 Good afternoon ladies and gentlemen and welcome to this full house to the Lowy Institute I'm Michael fully loved the executive director here at the Institute And I'm delighted to welcome you to this special event with the head of the Australian Signals Directorate Mike Burgess Ladies and gentlemen It seems that every week we read another big story about cyber attacks the hacking of the Australian Parliament and the political parties here in Australia the North Korean attack on Sony the worm that crippled the UK's national health service and Of course the Russian meddling in the US presidential election But all those stories if you like are on the defensive side of the ledger They are attacks on Australia and on Western countries by other state actors The other element of the game is offense The actions taken by Western governments to disrupt and deter our adversaries and we don't hear about those so often There was some coverage of the Stuxnet worm Which is thought to have been used by the United States and Israel to damage Iran's nuclear centrifuges There has been speculation about hacking of North Korea's missile programs There's been a few things like that But in general we hear more about operations against the West than operations by the West and as my colleague Richard McGregor Said to me recently It's a bit like watching a boxing match where you can only see the punches thrown by one of the fighters And that's why today is such an interesting event in which the head of Australia's Signals Intelligence Agency will tell us about Australia's offensive cyber capabilities Ladies and gentlemen, Mike Burgess has served as the head of ASD since January 2018 when it became a statutory agency in July last year Mike became its first director general Previously he worked as an intelligence official and a private sector chief information security officer He served on boards including the federal government's naval shipbuilding advisory board Mr. Burgess holds a degree in electronics engineering from the South Australian Institute of Technology I will have a conversation with Mike will be and Mike has agreed to take your questions But first of all, please join me in welcoming Mike Burgess to the lectern Good afternoon everyone. It's my great pleasure to be here and a few familiar faces in the audience Let me start by first acknowledging the low eboard members. Thank you Michael and the low eboard members for being here The Honourable Margaret Stone, the Inspector General of Intelligence Security It's nothing like standing up and speaking in front of your oversight Welcome Margaret Phillip Lowe, the Governor of the Reserve Bank of Australia and Lieutenant General John Fruin, my principal Deputy Director General of the Australian Signals Directorate For me and John, it's a great privilege to lead this organisation And as you would understand in any good organisation, it's not actually the leadership Sorry, John. It's actually the great people who work for us and we have the privilege of not just leading but in reality We actually have the privilege of working for the men and women of the Australian Signals Directorate and they do an absolutely fabulous job I would like to acknowledge in that regards then some of my staff who are actually in the room Mark Sinkin who is the head of strategic communications at the ASD A vet, I'm not going to give her a surname just to protect individuals who's the director of communications Joe my Chief of Staff and JJ's Chief of Staff Scott Logan, I gave his surname away sir. Apologies Tell I'm not really good at this spook stuff. Hey Scott has an interesting job title and he I didn't tell him I'm going to do this But it's military effects and network operations There's something interesting about the title of our workforce Final staff member. I want to acknowledge is Michelle. Michelle is the head of strategy and strategic policy She's an absolute whiz at that bit of a unicorn, but that's not her real strength A lot of what I'm talking today the policy framework through which we operate and do this Effectively and legally is all down to individuals like Michelle and Michelle has been outstanding in her leadership So late last year I gave a public speech where I promised to bring the Australian Signals Directorate out of the shadows At that time I committed to be more being more transparent about our role and for an organization like ASD That was a very difficult thing to do It would be real easy to stay in the shadows out of public's attention But that wouldn't have been the right thing to do. I Cannot stress enough how important I believe it is that the public understands how ASD Defends Australia from global threats and why our work is so important and most importantly that we act legally and ethically in everything that we do Transparency also has other benefits For the first time we can start talking in more detail about what our staff do and what kind of skills We have and why they might want to come and work at the Australian Signals Directorate So why is that important? Transparency helps inform helps dispel myths and most importantly helps with our value proposition to prospective employees So in the spirit of transparency, let me be open up front While today's talk might be very attractive from the point of view of the topic. I've chosen to speak about My prime objective is simply to sell ASD as a rewarding place to work So, sorry Michael. I actually think this might be the first time Lowy has been used as a real live job advertisement So, thank you so much a job where you'll belong to a great team defending Australia from great global threats Where you'll be operating in that slim area between the difficult and the impossible and where you can have a rewarding career that makes a difference So let me start with one of our myths one of the most common misapprehensions around ASD's offensive cyber mission work Is around what that might look like probably not surprising given the cliches in the movies There's always a geek Invariably a guy wearing dark clothing working in low light hacking at systems at will Usually they're cavalier. They have no regard for the law and They can just hit the enter key and blow up buildings or do impossible things with electrical surges The real hackers in ASD couldn't be further from this stereotype But to understand why you need to understand a little bit about our capability So when we say offensive cyber, what do we mean? At ASD we're referring to a broad range of activities designed to disrupt degrade or deny our adversaries and To be clear all of our activities are conducted offshore We do this using specialized