SlideShare a Scribd company logo
1 of 15
The Information Component
  of National Power and
Australian National Security
           Policy

        Captain Jeff Malone
2003 CDF Fellow – Australian Defence
       Studies Centre - ADFA
     4th AOC International Symposium
       Adelaide 17th February 2004
Caveat
 Paper is UNCLASSIFIED and has been
  cleared for public release
 Paper reflects personal views of author
Scope of Presentation
 Global security in the contemporary era
 Operationalising the Information
  Component of National Power (ICNP)
 The Australian National Security System
 The ICNP in Australia
 Enhancing the ICNP in Australia
Global Security in the
     Contemporary Era
 Broadened security agenda
 Increased significance of non-state
  actors
 Decline in ability of states to control
  information flows
 Relative power of non-state actors
  versus states has increased
Operationalising the ICNP
           NIIP

    INT                  CI

                                National
          ICNP                  Security
                                 Policy


    PM                  IO
                    National
                  Information
                     Policy
The Australian National
   Security System
                      NSC


                      SCNS

         SPCG




       Departments        Inter-Departmental
       and Agencies      and Inter-Government
                             Arrangements


            DPMC                    AIC


             AGD             Inter-Departmental
                                Arrangements

             DFAT            Inter-Government
                               Arrangements

             DOD


             OGD
The ICNP in Australia (1)
 Not formally recognised as a whole, but
  individual components are present
 Long standing arrangements for
  intelligence, CI, and (to a lesser extent)
  PM
 Evolving arrangements for NII
  protection and IO
The ICNP in Australia (2)
   Intelligence
    – Impact of electronic media cycle
   CI
    – lack of attention to information held in the
      private sector
   NII protection
    – poorly integrated and resourced
    – poor engagement of private sector
The ICNP in Australia (3)
   PM
    – No coordination mechanisms
    – poorly prioritised and resourced
   IO
    – poorly prioritised and resourced
    – OK at tactical/operational level, poor at
      strategic level
What’s Wrong?
 No formally articulated national security
  policy
 No formal consideration of the ICNP
 Weak state of integrating mechanisms
  in national security system
 Poor understanding of the ICNP
Enhancing the ICNP in
          Australia (1)
   Improving overall national security
    arrangements
    – Formally articulated national security policy
    – Recognise the ICNP within national security
      policy
    – Improve integrative mechanisms in the
      national security system
Enhancing the ICNP in
          Australia (2)
   Specific Improvements
    – Intelligence
          Increased professionalism
    – Counterintelligence
          Consider the national security implications of
           data held in the private sector
    – NII Protection
          Consolidate present arrangements
          Incentives for private sector action
Enhancing the ICNP in
          Australia (3)
   Specific Improvements
    – Perception Management
         Establish coordination mechanisms
         Reform funding/governance arrangements for
          external broadcasting
    – Information Operations
         Enhance ADF IO capabilities
         Enhance strategic coordination
Conclusion
Questions?

More Related Content

What's hot

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020Benjamin Ang
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Miguel A. Amutio
 

What's hot (8)

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 

Viewers also liked

Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Jeffrey Malone
 
Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations WorkforceJeffrey Malone
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information WarfareJeffrey Malone
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It MattersJeffrey Malone
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian PerspectiveJeffrey Malone
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian PerspectiveJeffrey Malone
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsJeffrey Malone
 
Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceJeffrey Malone
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Jeffrey Malone
 

Viewers also liked (9)

Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 
Training the Information Operations Workforce
Training the Information Operations WorkforceTraining the Information Operations Workforce
Training the Information Operations Workforce
 
The Russian Approach to Information Warfare
The Russian Approach to Information WarfareThe Russian Approach to Information Warfare
The Russian Approach to Information Warfare
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It Matters
 
Information Operations After Afghanistan: An Australian Perspective
Information Operations After Afghanistan:  An Australian PerspectiveInformation Operations After Afghanistan:  An Australian Perspective
Information Operations After Afghanistan: An Australian Perspective
 
Defending the Defence Information Infrastructure: An Australian Perspective
Defending the Defence Information Infrastructure:  An Australian PerspectiveDefending the Defence Information Infrastructure:  An Australian Perspective
Defending the Defence Information Infrastructure: An Australian Perspective
 
Intelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network OperationsIntelligence Support Requirements for Offensive Computer Network Operations
Intelligence Support Requirements for Offensive Computer Network Operations
 
Information Operations in the Australian Defence Force
Information Operations in the Australian Defence ForceInformation Operations in the Australian Defence Force
Information Operations in the Australian Defence Force
 
Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...Imperatives for Successful Information Operations in a Coalition Setting – An...
Imperatives for Successful Information Operations in a Coalition Setting – An...
 

