- The Strategist - https://www.aspistrategist.org.au -

How vulnerable is Australia’s national identity data?

Posted By on May 3, 2018 @ 09:00

There is general consensus among the government, civil society and industry sectors that data is a critical asset in our lives. Everything from knowing the weather in the morning to reading the news and checking emails is based on an underlying assumption about reliability. In short, we assume that the data, in whatever form it may be, is accessible, accurate and verifiable.

Data is central not only to our personal lives, but to the functioning of society and government. Every nation is sitting on a goldmine of data, from health records to immigration, intelligence and defence data. Yet, there’s an inherent risk in putting so much trust into an asset that is highly vulnerable. The broad spectrum of cyberattacks and technological advancements in cybersecurity highlight how easily our dependence on reliable data can be shattered.

Data is a vulnerable and critical asset. There are four key examples that highlight how it can be manipulated and abused by cyber warfare and information operations. As outlined in the Australian Signal Directorate’s Information security manual [1], it’s important to have an understanding of the cyber threat environment and of malicious cyber actors to best mitigate such threats.

Firstly, data can be stolen. The practice of stealing information through cyber espionage is well-established in military and intelligence operations. In one example of state-sponsored cyber espionage, millions of government officials’ fingerprints, social security numbers and personal and financial were stolen from the US Office for Personnel Management [2]. China is also active in cyber espionage, for example obtaining military documents and sensitive information from the Philippines government [3].

Secondly, data can be made inaccessible or restricted. Cyber sabotage attacks information for financial gain or to create chaos and disruption. The WannaCry ransomware attacks of 2017 were a recent example. The virus encrypted files and demanded that a ransom be paid for the data to be decrypted. Various governmental institutions and companies were affected by the attack [4]. Britain’s National Health Service [5] couldn’t access its health records and had to cancel non-urgent operations.

Denial of service (DDoS) attacks are also commonly used against government websites to disrupt services and restrict public access to government information. There have been DDoS attacks on government websites in Thailand [6], India [7] and Luxembourg [8], among others. Even NATO’s website [9] has been affected. The Digital Attack Map [10] tracks the top daily DDoS attacks globally and highlights the scope of the problem.

Thirdly, the reliability of information has been compromised by fake news and disinformation. Deliberately disseminating false information is a form of cyber-enabled influence operation, the deliberate attempt to influence decisions and opinions. The most blatant example has been the alleged interference by Russia in the 2016 US elections [11]. China also has a hand in influence operations in Taiwan [12].

Finally, data is vulnerable due to the systems on which it is stored. Cyberattacks on critical infrastructure is a tool of cyber warfare. As we saw in Atlanta, cyberattacks can cause an entire city to come to a standstill. As a Forbes article rightly pointed out, we must recognise the threat posed by cyberattacks not only to critical infrastructure services, but also to democratic and governmental continuity [13].

Attacks on critical infrastructure, particularly energy systems, are increasingly common. The world’s biggest oil company—Saudi Aramco—was hit by a malware attack in 2012 [14] that successfully wiped data from approximately 35,000 computers and caused the company to temporarily suspend oil sales. Ukraine’s energy sector was also the target of a cyberattack—attributed to Russia in 2015—that caused power outages [15] to more than 225,000 citizens.

These vulnerabilities threaten the continuity of certain functions within society. The question then arises: can the continuity of our digital national identity also be threatened? Data collections such as our immigration, birth, death and marriage records, parliamentary records and court rulings are the evidence of who we are as a nation. If such assets were stolen, destroyed or manipulated, would we have a point of truth to fall back on? As Anne Lyons argues, our digital national identity assets are vulnerable to manipulation [16].

We should take a leaf from Estonia’s book. Estonia is the only country to have fully realised the vulnerability of its critical governmental data and taken action to ensure its protection. Estonia is creating an overseas ‘data embassy’ [17] in Luxembourg to store its government data. The idea is that if Estonia suffered a catastrophic attack, either physical or cyber, the essence of Estonian government, history and society wouldn’t be lost. This initiative safeguards Estonia’s critical data by storing that data in different, geographically distributed locations.

Although Australia hasn’t been targeted on a large scale as yet, we haven’t been completely immune either. Most (in)famously was the DDoS attack during the 2016 census, causing the ABS website to crash [18] and delivering a significant blow to the reputation of both the Australian Bureau of Statistics and to the Australian government. Some years earlier, the group Anonymous subjected the Australian Parliament (APH) and a senator’s website to DDoS attacks, shutting down the APH website for 50 minutes [19].

It is no secret that data is a target of cyber warfare. That vulnerability threatens our national security. Understanding the constantly evolving cyber threat environment and the tools of cyber warfare should make clear the importance of protecting critical data. As the threats expand, so too should our ideas of what data we need to protect.

The Australian government needs to ensure that our critical national identity assets are protected from manipulation, falsification or destruction to ensure the reliability of the data that underpins our democracy, governance and national security.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/vulnerable-australias-national-identity-data/

URLs in this post:

[1] Information security manual: https://www.asd.gov.au/infosec/ism/

[2] US Office for Personnel Management: https://www.aspistrategist.org.au/foreign-intelligence-stravas-global-heatmap/

[3] from the Philippines government: https://thediplomat.com/2015/09/the-chinese-cyber-threat-in-the-south-china-sea/

[4] were affected by the attack: http://money.cnn.com/2017/05/15/technology/ransomware-whos-been-hit/index.html

[5] Britain’s National Health Service: https://www.theverge.com/2017/5/12/15630354/nhs-hospitals-ransomware-hack-wannacry-bitcoin

[6] Thailand: http://www.bbc.com/news/world-asia-34409343

[7] India: https://www.hindustantimes.com/india-news/ministry-of-defence-website-hacked-leads-to-error-message/story-85ASfKmolUiDXEwrwNsAfP.html

[8] Luxembourg: https://www.scmagazineuk.com/luxembourg-government-servers-forced-offline-by-ddos-attack/article/641003/

[9] NATO’s website: https://www.reuters.com/article/us-ukraine-nato/nato-websites-hit-in-cyber-attack-linked-to-crimea-tension-idUSBREA2E0T320140316

[10] Digital Attack Map: http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=17630&view=map

[11] alleged interference by Russia in the 2016 US elections: https://www.cfr.org/backgrounder/russia-trump-and-2016-us-election

[12] influence operations in Taiwan: https://www.aspistrategist.org.au/cyber-enabled-information-influence-operations-not-just-russia/

[13] democratic and governmental continuity: https://www.forbes.com/sites/dantedisparte/2018/04/02/cities-held-for-ransom-lessons-from-atlantas-cyber-extortion/#16f5822b5996

[14] malware attack in 2012: http://money.cnn.com/2015/08/05/technology/aramco-hack/?iid=EL

[15] caused power outages: http://www.bbc.com/news/technology-38573074

[16] are vulnerable to manipulation: https://www.aspistrategist.org.au/australias-national-digital-identity-vulnerable-manipulation/

[17] ‘data embassy’: https://news.err.ee/684635/data-embassy-bill-passes-first-reading-in-riigikogu

[18] causing the ABS website to crash: http://www.abc.net.au/news/2016-08-10/australian-bureau-of-statistics-says-census-website-hacked/7712216

[19] shutting down the APH website for 50 minutes: https://www.itnews.com.au/news/australian-government-websites-blitzed-by-ddos-attack-166860

Copyright © 2024 The Strategist. All rights reserved.