Thanks idle. You're certainly well up to date. The following extract from your link (http://www.asio.gov.au/Media/Contents/AICC_2008.aspx) is inter alia, pertinent
" And whereas extremists have proven adept at utilising new media for propaganda purposes, it doesn't take a large leap of the imagination to envisage them engaging in other types of cyber-activity, with the aim of exploiting our society's growing dependence on information technology systems and infrastructure. Regarding potential exposure to cyber-activities more broadly, the widespread use of the internet in government and business presents opportunities for state agencies to gain covert access to information. And a range of non-state actors - hackers, criminals and other foreign entities, acting independently or on behalf of groups, networks, or states - are engaged in nefarious cyber-activities: whether for profit; to cause damage; test for vulnerabilities; or acquire sensitive information. Such actors are targeting business and government alike. And, in terms of private sector vulnerabilities, they may not be trying merely to test, manipulate, or damage your IT systems. By using trojans and other covert programs designed to transmit sensitive information, data held on compromised IT systems can be exfiltrated, covertly, via the internet, to someone virtually anywhere on the planet. A successful attack could see the loss of commercially-sensitive information: business strategies, intellectual property, sensitive client details, even company employee information."
SYG Price at posting:
0.0¢ Sentiment: Buy Disclosure: Held