National Security impacted by Global Change



Similar documents
Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

THE STRATEGIC POLICING REQUIREMENT. July 2012

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework

On the European experience in critical infrastructure protection

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

AGENDA ITEM: B2. RSSB Board Meeting Final: 08 May 2014 Page 1 of 3. November 2011

Commonwealth Organised Crime Strategic Framework: Overview

National Surface Transport Security Strategy. September Transport and Infrastructure Senior Officials Committee. Transport Security Committee

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises

The Strategic Policing Requirement. March 2015

DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

Implementation Plan: Development of an asset and financial planning management. Australian Capital Territory

National Security Overview - Australia

National Cyber Security Policy -2013

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

STRATEGIC SCIENCE AND RESEARCH PRIORITIES

Records Authority. Australian Security Intelligence Organisation

I Conference Summary

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities

AUSTRALIAN SECURITY INTELLIGENCE ORGANISATION

The Crisis Management System in Germany

South-East Asia Region Capacity-Building Working Group (SEA WG)

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

Submission on the draft National Primary Health Care Strategic Framework October 2012

Good Security. Good Business

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU Counter-Terrorism Policy: main achievements and future challenges

Business Continuity Management Policy

Intelligence Analysis for Homeland Security RPAD 557

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Australia s counter-terrorism laws

Purpose of the Governor s strategy. Guiding Principles

NATIONAL COUNTER-TERRORISM PLAN

FCT i H2020 Säkra samhällen 2016 Fight against Crime and Terrorism. soren.jagerhok@foi.se

A guide to the Defence Trade Controls Amendment Bill 2015

Seamus Reilly Director EY Information Security Cyber Security

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

How To Get A Security Degree In Australia

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Guide to Australia s National Security Capability

Action Plan for Canada s Cyber Security Strategy

How To Write A Book On Risk Management

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

2 Gabi Siboni, 1 Senior Research Fellow and Director,

RISK MANAGEMENT SERVICES

StroNg ANd Secure A Strategy for Australia s National Security

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

Towards new mission-oriented RTI policy and new rationales for programming and priority-setting

8674/15 MC/pf 1 DGD 1B

Public Private Partnerships and National Input to International Cyber Security

Attachment G.18. SAPN_PUBLIC_IT Enterprise Information Security Business Case Step Change. 03 July, 2015

How To Manage Risk On A Scada System

PRIMARY HEALTH CARE POLICY

CYBER SECURITY STRATEGY AN OVERVIEW

National Counter-Terrorism PLAN

DHS, National Cyber Security Division Overview

How To Improve Safety In Lancashire

Crisis Management. IT Governance Summit 2015 Golden Tulip-Kumasi October 2015

HMG Security Policy Framework

The UK cyber security strategy: Landscape review. Cross-government

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

Border technology strategy. Chair: Mike Milford, First Assistant Secretary, Major Capability Division

Fighting Terrorism at its Source

Training Courses Catalog 2015

6 February 2015 Submission to the Department of the Treasury

NOT PROTECTIVELY MARKED Agenda Item: 8

BLUEPRINT FOR INTEGRATION

ACT Auditor-General s Office. Performance Audit Report. Whole-of-Government Information and Communication Technology Security Management and Services

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

Australian Citizenship

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

A Speech by. His Excellency Mr John Dauth LVO Australian Ambassador and Permanent Representative to the United Nations. to the

Business Continuity Plan

Active Engagement, Modern Defence

Business Plan 2012/13

Guidelines on SPECIAL BRANCH WORK in the United Kingdom

PART C EMERGENCY MANAGEMENT ARRANGEMENTS

Home Security: Russia s Challenges

The National Security Strategy of the United Kingdom: Update Security for the Next Generation

Criteria for adopting International Standards and Risk Assessments

Dirk Helbing (ETH Zurich) A New Approach to Sustainability Calling for Novel Science, Technology and Arts

Implementing the United Nations Global Counter-Terrorism Strategy in Central Asia Concept Paper

PRINCIPLES FOR ACCESSING AND USING PUBLICLY-FUNDED DATA FOR HEALTH RESEARCH

PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY. May 2008

S. ll IN THE SENATE OF THE UNITED STATES

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Integration of Financial Investigation into Counter Terrorism Strategy

National Cyber Crime Unit

How To Protect The Railway From Attack

v. 03/03/2015 Page ii

Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en)

CONTEST: The United Kingdom s Strategy for Countering Terrorism

1 FOCUS Foresight Security Scenarios

NATIONAL FRAMEWORK FOR RURAL AND REMOTE EDUCATION

Transcription:

National Security impacted by Global Change NATIONAL SECURITY SCIENCE & TECHNOLOGY To provide a national focus for science and technology to enhance Australia s national security capabilities Dr Richard Davis National Security Science & Technology Branch Office of National Security Department of the Prime Minister and Cabinet

