Tag Archive for: Intelligence

The ‘official’ histories of Australian and British intelligence: lessons learned and next steps

Unclassified, official histories of ‘secret’ intelligence organisations, for public readership, seem a contradiction in terms. These ‘official’ works are commissioned by the agencies in question and directly informed by those agencies’ own records, thus distinguishing them from other, outsider historical accounts. But while such official intelligence histories are relatively new, sometimes controversial, and often challenging for historians and agencies alike, the experiences of the Australian and British intelligence communities suggest they’re a promising development for scholarship, maintaining public trust and informed public discourse, and more effective functioning of national security agencies. Furthermore, these histories remain an ongoing project for Australia’s National Intelligence Community (NIC).

A national strategic warning intelligence capability for Australia

Australia’s strategic warning time has collapsed—in response to profound geopolitical shifts. As the ADF is adapting to the hard implications of this change, so must the national intelligence community (NIC).

Australian Government decision-makers need time and insight to identify and prioritise threats (and opportunities) and devise effective responses. Strategic warning intelligence enables and empowers them to do so. But it must be done in a way that keeps up with the rapid pace of geopolitical and technological change, and a widening array of non-traditional strategic threats, and in a fashion best suited to Australia’s circumstances.

To meet this need the NIC should develop a discrete, institutional strategic warning intelligence function—an Australian Centre for Strategic Warning (ACSW). This would recognise the distinct skills, analytical focus and interface with decision-making entailed—and the vital national interests at stake. In implementing an ACSW, much can be learned from our own and other intelligence communities’ ongoing efforts to adapt to threats other than invasion—notably terrorism and pandemics. This will be especially pertinent in its application to grey-zone threats such as economic coercion.

Done right, an ACSW would be an important addition to the suite of Australia’s statecraft tools.

Australia’s 2024 Independent Intelligence Review: opportunities and challenges: Views from The Strategist

Australia has a recent history of intelligence community reform via independent intelligence reviews (IIRs) commissioned by government on a regular basis since 2004. The latest IIR is being undertaken by Dr Heather Smith and Mr Richard Maude.

In the lead-up to the announcement of the 2024 IIR, and afterwards, ASPI’s The Strategist has served as a valuable forum for canvassing publicly the most significant issues and challenges to be addressed by the reviewers.

This report draws together a selection of articles featured in The Strategist over the past year, with direct relevance to the review and its terms of reference. The articles cover topics from the broad to the specific but include:

  • the review itself, including its scope and purpose
  • the key capability challenge facing Australian intelligence—its future workforce
  • the ‘how’ of intelligence now and into the future; more particularly, new tools such as intelligence diplomacy and offensive cyber operations
  • the purposes for intelligence – from addressing global, existential risks to informing effective net assessment of Australia’s strategic circumstances.

In the lead-up to the expected public release of the IIR’s findings later this year, this compilation provides valuable background to the review and to the fundamental challenges and opportunities facing Australian intelligence in the decade ahead.

Incels in Australia: the ideology, the threat, and a way forward

This report explores the phenomenon of ‘incels’—involuntary celibates—and the misogynistic ideology that underpins a subset of this global community of men that has become a thriving Internet subculture. It examines how online spaces, from popular social media sites to dedicated incel forums, are providing a platform for not just the expansion of misogynistic views but gender-based violent extremism.

It raises key questions regarding Australian efforts to counter misogynistic ideologies within our nation. If there’s a continuum that has sexist, but lawful, views on gender at one end and gendered hate speech at the other, at what point does misogynistic ideology tip into acts of gendered violence? What’s needed to prevent misogynistic ideologies from becoming violent? And how do we, as a society, avoid the epidemic levels of violence against women in Australia?

This report doesn’t intend to provide answers to all of those questions. It does, however, seek to make an important contribution to public discourse about the increasing trend in misogynistic ideology through examination of a particularly violent community of misogynists, and proposes a range of policy options for consideration to tackle the threat that misogynistic ideology poses to Australia.

This report makes six recommendations designed to reduce and, where possible, prevent the risk of future occurrence of incel and similar violence in Australia. The recommendations include greater awareness raising and policy recognition that incel violence can be an ideological form of issue-motivated extremism which would provide certainty that incels could formally fall within the Australian Security Intelligence Organisation (ASIO)—in addition to law-enforcement agencies—and would encourage tailored education programs focused on engaging young males at risk from indoctrination in this extreme subculture (along with their parents).

