Australia’s Sharp Turn To Information Warfare

Australia’s place in the Asian military scene took a sharp turn at the beginning of July when the Government led by Malcolm Turnbull announced the creation of the country’s modified version of a US Cyber Command. 

The move followed the 2016 Defence White Paper, which foreshadowed a near doubling of defence spending in the decade, including 1700 new posts in cyber or cyber-related roles. What combination of threat or opportunity pushed Australia into this position?

That document noted merely that “Defence will continue to integrate cyber capabilities into routine planning and command and control processes in addition to maintaining and remediating the networks and systems.” 
The key concepts of information superiority or information dominance do not explicitly appear. It painted a picture of a defence organisation hamstrung by tight budgets and outgunned in the region.

The document stuck with the decades-old view that Australia could maintain a technical edge over its regional rivals that might help compensate for smaller numbers. It observed that “superiority in combat and other military operations will hinge on continual technological advancement…providing significant strategic, operational and tactical advances to offset our strategic and fiscal challenges.”

There are several possible explanations that separately or in some combination explain the radical shift in 2017 to reorganise the Australian Defence Force (ADF) for information war. 

In December 2013, ISIS began its rapid military advance into Iraq, supported by globally prominent Internet-based propaganda. In March 2014, China stated its intention to do everything it could to become a “cyber power,” including through consequential changes in military strategy and organisation.

At the same time, through 2014 and 2015, the ADF was confronted by Russian military cyber operations as the Australian government intervened robustly in the investigation of the Russian missile attack on MH17 and subsequently decided to deploy RAAF assets to operate in Syrian air space, where Russian military aircraft were also involved in combat. In September 2014, Malcolm Turnbull, the country’s first high-tech leader, replaced Abbott as prime minister. In 2014 and 2015, the United States undertook its most intense lobbying effort yet seen toward Australia to do more to counter what it saw as the China threat in the South China Sea.

Until Abbott came to power, Defence probably did not feel it could divert scarce resources to what it felt was an experiment in military evolution. Its view was best captured in the 2009 White Paper, which observed that “we need to be more capable in this area by 2030” and that “the risk of cyberattack is even greater than we had first thought.” 
It reported that the government had “decided to invest in a major enhancement of Defence’s cyber warfare capability” but it talked of “information superiority” for decision-making only, suggesting “modest capability developments, while keeping open the option of enhancing our capabilities.”

The big spend by Abbott almost certainly unleashed Defence to look more radically at the “cyber command option,” which would see the development of such capabilities throughout the ADF, and not just for command and control. 
This interest would have been enabled by China’s decisive moves in that direction in 2014 and by a general realisation that global terrorism probably had cyber-space implications for ADF operational capability. In mid-2015, ADF sources reported that they were impatient change for change and that the government was still holding them back.
It was in May 2015 that China issued its first ever information warfare strategy declaring, as the United States had, its commitment to the war-fighting principle of information dominance. 

The Australian Navy and Air Force had long been active in the cyber domain, and were moving in the same direction as Army, but it may well have been the changes in Army that allowed the breakthroughs in a political sense. The easing tempo of overseas combat commitments by later 2014 probably also facilitated the change.

While the threat environment may have been a principal driver, and institutional factors within the ADF an enabler, it is probably the case that the ADF had slowly been socialised to acceptance of the information revolution in military affairs through its wide-ranging contacts with counterparts in the United States and other friendly countries, including Israel, which won a contract for battle-management technologies for the Army in 2010. 

The concept of information dominance was American but the Israeli example may have been an inspiration for government ministers on what smaller countries could do in this space.

The Diplomat:

You MIght Also Read:

Australia Implements Mandatory Data Breach Reporting:

North Korea's Cyber War on Australia:

 

« Islamic State On The Internet
Twitter May Introduce A 'Fake News' Flag »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.