Australia’s Sharp Turn To Information Warfare

Australia’s place in the Asian military scene took a sharp turn at the beginning of July when the Government led by Malcolm Turnbull announced the creation of the country’s modified version of a US Cyber Command. 

The move followed the 2016 Defence White Paper, which foreshadowed a near doubling of defence spending in the decade, including 1700 new posts in cyber or cyber-related roles. What combination of threat or opportunity pushed Australia into this position?

That document noted merely that “Defence will continue to integrate cyber capabilities into routine planning and command and control processes in addition to maintaining and remediating the networks and systems.” 
The key concepts of information superiority or information dominance do not explicitly appear. It painted a picture of a defence organisation hamstrung by tight budgets and outgunned in the region.

The document stuck with the decades-old view that Australia could maintain a technical edge over its regional rivals that might help compensate for smaller numbers. It observed that “superiority in combat and other military operations will hinge on continual technological advancement…providing significant strategic, operational and tactical advances to offset our strategic and fiscal challenges.”

There are several possible explanations that separately or in some combination explain the radical shift in 2017 to reorganise the Australian Defence Force (ADF) for information war. 

In December 2013, ISIS began its rapid military advance into Iraq, supported by globally prominent Internet-based propaganda. In March 2014, China stated its intention to do everything it could to become a “cyber power,” including through consequential changes in military strategy and organisation.

At the same time, through 2014 and 2015, the ADF was confronted by Russian military cyber operations as the Australian government intervened robustly in the investigation of the Russian missile attack on MH17 and subsequently decided to deploy RAAF assets to operate in Syrian air space, where Russian military aircraft were also involved in combat. In September 2014, Malcolm Turnbull, the country’s first high-tech leader, replaced Abbott as prime minister. In 2014 and 2015, the United States undertook its most intense lobbying effort yet seen toward Australia to do more to counter what it saw as the China threat in the South China Sea.

Until Abbott came to power, Defence probably did not feel it could divert scarce resources to what it felt was an experiment in military evolution. Its view was best captured in the 2009 White Paper, which observed that “we need to be more capable in this area by 2030” and that “the risk of cyberattack is even greater than we had first thought.” 
It reported that the government had “decided to invest in a major enhancement of Defence’s cyber warfare capability” but it talked of “information superiority” for decision-making only, suggesting “modest capability developments, while keeping open the option of enhancing our capabilities.”

The big spend by Abbott almost certainly unleashed Defence to look more radically at the “cyber command option,” which would see the development of such capabilities throughout the ADF, and not just for command and control. 
This interest would have been enabled by China’s decisive moves in that direction in 2014 and by a general realisation that global terrorism probably had cyber-space implications for ADF operational capability. In mid-2015, ADF sources reported that they were impatient change for change and that the government was still holding them back.
It was in May 2015 that China issued its first ever information warfare strategy declaring, as the United States had, its commitment to the war-fighting principle of information dominance. 

The Australian Navy and Air Force had long been active in the cyber domain, and were moving in the same direction as Army, but it may well have been the changes in Army that allowed the breakthroughs in a political sense. The easing tempo of overseas combat commitments by later 2014 probably also facilitated the change.

While the threat environment may have been a principal driver, and institutional factors within the ADF an enabler, it is probably the case that the ADF had slowly been socialised to acceptance of the information revolution in military affairs through its wide-ranging contacts with counterparts in the United States and other friendly countries, including Israel, which won a contract for battle-management technologies for the Army in 2010. 

The concept of information dominance was American but the Israeli example may have been an inspiration for government ministers on what smaller countries could do in this space.

The Diplomat:

You MIght Also Read:

Australia Implements Mandatory Data Breach Reporting:

North Korea's Cyber War on Australia:

 

« Islamic State On The Internet
Twitter May Introduce A 'Fake News' Flag »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

OpenSphere

OpenSphere

OpenSphere is an IT company providing security consultancy, information system risk management and security management services.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

Pipeline Security

Pipeline Security

Pipeline is a leader in cybersecurity, offering comprehensive services to protect organizations from evolving threats.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Spinnaker Support

Spinnaker Support

Spinnaker Support is a premier global provider of on-premise and cloud-based enterprise software support services.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.