Tag Archive for: Five Eyes

Trump’s upending of US intelligence: implications for Australia

Australia has no room for complacency as it watches the second Trump Administration upend the US Intelligence Community (USIC). The evident mutual advantages of the US-Australian intelligence partnership and of the Five Eyes alliance more generally are not enough to guarantee preservation of benefits. In addition, Australia’s National Intelligence Community (NIC) will need to adopt a more deliberate and coordinated approach to its relationship with the USIC, centred around agreed national objectives.

Amid the turmoil being experienced in the USIC, and the longer-term challenges for American partner agencies themselves, especially as a result of likely disruption to fragile workforce development pipelines, there will be opportunities for the NIC. As happened after US intelligence reforms in 2004, Australia can learn what works, what doesn’t—and what can be adopted by the NIC, particularly in relation to the utility of the ‘China challenge’ as a potential organising principle. Already, the NIC can note the vital need for intelligence organisations in democratic societies to not just protect reputations for bipartisanship but to keep the trust and confidence of the broader public.

Trump and his spies, the second time around

Donald Trump’s first presidential term was characterised by conflict and tensions between him as a neophyte politician and the USIC. This was exemplified by Trump’s remarks at a 2018 summit in Helsinki, where he appeared to side with President Vladimir Putin over the FBI’s assessment that Moscow had tried to interfere in the 2016 US election. In one regard this estrangement between Trump and the USIC seemed incongruous. A president otherwise so keen to advance US interests through the forceful exercise of American power did not make best use of a policy instrument designed to do just that, the USIC.

The re-elected and emboldened Trump need not make the same mistake (although he might still).

Looking beyond current political debates surrounding his cabinet picks and the handling of broader US government reforms, what will the intelligence community look like in the next four years, and what are the implications for close intelligence allies like Australia?

By the end of Trump’s first term his estrangement from the USIC was confirmed, and it was accentuated by his four years out of office, his legal troubles, which included charges (now discontinued) for mishandling classified material, and an electoral campaign in which he cast intelligence agencies as an inveterate deep state.

More recently, attention has focused on the president’s unorthodox choices for some leadership positions, notably Tulsi Gabbard as director of national intelligence (DNI) and Kash Patel as director of the Federal Bureau of Investigation. These choices shouldn’t be dismissed lightly. After all, the old axiom holds that personnel is policy, and this is amplified by Trump’s personal loyalty-driven approach to governing. In addition, Trump has come to office the second time around considerably better prepared to staff a new administration than in 2016—and these picks are his, not those of advisers. But in trying to understand what this might mean we should seek further contextualization, especially on where the USIC might be steered by its new captains.

Project 2025, new (and old) faces and implications for US Intelligence

Alongside public statements by the Trump administration and its appointees, another potential source for such context is Mandate for Leadership: The Conservative Promise, published in 2023 by the Heritage Foundation’s Project 2025. It should be noted that during the election campaign Trump disavowed knowledge of this conservative think-tank project but he has since re-embraced the manifesto’s authors and recommendations. And Mandate for Leadership’s chapter on intelligence reform offers detail absent from the 2024 Republican Party Platform.

More particularly, that chapter draws heavily on the views of John Ratcliffe, Trump’s former DNI, now director of the Central Intelligence Agency. Ratcliffe’s leadership of the CIA now heightens the significance of his expressed views, suggesting that the manifesto’s policy priorities and prescriptions for CIA (and the USIC generally) will influence the administration’s own.

The chapter is not without its idiosyncrasies and errors. Nonetheless, a close reading of Project 2025 gives insights into the USIC for the next four years, especially through its five consistent themes: politicisation, China, the CIA’s future, technology and centralisation through the Office of the DNI (ODNI).

Politicisation is an unavoidable topic, the bitter fruit of the estrangement in Trump’s first term. Mandate for Leadership makes the case for a return to a politically neutral USIC, but that itself seems challenging in the current environment in which so much is tarred as politicised. The future of the enabling Foreign Intelligence Surveillance Act (FISA) is bound up in relitigating past cases that affected individuals in Trump’s orbit. Integrity in analysis is framed by continuing debate over the appropriate emphasis on electoral interference threats from China instead of Russia. One resulting measure recommended in the manifesto is USIC leaders and their agencies withdrawing from the public square. It will be interesting to see whether this recommendation carries through to the new USIC leadership, given the existing public (and very political) profiles of Gabbard and Patel.

The positive mirror image of ‘politicisation’ is responsiveness, and this is borne out in Mandate for Leadership’s case for a more empowered DNI, one who is more directive over the rest of the USIC and responsive to the president. This change would be accompanied by down-sizing and shedding some of the responsibilities ODNI has accumulated since 2004—unsurprisingly, since bloat has been a criticism of ODNI since its establishment. It’s telling that the handful of Republican senators who were initially sceptical about Gabbard’s nomination as DNI were apparently won over by her commitment to just such downsizing.

It’s also worth noting that an invocation to laser focus on the president’s defined needs risks undermining an intelligence community’s important role in seeing over the horizon to unknown unknowns.

Nonetheless, statutory ambiguities have already weakened the ODNI’s authority over budgets, personnel and operations, leaving it unable to resolve interagency rivalries or streamline intelligence activities. According to the manifesto, these deficiencies, compounded by entrenched inefficiencies, have relegated the ODNI to a bureaucratic bottleneck rather than a strategic leader, raising concerns about its ability to address evolving global threats effectively.

Key manifesto recommendations therefore include granting DNI full authority over budgets and personnel to dismantle institutional silos and reduce redundancies. These structural changes would be accompanied by efforts to address cultural issues such as politicisation and overclassifying the secrecy of information, which are said to hinder operational effectiveness.

Where might that more directive DNI drive the USIC? One answer is a more joined up national intelligence effort that sees the generational threat posed by the Chinese Communist Party as an imperative, if not an organising principle. That would certainly be the choice of Ratcliffe, who boasted to the Senate Select Committee on Intelligence that:

As DNI, I dramatically increased the Intelligence Community’s resources devoted to China. I openly warned the American people that, from my unique vantage point as the official who saw more US intelligence than anyone else, I assessed that China was far and away our top national security threat.

