'

DFNS.net Policy Blog

We’ll be back tomorrow

By The Editors It’s the Labour Day public holiday here in Canberra. That means we’re taking the day off from normal duties and will be back tomorrow with our usual full schedule of strategic...

Summaries of Newly Obtained KGB Training Manuals

By Interpreter Staff The Interpreter seeks support for the translation, analysis and presentation of never-before-published KGB training manuals spanning multiple decades. …read more From:: The Interpreter – Institute of Modern Russia

New KGB Manuals Available

By Interpreter Staff The Interpreter seeks support for the translation, analysis and presentation of never-before-published KGB training manuals spanning multiple decades. …read more From:: The Interpreter – Institute of Modern Russia

ASPI suggests

By James Brorson, Aakriti Bachhawat and Luke Courtois The world China has taken centre stage this week following the 70th anniversary of the Chinese Communist Party coming to power. See IISS for the new...

It’s time to reboot Australia’s cybersecurity strategy

By Rachael Falk Australia’s 2020 cybersecurity strategy needs the input of all Australians—from individuals to academia, business, community associations and regulators. The government has issued a discussion paper calling for views, asking Australians to...

PNG Update: by the numbers

By Rohan Fox and Stephen Howes The PNG Update has a long history, but in its current format (held at UPNG and co-hosted by the UPNG School of Business and Public Policy and the...

Inside Macron’s Russia initiative

By Mark Leonard French President Emmanuel Macron is one of those leaders who wants to bend the arc of history. Having upended French politics, he has secured positions for his preferred candidates at the...

Tackling betel nut littering in Port Morseby

By Raphael Yanka Addressing betel nut littering in Port Moresby has been a challenging task for Papua New Guinea’s National Capital District Commission (NCDC). NCDC has attempted bureaucratic and community solutions but neither has...

Lessons from the ANU cyberattack

By Michael Shoebridge Australian National University Vice Chancellor Brian Schmidt’s public release of a detailed report on the damaging cyberattack on ANU systems and data marks a refreshing shift in behaviour on cybersecurity for...

National security wrap

By Sunny Cao, Sarah O’Connor and James Rickard The beat UK police to gain access to encrypted messages The UK and the US are expected to sign an agreement that will force US-based social...

Can cyberwarfare be regulated?

By Joseph S. Nye Whether or not a conflict spirals out of control depends on the ability to understand and communicate about the scale of hostility. Unfortunately, when it comes to cyber conflict, there’s...

The R4D iXc review

By Stephen Howes A report on the InnovationXChange (iXc) by Results for Development or R4D, a US NGO, “Experimentation, partnership and learning: insights from a review of the first three years of DFAT’s innovationXchange”...

Projecting power with the F-35 (part 2): going further

By Marcus Hellyer In part 1, I examined the hard limits on the F-35A’s unrefuelled range. Air-to-air refuelling can certainly help extend it. Tankers can substantially increase fighters’ time on station (that is, how...

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close