Loose Lips Bring Ships: Operations Security in Operation Sovereign Borders

OPSEC requires constant monitoring to ensure it addresses the identified vulnerabilities and mitigates the assessed risks. It may be that this needs to occur not only in the chain of command, but by Defence publications as well.

CAPT Samuel C. Duckett White*
5 min

Australia, Korea and ASEAN: Forging Ahead Together

Photo courtesy SBS Australia from the first ASEAN-Australia Special Summit, 2018

Jacob Choi
5 min

Michael Pezzullo’s seven gathering storms: national security in the 2020s

Mr Michael Pezzullo, Secretary, Department of Home Affairs, addressed the Australian Strategic Policy Institute on 13 March 2019 and provided a framework for considering emerging security risks - the 'future stormy possibilities' - into the next decade. This article is reprinted from 'The Mandarin' (image: Wordpress.com)

Michael Pezzullo
15 m

Human Development at ADFA

The talk emphasises the need for a comprehensive development of staff, including aspects such as Cognitive, Social, Psychological, Physical and Social. Professional development is incomplete without personal development.

COL Richard Mallet
40
Two groups of people facing off against each other, one holding a US flag and one holding a Chinese flag

US Defense Implications of Expanding China

This U.S. DoD report assesses China’s global expansion efforts and the implications for the U.S. in terms of military access, logistics, force posture and training. The report has generated discussion and various assessments can be found online across the national security community.

Various
1 hr
Security camera

Leave No Dark Corner

This article explores high-tech surveillance systems being used in China to monitor and shape its population. The technology demonstrates China’s push to become the world leader in artificial intelligence.

Matthew Carney
30m
Padlock

Where should we focus our security efforts?

Australians have fought in global conflicts for over a century. We’re in Afghanistan and the Middle East still. The argument is that these far-away wars advance our national interest. But is Australian security better served by focussing on regional alliances?

Cathy Van Extel
1h
Security lock

Australian Security

The balance of power is shifting in our region with the rise of China and a belligerent North Korea. Our strategic and economic interests are at odds as China and the United States push up against each other. So what are the threats to Australia and how should we respond?

Cathy Van Extel
1h
Melting ice

How the Military Fights Climate Change

Military leaders have known for millennia that the time to prepare for a challenge is before it hits you, says scientist and retired US Navy officer David Titley. He takes us from the humanitarian catastrophe in Syria to the icy shores of Svalbard to show how the military approaches the threat of climate change, in a refreshingly practical, nonpartisan take on climate preparedness. "The ice doesn't care who's in the White House. It doesn't care which party controls your congress. It doesn't care which party controls your parliament," Titley says. "It just melts."

David Titley
8m
Document being signed

Better Policy for Defence Officials

A series of videos describing how defence officials can better communicate and develop policy with government

ASPI Various
90m
Army tank

Understanding Why a Ground Combat Vehicle That Carries Nine Dismounts Is Important to the Army

The Army has examined the lessons of half a dozen significant conflicts, starting with World War II, has conducted numerous studies over the last 65 years, and has found time and again that an ability to conduct dismounted fire and maneuver is the fundamental squad-level tactic.

Bruce Heldm Mark A. Lorell, James T. Quinlivan, Chad C. Serena
15m
Person wearing a gas mask

Development of an Algorithm for Calculating the ‘Risk’ of Terrorist CBRN

In order to avert a disaster from a terrorist chemical, biological, radiological or nuclear (CBRN) attack, it is important to study the likelihood of terrorists using CBRN weapons. This study reports on the development of an algorithm for calculating the ‘risk’ of a terrorist seeking CBRN weaponry with 67.3 percent prediction accuracy.

DL Bolduc
2h