G20 is an \u201cirresistible target for hackers,\u201d according to Greg Rudd, spokesman for the Council of Registered Ethical Security Testers, or CREST Australia. Hackers "would love to just get into the traffic light system for example and just disrupt that and what they're after really is free international media," Rudd told ABC.Historically, attackers do target the G20 Summit, but none have ever taken over traffic light systems. Even though it\u2019s supposedly \u201ceasy\u201d to hack traffic lights with a laptop, it\u2019s a safe bet that if attackers ever take control of traffic light systems anywhere in the world, at any time, it will gain international media attention.Rudd gave three broad categories of groups that can launch massive \u201ccyberattacks on G20: state-sanctioned hackers, commercial spies and activist organizations such as Anonymous.\u201d But with China and Russia as the most obvious suspects, Rudd said, \u201cA lot of hackers all over the world have gone out of their way and developed it into a bit of an art form to lay the blame at China and Russia's feet for all sorts of hacks."Past cyberattacks on G20 Summits have included a flood of emails with malware attachments while G20 was held in Paris during 2011; a botnet-controlled DDoS attack on South Korea in 2009; and a 2007 cyberattack on Estonia that was dubbed \u201cthe second-largest instance of state-sponsored cyberwarfare.\u201d Australian businesses have been warned by the Australian government spy agency responsible for signals intelligence (SIGINT) and information security (INFOSEC) \u201cto brace for a wave of cyberattacks\u201d around the G20 summit.With a motto of \u201creveal their secrets \u2013 protect our own,\u201d the Australian Signals Directorate (ASD) is like an Australian version of the NSA and is part of Five Eyes. Since the G20 Summit will be held in Brisbane on November 15 to 16, ASD said networks there have "become a more attractive target for cyber espionage and attack." Targeted attacks by \u201cstate-sponsored or other foreign adversaries, cyber criminals and issue-motivated groups is a real and persistent threat.\u201dBecause the same old cyber tricks are still effective, the ASD issued recycled G20 cyber security advice from 2013. Social engineered emails are part of the warning as malicious cyber actors are looking for a \u201cweak link to try and break into a network.\u201d Just ask Home Depot or Target how well tricking a third-party vendor for a foothold and stolen credentials still works.\u201cIf it\u2019s not yours, don\u2019t use it!\u201d That wisdom pertains to USB flash drives or other removable media as they are common \u201cgifts\u201d handed out at G20. Malicious software might also be a hidden extra in \u201cgifted electronic devices\u201d or when charging mobile devices via untrusted computers. Other cyber advice to individuals involved in G20 included avoiding public Wi-Fi connections, hotel kiosks, Internet cafes, and accessing web-based email as well as steering clear of blabbing too much in social media.Anonymous denies plans to wear burqas at G20The list of G20 prohibited items (pdf) is long and diverse; it includes a ban on clowns \u2013 or otherwise disguising or concealing a person with camouflage paint or cream. That also applies to the Guy Fawkes masks often donned by members of Anonymous. After an article claimed Anonymous protesters would wear burqas to hide their faces, Anonymous Queensland issued a statement calling the article \u201cfake.\u201d Yet the possibility caused the Queensland Police Service to issue a warning that it \u201cwill challenge anyone who they believe poses a threat to the safety and security of the G20 leaders\u2019 summit, and through a variety of means establish their identity.\u201dG20 Operations Center surveillanceFor real-world security, the G20 Operations Center was described as a \u201cstate-of-the-art police command center\u201d with \u201cunprecedented\u201d surveillance capabilities that spark \u201cenvy\u201d among other Australian police departments. 150 police will man the center 24 hours a day.\u201cHundreds of security cameras, including those at Brisbane Airport and across the CBD, will feed into the command center,\u201d which has \u201cdozens of TV screens\u201d lining the walls. "It really is a state-of-the-art facility, there's quite a few screens that obviously give us access to CCTV footage [and] to aerial photography from [the police] Polair [helicopter]," said G20 Police Commander Katarina Carroll.On Friday, a 57-year-old man was the first to be arrested under the G20 Safety and Security Act; not because of his actions, but because he was taking photos and \u201crefused to identify himself when questions by police on the steps of the Brisbane Convention and Exhibition Center.\u201d Police cited the same G20 Act to question a woman after asking her to provide identification. The Queensland Police Service also allegedly warned protesters that it has sonic cannons for crowd control if G20 demonstrations get too rowdy.