Australia’s Sharp Turn To Information Warfare

Australia’s place in the Asian military scene took a sharp turn at the beginning of July when the Government led by Malcolm Turnbull announced the creation of the country’s modified version of a US Cyber Command. 

The move followed the 2016 Defence White Paper, which foreshadowed a near doubling of defence spending in the decade, including 1700 new posts in cyber or cyber-related roles. What combination of threat or opportunity pushed Australia into this position?

That document noted merely that “Defence will continue to integrate cyber capabilities into routine planning and command and control processes in addition to maintaining and remediating the networks and systems.” 
The key concepts of information superiority or information dominance do not explicitly appear. It painted a picture of a defence organisation hamstrung by tight budgets and outgunned in the region.

The document stuck with the decades-old view that Australia could maintain a technical edge over its regional rivals that might help compensate for smaller numbers. It observed that “superiority in combat and other military operations will hinge on continual technological advancement…providing significant strategic, operational and tactical advances to offset our strategic and fiscal challenges.”

There are several possible explanations that separately or in some combination explain the radical shift in 2017 to reorganise the Australian Defence Force (ADF) for information war. 

In December 2013, ISIS began its rapid military advance into Iraq, supported by globally prominent Internet-based propaganda. In March 2014, China stated its intention to do everything it could to become a “cyber power,” including through consequential changes in military strategy and organisation.

At the same time, through 2014 and 2015, the ADF was confronted by Russian military cyber operations as the Australian government intervened robustly in the investigation of the Russian missile attack on MH17 and subsequently decided to deploy RAAF assets to operate in Syrian air space, where Russian military aircraft were also involved in combat. In September 2014, Malcolm Turnbull, the country’s first high-tech leader, replaced Abbott as prime minister. In 2014 and 2015, the United States undertook its most intense lobbying effort yet seen toward Australia to do more to counter what it saw as the China threat in the South China Sea.

Until Abbott came to power, Defence probably did not feel it could divert scarce resources to what it felt was an experiment in military evolution. Its view was best captured in the 2009 White Paper, which observed that “we need to be more capable in this area by 2030” and that “the risk of cyberattack is even greater than we had first thought.” 
It reported that the government had “decided to invest in a major enhancement of Defence’s cyber warfare capability” but it talked of “information superiority” for decision-making only, suggesting “modest capability developments, while keeping open the option of enhancing our capabilities.”

The big spend by Abbott almost certainly unleashed Defence to look more radically at the “cyber command option,” which would see the development of such capabilities throughout the ADF, and not just for command and control. 
This interest would have been enabled by China’s decisive moves in that direction in 2014 and by a general realisation that global terrorism probably had cyber-space implications for ADF operational capability. In mid-2015, ADF sources reported that they were impatient change for change and that the government was still holding them back.
It was in May 2015 that China issued its first ever information warfare strategy declaring, as the United States had, its commitment to the war-fighting principle of information dominance. 

The Australian Navy and Air Force had long been active in the cyber domain, and were moving in the same direction as Army, but it may well have been the changes in Army that allowed the breakthroughs in a political sense. The easing tempo of overseas combat commitments by later 2014 probably also facilitated the change.

While the threat environment may have been a principal driver, and institutional factors within the ADF an enabler, it is probably the case that the ADF had slowly been socialised to acceptance of the information revolution in military affairs through its wide-ranging contacts with counterparts in the United States and other friendly countries, including Israel, which won a contract for battle-management technologies for the Army in 2010. 

The concept of information dominance was American but the Israeli example may have been an inspiration for government ministers on what smaller countries could do in this space.

The Diplomat:

You MIght Also Read:

Australia Implements Mandatory Data Breach Reporting:

North Korea's Cyber War on Australia:

 

« Islamic State On The Internet
Twitter May Introduce A 'Fake News' Flag »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Twilio

Twilio

Twilio are the customer layer for the internet, powering the most engaging interactions companies build for their customers. We provide simple tools that solve hard problems.

HazeGrayCyber

HazeGrayCyber

HazeGrayCyber offers comprehensive technical services to bring your company to the next level.

Octane

Octane

Octane is an AI cybersecurity startup using machine learning to identify and fix vulnerabilities in blockchain codebases.

ZehnTek

ZehnTek

ZehnTek is a premier technology solutions provider, committed to offering comprehensive IT services tailored to meet the diverse needs of businesses.