Australia’s Sharp Turn To Information Warfare

Australia’s place in the Asian military scene took a sharp turn at the beginning of July when the Government led by Malcolm Turnbull announced the creation of the country’s modified version of a US Cyber Command. 

The move followed the 2016 Defence White Paper, which foreshadowed a near doubling of defence spending in the decade, including 1700 new posts in cyber or cyber-related roles. What combination of threat or opportunity pushed Australia into this position?

That document noted merely that “Defence will continue to integrate cyber capabilities into routine planning and command and control processes in addition to maintaining and remediating the networks and systems.” 
The key concepts of information superiority or information dominance do not explicitly appear. It painted a picture of a defence organisation hamstrung by tight budgets and outgunned in the region.

The document stuck with the decades-old view that Australia could maintain a technical edge over its regional rivals that might help compensate for smaller numbers. It observed that “superiority in combat and other military operations will hinge on continual technological advancement…providing significant strategic, operational and tactical advances to offset our strategic and fiscal challenges.”

There are several possible explanations that separately or in some combination explain the radical shift in 2017 to reorganise the Australian Defence Force (ADF) for information war. 

In December 2013, ISIS began its rapid military advance into Iraq, supported by globally prominent Internet-based propaganda. In March 2014, China stated its intention to do everything it could to become a “cyber power,” including through consequential changes in military strategy and organisation.

At the same time, through 2014 and 2015, the ADF was confronted by Russian military cyber operations as the Australian government intervened robustly in the investigation of the Russian missile attack on MH17 and subsequently decided to deploy RAAF assets to operate in Syrian air space, where Russian military aircraft were also involved in combat. In September 2014, Malcolm Turnbull, the country’s first high-tech leader, replaced Abbott as prime minister. In 2014 and 2015, the United States undertook its most intense lobbying effort yet seen toward Australia to do more to counter what it saw as the China threat in the South China Sea.

Until Abbott came to power, Defence probably did not feel it could divert scarce resources to what it felt was an experiment in military evolution. Its view was best captured in the 2009 White Paper, which observed that “we need to be more capable in this area by 2030” and that “the risk of cyberattack is even greater than we had first thought.” 
It reported that the government had “decided to invest in a major enhancement of Defence’s cyber warfare capability” but it talked of “information superiority” for decision-making only, suggesting “modest capability developments, while keeping open the option of enhancing our capabilities.”

The big spend by Abbott almost certainly unleashed Defence to look more radically at the “cyber command option,” which would see the development of such capabilities throughout the ADF, and not just for command and control. 
This interest would have been enabled by China’s decisive moves in that direction in 2014 and by a general realisation that global terrorism probably had cyber-space implications for ADF operational capability. In mid-2015, ADF sources reported that they were impatient change for change and that the government was still holding them back.
It was in May 2015 that China issued its first ever information warfare strategy declaring, as the United States had, its commitment to the war-fighting principle of information dominance. 

The Australian Navy and Air Force had long been active in the cyber domain, and were moving in the same direction as Army, but it may well have been the changes in Army that allowed the breakthroughs in a political sense. The easing tempo of overseas combat commitments by later 2014 probably also facilitated the change.

While the threat environment may have been a principal driver, and institutional factors within the ADF an enabler, it is probably the case that the ADF had slowly been socialised to acceptance of the information revolution in military affairs through its wide-ranging contacts with counterparts in the United States and other friendly countries, including Israel, which won a contract for battle-management technologies for the Army in 2010. 

The concept of information dominance was American but the Israeli example may have been an inspiration for government ministers on what smaller countries could do in this space.

The Diplomat:

You MIght Also Read:

Australia Implements Mandatory Data Breach Reporting:

North Korea's Cyber War on Australia:

 

« Islamic State On The Internet
Twitter May Introduce A 'Fake News' Flag »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

IT Security Association Germany (TeleTrusT)

IT Security Association Germany (TeleTrusT)

TeleTrusT is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Cyberra Legal Services (CLS)

Cyberra Legal Services (CLS)

Cyberra Legal Services provides cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security, cyber forensics and cyber training services.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.