An inflection point for Australian intelligence: revisiting the 2004 Flood Report

The 2003 Iraq war, and more particularly intelligence failure in relation to Iraqi WMD, led to a broad-ranging inquiry into Australian intelligence conducted by Philip Flood AO. Flood’s July 2004 report has proven an inflection point between the Australian Intelligence Community (AIC) of the immediate post–Cold War period and today’s National Intelligence Community (NIC).

Flood laid out an ambitious vision for Australian intelligence and forcefully advocated for sovereign intelligence capability. The scope of his review extended beyond more than ‘recent intelligence lessons’ – that is, Iraq’s WMD, the 2002 Bali bombings and the unrest that led to 2003’s Regional Assistance Mission Solomon Islands – to the effectiveness of oversight and accountability within the AIC (including priority setting), ‘division of labour’ between AIC agencies and their communications with each other, maintenance of contestability in intelligence assessments, and adequacy of resourcing (especially for the Office of National Assessments – ONA).

It was in addressing these matters that Flood laid the foundation for the future NIC, upon which would be constructed the reforms instituted by the L’Estrange-Merchant review of 2017.

Importantly, Flood’s recommendations significantly enhanced ONA’s capabilities—not just analytical resources but also the resources (and tasking) needed to address the more effective coordination and evaluation of foreign intelligence across the AIC. This was a critical step towards the more structured and institutionalised (if sometimes bureaucratic) NIC of 2023 and an enhanced community leadership role for, ultimately, ONI.

In addition, the Flood Report identified issues that remain pertinent and challenging today – including the vexed issue of the public presentation of intelligence for policy purposes, the central importance of the intelligence community’s people (including training, career management, recruitment and language proficiency), intelligence distribution (including avoiding overloading time-poor customers), the need to maximise collaborative opportunities between agencies, and how best to leverage intelligence relationships (including broadening relations beyond traditional allied partners).

Informing Australia’s next independent intelligence review: learning from the past

The Australian Government commissions a review of its intelligence community every five to seven years. With July 2023 marking six years since release of the last review’s report and, with funding already allocated in this year’s federal budget, the next one is likely to commence shortly.

The best starting place for the forthcoming review is the work that precedes it, so reflection on 2017’s Independent Intelligence Review proves valuable. This report, Informing Australia’s next independent intelligence review, reflects on the experiences of the 2017 review and the implementation of its recommendations, and draws lessons to inform the terms of reference, approach and suggested focus of the next review.

In doing so the report identifies three broad topics upon which the next review can most profitably ground its work: attracting, building and retaining a skilled workforce; adapting to rapid and profound technological change; and leveraging more, and closer, partnerships. It also highlights how the past six years have raised important and challenging questions in relation to each of those broad topics and identifies opportunities to further advance the future performance of the National Intelligence Community. In addition, specific recommendations are made to inform government’s planning and preparation for the new review.

Collaborative and agile. Intelligence community collaboration insights from the United Kingdom and the United States

The central aim of this report is to generate insights from the US and UK intelligence communities’ collaboration efforts. It identifies insights so that members of Australia’s national intelligence community, including the ONI, can use them to enhance the community’s collaboration and agility for the purpose of giving Australian decision-makers an insight edge over others. We acknowledge that agencies must contextualise those insights to Australia’s specific circumstances, and we’ve sought to do some of that in this report. The report isn’t intended as an academic think piece but as a guide-and goad-to actions that can advance and protect Australia’s wellbeing, prosperity and security.

This report doesn’t seek to second-guess the internal insights that it explores. Instead, it takes an external perspective, informed by experience in relevant agencies and by perspectives from intelligence-community partners and analysts in the UK and the US.

The ASIS Interviews

The ASIS Interviews is a series of interviews with the Director-General of the Australian Secret Intelligence Service, Paul Symon – with bio, transcripts and videos.

For the first time in the 68 year history of Australia’s overseas spy service, the top spy has gone before the camera for a series of video interviews, conducted by the Australian Strategic Policy Institute.

Symon, a former Major General, talks about the purposes and principles of the Australian Secret Intelligence Service and spying in the 21st century.

The interviews were recorded in September & October 2020 and will be released weekly.

1: The formation of ASIS.