Ratcliffe’s coda—that ‘President Trump has been an incredible leader on this issue, and it is encouraging that a bipartisan consensus has emerged in recent years’—belies the ambiguity otherwise apparent in the new DNI’s own testimony (which gave little insight into her thoughts on the targets of US intelligence) and by both Gabbard and Ratcliffe’s unwillingness to comment on the messiness of the president’s approach to TikTok’s future.

Presumably USIC focus will follow policy priorities, including on China. We’ve already seen other, alternative priorities aired in public: countering the Mexican cartels, the western hemisphere more broadly, and economic intelligence (the reflex of all new governments everywhere when contemplating what intelligence machinery can do for their policy agenda).

The CIA features as prominently in Mandate for Leadership as the ODNI, unlike the other 16 agencies of the USIC. It’s the CIA that stands accused of managerialism run amok, and for which there are calls for the return of an ‘OSS culture’. (The Office of Strategic Services was the CIA’s World War II antecedent. Presumably Mandate for Leadership is referring to the OSS’s famed can-do pioneering spirit and not to its penetration by the Soviets.) Hence Ratcliffe’s clarion call at his nomination hearing:

To the brave CIA officers listening around the world, if all of this sounds like what you signed up for, then buckle up and get ready to make a difference. If it doesn’t, then it’s time to find a new line of work.

Manifestations of this desire for a cultural shift within CIA are found in the manifesto’s argument for greater external and lateral recruitment into the agency, a more ruthless up-or-out approach to promotion, and transfer of various CIA elements and facilities away from Washington DC and northern Virginia.

Perhaps more consequentially, the manifesto makes the case for recalibrating covert action responsibilities away from CIA and towards the Department of Defense (and its ‘certain clandestine capabilities […] that may resemble but far exceed in scale similar capabilities outside of DOD’). Covert action is described as activities ‘to influence political, economic or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly’. This aligns with a broader shift in confidence towards the military intelligence agencies, which are seen (fairly or not) as more reliable and responsive than the CIA. This shift has been highlighted in conversations with Republican-aligned national security figures over the past year.

Finally, the newfound alignment between conservative US politics and the US technology sector finds expression in the manifesto’s pushback against the European Union’s data privacy regulations and a warning to the USIC to avoid duplicating technology development by the private sector. Mandate for Leadership also takes to task the current USIC for not adhering to an ‘obligation to share’ relevant intelligence, especially on cyber threats to industry. It similarly echoes the president’s criticisms of over-classification (which, it must be fair, have been bipartisan and broad-ranging for many years). Thus, according to the manifesto, ‘an ODNI-run declassification process that is faster, nimbler, default-to-automated, and larger-scale should be a priority.’

Insights for Washington’s intelligence partners

The above is necessarily a partial view of what will be the next four years for the USIC. Just as a decades-long prioritisation of global counter-terrorism was not on the cards when George W Bush took office in 2001, so events will play their own part in deciding what happens next. But there is a useful foundation from which close intelligence allies like Australia can take some cues.

The USIC will be distracted and inwardly focused, partly because it will be working through contradictory impulses and directives early in this administration. This is where the question of personnel is particularly important. The apparent effort to denude the FBI of its existing leadership and structure, particularly moves to downsize the bureau’s National Security Division (including disbandment of counter-foreign interference efforts, victims of the bad political blood of the past decade), bodes poorly for US counter-intelligence. So too does the call for the FBI to return to crime fighting. Yet these circumstances (and the partisan political climate) don’t suggest that an idea advanced in the past by conservative critics of the FBI, creation of a separate non-law-enforcement security intelligence agency comparable to ASIO or MI5, is likely to come to pass anytime soon.

As for the remainder of the USIC, their workforces are being buffeted by the same forces affecting the wider US civil service. Of particular concern are moves to pause entry-level recruitment processes or even to dismiss probationary staff. These kinds of disruption have historically (in the US but also elsewhere) had cascading effects through intelligence agencies over years, indeed even decades, especially for streams requiring careful selection and considerable training (such as for CIA’s Directorate of Operations).

As radical as aspects of the new administration’s approach might appear, there is also a certain (and not always unwelcome) conservatism. For example, Mandate for Leadership rejects expansion of the Five Eyes alliance, a perennial subject of think pieces, favouring instead ‘ad hoc or quasi-formal intelligence expansion […] amongst nations trying to counter the threat from China’. This underplays the long-term efforts typically required in building effective liaison relationships. But even ad hoc relations might not remain viable. For example, Gabbard has been notably hostile in her past public commentary about Japan’s defence build-up and desire for a closer security relationship with the US. She was given the opportunity to moderate those comments during questioning before the Senate intelligence committee but declined to do so. And we’ve also seen remarks, now walked back, by a separate member of the administration (albeit one from outside of national security policy) about excluding Canada from the Five Eyes.

Gabbard also declined senators’ myriad (almost pleading) opportunities to dissociate herself from her past support for Edward Snowden. That she did not do so only underscored the priority she accords to her interpretation of civil rights, also reflected in her answers to the other matter of importance to those same senators: the continuation of FISA’s section 702. The other priority apparent from the new DNI’s remarks, and from related administration actions, is a more forward leaning approach to declassification and over-classification.

Taken together, these emphases are likely to engender some concerns among close intelligence partners used to sharing sensitive secrets by default. It would be natural in this situation for those partners to take stock of existing relationships with the USIC, especially where, in parallel, there are perhaps new divergences on stated policy objectives.

At the same time, the mutual advantages of the Five Eyes relationship (now almost 80 years old), including in the advancement of US interests, are readily identifiable. But this shouldn’t be a reason for complacency. Such demonstration of obvious advantage may still not be enough to insulate relationships from unwelcome developments. After all, the single best example of the US gaining from an intimate security arrangement with a close partner remains the North American Aerospace Defence Command, a US-Canadian military organisation, better known as NORAD, that stands ready to warn of nuclear attack. Yet such a close relationship has done little to shield Canada from recent actions by the White House.

What will be required is a careful and coordinated approach from the Australian government across all points of the alliance (including intelligence). As always in Canberra, the simplest but also most challenging part of the exercise will be determining and sustaining a clear national (and whole-of-government) objective for that approach to serve.

Recommendations for Australia’s National Intelligence Community

Amidst this turmoil in Washington, there are opportunities for Australia’s NIC also. There will be lessons to be learned from new directions in IC organisation and leadership, just as Australia’s establishment of the Office of National Intelligence was well informed by what went right and wrong in the creation of the US ODNI. This includes the potential value of using China as a central organising principle for an intelligence community that is also required to deal with other persistent, if not as strategic, national security challenges.

