ensure that the technology we depend on stays on our side.




Australia’s social scientists and the intelligence agencies have a new joint role in protecting the country, but may need a more tech-savvy workforce to get there.


There are historical precedents for this kind of cooperation. In September 1939, just as war broke out in Europe, the Cambridge University scholar Alan Turing arrived at Bletchley Park to take up a position helping the UK government break the German codes and cipher machines.


Australia’s current geopolitical situation is obviously not as dire. But we are facing the same institutional problem. The country has not been able to develop an intelligence workforce that can keep up with the speed of advancing technologies today and their intensifying threat to our national security.


New cyber technology threats


In 2012, Nick Warner, then-director general of the Australia Secret Intelligence Service (ASIS), first advocated the need for greater attention to the threat posed by advanced technologies.




Seven years later, as the new director-general of the Office of National Intelligence (ONI), Warner again publicly asserted that accelerating technological change is “not only changing the business of intelligence; it’s changing the entire world”.


Warner specifically mentioned recent innovations in nanotechnology, quantum computing, synthetic biology and facial recognition technology as among the most critical for our intelligence agencies to better understand.




Deeper: When it comes to recognising faces, a computer can do it better than you




As it stands, there are gaping holes in our capability to grasp both the threats posed by these new technologies, as well as the opportunities for our intelligence agents to use them in their missions.


On the threat side, one area where Australia and most other countries are weak is the need to have advanced, 24-hour monitoring and immediate remediation of cyber-intrusions for nationally connected systems.


This can only be done through the development of artificial intelligence applications unique to the country, its cyber-infrastructure, and the threat profile of potential adversaries. An algorithm for Australia’s system, for instance, will not work for the United States.


But how many Australians are qualified in this area? This shortfall in the number of candidates with high-tech qualifications to help remake our intelligence workforce is probably the main reason why leaders like Warner are going public with their concerns.




Teach This: Education Resource – We’re not ready for a looming cyber-emergency




Enter the cyber scholars


Around the time Warner made his speech this April, the Office of National Intelligence (ONI) asked the Academy of Social Sciences in Australia (ASSA) to advise it on how scholars could assist the agencies in doing their job better, including in the area of addressing new, advanced technologies.


ONI was following the lead of the chief intelligence agency in the United States, the Office of the Director of National Intelligence (ONDI), which had asked the US National Academies of Sciences, Engineering and Medicine to do the same thing.


Their report was released in March 2019 after two years of work, 100 working papers and a cost of A$15 million.


The American scholars’ report revealed how the richest, most technologically advanced country in the world was struggling to maintain confidence in its intelligence capabilities at a time of emerging, often invisible or untraceable threats in cyberspace.




Also: Making private browsing secure




The most surprising conclusion of the American scholars was that the solutions would be found in areas of social policy and workforce development.


The report gave prominence to the emerging concept of social cyber-security. The focus, they said, had to be in forecasting the changes in human behaviour that have been caused by new cyber-technologies.





Developing a future high-tech workforce



Building off the US report, the Australian scholars’ most important recommendation was that our country needs a strategic plan for workforce development in the intelligence community that can deal with emerging cyber-threats.


They want to see a commitment to developing a bigger pipeline of more diverse and capable intelligence analysts, schooled as deeply in the social and political aspects of cyber-space as in the technical dimensions.


As I argued in a 2017 discussion paper on this topic – and as many others have also argued – Australia is not even close to a national workforce plan for a high-tech future.


The Coalition government, like the opposition, is happy to leave the universities to set the pace in terms of educating a future high-tech workforce. Only token amounts of money have been invested in new cyber-education programs by the government. That investment has come without any corresponding strategy at the federal level.


In spite of some small successes, the universities are not delivering. We need to know why. Are traditional universities even the appropriate venue for advanced cyber-social research and education?


We certainly need a greater sense of urgency. In May, the US declared a national “cyber emergency”, the third time it’s done so in the past four years. At the same time, it released a new cyber workforce strategy as a primary plank of its emergency response plan.


Australia should adopt this urgency to create a new workforce capable of countering the high-tech threats of the future.


This article is republished from The Conversation under a Creative Commons license. Read the original article.


More Like This


“Vaccines” to protect neural networks against hacking


Should you have the right to know you’ve been hacked?




