25.02.2016 Views

2016 DEFENCE WHITE PAPER

2016-Defence-White-Paper

2016-Defence-White-Paper

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Australia’s security environment 51<br />

and anti-submarine warfare, and better link the ADF’s individual<br />

capabilities to each other.<br />

2.46 As countries in the Indo-Pacific continue to develop their military<br />

capabilities, opportunities will emerge for increasingly sophisticated<br />

practical military cooperation. The more advanced technologies being<br />

brought into service will improve the ability of regional countries,<br />

including Australia, to share situational awareness, communicate and<br />

cooperate in response to shared security challenges.<br />

SECTION ONE STRATEGY<br />

2.47 Military modernisation also has the potential to increase strategic<br />

competition as countries seek military advantages over their<br />

neighbours and the likely consequences of conflict in the event of any<br />

miscalculation.<br />

2.48 Sustained and genuine commitment by all countries in our region to<br />

transparency and to cooperation through strengthened regional security<br />

architectures is essential to ensure that strategic competition does not<br />

escalate through miscalculation or misadventure into tension and conflict.<br />

Cyber and space<br />

2.49 Beyond the increasing regional military modernisation, the strategic<br />

environment over the next 20 years will be shaped by complex nongeographic<br />

threats, such as the threats in cyberspace and space. The<br />

security environment of the future, both in peacetime and during armed<br />

conflict, will feature increased threats from offensive cyber and spacebased<br />

capabilities.<br />

2.50 Cyber attacks are a direct threat to the ADF’s warfighting ability given its<br />

reliance on information networks. State and non-state actors now have<br />

ready access to highly capable and technologically advanced tools to<br />

target others through internet-connected systems and we are seeing<br />

greater use of offensive cyber operations. This trend is likely to continue.<br />

<strong>2016</strong> <strong>DEFENCE</strong> <strong>WHITE</strong> <strong>PAPER</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!