Key Themes

National Security Context 3

Two key reform documents

National Security Adviser Defence policy and operations, intelligence coordination and the NSST Branch Including border security, counterterrorism, emergency management, infrastructure security, NCTC Secretariat Provision of international policy advice, as well as ceremonial and hospitality coordination Strategic advice on particular international policy issues

The NSST Branch

National Security Science and Innovation Strategy

Key themes for development of the Strategy

Triple Helix model Aim to maximise benefit and leverage from the three sectors collaborating Scope for enhanced contribution to public policy debate and analysis 10

Research Support for Counter-Terrorism

Key Drivers 12

National Security Statement (selected excerpts...) improving the coordination of national security policy with reform of the structure of national security decision making through establishing for the first time a National Security Adviser; Implementing the recommendations of the Smith Report..this includes the initiatives I have announced on organised crime, border securityand science and innovation Australia must also apply a risk-basedapproach to assessing, prioritising and resourcing our national security policy across the defence, diplomatic, intelligence and wider national security community. Effective mitigation of terrorist attacks involves the combination of an appropriate security response with broader strategies to enhance social cohesion and resilience and lessen the appeal of radical ideology. incorporating the implications of climate change and energy security into the formal national security decision making framework. 13

Practical steps Expanding the community Expanded SCNS, HPCG, NICC Coordinated national security evaluation & budget Creation of Exec Coord(SES2) Enhanced information sharing Creation of NS CIO (SES2) Education & training National security college

Global Risks 2009 9/10 Economic indicators in top quadrant Societal indictors 3/5 in top quadrant Pandemic Chronic disease Liability regimes (litigation & community risk) 12/14 top issues were Economic or Societal. Others were: Global governance gaps Critical Information Infrastructure breakdown 15

Annual Threat Assessment (US Director of National Intelligence*) 1. Global Financial crisis 2. Violent Extremism 3. Geo-strategic assessments 4. Cyber security 5. Environment security Including climate change *Annual Threat Assessment of the Intelligence community, Denis Blair, Feb 2009 16

Human & Social factors 17

Radicalisation 21 of 30 people charged with terrorism in Australia are Australian born. Overall 40 Australian citizens or permanent residents are confirmed, assessed or suspectedto have received terrorist training in Afghanistan or Pakistan. Significant focus of research and community outreach in Australia 18

Radicalisation (Countering Violent Extremism) Understanding the drivers and paths to violent extremism Understanding the factors which assist with counter-extremism and de-radicalisation The role of the internet and other communications media The role of communities 19

Social Resilience Capacity of a population to prepare for and respond effectively to large-scale crises Acute v chronic Local v virtual/distributed (diaspora) Known v unknown Role of federal, state & local government & agencies Key enablers Education, training Knowledge & communications Resources & support 20

Psycho-social response to CBRN The Unknown Dread The uncontrollable Management: Knowledge Information & learning resources Dealing with dread Control & Action Professor Beverly Raphael, UWS 21

Augmenting Phenotype By creating devices: Combat armour Exoskeletons Night Vision Goggles Sensors Mobility Lethality Enhancing Genotype By genetically: Growing a metallic skin Identifying genes that improve vision at night Increasing muscular and cardiovascular performance Improving cognitive function Silicon / biological interfaces 21 st Century technology race : enhance genotype vs augment phenotype (from DSTO)

Modelling & Simulation 23

Modelling & Simulation Current M&S support to government decision making, includes: Economic modelling (Treasury) Climate change (CSIRO support to Garnautreview) Pandemic modelling (DOHA) CIP modelling CIPMA (AGD) Broadening the application SIAA Emergency Management SIG Socio-economic interplay with enviro-security factors 24

CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS Attorney General s Department

1. Overview of CIP in Australia Critical Infrastructure is defined as those physical facilities, supply chains, information technologies and communication networks which if destroyed, degraded or rendered unavailable for an extended period would significantly impact on the social or economic wellbeing of the nation or affect Australia s ability to conduct national defence and ensure national security

2. CIPMA Overview SYSTEM MODELLING DECISION SUPPORT INFORMATION & DATA ELECTRICITY GAS ECONOMIC SOCIAL INVESTMENT BUSINESS CONTINUITY SECURITY RESILIENCE LIQUID FUELS COMMUNICATIONS BROADCASTING BANKING & FINANCE WATER Acknowledged gap in modelling social factors

Conclusions New national security arrangements are encouraging broader participation and cooperation Inclusion of climate change, economic impact, resource/energy security Human/social factors critical for understanding overall system Specific interest in radicalisation & resilience Modelling & simulation scope for greater analytical support to public policy 28