2: Purpose and principles.

3: Spying for Australia.

4: Australia’s James Bond: finding jewels for the country.

Information sharing in Australia’s national security community by Kelly O’Hara and Anthony Bergin

This Policy Analysis, authored by Kelly O’Hara and Anthony Bergin, examines the information sharing vision of the new National Security CIO in light of reforms made towards a more joined-up national security community. It argues that information sharing should be a high priority for improving decision making in Australia’s national security community.

This Policy Analysis recommends: 

  • Making information discoverable and accessible to authorised users by means of off-the-shelf technology;
  • Mapping the information exchanges between agencies to reveal the extent of connectivity and capability gaps;
  • The National Security CIO conduct a regular audit to determine the extent to which community members have reached key milestones in making information discoverable and retrievable;
  • The new National Security College incorporate training modules on how to advance a responsibility to provide culture for senior national security officials;
  • The National Security CIO work in consultation with the Office of the Privacy Commissioner to develop a transparent national privacy framework of principles to guide information sharing in the national security community;
  • Greater use of Web 2.0 in the national security space to facilitate information sharing;
  • Establishing a centralised security vetting agency to issue clearances, rather than each agency ‘doing its own thing’.

Neighbourhood watch: The evolving terrorist threat in Southeast Asia

The regional terrorist threat remains high on the list of Australia’s national security priorities. It is time to take stock of the regional security environment and to ask how the Southeast Asian terrorist threat might evolve in the future.  This report, authored by Peter Chalk and Carl Ungerer, analyses the changing nature of religious militancy and sets out a framework for understanding the forces and trends that are driving jihadist extremism in the region. A number of policy recommendations are made on the appropriate next steps in Australia’s regional counter-terrorism strategy.

The publication was launched at Parliament House by The Hon Mr Robert McClelland MP. For information on the launch including the speech click here.

Tag Archive for: Intelligence

A stronger centre is key to future Australian intelligence capability

It will be a welcome step if the current Independent Intelligence Review (IIR) recommends further empowering the Office of National Intelligence (ONI) to lead capability development and, by extension, to achieve a more collective approach by the many Australian agencies working in the field.

Terms of reference for the IIR encompass progress in the implementation of recommendations from previous reviews, including the establishment of the ONI and the creation of the national intelligence community (NIC). The review has been due to report to the government in mid-2024.

Australia’s traditionally federated intelligence community might seem unusual, given its moderate size; it’s more comparable to the notoriously decentralised US intelligence community than those of other Five Eyes countries. Australia typically separates assessment from collection (although not in the case of the Australian Security Intelligence Organisation, or ASIO) and has different agencies for different collection modes (signals, imagery and human intelligence-gathering) and for different intelligence purposes (foreign, defence, security, law enforcement, border and regulatory). The resulting myriad agencies, variously reporting to five ministers, work collaboratively towards common goals.

This is not accidental. As the 2017 IIR observed, ‘those delineations have broad enduring relevance. They capture, in particular, the essential requirements for a relationship of trust between government and the wider community in Australia about the legitimate uses of intelligence, and therefore the legal framework within which the agencies need to operate.’ However, the future would ‘demand greater levels of collaboration across traditional dividing lines and more cross-over points’.

So we got ONI, built up from the old Office of National Assessments (ONA) and responsible for the NIC’s enterprise-level management—‘leading the development and implementation of national intelligence priorities, undertaking systematic and rigorous evaluation of the performance of the agencies, implementing strategic workforce planning and facilitating joint capability planning,’ as the 2017 report said.

Seven years on, the NIC hasn’t quite developed as envisioned. As I’ve written previously, that’s due to levers that aren’t exercised as fully as the 2017 reviewers recommended (the Joint Capability Fund, or JCF, and the Intelligence Capability Investment Program, or ICIP); such unforeseen developments as establishment of the Department of Home Affairs and the Defence Intelligence Group; and natural structural features and incentives. The latter include enduring deficiencies in national security decision-making.

ONI’s role was defined cautiously, including legislatively, as ‘guidance’ and ‘coordination’. Within ONI, there remains gravitational pull upon attention and resources by its enduring role from when it was ONA as the principal all-source assessment agency.

