{"id":59438,"date":"2020-09-30T13:03:48","date_gmt":"2020-09-30T03:03:48","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=59438"},"modified":"2020-09-30T15:32:53","modified_gmt":"2020-09-30T05:32:53","slug":"mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/","title":{"rendered":"Mitigating diffused security risks in Australia\u2019s north: a case for digital inclusion"},"content":{"rendered":"
<\/figure>\n

Australians\u2019 daily reliance on digital communications infrastructure\u2014from smartphones and social media platforms to the National Broadband Network\u2014is changing the nature of national security risks.<\/p>\n

Just like our networked communication patterns, contemporary security risks are becoming increasingly diffused<\/a>\u2014geographically dispersed, nonlinear in their causes and outcomes, and difficult to predict and contain.<\/p>\n

Lessons from armed conflicts in other regions can help policymakers think about how to develop resilient social and communications infrastructure in Australia\u2019s critical northern approaches.<\/p>\n

The ongoing Russia\u2013Ukraine conflict is one such case study. On 25 February 2014, polite uniformed men with no insignia inconspicuously took over the administrative buildings of Simferopol, Ukraine. These events represent a significant development in the conduct of modern-day warfare: not a shot was fired in the course of the Russian annexation of Crimea, in what is now known as the most significant breach<\/a> of state borders since World War II.<\/p>\n

In retrospect, the photos and news reports from those turbulent events in Crimea were deliberately obscure, which has become a distinctive feature of contemporary military conflicts. Due to their diffused nature, identifying and mitigating security risks calls for a combination of digital literacy and inclusion among the civilian population.<\/p>\n

Following the annexation of Crimea, Russia repeated the same scenario in other eastern Ukrainian cities, including Donetsk and Luhansk. In response, citizens of Mariupol\u2014the next strategic object of Russian interest on the map\u2014took to social media<\/a> to pre-emptively identify these patterns and mitigate the diffused and otherwise inconspicuous security threats in their city.<\/p>\n

Grassroots open-source-intelligence<\/a> communities are an emerging type of social infrastructure<\/a> in which civilian networks rely on widely available information and communications technologies to build resilience<\/a> to security threats. Thousands of Mariupol civilians spent their days and nights collecting and verifying<\/a> intelligence from local social media posts and informants, and fighting the spread of false and misleading information about events in their city. This civilian effort became part of a coordinated response with local security services and the state military.<\/p>\n

Arguably, had Mariupol been the first eastern Ukrainian city on the line of Russia\u2019s \u2018non-occupation\u2019 tactics, or had it lacked the critical communications infrastructure at the time when these events were unfolding, it would likely have joined the ranks of the separatist republics. Yet, six years later, Mariupol firmly remains a part of Ukraine.<\/p>\n

The success of the city\u2019s citizen-led campaign makes a strong case for strategic investment in digital inclusion and digital literacy as a pathway for identifying and mitigating hybrid, externally orchestrated interventions. In a context where \u2018every battle seems personal, but every conflict is global<\/a>\u2019, as argued by 21st century war experts P.W. Singer and Emerson T. Brooking, what lessons can be applied from the Crimean scenario to the Northern Territory?<\/p>\n

Despite the absence of historical claims on the Northern Territory by other nations in the Asia\u2013Pacific region, the two territories\u2014pre-2014 Crimea and the Northern Territory\u2014share some commonalities. Both bear a centuries-long legacy of colonial violence toward the Indigenous populations, which resulted in socioeconomic disparities that continue to shape the local context.<\/p>\n

Both are home to large-scale infrastructure developments, including externally funded private-sector-initiated projects<\/a>, and rely heavily on tourism<\/a>. Both also have a fair degree of self-governance within a broader national framework yet have a strategic geopolitical significance in maintaining domestic and regional security.<\/p>\n

The changing nature of contemporary military conflicts calls for the ability to effectively mitigate diffused security threats. Hybrid conflicts, which blur the distinctions between digital and physical battlefronts and between military and civilian actors, call for an expanded understanding of the role Australian civilians can play in supporting these strategic capabilities.<\/p>\n

Countermeasures should extend beyond the cybersecurity domain and focus on two key aspects: first, supporting national efforts in expediting the NBN rollout to remote areas in the NT while also ensuring the service is affordable, especially for young people and marginalised groups<\/a>; and second, strengthening civil society institutions and promoting public education campaigns on disinformation and media manipulation.<\/p>\n