tools and techniques to disrupt the communications of And interfere with the way they operate and in my experience when people generally think of offensive cyber They go to the high end of the spectrum thinking about computer network attacks that destroy adversaries communications devices Yes, this is something ASD does but in very specific circumstances and within strict legal frameworks But it's just one of the ways we can disrupt our targets behavior online Our operations are carefully designed to achieve their objectives in a much more precise subtle and sophisticated way and To be honest that is far more exciting than smoking computers in cyberspace So for example our targets might find their communications don't work at a critical moment rather than being destroyed completely Or they don't work in a way. They expect they might find themselves not being able to access their information or accounts When they want to These kinds of operations are more representative of what offensive cyber looks like highly targeted and proportionate Timed to precision Whatever the technique our objective is to use our offensive cyber capability to keep Australians and Australia safe It's also again important to remember that we are a foreign intelligence agency Our operations disrupt degrade and deny offshore adversaries who pose serious threats to Australia The Prime Minister first announced or disclosed the existence of ASD's offensive capabilities in 2016 Since then further announcements have been made establishing how our capability supports the Australian Defence Force including military operations in the Middle East Where offensive cyber has helped disrupt Daesh's communications launch attacks or helped stop them launching attacks and their spread of propaganda The government has also revealed the role ASD's offensive capability plays in disrupting foreign cyber criminals targeting Australians Regardless of the context all of our operations are conducted in accordance with international and domestic law Every mission must be targeted and proportionate and is subject to rigorous oversight All our actions are deeply considered and subject to meticulous planning to consider the potential for unintended consequences ASD takes its legal responsibilities Incredibly seriously we pride ourselves on being meticulous in execution and we operate within the law As I said in my ASB address last year I've heard of some boardrooms in Australia contemplating the prospects of hacking back to protect themselves against attacks So let me be clear ASD's offensive cyber capability is enabled by the Intelligence Services Act and authorised at the direction of our Minister No corporation or individual should contemplate the prospects of hacking back to defend themselves from hackers That would be an illegal act and the obligation to protect one's corporate assets does not extend to breaking the law So what do our hackers really look like? ASD's offensive cyber operators look and act nothing like they do in the movies It takes teams of experts to make these operations successful and to ensure all our actions are considered legal and ethical Our operators and planners are imaginative and disciplined with a strong sense of propriety They are cool under pressure and they love working as part of a team It's as far away as you can get from the cliche in the movies They come from all sorts of backgrounds, everything from computer science to marketing, international relations, the law, linguists, biology and mathematicians to name a few Regardless of their background all of them go for an intensive comprehensive training program to make sure they have what it takes to be an offensive cyber operator Some of them are expert at generating technical effects to degrade or destroy an adversaries communication device It's the type of effect that might be crucial to support a military operation Working alongside our operators are our software developers These programmers are responsible for developing highly surgical tools to cause the effect It's precision work requiring reverse engineering skills and a deep understanding of computer operating systems They have to find a way to bypass the target security mechanism and make sure the tool causes the exact effect that has been approved under our legal framework And only that effect Our operators create the effect by focusing on the person behind the device as well The intelligence target themselves They draw on a range of intelligence sources to understand their motivations, the online technology use and more importantly how they use it And of all our operations rely on stealth and obfuscation It's not just as simple as setting up an internet connection and away you go So backing up our operators are a group of talented individuals, system administrators and security professionals Who know how to build and sustain the infrastructure we need to hide our tracks online So let me share some real examples Naturally we don't often talk about the detail of what ASD does But to help explain why our work matters and what kind of people we're looking for I've decided to declassify aspects of two operations The Australian Signals Directorate has a long history of supporting military operations With the beginnings of this going back to World War II In that time or since that time we've provided critical support to the nation's warfighter Including providing intelligence on threats to Australian personnel And tracking the locations of military adversaries to enable ADF and coalition operations to be conducted And the operations are highly targeted That long standing support has expanded into offensive cyber Offensive cyber is a crucial part of Australia's military arsenal And ASD supports those on the front line For the first time I can tell you a little bit about what that looks like Involving some insights from our operators who conduct these activities The work we do makes a difference And in the Middle East our offensive cyber operators have helped make a difference between success and failure, life and death At the height of the fight against ASD, working in the direction of the ADF helped shape a crucial battle Just as coalition forces were preparing to attack terrorist positions Our offensive cyber operators were at their keyboards in Australia Firing highly targeted bits and bites into cyberspace Dayish communications were degraded within seconds Terrorist commanders couldn't connect to the internet and they were unable to communicate with each other Terrorists were in disarray and driven from their position In part because of the young men and women at their keyboards some 11,000 