There will also be opportunities for cooperation on technology, whether that’s the next frontier of space surveillance (which the manifesto identifies as an opportunity for Five Eyes collaboration) or in addressing the challenge presented to intelligence operations by the burgeoning phenomenon of ubiquitous technical surveillance.

So, the Office of National Intelligence should be thinking about how to engage with a potentially different looking and focussed ODNI. Likewise, Australia’s defence intelligence agencies should be thinking about an even more important engagement role, if there is a swing in confidence and influence within the US system from the civilian to the military.

More broadly, it will be incumbent on Australia’s NIC to closely monitor US policy changes and evaluate their potential effects here. Furthermore, as we adjust to those changes and continue to demonstrate mutual advantage from the intelligence partnership, we need to prioritise investing in truly sovereign intelligence capabilities for Australia—both as a hedge against the unknowable future and as a tangible and valuable contribution to the continuing partnership.

We would also do well to learn from experience in the US and redouble existing commitments to a NIC that enjoys not only bipartisan support but also the trust and confidence of the Australian public beyond Canberra. This includes when negotiating the complex national security (and unavoidably political) challenges presented by foreign interference and disinformation.

No, Japan is not ready for AUKUS

On 14 November, Aso Taro, the vice president of Japan’s ruling Liberal Democratic Party, called for Japan to be included in the AUKUS trilateral security partnership with Australia, the United Kingdom and the United States. This ‘JAUKUS’ proposal is nothing new. Since the inception of AUKUS in September 2021, Japan has been viewed as the leading candidate for additional membership due to its solid alliance with the US and membership of other security partnerships, including the Quad. In August, the UK House of Commons Foreign Affairs Committee recommended the inclusion of Japan and South Korea into Pillar 2 of the agreement.

While it’s a natural strategic choice for Japan to join in advanced military technology cooperation under AUKUS Pillar 2, a fundamental stumbling block is Japan’s lack of effective counter-espionage laws.

Japan currently has some laws dedicated to preventing espionage. One is the Unfair Competition Prevention Act (UCPA) which sets the maximum criminal punishment as imprisonment for not more than 10 years or a fine of not more than 20 million yen for the illicit transfer or disclosure of trade  secrets. The Act on the Protection of Specially Designated Secrets (PSDS) that was passed by the Abe administration in 2014 allows the government to designate certain information related to national security and diplomacy as special secrets and sets the maximum punishment at imprisonment for not more than 10 years or a fine of not more than 10 million yen for leaking such secrets.

There are three deficiencies there. One is Japan’s weak punishment for espionage compared to other AUKUS members. The US has the Espionage Act 1917 with the maximum punishment of death or imprisonment for any number of years. With the National Security Legislation Amendment Bill 2018, Australia punishes espionage, defined as ‘dealing with security classified or national security information to be communicated to a foreign principal’ with at least 10 years imprisonment, up to imprisonment for life. Its 27 newly introduced offences cover a preparatory offence punished by imprisonment for 15 years and interference, as separated from espionage, for up to 20 years. Despite significant domestic opposition since 2015, the UK parliament finally updated its counter-espionage law in July 2023, following Australia’s path.

The second problem is the limited coverage of espionage. The UPCA only criminalises actions for ‘the purpose of obtaining an unjust profit or causing damage to the secret holder’ (Article 21). There is no articulation of foreign principals or foreign states. Article 24 of the PSDS criminalises obtaining, or attempting to obtain, secrets for foreign states (it says ‘gaikoku’ without definition). The PSDS criminalises disclosure of secrets, obtaining such secrets and conspiring, abetting, or inciting others to commit such acts. Other forms of espionage, such as possession and concealment, making a record or copy, or communicating and publishing secrets are out of its purview.

Finally, Japan needs to set up broader rules and regulations to protect its business and education sectors from espionage. Australia’s Foreign Relations Act 2020 created a framework for the Commonwealth to review and cancel arrangements between state and territory entities and foreign governments. The Foreign Influence Transparency Scheme Act 2018 requires registration and disclosure of activities undertaken on behalf of foreign principals. The University Foreign Interference Task Force established in 2019 guides Australian universities in providing training courses on foreign interference. As the largest academic funding body, the Australian Research Council articulates its policy and acknowledgement of the risks associated with foreign interference.

Japan lacks such measures. It has promoted economic security measures, including protection of critical infrastructure, resilient supply chains and development of advanced technology, culminating in the Economic Security Promotion Act in May 2022. But measures to expand the coverage of espionage and foreign interference and protecting its research organisations and universities are limited. Japanese universities reluctantly commit to voluntary scrutiny of foreign researchers as they have no internal intelligence capabilities. The Science Council of Japan strongly opposes its own government’s intervention while it has not adopted any official position on foreign interventions.

Overall, despite huge security legislation reforms under the Abe administration, Japan still lives in either pre-war trauma or the post-war euphonism. Domestic backlash against the SDS in 2014 often raised ‘remember the Security Maintenance Law 1925’, which the then government used to arbitrarily arrest and even torture anti-government protesters and communists.

Upon its defeat in 1945, the Japanese government deleted Article 85 of the criminal law which said ‘a person who engages in espionage for the enemy or aids and abets the espionage of the enemy shall be sentenced to death or to imprisonment for life, or to imprisonment for not less than five years. The same shall apply to those who leak military secrets to the enemy’. This was deleted because the concept of ‘enemy’ no longer existed in the Japanese constitution. Article 9 of Japan’s Constitution renounces war as a sovereign right of the nation.

If Japan wants to join a JAUKUS or a ‘Six Eyes’, it has to share not only strategic interests or values, but rules. However, no one waits for Japan. AUKUS members see AUKUS as a critical opportunity to create ‘a seamless defence industrial base across the three countries’. This will lead them to remove almost all barriers among themselves but setting up high fences against others. Australia is taking further actions to amend its defence control legislation to smoothen its AUKUS partnership while the US Congress carefully scrutinises the possibility of sophisticated submarine technologies leaking from Australia to others. Embodying Abe’s political credo of graduating from the post-war regime is essential element to the realisation of JAUKUS.

 

What can Australia do to stem the rise of industrialised intellectual property theft?

