logo

Espionage and Intelligence & Cyber Attacks

   

Added on  2020-06-05

12 Pages3427 Words68 Views
CYBERATTACKSPOLICY BRIEF
Espionage and Intelligence & Cyber Attacks_1
Table of ContentsINTRODUCTION...........................................................................................................................1BACKGROUND ............................................................................................................................1ISSUES............................................................................................................................................1RECOMMENDATIONS.................................................................................................................5CONCLUSION................................................................................................................................7REFERENCES................................................................................................................................9
Espionage and Intelligence & Cyber Attacks_2
INTRODUCTIONGetting secret or the confidential information without the permission of the holder towhich the information actually belong to is known as Espionage (Taylor and et.al., 2014). Thisprocess is generally used by the government to uncover or obtain the secret information from thedoubtful persons. The gathering of illegal information or espionage from public sources throughintelligence. Here the topic taken is ' Espionage and intelligence & cyber attacks, its issues,purpose and uses will be discussed. BACKGROUND The Australian security intelligence organisation is the domestic spy agency of thecountry. It plays an important role to collect the information related to the security or the factorsthat can cause threat to the country. These spies helps to fight or make the strategies to avoid theharmful planning of the other countries. Only the intelligence organisation has the right to bothanalyse and gather the information. The Espionage is crime in Australia and the person who doesthis is punishable by the government for 25 years imprisonment. The Australian secret services isthe spy that looks after the overseas (Bodenheimer and et.al., 2014). Espionage and intelligencehelps to provide wealth of information and documentation on the aspects of the intelligenceorganisation and the operations during and after the cold war. The present unique look into theinternal workings of the Australian intelligence community helps to gather the documents or theinformation for the future planning of the nation during the cold war. It helped to consolidate andre-evaluate the intelligences and espionage before the war era. The Espionage and intelligenceagency helps to fight the terrorism in the countries by making the strong decisions and thestrategic planning against it as well as other countries. ISSUESThe theft of Australian information or data by someone either acting on behalf of aforeign power providing the information to another country to seek the personal data and to gainthe advantages from that for the development or to lessen the power of the country whom thedata is been taken. Espionage and intelligence can target the defence, political, industrial or anyother background (Banks, W.C., 2016). For example : the relationship between the countriessuch as Indonesia and Australia are at their lowest point, after Australia emerged its spy agenciestapped the mobile phone of the president Bambang Susilo Yudhoyono of Indonesia in 2009 the1
Espionage and Intelligence & Cyber Attacks_3
relation between the countries are unhealthy. Indonesia is demanding for the apology which theprime minister of Australia ' Tony Abbott has refused. Its helps to protect the country from terrorism by making the different strategies andplanning Australia has the main issue of the terrorist attack and Espionage and intelligence, towork on this the agency is working on the information collected by the spies (Rid and Buchanan,2015). The produced intelligence that will enable to warn the government about the criminal,illegal and terrorism activities and the situations which might endanger the Australian security orit interests abroad. The spy helps to collect the information about the important issues to beworked upon. Espionage and intelligence plays an important role in the protection of the country.The international environment which is one of the most powerful forces to change the re shapingconcept of the security, recalibrating the interactions between the state and people and betweenthe individual. The enhancement in the citizenship and the capabilities of the non state actors forces theinternational change to frame the foreign policies and the national security interests. Creating thenew challenges for the Australian spies to enhance their planning strategies for the oversea aswell as for the terrorism activities (Banks, W., 2014). Australia has pursuit the global andregional interests which is influencing the perception of the individual to accept the role of theintelligence agencies and to create new requirements for more effective and efficient working ofthe cooperation between the Australian public and private sectors or the national security issues.Australia is a target of hostile foreign intelligence services as a result of :Strategic alliances and the defence relationship we share with other countries.A desire to gain privileged insights into our strategic interests and positions oninternational diplomatic, economic and military issues.A desire to gain commercial advantage over Australia, on matters including our energyand mineral resource.A desire to gain access to our innovations in science and technology.A desire to shape the actions of Australian decision-makers and public opinion in favourof the adversary. The reach of online technologies enabling hostile cyber activities.The attacks that locks the computer and holds the users files for ransom is known as thecyber attack. On of the Australian companies have faced this dangerous issue and have been2
Espionage and Intelligence & Cyber Attacks_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Role of U.S Agencies in Counterterrorism
|8
|1711
|420

Effect of Cyber Warfare on the US
|6
|1415
|478

Homeland Security Assignment Task
|15
|4480
|14

MKT 305 Consumer Behavior Assignment - Desklib
|12
|3713
|87

Intelligence Failure Problems in Data Analysis
|23
|6659
|12

Report on Information v\s Intelligence
|8
|1980
|261