Viw Magazine

Men's Weekly

.

  • Written by Stanley Shanapinda, Research Fellow, La Trobe University
There is no clear cybersecurity governance framework geared towards detecting and preventing attacks against digital identity assets.

One of the key functions of the government is to collect and archive national records. This includes everything from property records and registers of births, deaths and taxes, to Parliamentary proceedings, and even the ABC’s digital library of Australian news and entertainment.

A new report released today from the Australian Strategic Policy Institute (ASPI) considers the important role these records play as the collective digital identity of our nation.

The report’s author, Anne Lyons, explains how an attack on these records could disrupt the day-to-day functioning of society, and why we need to do more to protect them.


Read more: Hooray, we're digital natives – so who preserves our culture?


Why are these records important?

Given that we live in the digital era, our digital identity records have been transformed into electronic data and are stored virtually in cloud servers. These servers act as the memory centre of the nation, preserving Australia’s unaltered history.

We can trust these records are accurate, confidential and not interfered with. All this digital information may be referred to as “digital identity assets”.

These assets are worth protecting, because they are important for the functioning of government, and are a legacy for future generations. Collectively, they embody who and what Australia is as a nation, its journey, and its time and place in history.

What could happen if they were hacked?

The impact of any theft, manipulation, destruction or deletion of digital identity assets could be catastrophic.

The courts would not be able to function without the relevant digital records. Manipulated property title deeds could create legal challenges. Passports and visas may not be able to be verified and issued. And historic records could be tampered with or forged.

In the worst-case scenario, such an attack could interfere with the proper functioning of government, and shatter public trust and confidence in government institutions.

Lyons paints a picture of what it would look like if property records were hacked:

You wake up in 2022 to discover that the Australian financial system’s in crisis. Digital land titles have been altered, and it’s impossible for people and companies to prove ownership of their assets. The stock market moves into freefall as confidence in the financial sector evaporates when the essential underpinning of Australia’s multitrillion-dollar housing market – ownership – is thrown into question. There’s a rush to try to prove ownership, but nowhere to turn. Banks cease all property lending and business lending that has property as collateral. The real estate market, insurance market and ancillary industries come to a halt. The economy begins to lurch.


Read more: Preservationists race to capture cultural monuments with 3D images


What are we doing to prevent attacks?

Three pieces of legislation have been passed since 2017 to protect the nation against crimes committed over the internet targeting telecommunications, water, electricity and gas equipment. These are the Security of Critical Infrastructure Act, the National Security Legislation Amendment (Espionage and Foreign Interference) Act and the Telecommunications and Other Legislation Amendment Act.

But cyber attacks are not only targeted at our nation’s critical infrastructure. Servers that host digital identity assets are also at risk. Nation states and individual hackers could gain access to databases using our email communications to gain access.

Despite this risk, our lawmakers have failed to exert the same vigour in crafting laws that protect digital identity assets as they have exerted in efforts to decrypt the WhatsApp messages of criminal targets.

There is no clear and specific cybersecurity governance framework in the law books geared towards detecting and preventing attacks against these assets.

How to protect our digital heritage

1. Assess cyber vulnerabilities alongside social ones

Governments need to improve their holistic situational awareness to counter threats. That means assessing cyber vulnerabilities in conjunction with societal ones.

Online disinformation campaigns and malicious cyber activities are all referred to as hybrid threats. Hybrid threats – which could make use of digital identity assets – are challenging to detect and to make sense of due to their dynamic nature. Understanding the complex nature of a hybrid threat is referred to as cyber situational awareness.

Outside of the cyber environment, situational awareness may refer to an awareness of cultural, ethnic and religious tensions in society that could be vulnerable to online exploitation. For example, in the 1980s the Soviet government used the HIV epidemic to sow social division in the United States. Under operation INFEKTION, Russia spread stories that the American government created the virus and spread it among its population.

In cases like this, it’s feasible that digital health records could be hacked and altered to serve as fake evidence. In this way, societal vulnerabilities can become one part of a mixed bag of threats.

Our ability to effectively resist and recover from malicious hybrid activities depends on our capacity to detect, analyse and understand the nature of the threat, in near real time. Metadata can be used for this purpose to show who accessed a server and from what location.

To improve cyber situational awareness, access logs should be retained and the computer emergency response team must collect metadata from government departments themselves, and analyse the data in near real time. This is a growing trend in the cybersecurity sector and public bodies must gear up.

2. Store copies of historical records offline

We also need to simulate how digital identity assets can be used against us and be prepared to counter the propaganda. Schools and universities can store multiple offline historic records, which can be used to verify accuracy when conflicting stories arise. Using National Archives as a central repository for digital identity assets is a single point of failure. Redundancy work-arounds must be created.


