'

Author: DFNS

Boosting maritime domain awareness in Southeast Asia

By Peter Chalk Promoting maritime domain awareness has become an increasingly high priority area for many Southeast Asian governments. As a concept, maritime domain awareness essentially refers to gaining a shared picture and understanding...

Boosting maritime domain awareness in Southeast Asia

By Peter Chalk Promoting maritime domain awareness has become an increasingly high priority area for many Southeast Asian governments. As a concept, maritime domain awareness essentially refers to gaining a shared picture and understanding...

Migration-development … without care?

By Matt Withers The relationship between temporary labour migration and economic development is a subject of longstanding academic debate and policy consideration. Migrant workers’ remittances, which this year overtook foreign direct investment (FDI) to...

The Bushmaster: from concept to combat

By Brendan Nicholson When David Nicolson and his fellow soldiers in Combat Team Alpha from the Royal Australian Regiment’s 2nd Battalion served in a remote outpost in Afghanistan’s Mirabad Valley, there was a standing...

National security wrap

By Sunny Cao, Sarah O’Connor and James Rickard The beat Calls to reform NSW strip-search rules Using data obtained by the Redfern Legal Centre under freedom of information laws, The Guardian reports that NSW...

US national security and Ukraine: what’s the connection?

By Mike Scrafton Witnesses appearing before the US House of Representatives’ impeachment hearings have regularly connected Russian aggression in Ukraine with US national security. The overwhelming international consensus is that Russia’s annexation of Crimea...

The month in women, peace and security: November 2019

By Sunny Cao, Sarah O’Connor and James Rickard Mapping WPS in the UN Security Council The Working Group on Women, Peace and Security has published its annual policy brief evaluating the UN Security Council’s...

Cybersecurity: how are we doing?

By Lesley Seebeck Making judgements about the state of cybersecurity isn’t easy. Much depends on the metrics we use to measure success and failure, where it’s all too easy to fall into the trap...

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close