{"id":76873,"date":"2022-12-01T14:30:52","date_gmt":"2022-12-01T03:30:52","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=76873"},"modified":"2022-12-01T13:49:33","modified_gmt":"2022-12-01T02:49:33","slug":"ausmin-2022-cyber-enabled-foreign-interference","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/","title":{"rendered":"AUSMIN 2022: cyber-enabled foreign interference"},"content":{"rendered":"
<\/figure>\n

As Australia\u2019s foreign and defence ministers and the US secretaries of state and defence prepare to meet for the annual AUSMIN consultations, ASPI has released a collection of essays exploring the policy context and recommending Australian priorities for the talks. This is an abridged version of a chapter from the collection; readers who are interested in learning more about this topic are encouraged to access the <\/em>full text on the ASPI website<\/em><\/a>.<\/em><\/p>\n

When AUSMIN began in 1985, the internet was still under development. Even as cyberspace started going global in the late 1990s, it would be another two decades before most governments turned their attention to complex challenges resulting from the ambition to maintain a free, open and secure internet run almost entirely by the private sector.<\/p>\n

The economic liberalism that encouraged globalisation is now confronting the weaponisation of that interconnectivity. Authoritarian states firewall their domestic cyberspace environments to maintain social control. Those states, and malign non-state actors, exploit globally connected networks as vectors for cyberattacks, data theft and information operations. Of those emerging security challenges, the ways in which an increasingly wide range of state and non-state actors manipulate the open information environments of democratic countries has historically received the least attention from policymakers and regulators.<\/p>\n

Elon Musk\u2019s takeover of Twitter in October, and the dismantling of the human rights team, alongside resignations from the senior leads focusing on misinformation, trust and safety, online harms, information operations and harassment, should sound an alarm for policymakers and regulators, including those attending next week\u2019s AUSMIN. Media reporting claimed<\/a> that, by mid-November, only four US-based employees were left at Twitter working to stop foreign disinformation campaigns, and no content moderation staff focused on the Asia\u2013Pacific (except for one contractor helping with spam in the Korean market).<\/p>\n

Adversaries and malign actors work at fissures in the openness of multicultural, democratic societies to interfere in and destabilise those societies. The actors behind these operations\u2014whether state or non-state, and whether politically, financially or geostrategically motivated\u2014push extremist narratives, conspiracy theories and disinformation across online channels. The targets are domestic and global debates, the public, elections, governments, multilateral organisations, businesses, individuals and key decision points (for example, governments meeting to vote at the UN).<\/p>\n

Information manipulation and cyber-enabled foreign interference are now occurring in many ways, \u00a0overt and covert. For years, ASPI has conducted research into the tactics and strategies<\/a> used by state and non-state actors in areas such as economic security<\/a>, foreign policy and defence<\/a>, and politics<\/a> and society<\/a>.<\/p>\n

The concern these issues are causing has become evident in AUSMIN communiqu\u00e9s as emerging and cyber-enabled security challenges gain prominence with US and Australian policymakers. \u2018Countering disinformation\u2019, for example, went from two mentions in 2020 to five in 2021. Both governments have ground to make up.<\/p>\n

Australia has suffered from a lack of clarity on which parts of government should protect which parts of the information environment\u2014the public sector, the private sector and individual citizens\u2014from interference by foreign actors with malicious intent. There\u2019s clarity on the protection of government data, but the protection of industry and citizens\u2019 data and personal safety has seemingly slipped through the cracks between policy and intelligence agencies. No one agency or authority seems to have been given responsibility for countering cyber-enabled foreign interference with Australian citizens.<\/p>\n

It\u2019s time for Canberra to devote serious resources to this challenge. The upcoming cyber strategy\u2014which can reallocate priorities and funding\u2014provides parliament, and especially Home Affairs and Cyber Minister Clare O\u2019Neil, with a neat mechanism to get its ducks in a row in 2023.<\/p>\n