The Five Eyes intelligence-sharing alliance—comprising the United States, Canada, New Zealand, the United Kingdom and Australia—has traditionally cooperated behind the scenes. But a recent public meeting of the group’s intelligence chiefs in Silicon Valley was marked by their public announcement of China as the most sophisticated and sustained thief of intellectual property in the world. True to form, Chinese media responded by dubbing the statement a ‘smear’ and accusing the Five Eyes of ‘demonising China’s development in cutting-edge technology’.

But we shouldn’t really be surprised by this announcement.

China has a lengthy history of (successfully) wedding quasi-licit and illicit strategies to its traditional mechanisms for technology acquisition. In 2020, an ASPI study detailed the comprehensive links between the Chinese Communist Party and talent recruitment programs. Then, in 2022, it was revealed that a hacking group associated with the CCP took hundreds of gigabytes of sensitive data from technology and manufacturing companies in North America, Europe and Asia. Chinese courts have also recently increased their use of ‘anti-suit’ injunctions to stop foreign companies from filing intellectual property claims outside China.

Of course, that’s not to say that China is the only one involved in this kind of activity. Reports have emerged that Vietnam tried to plant spyware on the devices of US senators. Countries like India and Egypt—often dismissed as ‘middling powers’—have been ramping up their espionage operations in the West. Russia has apparently set up an entire university dedicated to training the next generation of signals and human intelligence officers. And North Korea isn’t exactly sitting on the sidelines either—hacking group APT43 has allegedly been given a specific remit to steal nuclear secrets from members of the AUKUS alliance.

What does this shifting intelligence environment mean for Australia?

First of all, Australia needs to move the dial on its security culture by a long way, particularly in university and higher education settings. The head of the UK’s MI5, Ken McCallum, warned last week that Australia was under threat because Chinese intelligence agents had placed a high priority on the secrets of nuclear propulsion due to be delivered under AUKUS. Yet observers inside Australia’s Defence Department are already suggesting that we simply don’t have the security culture needed to protect that technology. Given some reports that Australia is the ‘weak link’ in the AUKUS chain, this is a timely reminder that we are about to start swimming in deep waters.

There also needs to be much stronger collaboration between Australia’s intelligence agencies and university research. Even before AUKUS was announced, industry and policy experts were calling for closer collaboration, increased funding and deeper ties between the Five Eyes allies and the university sector. Shortly after the Five Eyes announcement about China, MI5’s McCallum warned that universities are a prime target because they ‘probably don’t think national security is about them’.

And finally, Australia needs to revisit the funding model for higher education research. In 2020, universities self-funded more than 50% of Australia’s $13 billion research budget, with only 15% of that total funding coming from governmental sources. By comparison, in the same year Amazon spent more than $60 billion on research and development. It’s hardly surprising that Australian universities look at China’s nearly half a trillion dollars in R&D investment with such envy.

Australia also can’t ignore its own backyard—China isn’t the only player in the market for questionably gained intellectual property. We need to be developing our security and collaborative relationships with our neighbours, like Indonesia and Singapore, as well as the Pacific islands that have already been targets of Chinese expansionism. In short, we could take the arguments that the Lowy Institute’s Sam Roggeveen sets out in his recent book about an Australian ‘echidna’ defence strategy and apply them to the protection of research that is in our national interests. We certainly can’t afford to be playing catch up with the larger powers, but with the right mix of research funding and appropriate security around our international collaborations, we can discourage the industrialised theft of our innovations.

Better together: Japan and the Five Eyes need to focus on critical minerals

Critical minerals are vital components in today’s rapidly growing clean-energy industry. They’re used in advanced technologies like electric vehicles and batteries, wind turbines, solar panels, fibre-optic cables and semiconductor chips. But the supply chain for critical minerals could now be at risk.

Global supply chains are a complex system of suppliers and customers, and are extremely delicate under pressure. They can be easily disrupted by major events like conflicts, natural disasters and pandemics.

Critical minerals are being consumed in greater volumes than ever before, and the level of demand will only increase over the next 10 to 20 years, and beyond. Critical minerals are in high demand in industries such as the automotive sector that are making modern batteries, by governments searching to secure supplies of rare-earth metals, and by renewable-technology manufacturers searching for necessary inputs, but there is much that needs to happen to build supply chains.

Mineral resource projects are largely at the early stage of commercialisation, and significant investment is needed to strengthen processing and manufacturing capabilities to meet demand.

The governments of Japan and the Five Eyes countries (Australia, Canada, New Zealand, the United Kingdom and the United States) are aware that critical minerals, including rare-earth elements, will be increasingly needed as the world shifts from fossil-fuel systems to renewable energy sources. The partner nations are also clear about the challenges and opportunities, especially given that the supply chains for several critical minerals have only one or few dominant key players.

Australia is fortunate to possess some of the world’s largest recoverable resources of cobalt, lithium, vanadium, manganese and zirconium. Australia and Canada are known for efficient processes and upstream resource extraction and production. Japan has the technology, and the US wants more critical minerals to supply its ever-expanding high-tech industries.

We must now think bigger than unilateral supply chains. The good news is that this model doesn’t require a whole new set of skills or capabilities. In a recent Forbes article, Deloitte Australia discussed the critical steps needed for taking action on opportunities and establishing whole value chains by working more closely together.

The renewable energy supply chain, for example, is at risk because it relies on a small number of countries. The production and use of solar energy are dependent on three primary value chains: collection, conversion and storage—with the latter critically dependent on lithium-ion batteries and subject to a concentrated supply chain.

Currently, 50% of the raw material for lithium-ion battery production comes from Australia. Around 90% of the processing occurs in China, and 53% of the battery assembly is done in Japan. In addition to supplying raw material, however, Australia is capable of processing an estimated 42% of global lithium. South Korea and Japan manufacture around 20% of global lithium-ion related products, and there’s potential for them to use existing infrastructure to expand their production capacity. The US, Japan and South Korea collectively account for 50% of global battery cell production. They are also responsible for nearly 82% of the global battery assembly production, of which 53% is done in Japan.

To capitalise on this immense potential, expand lithium-ion production facilities and reorchestrate the renewable energy supply chain, it’s imperative that Japan and the Five Eyes coordinate and blend their complementary and critical capability together. By shifting from unilateral to multilateral value chains, the partners can reduce risk and collectively help to sustainably meet the growing demand.