kilometres or so away While the effect was almost instantaneous it took many weeks of planning By specialist ASD and ADF personnel to make what happened and to ensure it went exactly to plan When it came to the day of the operation our operators were constant contact with deployed military elements To make sure the effects were carefully coordinated and timed to precision Our effects were generated in support of and in coordination with ground manoeuvres This operation marked a milestone for both Australia and coalition partners It was the first time that an offensive cyber operation had been conducted so closely synchronised with movements of military personnel in theatre And it was highly successful Without reliable communications the enemy had no means to organise themselves and coalition forces regained the territory As part of another operation we worked with coalition partners to damage the terrorist media machine We locked the terrorist out of their servers and destroyed their propaganda material Undermining Daesh's ability to spread hate and recruit new members Our work makes a difference In these operations cyber operators in Canberra help fight and defeat terrorists on the other side of the world On other occasions our offensive cyber operations take on a different character literally Some activities involve ASD operatives assuming false online identities to disrupt terrorist networks One case involved a man who had been radicalised and was in remote location overseas trying to join and fight for a terrorist group The risks were significant and the stakes were high If the terrorist didn't accept the newcomer they would likely execute him If they did accept him they would further radicalise him and train him to kill It was literally a matter of life and death When ASD first was alerted to the situation we stood up a specialist team and developed a sophisticated plan The team included linguists, cultural experts and behavioural experts and was led by one of our top operatives A highly trained young woman A science graduate turned covert online operator ASD tracked down and reached out to the man over the internet Pretending to be a terrorist commander our lead operator used a series of online conversations to gradually win her target's trust Our operative type in deliberately broken English and was so convincing she was able to influence the man's behaviour To ensure he couldn't contact or be contacted by the real terrorists she got him to change his method and mode of communications And eventually she convinced the aspiring terrorist to abandon his plan for Jihad and move to another country Where our partner agencies could ensure he was no longer a danger to others or himself In this case a young operative sitting at a computer in Canberra was successfully pretended to be a senior terrorist fighting in a far away war zone Her online persona was the inverse of a real one Different gender, age, culture, language, status and a radically different ideology One word or reference out of place and the whole thing could have fallen apart potentially with grave consequences The work that our operators do is extraordinary but talented operators like this come from fairly ordinary backgrounds Like many of us she grew up in the suburbs of a major Australian city She enjoys yoga, hiking and playing touch football And when she was studying at university she would never have dreamed that one day she'd be posing as a terrorist online helping to defend Australia from global threats We spotted she had the aptitude to do this work early when she joined ASD She was an imaginative, had great problem solving skills and was a team player After completing an intensive training program she joined our team of covert online operators A job title that remains secret until today So if you're looking for a job, do you pick a fence? In the past it was difficult to recruit people with aptitude for this work If we continue to live in the shadows you can't exactly put covert online operator on your LinkedIn profile We suspect a lot of people wrongly concluded also that our offensive cyber mission was just for techies Or worse still we were looking for those cavalier types that you see in the movie By being more transparent about the work we do really will help get the fascination and attention of other people who can consider a career in ASD's offensive cyber mission And while a lot of our staff have technical backgrounds, yes, offensive cyber is not just for techies And it's not as male dominated as you might think Our most experienced covert online operators are all women And all our staff in this field are imaginative, curious, minded and persistent And when we set them objective they always find a way Or do you pick defence? A good offence is only as useful if you also play defence and play that well And in cyber it's the defence mission that really counts On the cyber security side of ASD there's also a range of fascinating roles where they focus on a different kind of adversary These are the malicious actors that try to compromise Australian systems, steal our information and take advantage of Australians online ASD works hard to make Australia a safest place to connect online My staff in the cyber security centre are central to that Cyber security is a great career for people who love problem solving skills For people who love diving into the detail to find security flaws that other people might have overlooked And in this respect they are amongst the greatest critical thinkers we have in my organisation They have to be, to think about all the ways our systems might be vulnerable and what are the best ways to protect Australians themselves And when we find hackers compromising of a network we call on our incident responders Who work out to how to get them out and how to keep them out These kind of operations rely on specialists who love fast paced operational work and are great in a crisis And that work is really rewarding when you consider the activity you might be defending against as all the hallmarks of a sophisticated cyber actor A worthy peer competitor That's when ASD really comes into its own In these situations we draw on combined expertise of our organisation Our experts from both the offensive and defensive side work side by side to ensure we understand the techniques these malicious actors are using And more importantly we understand how to protect Australia and Australians from what's happening Because sometimes to catch a thief you have to be one or at least think like one So be a real poacher turn gamekeeper and pick both This is one of the great things about ASD you don't have