2016 DEFENCE WHITE PAPER
2016-Defence-White-Paper
2016-Defence-White-Paper
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Australia’s security environment 51<br />
and anti-submarine warfare, and better link the ADF’s individual<br />
capabilities to each other.<br />
2.46 As countries in the Indo-Pacific continue to develop their military<br />
capabilities, opportunities will emerge for increasingly sophisticated<br />
practical military cooperation. The more advanced technologies being<br />
brought into service will improve the ability of regional countries,<br />
including Australia, to share situational awareness, communicate and<br />
cooperate in response to shared security challenges.<br />
SECTION ONE STRATEGY<br />
2.47 Military modernisation also has the potential to increase strategic<br />
competition as countries seek military advantages over their<br />
neighbours and the likely consequences of conflict in the event of any<br />
miscalculation.<br />
2.48 Sustained and genuine commitment by all countries in our region to<br />
transparency and to cooperation through strengthened regional security<br />
architectures is essential to ensure that strategic competition does not<br />
escalate through miscalculation or misadventure into tension and conflict.<br />
Cyber and space<br />
2.49 Beyond the increasing regional military modernisation, the strategic<br />
environment over the next 20 years will be shaped by complex nongeographic<br />
threats, such as the threats in cyberspace and space. The<br />
security environment of the future, both in peacetime and during armed<br />
conflict, will feature increased threats from offensive cyber and spacebased<br />
capabilities.<br />
2.50 Cyber attacks are a direct threat to the ADF’s warfighting ability given its<br />
reliance on information networks. State and non-state actors now have<br />
ready access to highly capable and technologically advanced tools to<br />
target others through internet-connected systems and we are seeing<br />
greater use of offensive cyber operations. This trend is likely to continue.<br />
<strong>2016</strong> <strong>DEFENCE</strong> <strong>WHITE</strong> <strong>PAPER</strong>