An alliance can effectively build a resilient supply chain network at every value-added stage by leveraging the competitive strengths and expertise of each partner and region. That would provide not only benefits from diversification, but also enable shared risk-sensing, multi-tier demand forecasting, and supply planning and optimisation. Additional benefits include shared risk exposure and aligning trading rules among partner nations.

Getting this network up and running will require a thorough assessment of supply networks and value chains; analysis of risks to help define the partners’ requirements; integrated planning and supply assurance among the partners; and development of efficient governance and trade vehicles to make the task of reorchestrating value chains simpler.

If this endeavour is approached in an orchestrated way, a powerful critical minerals industry and associated supply chains can be unlocked, presenting a more reliable and secure value proposition and laying the foundations for a strong, prosperous and sustainable future.

An Australian DARPA? University research vital to national security

Providing significant amounts of Defence funding to Australia’s universities could drive urgent national security research while ensuring the survival of the institutions and reducing their dependence on large numbers of students from China.

A new ASPI paper urges the establishment of a formal partnership involving the Defence Department, defence industry and Australian universities via the creation of an Australian Defence Advanced Research Projects Agency, or Australian DARPA—based on the highly successful American model.

In An Australian DARPA to turbocharge universities’ national security research: securely managed Defence-funded research partnerships in Five-Eyes universities, authors Robert Clark, a former chief defence scientist, and ASPI’s executive director, Peter Jennings, say there is a significant opportunity to boost international defence scientific and technical research cooperation with ‘Five Eyes’ partners the United States, Britain, Canada and New Zealand. The UK plans to establish its own DARPA equivalent next year.

‘Central to this partnership proposal is the need to restructure current arrangements for Defence funding of Australian universities,’ the authors say. And that would contribute significantly to a vital restructuring of the university sector’s research funding model.

‘An Australian DARPA, with robustly managed security, will enhance research “cut-through” in the defence sector and the wider economy.’

It’s vital that this work, underpinned by a DARPA-like culture of urgency and innovation and with potential to affect several portfolios beyond Defence, is championed at a senior government level, the authors say.

‘In the modern Australian system of government, that means the prime minister needs to be directly involved. Urgent means urgent. At least for the first few years of its life, an Australian DARPA should, in our view, report through Defence to the Prime Minister and the National Security Committee of Cabinet.’

They say significant financial and security risks of our universities becoming overdependent on funding sources from the People’s Republic of China has become painfully obvious because of the Covid-19 pandemic’s restrictions on international students. That’s led to major university job losses, with more to come, and recent foreign interference investigations of researchers’ links to schemes such as the PRC’s Thousand Talents Plan recruitment program. Those risks and their consequences are further amplified by geopolitical tensions that show no sign of abatement.

The authors stress that the central issue isn’t about international students per se. ‘International students, particularly from our ASEAN neighbours, have rightly been welcomed by our university sector dating back to the 1950 Colombo Plan. The problem is that what was once a diverse and proportionate international student cohort has grown to be significantly dominated by the PRC, and universities have locked their funding model on to that dominance to cross-subsidise research.

‘Further, our universities have pursued substantial and direct research funding from China. According to the peak body, Universities Australia, in 2018 there were 10,392 international agreements with our 39 tertiary institutions. The source of most agreements was China, with 1,741 agreements—nearly a fourfold increase in a decade. The US was a distant second, with 1,110 agreements.’

To complicate matters, the US is redefining the role of universities to include being an important part of the national security enterprise and thus subject to stronger regulation and oversight. Other nations are likely to follow.

‘In this hardened reality, the current largely open approach of Australian research universities to their international links is significantly exposed.’

The authors say there’s a view that the funding problem might be temporary, and that international students will return in numbers, particularly from China, but that is unlikely before a significant restructure of the university sector is required to meet the substantial projected funding shortfalls for 2021 and 2022.

‘Even if that were the case, does the Australian Government, the Australian public or the sector want to continue to carry the inherent financial and sovereignty risks of a return to the status quo ante, in which the impact of a pandemic could so easily be replicated by a future geopolitical incident? In our view, we’re in a “call to action” situation, in which the PRC-dependency of our university sector needs to be unlocked.’

They say more careful assessment and stronger direction by university management are needed to ensure that key ‘dual-use’ research areas—areas with potential military and civil applications—can make stronger contributions to Australia’s national and economic security.

The central issue for the university sector is financial, the authors say, and all roads lead back to sourcing necessary levels of research funding. Significant cross-subsidisation of research predominantly by international student fees from the PRC and direct research funds from PRC sources and programs has produced rivers of gold that have grown Australian universities and, to a limited extent, increased their world rankings.

‘For that financial dance, the music has stopped. We judge that, for strategic reasons, there will be no easy or quick return to that business model. Even if a return to easy cooperation with the PRC were possible, it wouldn’t be desirable for our universities to reinforce our dependence after we’ve seen Beijing’s willingness to use such dependence as a coercive instrument to “punish” Australian policy independence,’ they say.

‘We can’t lose sight of the necessity to maintain a strong and sovereign university research base with the capacity to support industry, the community and national security. This is clearly important for Australia’s future and can’t be allowed to fail.’

Why is the UK jeopardising its Five Eyes partnership over 5G?

The looming UK decision on 5G and Huawei has profound consequences for the UK, for the four other members of the Five Eyes intelligence-sharing group (the US, Canada, Australia and New Zealand) and for the future technological landscape of Europe. But it’s in danger of happening while those around it are distracted by bigger disasters.

The bad news is that, if what Britain’s top cybersecurity official, Ciaran Martin, outlined when he spoke at last month’s CyberSec conference in Brussels is any measure, the UK seems intent on defending the wisdom of a decision made a decade ago, despite all the changes in the strategic and technological landscape since then.

Martin sent some interesting signals in his speech. Apparently, it’s not that important who the 5G technology vendors are, because Russians successfully hacked the UK telecommunications system  even though ‘those networks didn’t have any Russian kit in them’. So, ‘From the point of view of managing corporate risk, or, in our case, national risk, it essentially doesn’t matter whether the vulnerabilities are deliberate or the result of honest mistakes.’

This shows very woolly thinking. It’s familiar logic for those following gun control: US gun advocates’ bumper stickers used to say, ‘Guns Don’t Kill People. People Do.’ They always forgot to add, ‘But people with guns kill plenty more people than people without guns.’

So too with cybersecurity. Without access to vendor knowledge and cooperation, it’s possible to hack systems. But hacking is easier and less discoverable if you do have the access to system designers—and even better if they have to cooperate with you.