to pick just one job Some of our staff have long spanning careers in defence and offence This is something you cannot do anywhere else These are the real poachers term gamekeepers or in some cases gamekeepers term poachers Having experience in both mission gives our staff a broad perspective and they are all the more expert because of it So today I've shared more about the nature of the work that we do Because we want people to understand what a career in ASD looks like But naturally there's only so much I can say about our operations and how they help Or to help people think about the career options that they have Much of the detail surrounding this will continue to be classified for obvious reasons Fortunately there is another way we can give people insights into what it's like to work for ASD And that's from our organisation's five values We make a difference We strive for excellence We belong to a great team We're audacious in concept and we're meticulous in execution These values say a lot about the culture of the organisation and the people who choose to work at ASD And they take on a special meaning when you look at them in the context of cyber operations We make a difference This is all about giving our customers those we serve a critical edge Whether that's providing offensive cyber support to the ADF operations overseas Or responding to serious compromise of Australian systems We strive for excellence It's about seeking and fostering talent, being committed, enthusiastic and responsive And being world class in all that we do The stakes are high in our cyber activity and missions And we have a highly talented workforce of cyber specialists who love what they do And do it to the highest professional standards We belong to a great team This is recognition we succeed through time Through teamwork and partnerships And there's no better exemplar of this teamwork at ASD than in our cyber operations Whether it's offence or defence It takes a team of talented individuals with a range of skill sets to be truly successful We're audacious in concept This is all about the work we do Which by its very nature requires ASD to operate in the slim area Between what is difficult And what our adversity thinks is impossible And it's bloody hard work Whether it's using offensive cyber tools to disrupt the communications of a terrorist Even when they're trying to evade detection Or uncovering a new technique used by a cyber-adversary to bypass security measures in Australian systems Last but not least We are meticulous in execution This is about precision and always acting legally and ethically And being accountable to the public through government for everything we do This one underpins everything we do in cyber All our offensive operations are conducted in accordance with the law They are subject to meticulous planning to ensure our activities are proportionate and highly targeted And this value also guides our cyber security teams who are meticulous in the way they search for vulnerability on Australian systems So which team is for you? By being more transparent about this We hope it gives people a better idea of what ASD does The Australian Signals Directory is a great organisation to be part of Our staff love what they do and they work with a great team We place enormous emphasis on diversity We require it and we desire it A diversity of people with a diversity of skills These operations I've outlined today Require linguists, software developers, analysts, code makers, code breakers and behavioural experts to name a few Some of our people wear short suits Suits to work alongside ADF members In uniform from the ADF's joint cyber unit Quite a few of our staff wear hoodies and jeans that you might expect to see in a tech startup Not like a normal public service organisation If you'd like a licence to hack legally You can keep a secret and want to make a difference Then ASD might have a job for you There's something for anyone who is curious minded and up for a challenge Over the next few years we'll be recruiting many hundreds of people To join our cyber workforce It's really just a matter of which team is for you Offence, defence or both Thank you ladies and gentlemen I look forward to taking your questions That's a foreign state actor just calling in Thank you very much Mike You've continued today to bring ASD out of the shadows And if you like on to LinkedIn So I'm glad you got in your job ad Happy to help And maybe in return you can help us with a few questions about your world If you don't mind Let me start on the subject of your speech on offensive cyber You gave us these two very interesting examples of operations By which ASD operators have helped to defend Australians And Australia against global threats First of all An operation alongside the ADF In which operators disrupted the work of Daesh And then secondly This fascinating example of a young, yoga loving, touch football playing Australian woman A covert online operator Which is a job title that I now aspire to Assuming the identity of an older male terrorist commander And I'm intrigued And I think probably a lot of us are intrigued How do you assume that identity? How do you persuade somebody online that you are somebody else Share a bit of the tradecraft that your colleagues use if you can For example in that case Sure, thank you again for having me here And thanks for the question It really is a team sport So as much as that individual is an outstanding impressive individual It's not just her Yes it's her at the keyboard leading the interaction But she's guided by many experts Including people who have language experience Cultural experience Behavioral experts, psychologists When we develop a plan And when we're live executing a plan Our operators are backed up by a very comprehensive team And a body of knowledge that says We know how to interact with that individual We already know what our objective is That helps a lot The other thing as part of that It's not just the great team It's the comprehensive training program We put our individuals through And the tradecraft we've developed over many years That help us do this very well There's something magical about my organisation Which isn't a good thing We're an organisation that's both poacher and gamekeeper Offense, defence To catch a thief, you need to think like a thief We go to great efforts to understand The behaviours, the motivations of the individuals And actually understand the character themselves So we can tap into that and win their trust And in this case It's a great example of where we did that At short notice based on our experience And our training And the