Contributing to Australia\u2019s defence shouldn\u2019t be the exclusive purview of the Australian Defence Force members. As the Ukrainian example demonstrates, committed citizens and community groups with high digital media skills and a good knowledge of the local context can become key actors in identifying hybrid, externally orchestrated interventions.<\/p>\n

While a direct military attack on the Northern Territory may be unlikely, civilian resilience\u2014the ability of citizens to identify and react to diffused security threats locally\u2014is becoming paramount in maintaining domestic security in hybrid contexts.<\/p>\n

In the present environment where most of us work, shop and socialise remotely, this combination of digital literacy and digital inclusion would feed into strengthening long-term civilian resilience capabilities and contribute to the defence of Australia\u2019s north.<\/p>\n","protected":false},"excerpt":{"rendered":"

Australians\u2019 daily reliance on digital communications infrastructure\u2014from smartphones and social media platforms to the National Broadband Network\u2014is changing the nature of national security risks. Just like our networked communication patterns, contemporary security risks are becoming …<\/p>\n","protected":false},"author":1228,"featured_media":59441,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[2138,381,1005],"class_list":["post-59438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-cybersecurity","tag-information-warfare","tag-northern-australia","dinkus-north-of-26-south"],"acf":[],"yoast_head":"\nMitigating diffused security risks in Australia\u2019s north: a case for digital inclusion | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigating diffused security risks in Australia\u2019s north: a case for digital inclusion | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Australians\u2019 daily reliance on digital communications infrastructure\u2014from smartphones and social media platforms to the National Broadband Network\u2014is changing the nature of national security risks. Just like our networked communication patterns, contemporary security risks are becoming ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-30T03:03:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-30T05:32:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/nt3009.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"665\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Olga Boichak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Olga Boichak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/nt3009.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/nt3009.jpg\",\"width\":1000,\"height\":665},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/\",\"name\":\"Mitigating diffused security risks in Australia\u2019s north: a case for digital inclusion | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/#primaryimage\"},\"datePublished\":\"2020-09-30T03:03:48+00:00\",\"dateModified\":\"2020-09-30T05:32:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d3292e9832d9bf14c877f825d93e82aa\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mitigating diffused security risks in Australia\u2019s north: a case for digital inclusion\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d3292e9832d9bf14c877f825d93e82aa\",\"name\":\"Olga Boichak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fbbf5061e80a1cb8c1250920268599b3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fbbf5061e80a1cb8c1250920268599b3?s=96&d=mm&r=g\",\"caption\":\"Olga Boichak\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/olga-boichak\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mitigating diffused security risks in Australia\u2019s north: a case for digital inclusion | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/","og_locale":"en_US","og_type":"article","og_title":"Mitigating diffused security risks in Australia\u2019s north: a case for digital inclusion | The Strategist","og_description":"Australians\u2019 daily reliance on digital communications infrastructure\u2014from smartphones and social media platforms to the National Broadband Network\u2014is changing the nature of national security risks. Just like our networked communication patterns, contemporary security risks are becoming ...","og_url":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2020-09-30T03:03:48+00:00","article_modified_time":"2020-09-30T05:32:53+00:00","og_image":[{"width":1000,"height":665,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/nt3009.jpg","type":"image\/jpeg"}],"author":"Olga Boichak","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Olga Boichak","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/nt3009.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2020\/09\/nt3009.jpg","width":1000,"height":665},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/","url":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/","name":"Mitigating diffused security risks in Australia\u2019s north: a case for digital inclusion | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/#primaryimage"},"datePublished":"2020-09-30T03:03:48+00:00","dateModified":"2020-09-30T05:32:53+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d3292e9832d9bf14c877f825d93e82aa"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/mitigating-diffused-security-risks-in-australias-north-a-case-for-digital-inclusion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Mitigating diffused security risks in Australia\u2019s north: a case for digital inclusion"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/d3292e9832d9bf14c877f825d93e82aa","name":"Olga Boichak","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fbbf5061e80a1cb8c1250920268599b3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fbbf5061e80a1cb8c1250920268599b3?s=96&d=mm&r=g","caption":"Olga Boichak"},"url":"https:\/\/www.aspistrategist.ru\/author\/olga-boichak\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/59438"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1228"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=59438"}],"version-history":[{"count":6,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/59438\/revisions"}],"predecessor-version":[{"id":59454,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/59438\/revisions\/59454"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/59441"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=59438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=59438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=59438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}