1 April 2019
PDF version [325KB]
members of the Parliamentary Library’s Cyber and Digital Research Group
Cat Barker, Monica Biddington, Nicole Brangwin,
Helen Portillo-Castro and Tyson Wils
This Quick Guide provides some brief background information on
national measures to build cybersecurity and cybersafety and combat cybercrime,
and includes links to relevant websites.
Development of Australia’s
Vulnerabilities in online environments are
discovered every day. Cybersecurity involves preventing the technical exploitation
of such vulnerabilities and mitigating the risk of such exploits occurring. The
extent of the cyber threat is vast, traversing many jurisdictions (domestically
and internationally), and stems from a myriad of sources. As such, it is not
just a technical ICT (information, communication and technology) issue.
According to the Government’s Australian
Cyber Security Centre (ACSC), some of the threats to Australia’s cybersecurity include
cyber espionage that gathers intelligence in support of state-sponsored
activities; cyber attacks that aim to destroy critical infrastructure; and criminals
using online environments to defraud, or steal individual identities.
As a government policy issue, concerns
about Australia’s cyber resilience were initially raised in the Howard
Government’s 2000 Defence White Paper, Defence 2000: Our Future Defence Force. A number of initiatives flowed from this policy, including
cooperation among key national security agencies to assess and deal with
emerging threats. In the 2009 Defence White Paper, Defending Australia in the Asia Pacific Century: Force 2030, the Rudd Government elevated investment in cyber capabilities to a
national security priority, and in 2010, established the Cyber Security
Operations Centre (CSOC) within the Defence Signals Directorate (now the
Australian Signals Directorate—ASD).
In September 2011, the Gillard Government
announced the development of a cyber white paper,
which was meant to address a broad range of cyber issues including safety,
crime, consumer protection, as well as broader issues such as national security
and defence. However, the concept of a cyber white paper lost its impetus and eventually
morphed into an overarching update of the National Digital Economy Strategy, which was released in June 2013.
In January 2013, prior to the strategy’s release, the CSOC had evolved
into the ACSC as ‘the hub of the government’s cyber security efforts’ and in May
the Defence White Paper 2013 was
released, which highlighted cybersecurity as an ‘important national capability’.
Following the 2013 election, cybersecurity
was not part of the Abbott Government’s public focus on national security
issues until the cybersecurity review was announced in November
2014. The review was originally intended to take six months but it was 17 months later, under the Turnbull
Government, when Australia’s new cybersecurity strategy was
announced—effectively replacing the 2009 Cyber Security Strategy.
While the Turnbull Government’s
Cyber Security Strategy (released
in April 2016) recognised that cybersecurity is a strategic issue for
Australia’s economy and national security, there was less emphasis placed on national
security than in 2009 when cybersecurity was considered ‘one of Australia’s top
tier national security priorities’. However, the Turnbull Government’s 2016 Defence White Paper (released
in February) acknowledged the importance of cybersecurity in that cyber attacks
directly threaten the Australian Defence Force’s (ADF) warfighting ability.
Under the 2016 Cyber Security Strategy,
the Turnbull Government established the positions of Australian Ambassador for
Cyber Affairs (Tobias Feakin), Special Advisor to the
Prime Minister on Cyber Security (Alastair MacGibbon—now Deputy Secretary
National Cyber Security Adviser under the Home Affairs portfolio and Head, ACSC)
and Minister Assisting the Prime Minister on Cyber Security (originally Dan Tehan, then Angus Taylor as the Minister for Law
Enforcement and Cyber Security). The latter position has since been subsumed by the Minister for Home Affairs, Peter Dutton, under the Morrison Government.
In the defence environment, debate continues to surround the
exact nature of cyberwarfare as a sole undertaking. The 2016 Defence White
Paper highlights the ‘complex non-geographic threats’ in cyberspace and
space, and how military capabilities can be adversely affected. The Australia –
United States alliance also acknowledged the seriousness of these threats
talks in 2011 (AUSMIN) where it was agreed that the ANZUS Treaty could be
invoked in response to a cyber attack. Cybersecurity has featured in each
AUSMIN discussion since.
The threshold for an armed response to a cyber attack is not
entirely clear nor is it publicly discussed by Australian or US officials. The Trump
Administration declared in its September 2018 National
Cyber Strategy that ‘all instruments of national power are available
to prevent, respond to, and deter malicious cyber activity against the United
States’, including military force. The Australian Strategic Policy Institute
(ASPI), however, suggests
that offensive cyber operations are being deliberately conducted ‘below the
threshold of armed attack’ because ‘no cyber operation thus far has been
classified as an armed attack’, which might prompt an overt military response.
Key internet links
Directorate (ASD)—an independent statutory agency within the Defence
portfolio, ASD is Australia’s signals intelligence and information security
agency and provides services to the ADF and the Australian Government. On 30
January 2018 the Defence Signals-Intelligence (SIGINT) and Cyber Command was established
within ASD as the military
component. ASD is also home to the ACSC.