individual's trust And she was able to move him into a safer place So he wasn't a danger to himself or others Let me ask about that question From a different point of view I like that phrase you just use to catch a thief Sometimes you need a thief And I guess in that case That young woman was using deception Manipulation You know, I'm sure ASD operators Use fishing attempts Fishing tools and so on Now in western countries We don't know a high horse When we hear about foreign hackers launching Those kinds of attacks against us But aren't you doing exactly the same thing? Yes, to a certain extent I might claim we're doing it better than others But to get to the nub of your question Remember we're doing this In very strict limited circumstances In this case We're using this to disrupt someone Who is either radicalised Or potentially radicalised from doing bad things In this case that's very targeted Generally what's on the receiving end Of Australians every day Is not so targeted It's a pretty broad brush Most of it comes from the criminal gangs Who are looking at making money We're not like that organisation We're here to defend Australia From global threats And everything we do is proportionate And legal And in limited circumstances enabled by law What about comparing ASD's work To the work of other Signals intelligence services Are there or what are the things That a signals intelligence service In a democracy such as ASD Would not do that a signals intelligence Service in a non-democracy For example like Russia Or China might do I will answer that question I'll start though by saying Obviously I'm here to talk about ASD's capabilities I can help the audience in so far as I'm confident there are things That we can do technically In terms of generating the effect That very few other nations could do But the best way to compare Us and other nation states Is actually in the premise of your question Look at the legal And cultural settings of our country Everything we do is enabled by law It has to be right It has to be legal It has to be right It has to be proportionate We just don't go up About there has to be some Authoritative basis for which we're doing it There are some countries A smaller number of countries Who don't have the same legal frameworks As we do and they might do things Which are not proportionate to The issue they may rightly be dealing with In our case I can assure you Our actions always proportionate It's a fundamental premise of every Think we do in the offensive cyberspace What about when Not when you're targeting foreign states But what about when you're targeting People smugglers For example people smugglers How does that work So my agency is a foreign intelligence agency And we have this thing called Offensive cyber capability If someone has the authority To disrupt people smugglers We can use this capability to support them It's just like anything else What's the authoritative basis On which someone is operating And can't ask to help them So yes we do have the capability To help people who have the authority To do a couple of questions about The Five Eyes if I can This very intriguing intelligence Alliance between five major Western democracies A decade ago Five Eyes was almost never mentioned In the press, it was a very sort Of niche topic and now It's dropped into New stories all the time You see ministers posing With media banners behind them Referring to a Five Eyes Meeting thanks to a story That learned indeed that Five Eyes Chiefs were served lobster At a dinner in Canada In July 2018 Why is the Five Eyes coming out Of the shadows in this way That's a great question Michael To be honest I'm not sure Why Five Eyes this thing It's a strange language It's a strange terminology But it's something in my business We've been comfortable for many years Yes it's been more known about To our particular circumstance I just happen to be a director general Who believes that in our democracy Transparency is important It's important that the public Understand what ASD does When we say we defend Australia From global threats It's important they understand The legal framework and the oversight Mechanisms under which we operate I think that's incredibly important In any democracy That's why I'm passionate about There are things we do need to protect I think that's incredibly important The other thing you'll see Is our cyber security mission We can't do that in the shadows Actually that's a very public thing And it's right that we're very public In that space So a combination of more transparency For democratic reasons But also our cyber security Activities have taken us out Of the shadows for sure I'm confident that's the same Are the Five Eyes agencies working Together more closely now Than they did in the past? I think it's safe to say We have worked closely together For the last since it was formed Just after the Second World War Let me ask you Let me go on to a slightly different topic But it's not unrelated And that's the question of 5G Two weeks ago on this stage I asked the Foreign Minister Why the government had decided That it was going to have to deal With the security laws Such as Huawei from Australia's 5G network And I should say this is a question That CEOs put to me very often It's the subject of a lot of discussion In the business community And often they will say to me Well, if Huawei, for example Provides the best and cheapest technology Why wouldn't we use it? When I put that question to the Foreign Minister The only answer she put on record Is to be part of Providing advice to the government In relation to that decision So can you tell us especially Given that we have CEOs In the audience today Why was that decision in Australia's interests? Certainly Firstly, AST was one of the agencies But it was a team effort Giving advice to government It's best to look at how we think About 5G and what 5G will become I must say up front though That the notion that some companies The telcos that we've spoke to Across the globe including here in Australia May not all agree with that Whether it's the best technology Or 5G is not yet a fixed thing We're on a path to 5G But back to the reasoning Or at least the way I view 5G For us in its mature form It will be at the top of this nation's Critical infrastructure list Why? Because 5G is not just faster data To your mobile phone Might like that It's not just that Yes, it will be that in some cases It's also more device density Will be supported Why is that important? It's not because there will be more humans With multiple devices It will be there will be machines Talking to machines Devices talking devices Enabled by 