It’s not quite the vision from the speech of the then attorney-general introducing ONI’s charter legislation: ‘ONI will lead the NIC with an “enterprise management” approach, creating … a “whole greater than the sum of its parts” which will leverage the strengths of each agency and enable government to consider the NIC’s efforts in their entirety.’ In short, a stronger centre.

Meanwhile, drivers identified earlier for a concerted community approach are now more pressing: the prospect of war, the persistence of transnational threats and the intensification of the international intelligence contest.

Portfolio-based approaches to operations and oversight still make sense, as confirmed by Dennis Richardson’s 2019 Comprehensive Review of national security legislation. For this outcome, an ONI that coordinates is sufficient, but capability development requires a more empowered ONI (one that leads) and a genuine community-first approach.

That’s not to say there haven’t been gains. In December 2021, ONI Director-General Andrew Shearer noted NIC agreement to capability-sharing principles, ‘so that we don’t have different agencies duplicating each other and inventing different solutions to the same problems’.

Nonetheless, we need not just the 2017 IIR vision for ONI but that model’s further enhancement. The tale of the Top Secret Cloud, foreshadowed in that review’s recommendation 13, illustrates this well.

In 2019, ASIO announced the pursuit of a new, cloud-based enterprise technology platform. This was superseded by ONI’s late 2020 request for expressions of interest for NIC-wide cloud computing services. A year later, Shearer acknowledged that agencies were cooperating on a top-secret cloud initiative. Then, in December 2023, he confirmed that the initiative was ongoing and it promised to ‘open up a shared collaborative space that will really reinforce this sense of working together as a genuine community and bringing all those different capabilities to bear on problems.’ On 4 July 2024, the government announced a strategic partnership between the Australian Signals Directorate (ASD) and Amazon Web Services to deliver the Top Secret Cloud at a cost of at least $2 billion.

An empowered ONI, leading a more collectively capable NIC, is critical to kicking on and making good on similar, future joint-capability developments. In fact, ASPI recommended this in relation to the Top Secret Cloud in its 2020 report National security agencies and the cloud: An urgent capability issue for Australia.

There is more than one way to skin the capability development cat. Community approaches needn’t be monolithic. Mini-lateralism can also be relevant. ONI can organise and direct community-benefiting developments through other NIC elements that are particularly capable of executing complex technical projects. In the case of information technologies, as we can see from the Top Secret Cloud announcement, that’s ASD.

What’s more, the Top Secret Cloud itself promises to drive other capability developments and operational effectiveness. Associated encouragement of more adaptive approaches to security can in the future open up other forms of efficiency and effectiveness (that is, the adoption of certain shared services).

Legislation shouldn’t be a barrier. Leaning forward on capability development, as distinct from agencies’ operations, shouldn’t fall foul of section 10 of the Office of National Intelligence Act 2018 (which details limits to ONI’s role).

Achieving a more collective NIC isn’t solely an agency problem. We also need ministers to buy in, providing incentive structures for agency leaders to prioritise community where appropriate. That includes more community-focused processes for decision-making. It also includes re-examining measures like JCF and ICIP, but funded as envisaged in 2017, and moving away from innovation-killers like the budgetary efficiency dividend.

ONI can also lead broader reforms, changing cultural and organisational incentives and disincentives for interagency service, encouraging more informed support to the NIC from the Department of Finance and others, and adaptive security approaches (that is, with focus on net result). The latter should be free of Monday morning experts appearing when future security problems are encountered, as they will—with or without adopting cloud computing.

A note of caution. The new assertion of leadership by ONI can’t be exclusionary. ONI can’t say ‘my way or the highway.’ In fact, it will be vital to avoid a potential pothole of cloud-related (operational) costs distorting existing budgets, especially for agencies that are already transforming business models through decade-long programs: ASIO ($1.3 billion), ASD’s Project REDSPICE ($9.9 billion) and the ‘modernisation’ of the Australian Secret Intelligence Service ($1.58 billion). That would be a surefire way of cruelling the case for future collective action.

Australia needs a national centre for strategic warning intelligence

Even mindboggling actions typically have a logic that’s discoverable, whether Hitler declaring war on America after Pearl Harbor or Putin invading Ukraine. That’s why ‘strategic warning’—informed by ‘strategic warning intelligence’—is so important.

Indeed, intelligence’s intuitive responsibility is warning and intelligence ‘failures’ are often framed around a failure to do so. Failing to exercise strategic warning intelligence effectively risks near-existential national damage—as Israel can attest.

