{"id":59137,"date":"2020-09-17T12:16:57","date_gmt":"2020-09-17T02:16:57","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=59137"},"modified":"2020-09-17T12:16:57","modified_gmt":"2020-09-17T02:16:57","slug":"the-threat-spectrum-2","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/","title":{"rendered":"The threat spectrum"},"content":{"rendered":"
<\/figure>\n

Welcome to \u2018The threat spectrum\u2019, a twice-monthly update focusing on non-traditional security threats. It\u2019s divided into five sections covering climate change (Planet A<\/strong>), trends in democracy and authoritarianism (Democracy watch<\/strong>), mis- and disinformation (Information operations<\/strong>), economics and global finance (Follow the money<\/strong>), and counterterrorism and non-state actors (Terror byte<\/strong>).<\/em><\/p>\n

Planet A <\/em><\/p>\n

A recent BBC report<\/a> shows how climate change and rising sea levels have forced migration and displaced locals in Fiji, leading to empty villages across the island nation. Vunidogoloa was the first to become a climate-induced \u2018ghost village\u2019 in 2014. The story of locals being displaced by global warming has been repeated throughout the Pacific, and the trend<\/a> is accelerating.<\/p>\n

The International Labor Organization<\/a> estimates that between 25 million and 1 billion people may be displaced due to climate-change-related effects by 2050. To put that in context, the displacement of 6.5 million people during the Syrian conflict<\/a> has put pressure on political systems from the Middle East to the UK. The Institute for Economics and Peace<\/a> points out that some of the countries most at risk, like Syria, Iraq, India and Pakistan, are also among the least stable, raising further concerns for security and counterterrorism in the region. As a leader in the Pacific, where climate migration is particularly likely, this will have serious implications for Australia\u2019s security, perhaps sooner than we think.<\/p>\n

Democracy watch<\/em><\/p>\n

The tactics used by protestors in Hong Kong have spread to emerging pro-democracy and protest movements around the world, including Belarus<\/a>, Lebanon<\/a>, Thailand<\/a> and the US<\/a>. Techniques including forming human chains, using encrypted messaging services and using art and popular culture to boost messaging and narrative power are among those used. Coordinated group defences that have spread from Hong Kong include using umbrellas as protective shields, using traffic cones and tennis racquets to defend against tear gas, and wearing face coverings to protect against facial recognition surveillance.<\/p>\n

While the character of these movements differs, these approaches demonstrate how grassroots movements can transcend borders to become part of a networked global fight against authoritarianism. As Hong Kong activist Nathan Law said, these movements are \u2018our collective battle, for our [democratic] values, for a world we want to live in\u2019.<\/p>\n

Information operations<\/em><\/p>\n

The Pentagon\u2019s Joint Artificial Intelligence Center is developing<\/a> a tool called \u2018Entropy\u2019 that will take text and video data from the internet and use it to summarise online trends in near real time. The US military will use the information to help understand the sentiments of adversaries and the general public. Entropy currently focuses on Tagalog, Mandarin and English but can be fine-tuned for other languages. A component under consideration would influence and shape<\/a> the information environment by feeding messages and counter-messages back onto the internet.<\/p>\n

According to a series of slides leaked by NSA whistleblower Edward Snowden in 2013, the UK also has information influencing capabilities<\/a>, including tools to fake Facebook posts or artificially increase traffic to websites. Online foreign interference has been led by countries such as Russia, China and Saudi Arabia but military methodology has also been co-opted<\/a> by corporations and interest groups to shape public opinion for their own interests. It remains relatively cheap and easy for well-resourced groups and states to influence the information environment.<\/p>\n

Follow the money<\/em><\/p>\n

The EU\u2013China leaders\u2019 meeting concluded this week. Issues such as trade, human rights and climate<\/a> were raised by top EU officials and German Chancellor Angela Merkel in discussions with Chinese President Xi Jinping.<\/p>\n

One of the key sticking points<\/a> was the Comprehensive Agreement on Investment<\/a>. The agreement has been under negotiation since 2014 and is a priority for Germany\u2019s<\/a> presidency of the European Council. While noting progress on China\u2019s regulation of state-owned enterprises and forced technology transfers, the European Council<\/a> emphasised that \u2018more work was urgently needed on the issues of rebalancing market access<\/a> and on sustainable development\u2019. On the European side, market access to China is particularly sought by the agri-food, financial services and digital sectors. Xi has agreed to \u2018expedite<\/a>\u2019 talks on the agreement, but with both sides hoping for a conclusion by the end of the year, an outcome only possible if one of the parties gives ground on human rights, trade transparency and the climate impacts of the deal.<\/p>\n