5G And there will be a whole range Of new applications Because the latency And some of which we probably have Not yet foreseen Because of that 5G will be critically Important in this country The way I also view it Because everyone will be so reliant on it If it's not there Availability If it's impacted in some way It will impact industrial applications And machines talking to machines Which will have consequences Real world consequences potentially On our society Elements of the power grid Will impact our country greatly So top of our critical infrastructure list For the reasons I've explained Then it comes down to What are we concerned about And I've just said that We're concerned primarily about the availability Because it's going to be top critical infrastructure We want it to be available Security has always been about Confidentiality, integrity and availability And yes in the mobile phone networks That we currently know today Yes government agencies do care about That's not our concern with 5G It's the availability piece What does that look like So if it's disrupted by a nation state That's a bad day because of the impact So I've just mentioned So high risk vendors for us Are categorised as vendors That actually have headquarters In countries Where those countries have capably form And intent And coercive laws That compel their companies I do not have a coercive power That allows me to go to an Australian company And say You must do this and you must keep it secret And this being something overseas To help me do signal intelligence I can't do that So when we have countries that have coercive powers That operate outside of their own Sovereign borders And that country has capably form And intent Those vendors will fall into the category of high risk We worked hard To have the capacity with other agencies To look at what yes would look like In the end I concluded that yes Wasn't acceptable But the decision was taken by government And I think it's the right decision That has been made Now we're watching sort of play out Similar decisions being taken In the capitals of other five eyes countries And for example in Britain There's been some reporting to the effect That Britain may not take the same decision That Australia did Although I think that there's a process That they're going through What about the United States? Because I also asked the Foreign Minister On this stage about that infamous tweet By President Trump Where he seemed to offer an olive branch Towards Beijing in relation to Huawei In the middle of these trade negotiations And he said I want the United States to win through competition Not by blocking out currently More advanced technologies And a lot of commentators read that Maybe if Xi Jinping played ball Then perhaps there's a possibility Of the President overturning Any decisions taken on 5G And I guess it would be awkward For Australia wouldn't it If the United States were to take that position On 5G after we had taken our decision Of course we're both sovereign governments But still given the relationship That would be very awkward So can I ask you from your interactions With US officials How confident are you that In that decision That they'll take a similar decision That they'll maintain a similar decision to ours So firstly I would say I think that was a great aspiration Of the US President The notion that you will win on your merits Rather than taking some forceful actions Is a pretty damn good one When it comes to sovereign nations It's a matter for every country To make a decision on how they manage their risk It's a question of risk appetite Very critical infrastructure It's for sovereign nations If the US made a completely different decision To Australia That doesn't matter Because Australia has made its own decision Based on our own risk appetite And that's the way it should be This is a thing that sits inside our country It impacts our country And risk appetites are decision For governments of sovereign nations Alright let me ask you Another Trump related question If I can The interference in the 2016 presidential Election is pretty well documented By agencies By US intelligence agencies And many other observers And over the weekend The special counsel Mr Muller Added his voice to theirs And he talked about Or at least the summary of the report That we have seen talks about Russia Attempting to influence those elections Both through disinformation And social media operations And whatever As a fellow professional What would you say about the effectiveness Of Russia's attempts to interfere In the US presidential election That's a great question I'm sorely tempted to say a look forward To your next question You know I'm not sure I can comment on that Did it have an outcome If they were successful Were they successful I think only the American people Can be a judge of that There is no doubt that In other nations Who might want to do nefarious things Or use it to disrupt You know counter terrorism for example That gives a world of opportunity And foreign interference Through amplifying or disaffecting people May or may not be an effective tool The strength So really again I come back to it as a question For the American people Whether that's had an impact or not Having said that The ability for us to freedom of speech And what we say and how we debate things Is actually a positive And even if someone is sending out Bad messages and trying to push people The way you counter that Is actually have a good robust society A conversation in society That's a good thing What about how democracies Should respond when our adversary Is trying to meddle in our affairs There's been a lot of discussion About how the Obama Administration Reacted to the early indications The early advice they were getting About the Russian operations And there's reporting that President Obama Looked President Putin in the eye And told him to cease and desist But there's also been a lot of criticism That more robust countermeasures Weren't taken by the United States For example You know people have written about Exposing ill-gotten gains Of the Russian leadership Or making some of those ill-gotten In stopping our adversaries Not just exposing them But actually showing them That we will impose a cost on them If they continue with this action Which is deleterious to our interests Sure, again that's a How long is a piece of string If you have clear evidence That a nation is interfering In your country Then of course you should have That conversation with them Interestingly in this conversation Where people go straight to There should be a cyber-response Cyber does not beget cyber If you have