Similar to The Information Component of National Power and Australian National Security Policy

Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligenceIT2Alcorn
 
EnergySec & NESCO Overview
EnergySec & NESCO OverviewEnergySec & NESCO Overview
EnergySec & NESCO OverviewEnergySec
 
The Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanThe Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanAPNIC
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesNora A. Rahim
 
ISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxpriestmanmable
 
Webinar 20111011
Webinar 20111011Webinar 20111011
Webinar 20111011Retired
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19consultancyss
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Assignment 3 Major Essay
Assignment 3   Major EssayAssignment 3   Major Essay
Assignment 3 Major EssayJulie Ambury
 
NESCO: A Closer Look
NESCO: A Closer LookNESCO: A Closer Look
NESCO: A Closer LookEnergySec
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorPaul O'Connor
 
APT PRFP 11: CERTs
APT PRFP 11: CERTsAPT PRFP 11: CERTs
APT PRFP 11: CERTsAPNIC
 

Similar to The Information Component of National Power and Australian National Security Policy (20)

Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
 
EnergySec & NESCO Overview
EnergySec & NESCO OverviewEnergySec & NESCO Overview
EnergySec & NESCO Overview
 
The Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanThe Present and the Future ISAC in Taiwan
The Present and the Future ISAC in Taiwan
 
Information Sharing and Protection
Information Sharing and ProtectionInformation Sharing and Protection
Information Sharing and Protection
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
SEO 11
SEO 11SEO 11
SEO 11
 
ISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docx
 
2002-annual-report
2002-annual-report2002-annual-report
2002-annual-report
 
Webinar 20111011
Webinar 20111011Webinar 20111011
Webinar 20111011
 
WCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming HoWCIT 2016 Jan Ming Ho
WCIT 2016 Jan Ming Ho
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 
UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Assignment 3 Major Essay
Assignment 3   Major EssayAssignment 3   Major Essay
Assignment 3 Major Essay
 
NESCO: A Closer Look
NESCO: A Closer LookNESCO: A Closer Look
NESCO: A Closer Look
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
 
APT PRFP 11: CERTs
APT PRFP 11: CERTsAPT PRFP 11: CERTs
APT PRFP 11: CERTs
 

Recently uploaded

Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docxkfjstone13
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 

Recently uploaded (20)

Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 

The Information Component of National Power and Australian National Security Policy

  • 1. The Information Component of National Power and Australian National Security Policy Captain Jeff Malone 2003 CDF Fellow – Australian Defence Studies Centre - ADFA 4th AOC International Symposium Adelaide 17th February 2004
  • 2. Caveat  Paper is UNCLASSIFIED and has been cleared for public release  Paper reflects personal views of author
  • 3. Scope of Presentation  Global security in the contemporary era  Operationalising the Information Component of National Power (ICNP)  The Australian National Security System  The ICNP in Australia  Enhancing the ICNP in Australia
  • 4. Global Security in the Contemporary Era  Broadened security agenda  Increased significance of non-state actors  Decline in ability of states to control information flows  Relative power of non-state actors versus states has increased
  • 5. Operationalising the ICNP NIIP INT CI National ICNP Security Policy PM IO National Information Policy
  • 6. The Australian National Security System NSC SCNS SPCG Departments Inter-Departmental and Agencies and Inter-Government Arrangements DPMC AIC AGD Inter-Departmental Arrangements DFAT Inter-Government Arrangements DOD OGD
  • 7. The ICNP in Australia (1)  Not formally recognised as a whole, but individual components are present  Long standing arrangements for intelligence, CI, and (to a lesser extent) PM  Evolving arrangements for NII protection and IO
  • 8. The ICNP in Australia (2)  Intelligence – Impact of electronic media cycle  CI – lack of attention to information held in the private sector  NII protection – poorly integrated and resourced – poor engagement of private sector
  • 9. The ICNP in Australia (3)  PM – No coordination mechanisms – poorly prioritised and resourced  IO – poorly prioritised and resourced – OK at tactical/operational level, poor at strategic level
  • 10. What’s Wrong?  No formally articulated national security policy  No formal consideration of the ICNP  Weak state of integrating mechanisms in national security system  Poor understanding of the ICNP
  • 11. Enhancing the ICNP in Australia (1)  Improving overall national security arrangements – Formally articulated national security policy – Recognise the ICNP within national security policy – Improve integrative mechanisms in the national security system
  • 12. Enhancing the ICNP in Australia (2)  Specific Improvements – Intelligence  Increased professionalism – Counterintelligence  Consider the national security implications of data held in the private sector – NII Protection  Consolidate present arrangements  Incentives for private sector action
  • 13. Enhancing the ICNP in Australia (3)  Specific Improvements – Perception Management  Establish coordination mechanisms  Reform funding/governance arrangements for external broadcasting – Information Operations  Enhance ADF IO capabilities  Enhance strategic coordination