ACSC programs and advice are being migrated to (see sidebar)

CyberSense video

< Previous episode - Index - Next episode >

CyberSense episode 7: Watching Your Every Move

Download (right-click > Save As) MP4 (14MB) or OGV (15MB)

Read script

CyberSense episode 7 'Watching Your Every Move' script

  1. FADE IN: Inside hackers' bunker - daytime. DAX, ANUSKHA and EMILY are working on computers.
  2. GRAPHICS: DAX is changing the settings on his email to He finalises a fake conference feedback Word document and attaches it in an email to SHAUN.
  3. CUT TO: Office interior - daytime. SHAUN Shaun receives the email.
  4. GRAPHICS: The email asking conference delegates to complete and return the attached feedback document. Shaun opens it. Shaun starts reading the document but is interrupted by his phone ringing.
  5. SHAUN - Shaun Strickland. Yes. OK, I’ll get onto that right now.
  6. GRAPHICS: Shaun starts a new email titled Tender Recommendation. He clicks 'attach' and from a folder named 'Contract 132-09' selects a file named 'Tender Rankings'. He sends the email. He replies to further classified emails.
  7. CUT TO: Inside hackers' bunker. DAX is at his computer.
  8. GRAPHICS: Dax can see all Shaun’s activity on his screen. A Trojan is scanning Shaun’s computer.
  9. DAX - Target secured and open for inspection.
  10. ANUSHKA and EMILY join him in front of his screen.
  11. ANUSHKA - Nice one.
  12. All three smile wickedly and chat amongst themselves in the glow of the computer.
  13. VOICE-OVER: If your computer is compromised at this stage, then it will be very difficult to identify. But let’s recap on the safety measures that can prevent this scenario ever occurring. FADE OUT


In August 2018 ACSC launched a new website,, to reflect its new organisation.

Cyber security programs and advice are being migrated to Information and advice on this site remains current.

Reports help the ACSC to develop a better understanding of the threat environment and will assist other organisations who are also at risk.

Cyber security incident reports are also used in aggregate for developing new defensive policies, procedures, techniques and training measures to help prevent future incidents.

Information for Australian businesses
Information for individual Australian citizens
Information for Federal, State and Local government agencies