Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The arms race of old has entered the cyberworld and nations are pushing hard to source the best security engineers to dominate the new battlespace.
But network-centric conflict was still unfamiliar territory for many nations despite its involvement in military conflict for decades.
Dr Tobias Feaken, research fellow at British independent think tank the Royal United Services Institute, said nations such as Britain and Australia were among those seeking to fill seats in defensive, offensive and intelligence positions.
“They are trying to find out what talent exists and have commenced big recruitment drives,” Feaken said in a phone interview ahead of the Cyber War conference in Canberra today.
“The US is bringing in 1000 plus people into its cyber security divisions and China and South Korea have ramped up recruitment. It is an arms race.”
Feakin, a renowned British counter-terrorism expert, sees network centric warfare as serious and big business.
He points out that the British Government tipped $1 billion ($AU650 million) over five years to 2015 into cyberwar coffers and anti-terrorism measures, while slashing public spend in other sectors.
Poignantly, the government planned to axe 42,000 military jobs over the same period.
Investments have been tougher to track in countries including Australia, which had launched a string of federal cyber defence and intelligence agencies that mirror those operating in allied nations.
Western nations have not yet laid claim to having fired cyber weapons but rhetoric is heavy with comminatory. Both Britain and the United States have flagged the use of offensive tactics should national assets be attacked.
“There is no doubt that [Britain] should have offensive capability,” Feaken said. “But there are questions about how it is used.”
One question is how cyberwar can be waged over infrastructure owned by the private sector.
To this end, British Prime Minister David Cameron had told prominent IT companies to “lay down arms and coordinate” to help build cyber capabilities, Feaken said.
Australia’s Attorney-General’s Department had spent the last two years identifying and training private sector organisations that were important to national defence.
Yet Feaken said Britain was only “just waking up” to serious network-related threats.
“The cyber domain is the greatest expressor of the individual to shape events since September 11. This is only recently being realised.”
For now, allied nations were focused on building information sharing arrangements. Feaken said Britain and Australia had historically perceived national threats similarly yet differed in how they were addressed.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.