Despite all the denials, this is just what hackers at the Chinese Ministry of State Security have with Huawei, Beijing’s anointed national champion for 5G technology.

It’s on the public record that Beijing’s National Intelligence Law requires Huawei—and every other Chinese company—to cooperate with the ministry and every other state intelligence agency for the Chinese state’s purposes. Similarly, under the State Security Law, all ‘enterprises and institutions, and other social organisations have the responsibility and obligation to safeguard national security’—and under the Chinese Communist Party, ‘national security’ is a very broad, politically driven concept.

Chinese CEOs understand their obligations to Beijing well. As Sogou’s CEO put it, ‘If you think clearly about this, you can really resonate with the state. You can receive massive support. But if it’s your nature to go your own way, to think that your interests differ from what the state is advocating, then you’ll probably find that things are painful, more painful than in the past.’

As former Australian prime minister Malcolm Turnbull noted in a recent speech:

If a state-sponsored adversary has enduring access to staff, software or hardware deployed into a target telecommunication network, then they only require the intent to act in order to conduct operations within the network. Traditionally, cyber security is premised on raising the cost for an adversary to such an extent that the adversary will not find it worthwhile to compromise a network. When an adversary can persistently and effortlessly pre-position, the effective cost of activity is greatly reduced.

Martin goes on though, to even more dubious ground. He doesn’t just defend the oversight regime the UK directed the top secret Government Communications Headquarters to provide for Huawei systems and products back in 2008 and 2010, he extolls it as a model: ‘Our regime is arguably the toughest and most rigorous oversight regime in the world for Huawei. And it’s proving its worth.’

Martin tells us there’s more good news: Huawei has accepted all the UK’s findings about the flaws in the security of its components, its design and production approach, and its software.

In fact, according to Reuters, Huawei has committed to address all of them, with the catch being that the company expects this to take ‘between three and five years’ and some US$2 billion.

What’s the problem? It’s in another part of Martin’s speech. It turns out that 5G, among its other impacts, ‘hugely accelerates the pace of technological change’. Huawei itself has said, ‘Enhancing our software engineering capabilities is like replacing components on a high speed train in motion.’

So, the world’s leading oversight regime of Huawei is fixing 2018’s problems between now and 2023. But it is already being outpaced by Huawei’s product development cycle, and, as technological change in communications accelerates, this will only get worse.

Given these factors, no oversight regime—even a UK version on steroids—will be able to manage Huawei 5G systems and software embedded in a nation’s critical digital infrastructure.

If EU nations are looking for insights and guidance from the UK experience, that’s the big one. Don’t follow the UK down a failing path.

Meanwhile, Huawei continues to get product development advice and insights into UK agency knowledge through the UK model.

It also uses the UK ‘brand endorsement’ to say that those who see major national security problems from embedding this Chinese 5G national champion into their own national digital infrastructure are jumping at shadows.

I wonder if Martin has taken that line in discussions with his Five Eyes partner, Mike Burgess, head of the Australian Signals Directorate, who has said there is no way to safely manage high-risk vendors in 5G networks.

Burgess has advised that:

Historically, we have protected the sensitive information and functions at the core of our telecommunications networks by confining our high-risk vendors to the edge of our networks.

But the distinction between core and edge collapses in 5G networks. That means that a potential threat anywhere in the network will be a threat to the whole network.

If the UK’s top cybersecurity official is talking down these risks, imagine what the UK’s economic ministries are doing.

Chinese state media has been helping here, campaigning hard to influence UK government thinking by flagging large new investments in the City of London and post-Brexit Britain. That state media product has gone into the UK debate word for word through the UK’s Telegraph newspaper, which ran a paid supplement, discreetly labelled as such, from the CCP’s China Daily on 21 February.

The negatives for the UK if it does exclude Huawei have been made less obvious, although Beijing’s punitive economic measures against a growing list of nations are clear enough.

At the core of UK thinking is a depressingly misplaced assessment. Martin sets his thinking in the context of globalised technology, and says, ‘There are limitations to what even a continent of the size and wealth of Europe can do on its own in an age where the US and China dominate tech development.’

A UK decision not to exclude Huawei would bring this world a few steps closer.

Martin seems to have forgotten that, when it comes to communications technologies, Europe has two globally significant firms with strong 5G technologies and patents—Nokia and Ericsson.

Let’s hope others in the UK government remember this, along with the fact that, at US$17.2 trillion in 2017, the GDP of Europe is bigger than China’s at US$12.24 trillion—and Europe’s plus America’s is some US$36.6 trillion. That’s a lot of heft and opportunity to set against Chinese threats and promises.

A truly strategic approach would not be to hand Huawei, which already benefits from a protected market in China, more global market power.

Instead, it would be to use the UK’s brand and market power deliberately, to work out how the big European providers might thrive and work with partner tech industries—like Australia’s, South Korea’s, France’s, America’s and Japan’s—to produce the prosperity, diversity, resilience and security we all need.

And the value of the Five Eyes partnership would weigh heavily in the scales of the decision too—at a time when the UK needs long-term, trusted friends.

Cyber wrap

What’s old is new again this week, with ransomware from 2016, ‘Petya’, again taking the world by storm, infecting machines across 65 countries. Except that’s not really the case, as Janus Cybercrime Solutions, the original creators of Petya, have publicly stated on Twitter that they are not behind the recent outbreak of Petya. Other analysts have also pointed out the significant differences between the March 2016 original and the recent outbreak which is masquerading itself as ‘Petya’. They’ve come up with a variety of names referencing the  deception: ‘NotPetya’, ‘Petna’, ‘Nyetya’, or only ‘SortaPetya’, or now completely different: ‘GoldenEye’ or ‘PetrWrap’. Naming issues aside, most commentators, including NATO Cyber Defence researchers, have concluded that this version of Petya is a data wiper in disguise, and that the token ransom note is part of an effort to create ‘plausible deniability’ for a wider objective.

The Ukrainian security service has gone a step further, and firmly laid the blame for Petya on Russia as a method to disrupt Ukrainian businesses as part of an ongoing cyber and hybrid war. Publicly available data indicates that Ukraine was the country hardest hit, and that the attack began spreading on a mass scale after a malicious update was pushed across a widely used Ukrainian tax program, M.E. Doc. Ukrainian cybercrime police are considering charging the company with neglect, after the company ignored repeated warnings that its servers had a number of vulnerabilities.

