- The Strategist - https://aspistrategist.ru -

Thinking deeper about Australia’s offensive cyber capability

Posted By on May 17, 2016 @ 06:00

At the launch of Australia’s new Cyber Security Strategy [1] last month, the Prime Minister confirmed [2] what many have been guessing for years [3]: Australia possesses offensive cyber capabilities. The announcement, however, provided us with the barest of information about Australia’s offensive cyber capability, and it remains largely unclear how its potential uses have been conceived by government and the national security community. Given the minimal discussion of Defence’s approach to cyber capability in the 2016 Defence White Paper [4], it’s unlikely that we’ll see this information disclosed anytime soon.

What we do know is that Australia’s offensive cyber capability provides an additional option for government [5] when responding to serious cyber security incidents. We also know that it resides in the Australian Signals Directorate—its natural home considering the Directorate’s technical expertise—and that it will only be used in accordance with stringent legal oversight and consistent with international law. The PM’s announcement was carefully calibrated to clarify that Australia has a sophisticated capability at its disposal, but will exercise significant restraint in employing it.

Offensive cyber capabilities have utility beyond [6] the responsive role outlined by the PM, but there’s little detail of how that capability has been integrated into Defence’s planning, operations and capability development processes. Its exclusion from the Defence White Paper [7] was a glaring omission, and it’s a shame that Defence and PM&C weren’t able to better align the DWP and the Cyber Security Strategy. Publicly releasing a document that outlines Defence’s thinking on Australia’s cyber capability would grow the sophistication of Australia’s cyber policy.

But what might be included in such a document? Given Australia’s strong defence and intelligence relationship with the US and the UK [5], Australia should draw significantly on their experience to develop concepts and doctrine for offensive cyber operations, adapting them to our own unique requirements. The US and UK have already produced a healthy public cache [8] on cyber operations, their use as a responsive capability and their potential to support conventional military operations. These documents give us some insight into how Australia may consider the development and use of its own offensive cyber capability.

US policy and doctrine characterises cyber operations as an instrument of power in broader conflict, as well as a response to cyber incidents, and seeks to integrate them seamlessly with conventional military operations. The US National Military Strategy [9] characterises cyber operations primarily as a means to defend the US homeland, and defeat an adversary by projecting power across multiple domains. The Department of Defense’s Cyber Strategy [10] states that ‘DoD must be able to provide integrated cyber capabilities to support military operations and contingency plans.’ It goes on to note specific examples of cyber operations in support of this goal including disrupting an adversary’s command and control networks, military-related critical infrastructure and weapons capabilities. US doctrine on cyberspace operations [11] notes that cyber operations are most effective when integrated with other capabilities. The doctrine holds that commanders should seek to integrate ‘cyberspace fires’ with other capabilities to achieve their desired effects.

Similarly, the UK sees significant value in using offensive cyber capabilities to support military operations, as well as a response option for cyber incidents. The 2015 National Security Strategy and Strategic Defence and Security Review [12] states that the Armed Forces will be provided with, ‘advanced offensive cyber capabilities’ that will be used to ‘enable the success of coalition operations’. Further, the Review states that offensive cyber capabilities will be considered amongst the full spectrum of response options that the UK will develop to deter adversaries and ensure there are consequences for actors that threaten the UK’s security.

The announcement that Australia has an offensive cyber capability, and the manner in which it was announced, indicate a growing sophistication and confidence in thinking on cyber policy issues in the Australian Government. To take advantage of the potential offered by such a capability, Defence needs to make a concerted effort to formulate its thinking on the how, when, where and why it will be used, along with how the capability will be developed and sustained. That should include its broader utility in support of conventional military operations as well as its potential role as a retaliatory option for government. Such moves will patch the hole in the DWP, aid the development of cyber capability within Defence and provide further evidence of Australia’s commitment to developing cyber capability that aligns with Australian and international law.



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /thinking-deeper-about-australias-offensive-cyber-capability/

URLs in this post:

[1] Cyber Security Strategy: https://cybersecuritystrategy.dpmc.gov.au/

[2] Prime Minister confirmed: https://www.pm.gov.au/media/2016-04-21/launch-australias-cyber-security-strategy-sydney

[3] guessing for years: http://www.tripwire.com/state-of-security/latest-security-news/australian-defense-force-seeks-to-develop-offensive-cyber-capabilities/

[4] the 2016 Defence White Paper: https://aspistrategist.ru/more-cookie-cutters-please-cyber-policy-in-the-2016-dwp/

[5] additional option for government: https://www.pm.gov.au/media/2016-04-22/doorstop-treasurer-and-minister-industry-innovation-science

[6] utility beyond: http://belfercenter.ksg.harvard.edu/publication/22046/on_the_use_of_offensive_cyber_capabilities.html

[7] exclusion from the Defence White Paper: https://aspistrategist.ru/matching-rhetoric-with-action-cyber-and-the-2016-defence-white-paper/

[8] healthy public cache: https://ccdcoe.org/cyber-security-strategy-documents.html

[9] US National Military Strategy: https://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwiP2efI-s7MAhWBGaYKHefkDWwQFggcMAA&url=http%3A%2F%2Fwww.jcs.mil%2FPortals%2F36%2FDocuments%2FPublications%2F2015_National_Military_Strategy.pdf&usg=AFQjCNFQk5kUVY7qTgPlDSbbI4cjqqn6rg&sig2=jJqtiCzAqtvB6Ybj4NNG0w

[10] Cyber Strategy: https://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwjnj8X9-s7MAhXDKKYKHRftAzIQFggbMAA&url=http%3A%2F%2Fwww.defense.gov%2FPortals%2F1%2Ffeatures%2F2015%2F0415_cyber-strategy%2FFinal_2015_DoD_CYBER_STRATEGY_for_web.pdf&usg=AFQjCNHksika1UvMP3URJG7ZU5YIGHLCdg&sig2=Q14zAD6AjSXzQH1JjM1oJg&bvm=bv.121421273,d.dGY

[11] doctrine on cyberspace operations: https://www.google.com.au/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&cad=rja&uact=8&ved=0ahUKEwjnj8X9-s7MAhXDKKYKHRftAzIQFgg7MAU&url=http%3A%2F%2Fwww.dtic.mil%2Fdoctrine%2Fnew_pubs%2Fjp3_12R.pdf&usg=AFQjCNE9kdVVhU3Q3DPHmk-8N1PsvDoLYA&sig2=pYtfLAV04J8sTEV3DQRnDA&bvm=bv.121421273,d.dGY

[12] National Security Strategy and Strategic Defence and Security Review: https://www.gov.uk/government/publications/national-security-strategy-and-strategic-defence-and-security-review-2015

Copyright © 2024 The Strategist. All rights reserved.