Australian Cyber Security
Centre (ACSC)—established in November 2014 and formally part of ASD since
July 2018, the ACSC incorporates cyber expertise from the Defence Intelligence
Organisation, Australian Security Intelligence Organisation, Australian Federal
Police and the Australian Criminal Intelligence Commission. The ACSC maintains the
Australian Government Information
Security Manual (ISM) that contains advice to businesses, industry and
government about best-practice cybersecurity measures. The ACSC also maintains cyber.gov.au, which is designed
to be a ‘central hub for cyber security information, advice and assistance to
all Australians’. This resource includes ACSC updates and reports on cyber
threats targeting Australia (see the 2015,
Centre—assists owners and operators of critical infrastructure
facilities to identify and manage national security risks such as sabotage,
espionage and coercion. Given the increase of cyber connectivity in this
sector, the Security
of Critical Infrastructure Act 2018 was passed to, among other
things, support cybersecurity efforts.
Department of Home
Affairs—the lead department for national security policy. The department’s
cybersecurity webpage links to relevant resources and initiatives, such as Australia’s Cyber
main digital research network within the Commonwealth Scientific and Industrial
Research Organisation (CSIRO). In the cybersecurity
sphere, Data61 is working to build more trustworthy and resilient systems
that have military applications, developing knowledge-based risk management,
automating cybersecurity and expanding partnering opportunities through
initiatives such as SINET61 (security innovation network).
Under the Joint
Cyber Security Centre Program, a number of Joint Cyber Security Centres
(JCSC) are being established across Australia. The first
JCSC was opened in Brisbane in February 2017, and others have since opened
in Melbourne, Sydney, Perth and Adelaide.
Defence Science and
Technology (DST)—the ADF’s research and development arm, which aims to
enhance military and national security
capabilities, including cyber. DST also has responsibility for the National
Security Science and Technology Centre, which includes cybersecurity as one
of six national security science and technology priority areas.
Warfare Division (IWD)—formed in July 2017 as part of the Joint
Capabilities Group within the ADF. The IWD has four branches: the
‘Information Warfare Capability, C4 and Battle Management Capability,
Capability Support Directorate and the Joint Cyber Unit’. In January
2018 the IWD released the Information Warfare Strategy, which identifies
four areas of capability: ‘self-defence, passive defence, active defence and
Telecommunications Union—Cybersecurity—ITU members can access tools,
advice, assessments and technical assistance to increase cybersecurity
capabilities and build trust in information, communication and technologies.
Economic Forum Centre for Cybersecurity—aims to ‘establish, activate
and coordinate global public-private partnerships to encourage intelligence
sharing and the development of cyber norms’.
for Security and Co-operation in Europe (OSCE)—details initiatives that
OSCE member states are taking to reduce the risks of conflict stemming from the
offensive use of cyber capabilities through devising confidence-building
America Cybersecurity Initiative—publishes reports and blog posts on
cybersecurity issues, including translations of official Chinese-language
materials on cyber and information policy through its DigiChina
- The RAND blog—hosts
commentary, essays and articles on issues intersecting with cyber and data
sciences, including cybersecurity. A 2017 research paper, Exploring
Cyber Security Policy Options in Australia, presents recommendations
based on an exploratory exercise held in December 2016 with participants drawn
from the public and private sectors, academia, think-tanks, industry
associations and the media at the Australian National University’s National
Security College in Canberra.
Capacity Portal—developed by the Global Cyber Security Capacity Centre,
this resource maps projects, programs and initiatives aimed at capacity
building to achieve cybersecurity objectives. It also publishes cybersecurity
capacity maturity model assessments as either regional studies or country
- North Atlantic Treaty Organization
(NATO)—established a number of Cyber Defence
mechanisms as part of NATO members’ overall collective defence. This
includes the 2016 Cyber Defence Pledge to prioritise cyber defence and the
formation of NATO Cyber Rapid Reaction teams. In 2018, NATO allies agreed to
‘set up a new Cyberspace Operations Centre as part of NATO’s strengthened
Command Structure’. NATO and the European Union also cooperate via a Technical
Arrangement on cyber defence, which was signed in February 2016. Cooperation
with industry is being advanced though the NATO Industry Cyber Partnership.
- NATO Cooperative
Cyber Defence Centre of Excellence (CCDCOE)—formally established in
2008 to ‘enhance the capability, cooperation and information sharing among
NATO, NATO nations and partners in cyber defence by virtue of education,
research and development, lessons learned and consultation’. The CCDCOE
maintains the Tallinn
Manual, which is considered the ‘most comprehensive analysis on how
existing international law applies to cyberspace’.
