13 research outputs found

    Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities

    Get PDF
    This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It also shows that, while cybersecurity is a concern, much media coverage tends to oversimplify the issue and not present the public with the fuller picture. 2013 is the year that cyber issues have taken on a heightened priority and strategic weight. Governments must now work out how to handle cyber matters as an element of their foreign policy to prevent long-term damage to international relationships

    The new frontiers of Islamist extremism: understanding the threat that al-Qaeda affiliates pose to African security

    Get PDF
    This paper examines three violent Islamist groups in Africa - Al-Qaeda in the Islamic Maghreb (AQIM), al-Shabaab and Boko Haram - and the way they’ve evolved, especially in the linkages between them and al-Qaeda’s ideology and tactics. Overview Over the past decade various groups that had been operating with a predominantly nationalistic agenda have increasingly become aligned with al-Qaeda in name, ideology, methodologies of attack and tactics. A new jihadism is spreading across Africa. This paper examines three groups—Al-Qaeda in the Islamic Maghreb (AQIM), al-Shabaab and Boko Haram. All of these groups are separate from the al-Qaeda core. They haven’t taken up the al-Qaeda model because they’ve been told to, but they’re emulating it. They’re all looking to become dispersed, decentralised movements that frame local grievances in the language of the global jihad. For the international community, the danger lies not so much in the immediate threat to Western targets from African Islamists, but in the potential future creation of a failed state that would provide a base for training and radicalising large numbers of Islamists. The proven capacity of AQIM, Boko Haram and al-Shabaab to train and share fighting and bombmaking skills with new recruits, and then deliver those recruits into intensive front-line fighting roles in areas such as Syria and Iraq, will be the groups’ most immediate international impact. There are no clear solutions for African states combating the Islamist groups but any solution will necessarily be complex. Unfortunately, if the situation’s allowed to continue, there is danger that we’ll see a rise in instability in the regions where the groups operate, and in their growth and ambition

    The future of jihad: what next for ISIL and al-Qaeda?

    Get PDF
    This report examines what the rise of ISIL means for al-Qaeda and how will it react. Overview ISIL is a real threat and must be targeted, but al-Qaeda shouldn’t be forgotten. Indeed, al-Qaeda should remain a key focus for international counterterrorism efforts. It’s a resilient and resolute terrorist organisation, but it’s also weaker than it’s been for many years. We should use this brief opportunity to dismantle the organisation completely. The report examines what the rise of ISIL means for al-Qaeda and how will it react. How will al-Qaeda seek to regain the oxygen of publicity that’s central to terrorist organisations if they’re to recruit, grow and, ultimately, challenge their enemies? Does the rise of ISIL signal the end of al-Qaeda or might al-Qaeda merge with ISIL, confront it head on or take some other course of action? The authors explore four alternative futures for al-Qaeda and ISIL and conclude that a worrying scenario of ‘one-upmanship’ is likely to take place between the two organisations in which al-Qaeda pursues a campaign of international attacks in order to regain the limelight

    A shared agenda for the Seoul Conference on Cyberspace, South Korea, 2013

    Get PDF
    This briefing is ASPI’s distillation of the thoughts of a group of prominent members of the Australian cybersecurity community. We held a workshop in Canberra on the key panel sessions that will take place at the Seoul Conference on Cyberspace, South Korea, in October 2013. Workshop participants included the Australian Government departments with a stake in cyber issues and members of the private sector, including the banking and IT sectors, defence and security industries and representatives from the wider business community. The aim of the workshop was to provide creative Australian perspectives to take to the Seoul conference

    Underground web: the cybercrime challenge

    Get PDF
    The two papers in this Special Report examine the central role that cybercrime plays in modern society and how technological developments create new opportunities for criminals to exploit. Overview Calum Jeffray’s paper, Caught in the net: the law enforcement response to international cybercrime, surveys the strategic cybercrime landscape and illustrates that, despite calls for law enforcement to ‘do more’ to prevent and investigate cybercrime, the agencies involved are often hampered in acting due to jurisdictional issues or the complexity of the investigations. Tobias Feakin’s paper, Cryptomarkets—illicit goods in the darknet, examines the emergence of the ‘darknet’, where trading in illicit goods and services in online black markets has become increasingly commonplace and exacerbates the problems that law enforcement already faces—tracing and prosecuting illegal activities online. This Special Report includes a foreword by Australian Federal Police Commissioner Andrew Colvin

    Cyber maturity in the Asia-Pacific Region 2014

    Get PDF
    Summary: To make considered, evidence-based cyber policy judgements in the Asia-Pacific there’s a need for better tools to assess the existing ‘cyber maturity’ of nations in the region. Over the past twelve months the Australian Strategic Policy Institute’s International Cyber Policy Centre has developed a Maturity Metric which provides an assessment of the regional cyber landscape. This measurement encompasses an evaluation of whole-of-government policy and legislative structures, military organisation, business and digital economic strength and levels of cyber social awareness. This information is distilled into an accessible format, using metrics to provide a snapshot by which government, business, and the public alike can garner an understanding of the cyber profile of regional actors

    Cyber maturity in the Asia-Pacific region 2016

    Get PDF
    The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement, military, business and social engagement with cyber policy and security issues. The 2016 report includes an assessment of three new countries, Bangladesh, Pakistan and the Solomon Islands. It also features, for the first time, separate data points on fixed line and mobile connectivity to better reflect the growth of mobile-based internet access across the region, its role in facilitating increased connectivity and opening new digital markets. &nbsp
    corecore