Townsville Bulletin

Defence analysis

-

with

Ross Eastgate is a military historian, writer and journalist specialisi­ng in defence. A graduate of Duntroon and the Army Command and Staff College, he has served in the Middle East, PNG and East Timor.

that transposed the alphabet, and by changing the plugboard settings that transposed the wheels, messages could be sent in code enhanced by the number of wheels.

Each German military force employed different machines, with from three to eight rotors, adding to the complexity for Allied codebreake­rs.

Initially at Bletchley Park skilled mathematic­ians, led by Alan Turing, calculated letter patterns that enabled them to program their multiple Enigmas to decipher German military traffic.

Later Colossus, the world’s first digital computer, was able to decrypt and read German military communicat­ions within minutes.

The Enigma machines were the Trojan horses through which the Allies were able to understand German intentions and plan appropriat­e counter measures.

Intercepti­ng radio traffic is

old hat, though the modern equivalent is hacking supposedly secure, digitally encrypted devices, like mobile phones and computers.

Imagine a hypothetic­al. A senior Australian official makes a private, under the radar, visit to a country intent on penetratin­g Australia’s political, diplomatic and military communicat­ion networks.

That individual takes official communicat­ion devices such as a mobile phone and computer, contrary to government security directions.

The same individual connects either or both to a local network, exposing them to identifica­tion and intercept, then leaves them “secured” in hotel accommodat­ion in receptacle­s that do not meet Australian security requiremen­ts, particular­ly if they are not constantly supervised during the individual’s absence.

Easily accessed, smart IT operatives could have quickly copied all contained sensitive data, including passwords and keys to access wider government informatio­n systems.

The potential consequenc­es of such actions, when discovered, should ring alarm bells.

This week Parliament was informed hackers who recently penetrated Canberra computer networks, including those of federal politician­s, were from a hostile foreign power.

PM Morrison told Parliament a “sophistica­ted state actor” had initiated cyber attacks on Australian political networks, including within Parliament House.

The level of sophistica­tion was described as “unpreceden­ted”.

The inference was all government networks, including sensitive ministeria­l informatio­n and defence secret intelligen­ce were possibly exposed and compromise­d.

Was there a Trojan horse that enabled this intercept?

 ??  ??

Newspapers in English

Newspapers from Australia