At first glance, transparency seems like an unequivocal virtue. It fosters trust among member nations, reassures the public, and demonstrates NATO’s commitment to openness. However, when dealing with military operations, the equation becomes more intricate. Operational security (OPSEC) demands that certain details remain confidential to protect troops, strategies, and capabilities.
Brig. Gen. Gunnar Bruegner, assistant chief of staff at NATO’s Supreme Headquarters Allied Powers Europe, aptly captures this dilemma. He acknowledges the need for transparency but recognizes that it cannot come at the cost of compromising operational effectiveness. Striking the right balance is akin to walking a tightrope: one misstep and the consequences could be dire.
Steadfast Defender involves a series of military maneuvers across NATO member countries, with Poland hosting a crucial leg. The exercise aims to test NATO’s readiness and interoperability. While NATO wants to showcase its capabilities, it must also be cautious not to reveal too much. The elephant in the room is Russia—a nation that views NATO exercises as a direct threat.
Recently, a leak in Germany added fuel to the fire. Discussions about potentially supplying Ukraine with Taurus missiles were intercepted by Russian intelligence. The audio from a web conference provided insights into missile supply plans and operational scenarios. Suddenly, the fine line between accountability and information security became starkly visible.
Russia closely monitors NATO’s activities. For them, Steadfast Defender isn’t just a routine exercise; it’s a signal. As NATO briefs the media and the public, it must tread carefully. The challenge lies in providing a bigger picture without inadvertently revealing critical details. The delicate dance continues.
NATO’s caution stems from the lessons learned during the war in Ukraine. The conflict highlighted the importance of protecting sensitive information. Russia’s hybrid warfare tactics—combining conventional military actions with cyberattacks and disinformation—underscore the need for robust OPSEC.
So, how does NATO navigate this minefield? Here are some considerations
Selective Transparency: NATO can be transparent about overarching goals, the importance of collective defense, and the commitment to deterrence. However, specific operational details should remain classified.
Secure Communication Channels: Ensuring secure communication channels during exercises and discussions is crucial. Encryption, secure video conferencing, and strict protocols can minimize leaks.
Educating Personnel: Every NATO member, from high-ranking officials to soldiers on the ground, must understand the delicate balance. Training programs should emphasize the importance of OPSEC.
Public Perception Management: NATO needs to manage public perception effectively. Transparency doesn’t mean revealing every tactical move; it means being accountable and explaining the broader context.
The Department of Defence is afraid that the personal information of personnel, like DoB, may have been breached after a communications platform used by the military suffered a ransomware attack.
Hackers attacked the ForceNet service, which is operated by an external information and communications technology (ICT) provider.
The organisation in the beginning told the Defense Department no data of former or current personnel was breached.
However, the Department of Defense believes that personal details like the date of enlisting and DoB may have been stolen, despite initial hints being contrary to what the external provider is saying.
In a message notification to the staff, the defence chief and secretary said the issue is being taken "very seriously."
There has been a series of cyberattacks in recent times, from health insurance companies to telecommunications.
Medibank earlier this week confirmed a criminal organization behind a cyber attack on its company had access to the data of around 4 million customers, some of these consist of health claims.
In September, Optus said a cyberattack had leaked the data of around 10 Million Australian users, with a considerable amount of information stolen from around 2.8 million people.
Minister for Defense Personnel Matt Keogh ForceNet kept upto 40,000 records, saying "I think all Australians, and rightly the Australian government, is quite concerned about this sort of cyber activity that's occurring, people seeking through nefarious means to get access to others' personal data."
In the email to the staff, the Defense Department was confident that the hack of ForceNet was not targeted at the IT systems of the department.
It said "we are taking this matter very seriously and working with the provider to determine the extent of the attack and if the data of current and former APS [Australian public service] staff and ADF personnel has been impacted. If you had a ForceNet account in 2018, we urge you to be vigilant but not alarmed."
Earlier talks with the service provider hint that there is no substantial proof that data of former and current ADF Personnel and APS staff personnel have been breached.
It said, "we are nevertheless examining the contents of the 2018 ForceNet dataset and what personal information it contains."