The latest report from ASPI’s Statecraft & Intelligence Centre highlights the critical importance of intelligence in warning of future threats. It recommends that the Australian Government should therefore invest in a discrete, institutional strategic warning intelligence function—an Australian Centre for Strategic Warning (ACSW).

The Defence Strategic Review and National Defence Strategy confirm that Australia’s strategic warning time has collapsed from 10 years (for development of capabilities threatening Australia) to zero, in response to profound geopolitical shifts. The threat of war in our neighbourhood is more real now than since the 1970s. Flashpoints abound across the Indo-Pacific, not least in the South China Sea and the Taiwan Strait, with direct potential impacts on our national interests.

Aggressors have more proven options to pursue their objectives covertly and incrementally, to our cost. This includes through cyber threats to critical infrastructure, as we saw when the Volt Typhoon hacker group was exposed by Five Eyes authorities in March this year. Threats are also broadening as states begin to use economic relations as a weapon, while transnational threats (including more instances of self-guided, grievance-driven terrorism) persist. As the Australian Defence Force is adapting to the hard implications of these change, so must Australia’s National Intelligence Community (NIC).

Regardless of threat origin or type, Australian Government decision-makers need time and insight to identify and prioritise threats and opportunities, and to devise effective diplomatic and other—including military—responses. It is strategic warning intelligence that enables and empowers them to do so.

Strategic warning is historically complicated and difficult. But the focus of strategic warning intelligence is broadening to reflect the full spectrum of threats, including the ‘grey zone’ between war and peace, and to a strategic environment where declarations of war are now rare—though the risk of actual war remains a reality. Indeed, strategic warning intelligence has already adapted to some new threats, while the methodology for indicators and warning has proven applicable in new circumstances—such as the cyber domain—provided that indicators are predictable, diagnostic, unambiguous and collectable.

Success or failure rests on analytical effectiveness, clarity of communication, and timeliness within a dynamic intelligence contest that is characterised by pervasive denial and deception. The current and emerging landscape also includes the promise, but also challenge, of incorporating all sources of intelligence in a fast-moving environment. Importantly, the effective communication of warning—including the persuasion of policymakers—and the integration of strategic warning intelligence with response mechanisms are critical. Done well, strategic warning intelligence empowers decision-makers to try and change the future, not just accept their fate. Intelligence-enabled shifts in alert posture or diplomatic signalling may be enough to dissuade aggressors from hostile actions.

However, Australia’s strategic warning intelligence capabilities are institutionally decentralised and were historically focussed on the long-range threat of military attack. How can future strategic warning intelligence be done in a way that keeps up with the rapid pace of geopolitical and technological change, in a fashion that best suits Australia’s circumstances?

Establishing an ACSW would recognise the importance of distinct skills, analytical focus, and interface with decision-making, as well as the vital national interests at stake. And in implementing an ACSW, much can be learned from our own and other intelligence communities’ ongoing efforts to adapt to threats other than invasion, notably terrorism and pandemics. This will be especially pertinent in application to grey-zone threats such as economic coercion.

The ACSW should be designed for an Australian context, informed by international perspectives, and have the mission to warn on a range of threats. Given the breadth of national responsibilities in question—and current NIC architecture—it should be located within the Office of National Intelligence and should leverage a multi-agency secondment model for its consciously limited staffing.

The ACSW’s leadership, akin to a National Intelligence Officer for Warning, should be able to apply analysis that is critical and independent from institutional interests. It should be afforded suitable access to decision-makers. Developing an effective interface with institutions such as the Cabinet’s National Security Committee will be vital, and would be enhanced by future developments, including in suitable accountability measures and incorporation of response options like strategic downgrades of intelligence.

A first step should be proving the ACSW concept through a classified simulation exercise applied to an economic coercion or impending regional crisis case-study.

Done right, an ACSW would be an important addition to the suite of Australia’s statecraft tools in an ever more challenging world. Setting aside the threat of invasion, imagine the future cost of surprise coercive actions against Australia’s most critical resource exports—those untouched during the imbroglio with China in recent years.

Would the national interest not be well served by time and space to identify such a development early enough to address it effectively?

 

 

OSINT capability should be dispersed through government

Stealing other countries’ secrets is the form of intelligence gathering that gets most attention—and resources. But a mass of information is publicly available and just waiting to be collected, to produce what’s called open-source intelligence (OSINT). 