evidence that a nation Is interfered in your country Then you have the full range Of the state in response What that looks like depends on What you're seeing happening to you The evidence you have And then actually what you need To do about it All right let me ask you One or two more questions And then I'm going to go to Come to as many people as possible Let me finish by asking This section of the event By just asking you about Christchurch About those awful events Ten days ago or so What has been the role Of ASD in the Australian Intelligence community In the response to Christchurch And is there any truth to The allegation or the suggestion That you've seen reported for example That Western intelligence agencies Have taken their eye off the ball Winging extremism because They're so focused on other forms Of extremism Firstly let me obviously say Like all of you how horrific Those events were in Christchurch Obviously my condolences To the people of New Zealand The victims and their families I think the New Zealand community Response has been nothing short Of impressive but what a terrible Thing to happen I can confirm for you that On that Friday None of us knew about him Beforehand I sought my minister's Authorisation and since that time We have been supporting ASIO And our New Zealand counterparts In investigations about What we know What other further elements of that Obviously that's subject to Ongoing investigations Which I won't speak of here New Zealand Government has Announced a Royal Commission And that's right for them to do The violent extremism Regardless of the ideological cause Is always going to be taken Seriously and of great interest To the Australian law enforcement And security agencies In fact there is actually The Director-General of security Has said that we've actually Been looking at that for some time There is a court case underway For a matter that happened in 2016 I won't comment any further So the notion that We've been focused over there Is almost related And the rest I'd suggest you ask Duncan Lewis when you're next Have him on stage Alright we'll get him next week Alright ladies and gentlemen We've got about ten or fifteen Minutes to ask for questions So what that means is that People need to keep their questions Very short I'm not going to allow people To make statements or speeches I'm interested in short sharp Questions I've seen a couple of questions From journalists and I'll take those But I want to take some questions From non journalists as well I saw Deborah Snow first Deborah if questions can wait For the microphone thank you Sure okay thanks very much For the speech And the Q&A so far has been Really interesting Just Dr Christ Church Was there anything that could Have been done perhaps Did you see any role In broadcasting his actions Alive on social media Or having seen that done Would that now be a priority For an organisation like yours To make sure that that couldn't happen again And just extending that Slightly more broadly How satisfied are you With the responses of the big tech companies To the challenges that this has thrown up Excellent question So my organisation Is a foreign intelligence organisation So any role I play in there Has to be the foreign end of that And as I explained We did have a role after the event And we do have a role after the event In terms of the elements Of social media companies Or the ability of you stop Something being broadcast Yes it's true Our offensive cyber capability Could be used to do things like that As in stop of broadcast Or call of call When that's happening And that's why I think it's right The government has approached the social media companies And said just like we do in our print media Or our television media The internet should be no different In terms of there are obligations On those service providers to make sure it's safe I think that's the right way of doing it Not going straight to let's unleash ASD To take down on some video streaming thing That's probably not the right way to go We need the help of the social media companies So far I'm not fully briefed on where We're up to on that That's not my lane in the road for obvious reasons But I think the question And the call for help And expectation of the social media companies By our government is the right one most definitely So Jamie Jamie Smyth from the Financial Times Good afternoon Just on the Huawei ban question You said it doesn't matter If the US or the UK Don't ban it But does it not have implications For the Five Eyes Network In terms of future cooperation If they're using different types of kit Would that not open up Australia To having problems in terms of cooperating No again because it's each nation Will make its own decision based on Its risk appetite Yes come back to my point around Here in Australia it's about the availability If there was some reason I was worried About another country's availability Of infrastructure that was actually In Australia's interests Maybe it would have a concern but no Because it's actually this is about Australia's risk appetite I can assure you our differences of opinion Which we will have from time to time And we've had in the past Don't impact our mutual recognised need That we are far better as a result Of our power to cooperate It's happened since the end Of the Second World War We've seen the benefit of that Time and time again And even differences on how we Damage our relationship at all At least from my perspective Paul Mayley from the Australian Hello Mike thank you for the speech In February it was revealed That Parliament House and the Major parties had been the target Of I think quite a sophisticated Hack that was attributed to Or it was believed was The work of a foreign state actor I wonder if you could just update us On that have we identified Have you identified For that hack And if so can you tell us who it was All I can say Paul is the investigation Continues yes you are correct We did say it was a sophisticated Nation state For reasons that When we do this work When we're hacking overseas For foreign intelligence purposes We work extremely hard And use tradecraft that says We will not be detected And if our activity was detected You could not prove it was Australia We still have an investigation underway Yes sir in the front row If you could just wait for the microphone sir Thanks very much Mike Tariq talk I'd really like to comment about culture Kind of bottom up approach Get a job in business anytime You spoke about legal And ethical frameworks And critical turning Good culture is the ethical framework Could you make some comment About that and how it's applied