An ADIZ with Chinese characteristics

While China’s unilateral declaration of an Air Defence Identification Zone (ADIZ) over disputed waters in the East China Sea (ECS) caught many by surprise, today’s debate circles around the likelihood that Beijing might take the …

Cybersecurity: escaping future shock

Mike Burgess, Telstra’s Chief Information Security Officer, claims that attributing blame for cyberattacks is a ‘distraction’. It’s hard not to empathise with his views when, according to the Australian Centre for Cyber Security, 85% of …

The Parramatta shooting and counterterrorism dilemmas

The Parramatta shooting and its aftermath demonstrate common difficulties democracies face in counterterrorism. On Friday 2 October, 15-year old boy Farhad Jabar fatally shot NSW Police employee Curtis Cheng at Parramatta police headquarters, before being …

Reflecting on Japan’s new security policy

On 19 September, Japan’s upper house passed a set of bills that allow the country to deploy its military overseas and play a much more prominent strategic role in peacekeeping and collective self-defence. Viewed from …

It’s time to change: a new national ice strategy

Tomorrow, ASPI’s Border Security Program will launch its new Special Report on crystal methamphetamine (‘ice’): Methamphetamine: focusing Australia’s national ice strategy on the problem, not the symptoms. Australia’s seemingly unquenchable thirst for ice has created major …

ASPI suggests

The US-led airstrike on a Médecins sans Frontières hospital in Kunduz, Afghanistan, which killed 12 MSF workers and 10 patients, is a story that has a long way to run. General John Campbell, the American …

ANZACs under armour: the future Australian IFV

There’s been a lengthy and lively debate on The Strategist lately regarding the future of Australia’s surface combatants, specifically the SEA 5000 future frigate. Attracting little attention on the other hand was last months’ closure …

The Beat, CT Scan and Checkpoint

The Beat Top states for profitable organised crime The World Economic Forum have released their Global Competitiveness Report 2015-2016, revealing how organised crime reduces business competitiveness by creating disincentives for private investment and economic transactions, …

Cyber wrap

Researchers in Singapore have demonstrated how hackers can use a smartphone mounted on a drone to steal data intended for wireless printers. The technology detects an insecure printer and intercepts documents by establishing a fake …

Xi’s visit: framing and ordering outcomes

Chinese President Xi Jinping paid his first state visit to the US from 22 to 25 September. On the eve of Xi’s visit, I wrote that Beijing was carefully managing the expectations of the visit, …