The US has historically been more attuned to and focused on this policy space but, like most open societies, sat idle while hoping that the freedom of cyberspace would liberalise the globe, while the authoritarian regimes in Moscow and Beijing took control of the internet at home and used its openness to engage in interference abroad. The US, still dealing with the aftermath of Russia\u2019s use of cyber to disrupt the 2016 election, also lost some credibility after Facebook and Twitter disrupted a network of pro-US government accounts in 2022 (reportedly linked to the US military) that were covertly seeking to influence users in the Middle East and Asia with pro-Western perspectives about international politics, including Russia\u2019s invasion of Ukraine.<\/p>\n

The US government will face challenges in credibly talking to allies and partners about countering disinformation and foreign interference if it doesn\u2019t articulate a distinction between its own environment-shaping activities and the at-scale propaganda and information campaigns run by Russia, Iran and China. As one US diplomat put it<\/a> to the Washington Post<\/em>:<\/p>\n

Generally speaking, we shouldn\u2019t be employing the same kind of tactics that our adversaries are using because the bottom line is we have the moral high ground. We are a society that is built on a certain set of values. We promote those values around the world and when we use tactics like those, it just undermines our argument about who we are.<\/p><\/blockquote>\n

Cyber-enabled foreign interference is now a growth industry that\u2019s eroding the quality of the information environment. While ongoing developments with Twitter are highly worrying, they also provide an opportunity, for democracies in particular, to focus minds and resources. The time is ripe for the Australian and US governments to take a leadership position on this issue and coordinate other democracies to build a more global and impactful response to this threat.<\/p>\n

Smart forms of government involvement in fostering democratic resilience to cyber-enabled foreign interference will involve working collaboratively with industry; for example, in protecting the digital public sphere that enables political participation, and ultimately the popular legitimacy of the institutions of government. One element of this strategy will be to apply the same country-agnostic standards of accountability to all technology and internet platforms and companies, whether that technology emerges from states that are open and democratic or closed and authoritarian.<\/p>\n

The US and Australia must prioritise this growing challenge and sync up more on strategies, resourcing and policy.<\/p>\n

Recommendation 1: <\/em>The Australian and US governments should work together to build a framework to tackle and deter malicious actors engaging in cyber-enabled foreign interference. The framework could serve as a blueprint for other partners and allies struggling with this complex policy challenge. This should include more and closer coordination on some new and ongoing deterrence measures (including the imposition of costs).<\/p>\n

Recommendation 2: <\/em>The US and Australian governments need to build specific capabilities, knowledge and policy responses to deter and respond to the key actor in the Indo-Pacific engaging in the widespread promotion of disinformation and cyber-enabled foreign interference\u2014the Chinese party-state. Congressional and parliamentary bodies should commission dedicated inquiries into Chinese cyber-enabled foreign interference, and the findings should be factored into policy responses. The reports by the US Senate Select Committee on Intelligence on Russia\u2019s Internet Research Agency<\/a> and by the Stanford Internet Observatory on the GRU<\/a>, Russia\u2019s military intelligence agency, could act as models.<\/p>\n

Recommendation 3: <\/em>The US and Australia should throw their weight behind the creation of an Indo-Pacific hybrid threats centre<\/a>. They could use both the 2022 and 2023 AUSMIN discussions to plan out their engagement with, and support of, such a centre. The centre would have a deterrent effect, creating transparency and offering a spectrum of attribution when governments in the region may be unwilling to do so. It could be a vehicle for reporting and analysis and regional capacity building, with a focus of democratic resilience to foreign interference, disinformation and subversion.<\/p>\n

With cyber at the forefront of malicious activity by China, Russia, Iran and North Korea, and non-state criminal behaviour, leaders need to make 2023 the year they take cyberspace and cybersecurity back from those doing us harm.<\/p>\n","protected":false},"excerpt":{"rendered":"