Read more: How the internet is reshaping World Heritage and our experience of it


3. Engage the private sector

This is a job too big and too important to be left to government alone. Historical societies and charitable organisations may need to store hard and soft copies of the same records all over the country. Relevant laws must mandate, cybersecurity situational awareness for telecommunications companies, ISPs, computer emergency response teams, law enforcement and security agencies, but in clear and responsible fashion.

We must take a proactive approach that mandates the roll out of appropriate advance counter measures. A legal mandate that is largely based on past incidents may not be an effective strategy to prevent dynamic hybrid threats. This is how we will tell hackers to back off our national heritage.

Stanley Shanapinda does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

Authors: Stanley Shanapinda, Research Fellow, La Trobe University

Read more http://theconversation.com/protecting-our-digital-heritage-in-the-age-of-cyber-threats-108252

Furnishing for Families Without Losing Style

Designing a family home can feel like a constant negotiation between practicality and aesthetics. On one hand, you want rooms that can han...

Decorating in Stages: A Smarter Way to Build a Home You Love

There is a lot of pressure to make a home look “finished” as quickly as possible. Between inspiration images, showroom displays and so...

Why Building Inspections Gippsland Are Essential for Property Buyers

Purchasing a home or investment property is an exciting milestone, but it also involves careful consideration and due diligence. One of the ...

Precision and Practicality: How Mini Excavators Support Modern Australian Projects

Lightweight, agile, and increasingly sophisticated, mini excavators have become a familiar presence across modern construction sites. Feat...

Choosing the Right Boat for Lakes and Rivers is About What’s Under the Water

Ready to hit the water and enjoy a boating lifestyle? Great! But not just any boat will do. You need to be equipped with the knowledge to ma...

How Fat Freezing Melbourne Treatments Help Reduce Stubborn Body Fat

Achieving a well-balanced body shape often requires regular exercise and healthy eating habits. However, many individuals still struggle w...

Why Childcare Cleaning Is Essential for Safe and Hygienic Early Learning Environments

Childcare centres provide important environments where young children learn, play, and develop social skills. Because these spaces are use...

Understanding Root Canal Treatment Melbourne And How It Saves Natural Teeth

Dental pain can disrupt daily life and make even simple activities uncomfortable. When tooth decay or infection reaches the inner part of ...

Why an NDIS Provider Plays a Vital Role in Supporting People With Disabilities

Access to the right support services can significantly improve the quality of life for people living with disabilities. Across Australia, ...

Key Terms in Commercial Leases Every Melbourne Business Should Understand

Signing a commercial lease is a significant commitment. However, many business owners focus on the rent figure and the lease term without ...

Why a Buyers Agent Adelaide Helps You Navigate the Property Market With Confidence

Buying property is one of the most significant financial decisions many people make. Whether purchasing a home to live in or investing in re...

What Makes a Successful Law Firm Website in 2026

In 2026, a law firm’s website is no longer just a digital brochure—it is one of the most important business development tools a legal ...

Why Every Modern Law Firm Needs a High-Performance Website

In today’s digital-first world, a law firm’s website is often the very first point of contact between a potential client and the legal p...

The Importance of Safe Sanitary Waste Disposal in Commercial Spaces

For facility managers, employers, and business owners, the provision of washroom amenities is more than a convenience—it is a critical int...

Why Brisbane Retailers Need Custom Security Solutions for Modern Retail Risks

A one-size-fits-all approach rarely works for something as nuanced and challenging as retail security. In Brisbane alone, there are differ...

Why Children Who Learn to Save Early Develop Stronger Financial Habits

The transition from understanding the value of a physical coin to managing a digital balance is a fundamental rite of passage for the next...

Planning Home Rewiring? Why Sydney Electricians Start with RCD Testing

It can be quite overwhelming thinking about rewiring your home. You may reside in a charming old terrace or even a modern townhouse; there...

Pour One Out: Cali by Snoop drops Kingz of Cali, the tribute wine honouring Tupac’s Legacy

The limited-edition wine celebrates 30 years since the release of Tupac and Snoop Dogg’s iconic track. Today, Cali By Snoop drops its mos...

Apartment Buyers Beware – Know Your Building Classification and Codes or Risk Big Fines

If you’re looking into buying a new apartment, you need to understand what classifications and codes apply to your potential new property...

Why Hurstville Tutoring Supports Strong Academic Growth And Confidence

Students in academically competitive areas often face increasing pressure to perform well across multiple subjects, which is why hurstvill...