Home Government Tech Policy Defence to move files from data centre after Chinese investment

Defence to move files from data centre after Chinese investment

Defence to move files from data centre after Chinese investment Featured

Chinese investment in the parent company of a Sydney data centre, Global Switch, has resulted in the Australian Defence Department deciding to end its relationship with the data centre and move all the secret files hosted there in-house again.

The parent company, Aldersgate Investments, owns two data centres in Ultimo where it stores classified Australian government material, including sensitive Defence and intelligence files, according to an ABC report.

The switch back will cost the government about $200 million and will take place in 2020 when the contract between Defence and the data centre ends.

Both data centres in Ultimo have gateways that are certified by the Australian Signals Directorate and can be used for secure access by government offices.

The ABC said that the ownership of Global Switch changed in December 2016 when Aldersgate sold a 49% stake to a Chinese group known as Elegant Jubilee.

However, this was contested by Treasurer Scott Morrison during the ABC News AM programme this morning. Morrison said the ownership of Global Switch had not changed despite the Chinese investment, as they had been "carved out" of the parent company and were thus not affected by the stake being sold.

The ABC said the investors in Aldersgate were brought together by Li Qiang who owns Daily Tech, a leading data centre company in China. The main investor was the Jiangsu Sha Steel Group, China's largest private steel enterprise.

The investment triggered a review by the Australian Foreign Investment Board, followed by the government seeking new conditions for the deal. These included an assurance that the two Australian data centres would continue to be owned in toto by Aldersgate.

ABC quoted Damon Reid, the APAC group director for Global Switch, as saying: "We don't provide IT services to customers nor do we have access to customer data.

"Our customers lease space which they fit out with their own secure cages with their own servers. Global Switch operates under the highest levels of security and our shareholders are restricted from physical access to the data centre."

This is not the first time that Australia has shown sensitivity to dealing with Chinese private sector entities. One example came when the Chinese telco Huawei was not allowed to bid for work with the NBN Co back in 2013.

In 2015, the investment by a Chinese corporation in Darwin's commercial port led to then US president Barack Obama personally telling Australian Prime Minister Malcolm Turnbull that Washington should have been consulted before the 99-year lease was finalised.

And more recently, additional conditions were imposed for foreigners, mostly Chinese, buying properties in Australia.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications