Debate: "General"
How to defend Australia: control and denial

Could Australia defend itself independently from direct military attack by a major Asian power like China? That’s the key question I set out to answer in How to defend Australia. My answer was a cautious …

Engaging the public to counter foreign interference

Australian citizens are frontline actors in today’s national security challenges: as targets of malign interference and coercion, victims of collateral damage, and agents of national resilience. The establishment of a parliamentary inquiry into social media …

Where is India’s foreign policy headed?

In a surprise move after the May election, India’s Prime Minister Narendra Modi reached out to former career diplomat Subrahmanyam Jaishankar to make him foreign minister. Jaishankar wasn’t a member of the Bharatiya Janata Party …

The 2020 Asia–Pacific outlook

Render the strategic outlook for 2020 into a core conundrum: How goes the new era of great-power competition? Is it to be security confrontation and economic decoupling? The crystal ball is clouded by rivalry. China …

ASPI suggests

The world NATO members met in London this week to celebrate the alliance’s 70th anniversary and discuss the increasing number of challenges they face. But instead of projecting an image of unity and strength, global …

Eight norms for stability in cyberspace

In little more than a generation, the internet has become a vital substrate for economic, social and political interactions, and it has unlocked enormous gains. Along with greater interdependence, however, come vulnerability and conflict. Attacks …

The Afghanistan enigma

No one—not the Afghan government, the higher-ups in the Trump administration, or the Taliban leadership—is sure of the course of American policy towards Afghanistan in the immediate future. Only two things in Afghanistan appear to …

National security wrap

The beat AFP and Europol trap cyber rats Law enforcement agencies from Europe and Australia have dismantled an international cybercrime operation involving the use of malware known as ‘Imminent Monitor Remote Access Trojan’, or IM-RAT. …