{"id":21324,"date":"2015-07-02T12:15:53","date_gmt":"2015-07-02T02:15:53","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=21324"},"modified":"2015-07-02T10:42:09","modified_gmt":"2015-07-02T00:42:09","slug":"cyber-security-in-the-2015-defence-white-paper-a-preview","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/","title":{"rendered":"Cyber security in the 2015 Defence White Paper: a preview"},"content":{"rendered":"
\"Minister<\/a><\/figure>\n

Minister for Defence Kevin Andrews recently gave a preview of what the cyber security community can expect from the forthcoming Defence White Paper during a speech<\/a> in Canberra.<\/p>\n

It seems that the next White Paper will continue the evolution of cyber policy settings outlined in the 2009 and 2013 White Papers. Reading between the lines of the speech, Defence\u2019s principle cyber tasks are to: secure the information required for conventional capability and operations; continue ASD\u2019s work within the Australian Cyber Security Centre; and support the rest of Government\u2019s cyber security and international cyber policy efforts.<\/p>\n

The first two tasks are clear directives, while the third is slightly vague, but they don\u2019t deviate from what was seen in 2013.<\/p>\n

Perhaps of greatest interest is that much needed new money for cyber capabilities appears to be on the cards, with Andrew\u2019s saying, \u2018the Government will substantially enhance Defence\u2019s cyber capabilities, as well as invest in other enablers of the joint force.\u2019 While encouraging, this investment would be futile without a carefully thought-out plan to recruit and retain cyber security professionals, but the Minister has assured that this too will be outlined in the White Paper. Separately, Army\u2019s Head of Modernisation and Strategic Policy, Major General Fergus McLachlan, said<\/a> that Defence would have to consider dramatically different recruitment standards to attract the necessary cyber security professionals, similar to the approach by the UK.<\/p>\n

The categorisation of cyber capability as an \u2018enabler of joint operations\u2019, analogous to intelligence and surveillance capabilities, provides an interesting insight into Defence\u2019s thinking on the role of cyber capability in military operations. While much has been said about the role of offensive cyber capabilities in future warfare, Defence has rightly recognised that conventional military capability and operations are at serious risk from cyber opponents if there isn\u2019t a focus on securing the information systems that provide modern militaries the multiplying effect of rapid information collection and sharing.<\/p>\n

Andrew\u2019s comments on Defence\u2019s support for the development of a rules-based order and peacetime norms for cyberspace are noteworthy considering the visible absence of Defence from DFAT\u2019s work in this field, including the Global Conference on Cyberspace<\/a> and ASEAN Regional Forum cyber security initiatives<\/a>. One way that Defence could contribute to the international cyber policy debate might be to declare Government\u2019s views on the use of offensive cyber capabilities.<\/p>\n

Details of cyber capability are necessarily sensitive, and despite some media conjecture<\/a>, the Australian Government has refused to comment on speculation that Australia has any such capability. Regardless of the existence or otherwise of such capability, a declaration similar to that of the US<\/a>, that Australia may consider using such capability, but only in accordance with existing international law (principally the Law of Armed Conflict (LOAC) and national rules of engagement) would be a significant contribution by Defence to Australia\u2019s pursuit of a rules-based approach to cyber space.<\/p>\n

While Andrews\u2019 speech gives a good indication of where Defence and Government thinking on cyber security will take the next White Paper, there are no big surprises here. It\u2019s more of the same, if only with some greater clarity about Government\u2019s expectations of Defence in cyber security and policy. This implies that Defence\u2019s analysis of its cyber structures has concluded that it has it pretty much right. If, Andrews\u2019 assessment\u2014that malicious cyber activity is likely to be the most persistent transnational security threat faced by Australia\u2014is accurate, let\u2019s hope this is true.<\/p>\n","protected":false},"excerpt":{"rendered":"

Minister for Defence Kevin Andrews recently gave a preview of what the cyber security community can expect from the forthcoming Defence White Paper during a speech in Canberra. It seems that the next White Paper …<\/p>\n","protected":false},"author":364,"featured_media":21363,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[95,713,684,1206],"class_list":["post-21324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber-security","tag-cyberattack","tag-defence-white-paper-2015","tag-kevin-andrews"],"acf":[],"yoast_head":"\nCyber security in the 2015 Defence White Paper: a preview | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security in the 2015 Defence White Paper: a preview | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Minister for Defence Kevin Andrews recently gave a preview of what the cyber security community can expect from the forthcoming Defence White Paper during a speech in Canberra. It seems that the next White Paper ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-02T02:15:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-02T00:42:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/20150303adf8588365_024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liam Nevill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liam Nevill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/20150303adf8588365_024.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/20150303adf8588365_024.jpg\",\"width\":800,\"height\":533,\"caption\":\"Minister for Defence the Hon. Kevin Andrews MP\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/\",\"name\":\"Cyber security in the 2015 Defence White Paper: a preview | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/#primaryimage\"},\"datePublished\":\"2015-07-02T02:15:53+00:00\",\"dateModified\":\"2015-07-02T00:42:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber security in the 2015 Defence White Paper: a preview\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936\",\"name\":\"Liam Nevill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g\",\"caption\":\"Liam Nevill\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security in the 2015 Defence White Paper: a preview | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/","og_locale":"en_US","og_type":"article","og_title":"Cyber security in the 2015 Defence White Paper: a preview | The Strategist","og_description":"Minister for Defence Kevin Andrews recently gave a preview of what the cyber security community can expect from the forthcoming Defence White Paper during a speech in Canberra. It seems that the next White Paper ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-07-02T02:15:53+00:00","article_modified_time":"2015-07-02T00:42:09+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/20150303adf8588365_024.jpg","type":"image\/jpeg"}],"author":"Liam Nevill","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Liam Nevill","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/20150303adf8588365_024.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/06\/20150303adf8588365_024.jpg","width":800,"height":533,"caption":"Minister for Defence the Hon. Kevin Andrews MP"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/","url":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/","name":"Cyber security in the 2015 Defence White Paper: a preview | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/#primaryimage"},"datePublished":"2015-07-02T02:15:53+00:00","dateModified":"2015-07-02T00:42:09+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-security-in-the-2015-defence-white-paper-a-preview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber security in the 2015 Defence White Paper: a preview"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d81d6aff5a42bb8e53d00720fad0e936","name":"Liam Nevill","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfa81d9fb18f77771edc760e855ec75f?s=96&d=mm&r=g","caption":"Liam Nevill"},"url":"https:\/\/www.aspistrategist.ru\/author\/liam-nevill\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21324"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=21324"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21324\/revisions"}],"predecessor-version":[{"id":21364,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/21324\/revisions\/21364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/21363"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=21324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=21324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=21324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}