Australia’s Sharp Turn To Information Warfare

Australia’s place in the Asian military scene took a sharp turn at the beginning of July when the Government led by Malcolm Turnbull announced the creation of the country’s modified version of a US Cyber Command. 

The move followed the 2016 Defence White Paper, which foreshadowed a near doubling of defence spending in the decade, including 1700 new posts in cyber or cyber-related roles. What combination of threat or opportunity pushed Australia into this position?

That document noted merely that “Defence will continue to integrate cyber capabilities into routine planning and command and control processes in addition to maintaining and remediating the networks and systems.” 
The key concepts of information superiority or information dominance do not explicitly appear. It painted a picture of a defence organisation hamstrung by tight budgets and outgunned in the region.

The document stuck with the decades-old view that Australia could maintain a technical edge over its regional rivals that might help compensate for smaller numbers. It observed that “superiority in combat and other military operations will hinge on continual technological advancement…providing significant strategic, operational and tactical advances to offset our strategic and fiscal challenges.”

There are several possible explanations that separately or in some combination explain the radical shift in 2017 to reorganise the Australian Defence Force (ADF) for information war. 

In December 2013, ISIS began its rapid military advance into Iraq, supported by globally prominent Internet-based propaganda. In March 2014, China stated its intention to do everything it could to become a “cyber power,” including through consequential changes in military strategy and organisation.

At the same time, through 2014 and 2015, the ADF was confronted by Russian military cyber operations as the Australian government intervened robustly in the investigation of the Russian missile attack on MH17 and subsequently decided to deploy RAAF assets to operate in Syrian air space, where Russian military aircraft were also involved in combat. In September 2014, Malcolm Turnbull, the country’s first high-tech leader, replaced Abbott as prime minister. In 2014 and 2015, the United States undertook its most intense lobbying effort yet seen toward Australia to do more to counter what it saw as the China threat in the South China Sea.

Until Abbott came to power, Defence probably did not feel it could divert scarce resources to what it felt was an experiment in military evolution. Its view was best captured in the 2009 White Paper, which observed that “we need to be more capable in this area by 2030” and that “the risk of cyberattack is even greater than we had first thought.” 
It reported that the government had “decided to invest in a major enhancement of Defence’s cyber warfare capability” but it talked of “information superiority” for decision-making only, suggesting “modest capability developments, while keeping open the option of enhancing our capabilities.”

The big spend by Abbott almost certainly unleashed Defence to look more radically at the “cyber command option,” which would see the development of such capabilities throughout the ADF, and not just for command and control. 
This interest would have been enabled by China’s decisive moves in that direction in 2014 and by a general realisation that global terrorism probably had cyber-space implications for ADF operational capability. In mid-2015, ADF sources reported that they were impatient change for change and that the government was still holding them back.
It was in May 2015 that China issued its first ever information warfare strategy declaring, as the United States had, its commitment to the war-fighting principle of information dominance. 

The Australian Navy and Air Force had long been active in the cyber domain, and were moving in the same direction as Army, but it may well have been the changes in Army that allowed the breakthroughs in a political sense. The easing tempo of overseas combat commitments by later 2014 probably also facilitated the change.

While the threat environment may have been a principal driver, and institutional factors within the ADF an enabler, it is probably the case that the ADF had slowly been socialised to acceptance of the information revolution in military affairs through its wide-ranging contacts with counterparts in the United States and other friendly countries, including Israel, which won a contract for battle-management technologies for the Army in 2010. 

The concept of information dominance was American but the Israeli example may have been an inspiration for government ministers on what smaller countries could do in this space.

The Diplomat:

You MIght Also Read:

Australia Implements Mandatory Data Breach Reporting:

North Korea's Cyber War on Australia:

 

« Islamic State On The Internet
Twitter May Introduce A 'Fake News' Flag »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

RiskSense

RiskSense

RiskSense empowers enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results.

Siscon

Siscon

Siscon delivers tailor-made compliance solutions that are based on the customer's specific wishes and reality and then supplement with many years of experience in the field.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

METCLOUD

METCLOUD

METCLOUD is driving a cloud evolution. A cloud that promises relentless cybersecurity, performance, resilience and sustainability.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.