The Australian government has announced the creation of a new, uniformed, ‘Information Warfare Unit’ within the ADF, with plans to grow the 100 cyber security specialists to 900 within the next 10 years to better protect military networks and mount offensive cyber operations. Also here in Oz, critical infrastructure protection is continuing to prove a trouble area, as the Queensland Audit Office has found that Queensland’s water service providers are vulnerable. One of the key weaknesses identified has been the lack of a central coordinating agency within the Queensland government on cyber issues. The Auditor-General of Western Australia has expressed similar, broader concern about five WA government information systems, finding that the ‘same common weaknesses’ are found ‘year after year’, with little to no action on the part of agencies.

Federally, the Australian National Audit Office has approved of the Department of Human Services’ myGov implementation. The department has been active in procuring new digital capability in other areas as well, including data extraction devices from Cellebrite, the same technology used by the FBI to crack security measures in the San Bernardino attacker’s phone in 2015. The purchase has raised concerns about why Centrelink investigations would require a capability that has previously been restricted to national security and law enforcement applications.

The Five-Country Ministerial meeting on National Security in Ottawa has concluded, and the partner countries have announced that they will be approaching communication service providers to establish an industry forum and build better cooperation to counter violent extremist messaging. The governments will engage with ‘communications and technology companies to explore shared solutions’ to access encrypted messaging, demonstrating further movement towards thwarting the encryption of terrorist messaging highlighted as priorities by Prime Minister Turnbull and Attorney-General Brandis in previous statements.

Antitrust regulators from the EU have issued Google with a landmark €2.42 billion fine for favouring Google Shopping in its search results, after numerous complaints from competitor companies that they were being excluded from Google’s search results. Google’s been provided 90 days to adjust its search ranks equitably, and faces the risk of being slapped with further fines of €10.6 million for every day of non-compliance that passes after that time, equivalent to 5% of daily global turnover. Similar investigations are being conducted into Google’s conduct in the smartphone and advertising markets. The EU has spent up to €10 million for a team of technology consultants that can analyse Google’s search engine for discriminatory and anti-competitive behaviours. The bold regulatory moves come in advance of the General Data Protection Regulation’s activation in 2018, which will expand and escalate data protections and punitive actions, indicating that the EU will be backing its information security laws with some teeth.

Cyber laws and norms have suffered a setback at the United Nations, as a group of government experts’ report has fallen short of its lofty goals to formally apply international law to cyberspace after being rejected by a small number of states, including Cuba, Russia and China. The states objected to the report’s reference to the possible use of countermeasures and self-defence, and its deference to international humanitarian law regarding proportionality in crafting responses to cyber attacks. The Americans were forthright in declaring it a ploy to allow them to use ‘cyberspace to achieve their political ends with no limits or constraints on their actions’.

For those looking for some good longreads, The Financial Post has published a comprehensive piece detailing the creation of Etherium and what it means for Blockchain. Bloomberg has provided a retrospective on the development of the Chaos Computer Club, an association of white-hat hackers who have been forcing the German government to fix things (by breaking them) since 2006. Finally, ProRepublica has published the details of its investigation into Facebook’s opaque internal moderation standards and policies when it comes to flagging and removing violent extremist content.

Cyber wrap

Image courtesy of Pixabay user geralt.

The UK Parliament’s e-mail system was targeted by a sustained brute-force password-guessing attack last Friday, forcing parliamentary staff to temporarily block remote email access and mandate password changes. The ‘rudimentary’ but effective attack resulted in the compromise of at least 90 email accounts. A few members of parliament, including Cabinet ministers, saw their details posted for sale online, and it’s possible that embarrassing personal information has been taken, posing a risk of blackmail. More importantly, the details gathered could be used to penetrate other vital systems. It’s not yet clear who conducted the attack or why they did it, but Conservative Party MP Henry Smith trundled out the usual suspects, from Russia, to North Korea, to an anonymous stranger in a basement. Subsequent commentary has criticised the Parliament’s information security practices, from accepting the use of weak passwords that could be ‘guessed’, to lacking basic and decades-old mitigation strategies like IP filtering and 2-factor-authentication, and finally the 10-hour delay before the Parliamentary Digital Service alerted affected personnel.

Attorney-General George Brandis and Minister for Immigration and Border Protection Peter Dutton have issued a joint media release setting out Australia’s agenda ahead of a Five-Eyes meeting in Ottawa—though 10 points from Gryffindor for ‘Ottowah’. The meeting is set to focus on encrypted communications, data sharing and immigration arrangements. Encrypted messaging has dominated the national security debate recently, due to its massive growth to 40% of CT-related commutation intercepts today, compared to 3% just four years ago. Russia is also facing the encryption debate, with the Russian Federal Security Service threatening to block encrypted messaging app Telegram for refusing to decrypt messages after it was used by terrorists in the St. Petersburg metro attack back in April.

Tech firms aren’t happy with the direction of the encryption debate either, with Google’s Legal Counsel Kent Walker stating that companies are in an ‘untenable’ position—caught between needing to fulfil unwieldy treaty-based international evidence requests (which currently take up to 10 months on average) despite systemic legal ambiguity. In a supporting blog post, he’s called for new regulations that clarify data sovereignty, improve current international evidence sharing processes, and introduce agreed norms when it comes to baseline principles of privacy, human rights and due process. Google has also announced that Gmail will no longer be scanned for advertising profiling data to increase consumer confidence.

In news for any legal scholars following the infosec world, the National Law Review, an American journal, has put out a three-part series providing a rundown on China’s recently implemented Cybersecurity Law. Germany has recently introduced new laws that expand the scope of situations in which German police are allowed to access devices and see messages at the source. The law has run into legal challenges, which argues that the new legislation is in contravention of EU laws. Finally, pending legislation, Canada might see it’s Communications Security Establishment legally empowered (with upgraded oversight) to carry out offensive cyber operations, a move that would significantly expand its mandate.

Cyber cooperation has seen big wins this week, with Canada and China signing an agreement to stop using cyber-attacks for industrial espionage. Multilaterally, Thailand’s Ministry of Foreign Affairs will host a seminar next week to discuss ASEAN’s cybersecurity cooperation and practice in the future. And the World Bank is funding a project to stand up Zambia’s National Cybersecurity Agency, with Israeli cybersecurity company CyGov providing advice and expertise.