Governments, including Australia’s, are working on how better to collect it, and one idea is to set up a central agency for the task. If that’s a solution, however, it’s not the full solution. Potentially valuable public information and the ways it is used are so varied that individual parts of the government each need to collect it and turn it into OSINT. 

So, as an independent review into Australia’s intelligence agencies proceeds, a high priority should be strengthening OSINT capabilities dispersed through the government. Australia must have an ecosystem of OSINT capabilities that are fit-for-purpose, evolve with the information environment, embrace accessibility of PAI, and move forward in alignment with industry, academia, and the whole federal government—not just the national intelligence community (NIC). 

Ben Scott of the National Security College argues that setting up a dedicated OSINT agency would rebalance the NIC’s work, putting more focus on publicly available information (PAI). And so it would. The problem is that there can be no one-size-fits-all OSINT capability: sources and applications are just too diverse. 

OSINT centres that are fit for purpose must be tailored to deliver intelligence at the level and tempo required by each part of the government to consume and exploit. In practice, this means the demand for OSINT varies according to the operational demands of each agency. They will variously require specialised forms of collection and exploitation, sometimes sustained monitoring of enduring hazards, or unplanned or dynamic collection on emergent threats. 

The Richardson review of the legal framework of intelligence collection provides a glimpse of these operational demands. The Department of Home Affairs, for example, uses PAI to inform policymaking, identify research gaps, and reduce the volume and effectiveness of terrorist and violent extremist content online. The department has a sustained high tempo of OSINT operations with a strong focus on people both onshore and overseas. 

The Department of Defence, by contrast, requires the capacity to quickly scale OSINT gathering in support of war fighters during crisis and conflict. 

Fit-for-purpose integration also depends on the intelligence maturity of the consumer. Some have access to exquisite intelligence, surveillance, and reconnaissance (ISR) assets. For them, OSINT will be geared for sharing with people at lower classifications, collecting against otherwise inaccessible targets,collecting faster and more cheaply and cueing other intelligence-gathering methods. 

But operators at the tactical edge or organisations not traditionally served with intelligence may have limited or no access to exquisite ISR capabilities. For them, OSINT is the solution. Many parts of the federal government outside the NIC find themselves in this situation, and their organic capabilities should be empowered. 

Moreover, OSINT centres must tailor and continuously adapt the inputs of their capability to the target information environment. As Scott outlines, we are amid an ongoing information revolution, where the potential of OSINT lies in capitalising on the growing volume, variety and velocity of PAI. The challenge of operating in this information environment lies in keeping pace with a landscape that varies by region and language and features unique and diverse platforms. This complexity extends to the diverse types of data generated on these platforms, including social media, news articles, satellite imagery, ship telemetry and more.  

But the difficulty doesn’t end there. How you access, use, protect, and share this information can be governed by whether it is personally identifiable, copyrighted, or access-controlled. While a central OSINT agency can play a significant enabling role, diverse agencies in the government can excel at keeping pace with and exploiting their respective target environments. 

Accessibility of PAI is the strongest argument for strengthening agency capabilities alongside a central body. Given the online nature of the information environment, if you have an internet connection, you have access to PAI. This accessibility is part of what makes OSINT so attractive to intelligence missions of all shapes and sizes—not just inside the NIC. 

However, the seemingly low barrier to entry is deceptive. Operating legally, safely, and effectively over sustained periods demands more than just connectivity; it requires tailored governance, policies, training, and technology, and operating without that backing carries risks. Those include risks that may compromise the integrity of collection and analytical products, harm analyst mental wellbeing, expose sensitive information, break laws, or conflict with other missions. 

Fortunately, agencies can already engage with these risks by leveraging the Government’s centre of expertise for open source within the Office of National Intelligence. 

Accessibility is also the reason why, as Scott acknowledges, OSINT thrives beyond government. Industry, academia, NGOs and private citizens are all delivering innovative intelligence products, services, and research. 

Australia is fortunate to have established vendors of OSINT training and managed services that already support, augment and complement a government workforce under strain. In the technology space, vendors build tailored OSINT tools and infrastructure that manage attribution and enhance all elements of the intelligence cycle. The challenge for all capability managers is in navigating a burgeoning marketplace, mapping their needs to the right mix of tools and services, and then optimally integrating them. 