As Australia\u2019s foreign and defence ministers and the US secretaries of state and defence prepare to meet for the annual AUSMIN consultations, ASPI has released a collection of essays exploring the policy context and recommending …<\/p>\n","protected":false},"author":691,"featured_media":57744,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[210,416,1263,106,2595,3183],"acf":[],"yoast_head":"\nAUSMIN 2022: cyber-enabled foreign interference | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AUSMIN 2022: cyber-enabled foreign interference | The Strategist\" \/>\n<meta property=\"og:description\" content=\"As Australia\u2019s foreign and defence ministers and the US secretaries of state and defence prepare to meet for the annual AUSMIN consultations, ASPI has released a collection of essays exploring the policy context and recommending ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-01T03:30:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-01T02:49:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-846822020.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Danielle Cave\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Danielle Cave\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-846822020.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-846822020.jpg\",\"width\":1024,\"height\":683,\"caption\":\"(FILES) A picture taken on October 17, 2016 shows an employee walking behind a glass wall with machine coding symbols at the headquarters of Internet security giant Kaspersky in Moscow. The US government banned the use of Kaspersky security software in federal offices on September 13, 2017, saying the Russian company has risky ties to Russian intelligence that threaten US national security. \/ AFP PHOTO \/ KIRILL KUDRYAVTSEV (Photo credit should read KIRILL KUDRYAVTSEV\/AFP via Getty Images)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/\",\"name\":\"AUSMIN 2022: cyber-enabled foreign interference | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/#primaryimage\"},\"datePublished\":\"2022-12-01T03:30:52+00:00\",\"dateModified\":\"2022-12-01T02:49:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/1730ec525f034baa16dd911fea57775f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AUSMIN 2022: cyber-enabled foreign interference\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/1730ec525f034baa16dd911fea57775f\",\"name\":\"Danielle Cave\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0eb0eb0ac065aaf45b63a5b7a87b53d7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0eb0eb0ac065aaf45b63a5b7a87b53d7?s=96&d=mm&r=g\",\"caption\":\"Danielle Cave\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/danielle-cave\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AUSMIN 2022: cyber-enabled foreign interference | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/","og_locale":"en_US","og_type":"article","og_title":"AUSMIN 2022: cyber-enabled foreign interference | The Strategist","og_description":"As Australia\u2019s foreign and defence ministers and the US secretaries of state and defence prepare to meet for the annual AUSMIN consultations, ASPI has released a collection of essays exploring the policy context and recommending ...","og_url":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2022-12-01T03:30:52+00:00","article_modified_time":"2022-12-01T02:49:33+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-846822020.jpg","type":"image\/jpeg"}],"author":"Danielle Cave","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Danielle Cave","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-846822020.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/07\/GettyImages-846822020.jpg","width":1024,"height":683,"caption":"(FILES) A picture taken on October 17, 2016 shows an employee walking behind a glass wall with machine coding symbols at the headquarters of Internet security giant Kaspersky in Moscow. The US government banned the use of Kaspersky security software in federal offices on September 13, 2017, saying the Russian company has risky ties to Russian intelligence that threaten US national security. \/ AFP PHOTO \/ KIRILL KUDRYAVTSEV (Photo credit should read KIRILL KUDRYAVTSEV\/AFP via Getty Images)"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/","url":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/","name":"AUSMIN 2022: cyber-enabled foreign interference | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/#primaryimage"},"datePublished":"2022-12-01T03:30:52+00:00","dateModified":"2022-12-01T02:49:33+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/1730ec525f034baa16dd911fea57775f"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/ausmin-2022-cyber-enabled-foreign-interference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"AUSMIN 2022: cyber-enabled foreign interference"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/1730ec525f034baa16dd911fea57775f","name":"Danielle Cave","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0eb0eb0ac065aaf45b63a5b7a87b53d7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0eb0eb0ac065aaf45b63a5b7a87b53d7?s=96&d=mm&r=g","caption":"Danielle Cave"},"url":"https:\/\/www.aspistrategist.ru\/author\/danielle-cave\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/76873"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/691"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=76873"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/76873\/revisions"}],"predecessor-version":[{"id":76876,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/76873\/revisions\/76876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/57744"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=76873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=76873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=76873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}