Oct 12, 2017

Hack of defence firm reveals a cybersecurity framework in chaos

While endlessly talking about the importance of cybersecurity, the government has an all-care-no-responsibility attitude toward its defence data.

Bernard Keane — Politics editor

Bernard Keane

Politics editor

The revelation that an Australian defence subcontractor had a large volume of material on Australia’s defence assets stolen in an “extensive and extreme compromise” should ring loud alarm bells in Canberra. Instead, it will likely pass with little interest. But be sure our enemies and allies have noted it.

They’ll also have noted the head-in-the-sand reaction from the government, with Defence Industries Minister Christopher Pyne dismissing the incident as merely relating to commercial, not classified information, and that it wasn’t the fault of the federal government that the subcontractor had poor security. Pyne was thereby demonstrating that the great advantage of outsourcing isn’t so much that governments save money, as that they can avoid blame. You get to outsource responsibility, above all.

Free Trial

Proudly annoying those in power since 2000.

Sign up for a FREE 21-day trial to keep reading and get the best of Crikey straight to your inbox

By starting a free trial, you agree to accept Crikey’s terms and conditions


Leave a comment

18 thoughts on “Hack of defence firm reveals a cybersecurity framework in chaos

  1. Barry Reynolds

    One possible solution is to stop the out sourcing, employ people and bring everything back under direct government control and make the ASD responsible for IT security

  2. [email protected]

    Yes, both apply. We are at the end of the game. We are sitting in the seat called absurdity and are lost in cyberspace….just where we are supposed to be. Just like the space family Robinson they (their Government) ain’t looking to rescue them anytime soon. And so we seek solutions! For what!
    As long as our so called security is written on software you can forget any security at all because it doesn’t work that way. You need to hit the digital boolean on the motherboard with the correct devices in order to maintain proper “security”. Thats all folks. But then your tech device will have this huge security device attached to it bigger than your tech device to achieve an acceptable protocol. No only at the simplest level can you be protected, anything destined for the software side of tech usage is open slather. People will learn one day!

  3. Pollietragic

    Isn’t it ridiculous that Pyne claims no responsibility for outsourced sensitive defence intelligence being hacked?

    Remember when the LNP blamed Garret for insulation installer contractor deaths?
    You can’t have it both ways, Pyne.

Share this article with a friend

Just fill out the fields below and we'll send your friend a link to this article along with a message from you.

Your details

Your friend's details