Publications

Cyber person
Cyber person

Defining Thresholds in Law - Sophisticated Decryption and Law Enforcement

Author(s): Mosey, M., Henschke, A.
Date of publication: 2018
Publication type: Policy

Key points: Encryption technologies have fundamentally changed the way people transmit data, reducing the capacity of law enforcement and intelligence agencies to access information. Relying on the private sector to provide agencies with plain text information is no longer productive, yet...

» further information

Exploring Beijing’s Motivations and Challenges for its New Silk Road

Author(s): Clarke, M
Date of publication: 2018
Publication type: Research

This article argues that Beijing’s ambitious ‘Belt and Road Initiative’ (BRI) is driven by the convergence of Innenpolitik and Aussenpolitik motivations including a desire: to counterbalance perceived American predominance; to ensure economic growth to underpin the CCP’s legitimacy; and to present...

» further information

"Fear and Loathing: When Nuclear Proliferation Emboldens"

Author(s): Cohen, M
Date of publication: 2018
Publication type: Research

Does nuclear weapon development embolden national leaders to engage in more assertive foreign policies? Despite the importance of this question to international security studies, the nuclear emboldenment hypothesis has received little attention. This article develops a theoretical explanation of...

» further information

Celebrating and Interrogating Women and National Security

Author(s): Thompson, S, Harris Rimmer, S
Date of publication: 2018
Publication type: Research

» further information

National Security College
National Security College

Between Giants: The Sino-Indian cold war in the Indian Ocean

Author(s): Brewster, D.
Date of publication: 2018
Publication type: Issues Paper

Strategic competition between India and China in the Indian Ocean is growing and has the potential to profoundly impact the stability and security of the region. The Indian Ocean is becoming the scene of a sustained contest that in some ways resembles strategic competition during the Cold War....

» further information

The United States and Southeast Asian Regionalism: Collective Security and Economic Development, 1945-75

Author(s): Thompson, S
Date of publication: 2018
Publication type: Research

» further information

Participants of the Belt and Road international forum, May 2017
Participants of the Belt and Road international forum, May 2017

One belt, one road, many rules-based orders

Author(s): Sussex, M, Clarke, M.
Date of publication: 2017
Publication type: Policy

Key points: The Belt and Road Initiative (BRI) is both a blueprint for a China-centric order in the Indo-Pacific and a means to address internal economic and political challenges. China is not yet capable of leading that order, but its desire to do so is increasing. Prospects for the long-term...

» further information

Airstrike on Marawi: Mark Jhomel/Wikimedia Commons
Airstrike on Marawi: Mark Jhomel/Wikimedia Commons

Marawi and after: how Australia can help

Author(s): Blaxland, J, Carroll, J, Carr, A, Harris, M
Date of publication: 2017
Publication type: Policy

Key points: The seizure of Marawi city by Daesh-linked militants is a game-changer for Southeast Asia, and presents a threat to all countries of the region. Limiting the movement of money, technology, recruits and planning support to extremist groups in the southern Philippines will be crucial to...

» further information

Hong Kong cityscape highlights, International Finance Centre: Mstyslav Chernov
Hong Kong cityscape highlights, International Finance Centre: Mstyslav Chernov

The threat to the global economic and financial order: protecting Australia’s interests

Author(s): Luckham, B.
Date of publication: 2017
Publication type: Policy

Key Points The international economic order reflects the balance of strategic power. The challenge to the post-1945 global economic and financial order will persist as it reflects long-standing trends: perceptions of unequal economic opportunity in developed economies; the increasing economic...

» further information

Federating Security

Author(s): Bergin, A
Date of publication: 2017
Publication type: Policy

Key points: National security has too often been run as a ‘top-down’ policy, with a tendency towards a ‘Canberra knows best’ approach. The states and territories contribute many of the powers and capabilities needed to support our overall effort in dealing with a wide range of national security...

» further information

Pages

Australian Government logo
‘The National Security College is a joint initiative of the Commonwealth Government and The Australian National University’

Updated:  21 June 2017/Responsible Officer:  Head of College, National Security College/Page Contact:  Web administrator