Terror byte<\/em><\/p>\n

At a recent ASPI discussion<\/a> about global terrorism threats, Shadow Home Affairs Minister Kristina Keneally highlighted <\/a>the threat of far-right extremism in Australia and urged the government to join other Five Eyes nations by listing far-right organisations as terrorist groups.<\/p>\n

ASIO and other security agencies have already warned<\/a> that right-wing groups are \u2018becoming more organised and sophisticated than ever before\u2019. Australian security agencies\u2019 focus on countering far-right extremism has increased<\/a> in recent years, and the Covid-19 pandemic has intensified risks<\/a> of extremist narratives becoming mainstream. Despite the recognition of the threat, experts have argued that politics has gotten in the way<\/a> of the government reviewing Australia\u2019s terror register.<\/p>\n

The debate comes after a New Zealand court handed a life sentenc<\/a>e<\/a> without parole to the Australian terrorist who murdered 51 people in Christchurch last year and the NZ government listed<\/a> him as a \u2018terrorist entity\u2019.<\/p>\n","protected":false},"excerpt":{"rendered":"

Welcome to \u2018The threat spectrum\u2019, a twice-monthly update focusing on non-traditional security threats. It\u2019s divided into five sections covering climate change (Planet A), trends in democracy and authoritarianism (Democracy watch), mis- and disinformation (Information operations), …<\/p>\n","protected":false},"author":1062,"featured_media":59139,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[283,276,2160,365],"class_list":["post-59137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-climate-change","tag-extremism","tag-pacific-islands","tag-trade"],"acf":[],"yoast_head":"\nThe threat spectrum | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The threat spectrum | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Welcome to \u2018The threat spectrum\u2019, a twice-monthly update focusing on non-traditional security threats. It\u2019s divided into five sections covering climate change (Planet A), trends in democracy and authoritarianism (Democracy watch), mis- and disinformation (Information operations), ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-17T02:16:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/48689357482_d1759b2060_c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tracy Beattie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tracy Beattie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/48689357482_d1759b2060_c.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/48689357482_d1759b2060_c.jpg\",\"width\":800,\"height\":600},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/\",\"name\":\"The threat spectrum | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/#primaryimage\"},\"datePublished\":\"2020-09-17T02:16:57+00:00\",\"dateModified\":\"2020-09-17T02:16:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/573b03ed3971a22cf72b154d48e8d70b\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The threat spectrum\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/573b03ed3971a22cf72b154d48e8d70b\",\"name\":\"Tracy Beattie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b431e4d07d6c837f52b1dbb1eb62cdfd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b431e4d07d6c837f52b1dbb1eb62cdfd?s=96&d=mm&r=g\",\"caption\":\"Tracy Beattie\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/tracy-beattie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The threat spectrum | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/","og_locale":"en_US","og_type":"article","og_title":"The threat spectrum | The Strategist","og_description":"Welcome to \u2018The threat spectrum\u2019, a twice-monthly update focusing on non-traditional security threats. It\u2019s divided into five sections covering climate change (Planet A), trends in democracy and authoritarianism (Democracy watch), mis- and disinformation (Information operations), ...","og_url":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2020-09-17T02:16:57+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/48689357482_d1759b2060_c.jpg","type":"image\/jpeg"}],"author":"Tracy Beattie","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Tracy Beattie","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/48689357482_d1759b2060_c.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/48689357482_d1759b2060_c.jpg","width":800,"height":600},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/","url":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/","name":"The threat spectrum | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/#primaryimage"},"datePublished":"2020-09-17T02:16:57+00:00","dateModified":"2020-09-17T02:16:57+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/573b03ed3971a22cf72b154d48e8d70b"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/the-threat-spectrum-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"The threat spectrum"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/573b03ed3971a22cf72b154d48e8d70b","name":"Tracy Beattie","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b431e4d07d6c837f52b1dbb1eb62cdfd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b431e4d07d6c837f52b1dbb1eb62cdfd?s=96&d=mm&r=g","caption":"Tracy Beattie"},"url":"https:\/\/www.aspistrategist.ru\/author\/tracy-beattie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/59137"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1062"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=59137"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/59137\/revisions"}],"predecessor-version":[{"id":59140,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/59137\/revisions\/59140"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/59139"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=59137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=59137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=59137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}