- UN Group of
Governmental Experts (GGE) on Developments in the Field of Information and
Telecommunications in the Context of International Security—considers
the application of international law and norms on the activities of UN member states
in cyberspace. The GGE maintains a ‘trends in cyber-armament’ map that
illustrates member states’ increasing investment in offensive cyber capabilities.
Cybercrime is criminal activity where a computer or network
is integral to, or the target of, an offence. It will often target individuals,
their data or their reputation. Cybercrime can encompass conduct such as cyberbullying,
hacking, unauthorised modification or destruction of data, distributed denial
of service attacks, online child pornography, online fraud and scams, ‘trolling’,
and image-based abuse.
The Commonwealth first enacted specific computer-related
offences in 1989, after such offences were recommended by the Review
of Commonwealth Criminal Law Committee. The Cybercrime Act 2001
modernised Commonwealth computer offences, inserting Part 10.7 into the Criminal Code Act
1995 (Criminal Code). The key offences cover unauthorised access
to and modification or impairment of data held in a computer or other device,
and unauthorised impairment of electronic communications.
The Cybercrime Act also updated search powers in the Crimes Act 1914
and the Customs
Act 1901 in response to technological developments. These provisions
have been regularly updated to ensure that law enforcement officers have the
powers necessary to search for and obtain electronic evidence. Most recently,
and Other Legislation Amendment Act 2018 (TOLA Act) amended
search powers in the Crimes Act and the Customs Act so that
officers may access data remotely for the duration of a search warrant. The TOLA
Act also introduced several other measures to assist law enforcement
agencies to better deal with challenges posed by the increasing use of encryption,
including an industry assistance regime (Part 15 of the Telecommunications
Act 1997) and new computer access warrants (Division 4 of
Part 2 of the Surveillance
Devices Act 2004).
acceded to the Council of Europe’s Convention on Cybercrime (sometimes
referred to as the Budapest
Convention) in 2012. The Convention is the first
international treaty on crimes committed against or using computer networks,
and requires parties to criminalise relevant conduct, have certain
investigative powers in place, and to cooperate with each other to the widest
extent possible on cybercrime investigations.
The Australian Government and state and territory governments
agreed to the first
National Plan to Combat Cybercrime in 2013. The plan committed governments
to actions against six key priorities: community education; partnering with
industry; fostering an intelligence-led approach and sharing information;
improving law enforcement capacity and capability; improving international
cooperation; and ensuring the criminal justice framework is effective. In
May 2017 relevant federal, state and territory ministers
agreed to develop an updated national plan, but as at the date of
publication of this Quick Guide, a revised plan had not been released.
International Cyber Engagement Strategy, released in 2017, included
commitments aimed at raising cybercrime awareness in the Indo-Pacific region;
assisting countries in the region to strengthen their cybercrime legislation;
building cybercrime investigation and prosecutorial capacity in the region; and
enhancing diplomatic dialogue and international information sharing on
Two parliamentary committee inquiries have focused
specifically on cybercrime. The then Parliamentary Joint Committee on the
Australian Crime Commission reported
on its inquiry in March 2004, and the House of Representatives Standing
Committee on Communications reported
on its inquiry in June 2010.
Key internet links
Many of the resources listed above under ‘Cybersecurity’ are
also relevant to cybercrime. In that context, it is worth noting that:
Cybersafety is the term used to describe initiatives and
resources to help an individual manage their online behaviour and information.
A number of Commonwealth offences to punish and deter offensive online
behaviour exist, and there are offences at the state level that address cyber
harassment, cyberstalking and cyberbullying, which carry prison sentences.
However, the focus of cybersafety is on education and an individual’s capacity
to monitor their online presence and online risks, including cyberbullying and
Discussion in parliament about online safety for children
can be traced back to at least 2010 with the creation of the Joint
Select Committee on Cyber-Safety by the then Labor Government, which
released the reports High
Wire Act: Cybersafety and the Young in June 2011 and Issues
Surrounding Cyber-Safety for Indigenous Australians in June 2013. This
latter report focuses on young Indigenous people in remote and rural
In January 2014 the Department of Communications and the Arts
a discussion paper seeking views about a range of policy proposals by the
Abbott Government, including the establishment of a Children’s e-Safety
Commissioner and possible legislative changes to create a new, simplified
cyberbullying offence. In December 2014 the Enhancing Online Safety for
Children Bill 2014 was introduced to establish the Children’s
e-Safety Commissioner, within the Australian
Communications and Media Authority (ACMA). The Enhancing Online Safety for
Children Bill provided for a complaints system for cyberbullying material aimed
at Australian children and a two-tiered scheme for rapid removal of that
material from large social media services. It also set out the functions of the
Children’s e-Safety Commissioner to include promoting and supporting online
safety for children. Both Bills were referred to the Environment
and Communications Legislation Committee in December 2014 and a report was published
in March 2015. The Act came into force that same month.