WannaCry has continued to infect pockets of unpatched systems this week, striking a Honda factory and forcing the factory to temporarily shut down while fixes were applied. WannaCry has also affected traffic cameras in Victoria. Initial statements from the Victorian government indicated that the overall system wasn’t compromised and that all infringements would remain, but that was later reversed, with the government stating they would ‘quarantine’ and review infringements generated by the affected cameras. The contradiction seems to indicate that the Victorian government is struggling with its communications and decision-making processes in the event of cyber incidents.

The US national security community seems to be embracing open source development communities, with the National Security Agency (NSA) joining GitHub to launch a page that shares the details of 32 different projects. Similarly, the Department of Homeland Security has announced a Kaggle competition for passenger screening, sharing valuable training data and offering a US$1.5 million reward to the team that develops an algorithm for body scanners to automatically identify concealed objects. There’s been some involuntary technology sharing between the national security and open source communities, too, with WikiLeaks releasing more technical documentation on CIA hacking tools from ‘Vault7’ The latest leak has provided details on a toolset called ‘Brutal Kangaroo’, designed to spread through infected USBs and, potentially, infiltrate air-gapped computers.

Contestability: the key to more successful intelligence analysis

Image courtesy of Flickr user theilr

During the festive season of 1978, in an underground corner of the Pentagon, a group of Defense Intelligence Agency analysts was burning the midnight oil. For some months, they’d been monitoring the deployment of Chinese forces from several military regions to the border with Vietnam. Examining the full spectrum of satellite imagery, electronic and communications intelligence, the conclusion was finally drawn that this troop concentration amounted to a sabre-rattling exercise, aimed at warning Hanoi over its attacks on the Khmer Rouge in neighbouring Cambodia.

Meanwhile, half a world away in Canberra, at the Joint Intelligence Organisation, a small team had pored over the same raw material, with starkly different results. Led by eminent sinologist David Cross, along with a young military intelligence captain named Alan Dupont, the Australian analysts predicted that a Chinese invasion of Vietnam was imminent. In their view, the ramping up of rhetoric in the Beijing press held the key, particularly references to launching a ‘counter-attack in self-defence’ (zi wei huan ji).

The Pentagon considered this contending view and, on the balance of probabilities, agreed that an attack was more likely than not. When China launched the Third Indochina War several weeks later, the technical eyes and ears of the West had been directed to the right place at the right time. Canberra had contested the received Washington wisdom and valuable information was derived for both ANZUS partners.

But intelligence analysis is more often judged by its failures than its successes. Both the recent Chilcot Inquiry in Britain and France’s parliamentary review of its intelligence services, following the 2015 extremist attacks in Paris, confirmed that intelligence is fallible. The 832 pages of the US congressional inquiry into the 9/11 terrorist attacks reached a similar verdict in 2002.

With the clear and present terrorist danger facing Australians, it’s worth considering our own experience of perceived intelligence shortfalls triggering government-mandated reviews. The most notable is that conducted by senior diplomat, Philip Flood, in 2004 following the Howard government’s decision to invade Iraq.

Subjecting analytical judgments to rigorous challenge was critical to effective intelligence, according to Flood, with contestability the leitmotif of his review. An entire chapter of the 250-page report is devoted to this idea.

In the Australian context, however, contestability would appear easier said than done. After all, only two government agencies have been apportioned the role and responsibility for providing official policy-makers and government decision-makers with all-source, finished intelligence product—the Defence Intelligence Organisation and the Office of National Assessments.

While calling out the need for contestability on the one hand, Flood drew, on the other hand, a demarcation line between the content and target audience for DIO and ONA intelligence assessments—a separation that’s hardly conducive to the mutual contestability of ideas and judgements between the two agencies.

The challenge of contestability is compounded by the very nature of the intelligence community workforce. While aspiring analysts may enter the recruitment funnel from diverse backgrounds, offering a wide range of knowledge and experiences, the excruciatingly involved security vetting process sees many fall by the wayside, with a disturbingly like-minded cohort dripping from the tube’s end. Under such circumstances, groupthink becomes a very real issue.

And relying on counterparts in allied intelligence services for pressure-testing Australian judgments will be useful only when all parties share common interests—like the Third Indochina War in 1979.

It may be that analysts in think tanks outside the government bubble will assume added significance as Pentagon-style ‘murder boards’. Organisations like the Australian Strategic Policy Institute and the Lowy Institute could perform such a function for most strategic analysis, complemented by academics and commentators with unique expertise in arcane areas of growing importance to Australia, like Mexican criminal cartels and African terrorist groups.

If contestability ran like a thread throughout the 2004 Flood Review, it was conspicuously absent from the 2011 follow-up review by retired senior public servant, Robert Cornall, and Melbourne University ethicist Rufus Black. The concept appears nowhere in the report’s relatively brief and comparatively anodyne pages. At least in its publically-released form, Cornall–Black is as mute as Flood was magisterial. One could be forgiven for thinking Australia’s national intelligence needs were being met by a highly evolved and impressively efficient community of practice. Nothing to see here, move along folks.

That may be the case; time will tell. A further review of the Australian Intelligence Community will be due in the life of the new Turnbull government, with Flood having recommended that the six agencies be subject to external review every five to seven years. Contestability should once again appear on the agenda, with practical and innovative recommendations on how to challenge conventional thinking in the face of unconventional threats.

The Australian Intelligence Community has a proud history of playing a constructive sounding board role for the three-letter agencies of Washington and other five-eyes counterparts. It’s time to harness that talent for our own purposes—both within and without the confines of government service. Our national security depends on it.

The Beat

This week on The Beat, we look at the fast-tracked treaty concerning MH17, the Silk Road conviction, more cybercrime, collaboration to counter organised crime and transnational terrorism, the US National Security Strategy and developments in the Adnan Syed/’Serial’ case.

Treaty fast-tracked following MH17

The Joint Standing Committee on Treaties has released its report into an Australia–Netherlands treaty that was fast-tracked following the downing of Malaysian Airlines flight MH17 in July 2014. The treaty allowed personnel from the Australian Federal Police and Department of Defence to be deployed quickly while undertaking Operation Bring Them Home. The action was allowed under the National Interest Exemption, which has been invoked only seven times since treaty reform in 1996. The report’s available on the Committee’s website. Read more