OSINT capability should be dispersed through government

Stealing other countries’ secrets is the form of intelligence gathering that gets most attention—and resources. But a mass of information is publicly available and just waiting to be collected, to produce what’s called open-source intelligence (OSINT). 

Governments, including Australia’s, are working on how better to collect it, and one idea is to set up a central agency for the task. If that’s a solution, however, it’s not the full solution. Potentially valuable public information and the ways it is used are so varied that individual parts of the government each need to collect it and turn it into OSINT. 

So, as an independent review into Australia’s intelligence agencies proceeds, a high priority should be strengthening OSINT capabilities dispersed through the government. Australia must have an ecosystem of OSINT capabilities that are fit-for-purpose, evolve with the information environment, embrace accessibility of PAI, and move forward in alignment with industry, academia, and the whole federal government—not just the national intelligence community (NIC). 

Ben Scott of the National Security College argues that setting up a dedicated OSINT agency would rebalance the NIC’s work, putting more focus on publicly available information (PAI). And so it would. The problem is that there can be no one-size-fits-all OSINT capability: sources and applications are just too diverse. 

OSINT centres that are fit for purpose must be tailored to deliver intelligence at the level and tempo required by each part of the government to consume and exploit. In practice, this means the demand for OSINT varies according to the operational demands of each agency. They will variously require specialised forms of collection and exploitation, sometimes sustained monitoring of enduring hazards, or unplanned or dynamic collection on emergent threats. 

The Richardson review of the legal framework of intelligence collection provides a glimpse of these operational demands. The Department of Home Affairs, for example, uses PAI to inform policymaking, identify research gaps, and reduce the volume and effectiveness of terrorist and violent extremist content online. The department has a sustained high tempo of OSINT operations with a strong focus on people both onshore and overseas. 

The Department of Defence, by contrast, requires the capacity to quickly scale OSINT gathering in support of war fighters during crisis and conflict. 

Fit-for-purpose integration also depends on the intelligence maturity of the consumer. Some have access to exquisite intelligence, surveillance, and reconnaissance (ISR) assets. For them, OSINT will be geared for sharing with people at lower classifications, collecting against otherwise inaccessible targets,collecting faster and more cheaply and cueing other intelligence-gathering methods. 

But operators at the tactical edge or organisations not traditionally served with intelligence may have limited or no access to exquisite ISR capabilities. For them, OSINT is the solution. Many parts of the federal government outside the NIC find themselves in this situation, and their organic capabilities should be empowered. 

Moreover, OSINT centres must tailor and continuously adapt the inputs of their capability to the target information environment. As Scott outlines, we are amid an ongoing information revolution, where the potential of OSINT lies in capitalising on the growing volume, variety and velocity of PAI. The challenge of operating in this information environment lies in keeping pace with a landscape that varies by region and language and features unique and diverse platforms. This complexity extends to the diverse types of data generated on these platforms, including social media, news articles, satellite imagery, ship telemetry and more.  

But the difficulty doesn’t end there. How you access, use, protect, and share this information can be governed by whether it is personally identifiable, copyrighted, or access-controlled. While a central OSINT agency can play a significant enabling role, diverse agencies in the government can excel at keeping pace with and exploiting their respective target environments. 

Accessibility of PAI is the strongest argument for strengthening agency capabilities alongside a central body. Given the online nature of the information environment, if you have an internet connection, you have access to PAI. This accessibility is part of what makes OSINT so attractive to intelligence missions of all shapes and sizes—not just inside the NIC. 

However, the seemingly low barrier to entry is deceptive. Operating legally, safely, and effectively over sustained periods demands more than just connectivity; it requires tailored governance, policies, training, and technology, and operating without that backing carries risks. Those include risks that may compromise the integrity of collection and analytical products, harm analyst mental wellbeing, expose sensitive information, break laws, or conflict with other missions. 

Fortunately, agencies can already engage with these risks by leveraging the Government’s centre of expertise for open source within the Office of National Intelligence. 

Accessibility is also the reason why, as Scott acknowledges, OSINT thrives beyond government. Industry, academia, NGOs and private citizens are all delivering innovative intelligence products, services, and research. 