Within your organisation Yeah thank you it's a great question So for us culture and leadership Are kind of tied good leadership Can bring the culture But the other thing that guides us Is our values Rules guide us when people are watching Values guide us when they're not So we work hard on the terms of our Selection our leadership And our interactions with our team And our values are very powerful That's a winning combination When you have people who you know Strive for excellence They understand you know what Belonging to a great team Because it's partnerships and teamwork That gets anything done You know the audacious in concept Because we do really hard things But actually the meticulous in execution Delivers in spades We have an organisation that is Actually incredibly focused on doing The right thing by the public Born out of our values We put a lot of effort focusing on that I saw a question from Angus Greig Can I just follow up on Paul's question If you do identify the sophisticated State actor Would you expect to name them Thanks for the question Yes let's have this conversation About attribution So the Australian government Has done attribution before China, Russia, Iran We should not assume from that though That every time we determine who it is That actually they would be called out publicly It's always a matter for government Depending on the circumstance Actually how we take the next step And what we do about that Once we know who it is So I can't answer that question At this point in time Whether we would call them out or not And actually that would be a matter For government on advice from the agencies But I would want to leave you with the message Of one we understand who it is That we would call them out publicly Remember calling them out publicly Is done for a reason Not just to have the satisfaction Of putting it into the press But it's done as part of a strategy To say some behaviour is unacceptable Attribution publicly is not one way Of always getting that message across Yes sir Thank you Mike George Potapas from Telstra Security Just a question related to availability Of services and resilience Moving forward in the new world I read about an exercise in Russia Of all places where they disconnected The whole country and ran an exercise In terms of seeing if the organisation Can still operate Are there any similar initiatives I guess at a national level Thoughts about how we can test And prepare larger organisations In terms of resilience and availability Of services at that level Thank you for your question Absolutely organisations, governments And we take seriously If you've not exercised The first time you're going to Try yourself is actually when something bad happens So exercising is really important I wouldn't necessarily agree to the Russian approach of let's disconnect Australia from the internet And see how we go That would be a bit of a crisis exercise On many levels But your point is valid and yes We should all focus on making sure We're ready and we match fit For the day that something bad happens Given really about the audacity Of concept that ASD prides itself on And I want to ask you about the targeting Process for ASD Obviously a few years ago We all recall there were a lot of stories About Australian intelligence officials Having access to the mobile phone Of the wife of the Indonesian president And there was a big discussion Then about protocols About between Australia and Indonesia In that period and more broadly Over the last 10 or 15 years of course Australia's foreign circumstances Have changed and in particular There's one country, China That is looming ever larger Both as an opportunity And a challenge for us So how does that flow through To the kind of targeting that ASD operates? Certainly so our again Foreign intelligence agency So our intelligence priorities are set By the National Security of Kidney Cabinet and that's coordinated Through Nick Warner's Office of National Intelligence Everything we do is guided by Those intelligence priorities set on us That directs where we go It's the government's need of the day Depending on our strategic circumstance And the need of government It works very effectively It works very effectively And in what direction does it tend to move? So you'd appreciate there's some things That we don't talk about Because the priorities themselves are classified But you would not be surprised That when it comes to threat to life That is a top focus And priority for government and the agencies So countering terrorism Or supporting military operations Supporting the warfighter They will always be at the top of our list And our resources where we apply Our resources are very much focused On those ones Anything threat to life If an Australian was kidnapped offshore In place we would work to provide Foreign Signals Intelligence to Try and get the safe return of that Australian That's a given The other priorities are Guided by strategic circumstances Some of them may be obvious Some of them not But I can't talk about them in this forum There's always got to be a little bit of mystery Of course when an intelligence official speaks Ladies and gentlemen I think Mike Burgess has been very good humid Actually and very open And I think that's all to the good It was a very interesting speech I noticed he made that comment about Sometimes when ASD is involved In an offensive cyber operation You don't have to blow up a computer You can just make sure that it doesn't work At a certain time That often happens to me in my IT experience So now I know who to blame Some of you might have seen last year At the Aspen Security Conference Mike and some of his counterparts From other Five Eyes In other countries Not that they're coordinating in any visible way But anyway they did an event on stage And Mike talked about Moving from admiring the problem To tackling the problem And I think today he has Filled in the picture For us a lot about how ASD Tackles some of the problems Like your agency And thank you So thank you for that Mike And also thank you for taking the questions You're also a good talker Let me thank everybody in the audience Let me give you one quick add And that is tomorrow night On this stage I'll be having a conversation With Steven Hadley One of the most respected foreign policy voices In Washington and the National Security Advisor To the last Republican president There's still a few tickets to that So please register now But for the moment ladies and gentlemen Thank you for coming And most importantly thank you very much To the general of the Australian Signals Intelligence Signals Director at Mike Burgess Thank you