About the Author

Greg Austin
Greg Austin is a Professor in the University of New South Wales (Canberra) where he serves as Deputy Director of UNSW Canberra Cyber (formerly the Australian Centre for Cyber Security). He is a world recognised expert on cyber security and terrorism.

Published By

Featured Videos

Placeholder
Big Questions: Cancer
Placeholder
A future of nanobots in 180 seconds
Placeholder
Multi-user VR opens new worlds for medical research
Placeholder
Precision atom qubits achieve major quantum computing milestone
Placeholder
World's first complete design of a silicon quantum computer chip
Placeholder
Micro-factories - turning the world's waste burden into economic opportunities
Placeholder
Flip-flop qubits: a whole new quantum computing architecture
Placeholder
Ancient Babylonian tablet - world's first trig table
Placeholder
Life on Earth - and Mars?
Placeholder
“Desirable defects: Nano-scale structures of piezoelectrics” – Patrick Tung
Placeholder
Keeping Your Phone Safe from Hackers
Placeholder
Thru Fuze - a revolution in chronic back pain treatment (2015)
Placeholder
Breakthrough for stem cell therapies (2016)
Placeholder
The fortune contained in your mobile phone
Placeholder
Underwater With Emma Johnston
Placeholder
Flip-flop qubits: a whole new quantum computing architecture
Placeholder
The “Dressed Qubit” - breakthrough in quantum state stability (2016)
Placeholder
Pinpointing qubits in a silicon quantum computer (2016)
Placeholder
How to build a quantum computer in silicon (2015)
Placeholder
Quantum computer coding in silicon now possible (2015)
Placeholder
Crucial hurdle overcome for quantum computing (2015)
Placeholder
New world record for silicon quantum computing (2014)
Placeholder
Quantum data at the atom's heart (2013)
Placeholder
Towards a quantum internet (2013)
Placeholder
Single-atom transistor (2012)
Placeholder
Down to the Wire (2012)
Placeholder
Landmark in quantum computing (2012)
Placeholder
1. How Quantum Computers Will Change Our World
Placeholder
Quantum Computing Concepts – What will a quantum computer do?
Placeholder
Quantum Computing Concepts – Quantum Hardware
Placeholder
Quantum Computing Concepts – Quantum Algorithms
Placeholder
Quantum Computing Concepts – Quantum Logic
Placeholder
Quantum Computing Concepts – Entanglement
Placeholder
Quantum Computing Concepts - Quantum Measurement
Placeholder
Quantum Computing Concepts – Spin
Placeholder
Quantum Computing Concepts - Quantum Bits
Placeholder
Quantum Computing Concepts - Binary Logic
Placeholder
Rose Amal - Sustainable fuels from the Sun
Placeholder
Veena Sahajwalla - The E-Waste Alchemist
Placeholder
Katharina Gaus - Extreme Close-up on Immunity
Placeholder
In her element - Professor Emma Johnston
Placeholder
Martina Stenzel - Targeting Tumours with Tiny Assassins
Placeholder
How Did We Get Here? - Why are we all athletes?
Placeholder
How Did We Get Here? - Megafauna murder mystery
Placeholder
How Did We Get Here? - Why are we so hairy?
Placeholder
How Did We Get Here? - Why grannies matter
Placeholder
How Did We Get Here? - Why do only humans experience puberty?
Placeholder
How Did We Get Here? - Evolution of the backside
Placeholder
How Did We Get Here? - Why we use symbols
Placeholder
How Did We Get Here? - Evolutionary MasterChefs
Placeholder
How Did We Get Here? - The Paleo Diet fad
Placeholder
How Did We Get Here? - Are races real?
Placeholder
How Did We Get Here? - Are We Still Evolving?
Placeholder
How Did We Get Here? - Dangly Bits
Placeholder
Catastrophic Science: Climate Migrants
Placeholder
Catastrophic Science: De-Extinction
Placeholder
Catastrophic Science: Nuclear Disasters
Placeholder
Catastrophic Science: Storm Surges
Placeholder
Catastrophic Science: How the Japan tsunami changed science
Placeholder
Catastrophic Science: How the World Trade Centre collapsed
Placeholder
Catastrophic Science: Bushfires