Since 2015 additional amendments have been introduced to the
Safety for Children Act 2015. This includes the Enhancing Online
Safety for Children Amendment Act 2017, which changed the title of the
Act to the Enhancing
Online Safety Act and the Children’s e-Safety Commissioner to the
Office of the eSafety Commissioner (eSafety Commissioner). It also expanded the
functions of the eSafety Commissioner to include promoting online safety for
The Enhancing Online
Safety (Non-consensual Sharing of Intimate Images) Act 2018 amended the
Enhancing Online Safety Act, the Broadcasting Services
Act 1992 and the Criminal Code
to establish a complaints and objections system for the sharing of intimate
images without the consent of the person depicted in those images—what is
commonly referred to as ‘revenge porn’. This legislation also made it illegal
to share an intimate image of another person on social media, the Internet or
other electronic service.
In 2017 the Senate
Legal and Constitutional Affairs Committee inquired into the adequacy of
existing offences in the Criminal Code and of state and territory
criminal laws to capture cyberbullying. This included consideration of the
adequacy of the policies, procedures and practices of social media platforms in
preventing and addressing cyberbullying. In 2018 the Committee
made recommendations that included increasing the maximum penalty for the
current Commonwealth cyberbullying offence from three years to five years
imprisonment. The Government had not responded to the Committee’s recommendations
as at the date of publication of this Quick Guide.
The eSafety Commissioner also administers the Online Content
Scheme (Schedules 5 and 7 of the Broadcasting
Services Act 1992). The Online
Content Scheme regulates the internet industry and the content services
industry through Codes of Practice and a complaints mechanism, which aims to
protect the public from ‘prohibited and potentially prohibited content’. The
National Classification Code sets out the principles under which classification
decisions are made. There are also guidelines for the classification of films,
computer games and publications. In June 2018 the Government commenced
a review into the Enhancing Online Safety Act and the Online Content
Scheme. The report of that review was published
on 15 February 2019 and made five recommendations, including that the
Government introduce ‘significant and wide ranging changes to the online safety
system’, which will ‘set out the new norms and standards for the online world,
and establish new regulatory arrangements to put them into practice’.
Cybersafety can also be seen as something for groups and
organisations to consider in their day-to-day practices as well as in their
broader planning. Increasingly, organisations are forced to consider
cybersafety in their values, risk assessments, capacity and their everyday
communications and transactions. Australia has focused on the cybersafety of the
individual (or groups of individuals such as children and the elderly) and
emphasised the importance of managing one’s online behaviour. However, there is
an increasing awareness of the need to assist small and medium enterprises to
protect themselves from malicious online activity that can affect their
reputation or financial security.
information and ideas for students, parents and teachers. Bullying. No Way! and
the National Day of Action
against Bullying and Violence are managed by the Safe and Supportive School
Communities (SSSC) Working Group. The SSSC includes representatives from the
Commonwealth and all states and territories, as well as the national Catholic
and independent schools sector.
education and resources for people to actively prevent child abuse and
exploitation, including online exploitation.
Office of the eSafety Commissioner’s website provides a reporting portal for
cyberbullying, illegal content and image-based abuse, as well as resources for
schools, parents and children.
partnership between the Australian Federal Police, Commonwealth Bank, Microsoft
and Datacom, and delivered in partnership with all state and territory police
and Neighbourhood Watch Australasia. ThinkUKnow presents to schools and parents
about what young people see, say and do online, and the risks of online
not-for-profit initiative, serving Australian and New Zealand communities, which
provides specialist counselling and information resources to support victims of
cybercrime and members of the public with cybersecurity concerns. It also
offers subscription services for private and public sector organisations to
promote cyber resilience and awareness.
For copyright reasons some linked items are only available to members of Parliament.
© Commonwealth of Australia
With the exception of the Commonwealth Coat of Arms, and to the extent that copyright subsists in a third party, this publication, its logo and front page design are licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Australia licence.
In essence, you are free to copy and communicate this work in its current form for all non-commercial purposes, as long as you attribute the work to the author and abide by the other licence terms. The work cannot be adapted or modified in any way. Content from this publication should be attributed in the following way: Author(s), Title of publication, Series Name and No, Publisher, Date.
To the extent that copyright subsists in third party quotes it remains with the original owner and permission may be required to reuse the material.
Inquiries regarding the licence and any use of the publication are welcome to email@example.com.
This work has been prepared to support the work of the Australian Parliament using information available at the time of production. The views expressed do not reflect an official position of the Parliamentary Library, nor do they constitute professional legal opinion.
Any concerns or complaints should be directed to the Parliamentary Librarian. Parliamentary Library staff are available to discuss the contents of publications with Senators and Members and their staff. To access this service, clients may contact the author or the Library‘s Central Enquiry Point for referral.