Transcript
A (0:00)
Foreign.
B (0:03)
Hello everyone, this is Tom Yuen. I'm here with the Gruk for another Between Two Nerds episode. G', day Grok, how are you?
A (0:10)
G', day Tom. Fine and yourself.
B (0:12)
This week's episode is brought to you by Kroll Cyber, who have a very good cyber incident response consultancy. So, Gruk, this week the Director General of asio, which is Australia's security Intelligence Organization, gave a speech where he talked about the threats of cyber espionage to Australia. And I'm going to pull out a few little parts, but it made me think about are we kind of missing the point? Like you and I, we're both immersed in the cybers, we think about them all the time and I think there's good reasons for that. But I'll go through and we'll just talk about whether there's a bigger picture out there that we're just missing. The broader thrust of Mike Burgess speech, that's the Director General, is that people in Australia are a bit complacent about espionage. And he basically says that espionage and foreign interference has increased a lot over the last three years, like several times increased in terms of the number of incidents that ASIO is dealing with. Now the part that leapt out to me, foreign intelligence services can obtain material in person, like traditional human intelligence is what I'd call that.
A (1:26)
And my grandmother used to make.
B (1:28)
Sorry, Yep, most commonly by hacking. And then this is the interesting part, often it's a combination of both. Where cyber espionage enables in person espionage or in person espionage begets cyber espionage. Now this made me think about how the organizations in countries I'm familiar with that do cyber espionage are different from the ones that do humit. Like we have entirely separate organizations. Now he goes on to give a number of examples and what struck me is that almost all of the examples are either traditional cyber espionage or traditional humint. There doesn't seem to be, it doesn't give any examples where they're combined. So the hacking one, he says foreign state hackers hacked into the systems of a law firm involved in sensitive government related litigation. Another group compromised the network of a peak industry body stealing sensitive information about exports and foreign investment. So traditional cyber espionage. And then all the other examples he gives are what I would call traditional humint. So buying a access to sensitive personal data sets, buying land near sensitive military sites, collaborating with researchers, that's traditional. Maybe it's not traditional humint, but it's definitely, if you did it 100 years.