Australia is fortunate to have established vendors of OSINT training and managed services that already support, augment and complement a government workforce under strain. In the technology space, vendors build tailored OSINT tools and infrastructure that manage attribution and enhance all elements of the intelligence cycle. The challenge for all capability managers is in navigating a burgeoning marketplace, mapping their needs to the right mix of tools and services, and then optimally integrating them. 

Classifications and clearances are the bricks and mortar of national security

Everyone has secrets. You don’t like Nana’s fruitcake but don’t want to tell her. That’s a secret, but it’s not classified SECRET (well, unless the fruitcake has illicit ingredients, not just dried fruit).

Yet from social media to pop culture, terms like ‘classified’, ‘secret’ and ‘top secret’ are thrown around with abandon. Often uninformed commentators, lobbyists and ideologues with little experience working in these environments purport to speak on these terms with authority. That’s unhelpful because information security, and clearances for information access, underpin the effective conduct of statecraft—especially when it involves intelligence matters.

In Australia, security classifications are applied to information based on the amount of damage it could cause if it was unlawfully disclosed.

What classifications mean and what security clearances are in an Australian government context is detailed in the foundational and constantly updated Protective Security Policy Framework (PSPF).

Compromise of information classified TOP SECRET would be expected to cause ‘exceptionally grave damage to the national interest, organisations or individuals’. (The leaking of Harry and Meghan’s plans for a TV project or new IOC rules for Olympic athletes? Not so much.)

National security agencies and the government haven’t always done enough to explain this to Australians. Proper use of these systems ensures national security. It’s important that the public understand the relative seriousness.

There are three levels of security classification used in Australia: PROTECTED, SECRET and TOP SECRET.

Protected information can be accessed with a minimum ‘baseline’ clearance. But such information does require some restrictions on how it’s stored, communicated and used. Formally, it is information the compromise of which would be expected to cause ‘damage to the national interest, organisations or individuals’. Compromising secret information could cause ‘serious damage’, and top secret ‘exceptionally grave damage’. Similar language is used by other governments in their definitions of classification levels.

The ‘exceptionally grave damage’ threshold is a high bar and should give pause. Examples in the PSPF include ‘significantly affecting the operational effectiveness, security or intelligence operations of Australian or allied forces’, ‘directly provoking international conflict or causing exceptionally grave damage to relations with friendly countries’ and ‘widespread loss of life’.

Some classifications, such as RESTRICTED, HIGHLY PROTECTED and CONFIDENTIAL, are no longer used and are now found only in historical documents. In addition, there’s OFFICIAL, a protective marking used for government documents but not strictly a security classification since it doesn’t require a clearance for access.

Agencies determining classifications are obliged to set them at the ‘lowest reasonable level’, and the PSPF outlines potential downsides of overclassification.

To access material classified as PROTECTED and above requires a security clearance, of which there are four types: baseline; NV1 (negative vetting 1), aka a secret clearance; NV2 (negative vetting 2), top secret; and PV (positive vetting), the highest clearance.

The Australian Government Security Vetting Authority (AGSVA) in the Department of Defence undertakes the bulk of security clearance work.  However, important changes are happening with the creation of a new vetting authority within the Australian Security Intelligence Organisation responsible for all PV clearances—rebadged as TOP SECRET—Privileged Access.

That change reflects Australia’s heightened security and counterintelligence concerns and is being implemented through legislation recently reviewed by the Parliamentary Joint Committee on Intelligence and Security. The new arrangements also reflect the difference between NV2 and PV clearances, which both provide access to top secret information. A crude but useful analogy: an NV2 lets you eat sausages, but a PV also lets you see how sausages are made (be involved in discussions about sausage-making techniques, have access to a sausage warehouse, and so on).

Before this, PV clearances were issued by a small number of ‘authorised agencies’ and AGSVA. AGSVA, and those authorised agencies, will continue to be responsible for non-PV clearances.

ASIO’s new responsibility is not unusual—security agencies in Canada and New Zealand, for example, perform comprehensive vetting roles for their countries’ public services.

Centralised vetting has significant potential benefits, particularly for increasing efficiency and effectiveness, but a principal challenge is effectively integrating clearance management by a central agency with ongoing personnel security management by individual employers.

Clearances are important because they govern access. To read (or just to have access to) a classified report requires a commensurate minimum level of clearance. But information is not always in the form of a report. Access might involve a whole system or a particular store of information. It might involve being part of sensitive discussions and planning. Or it might mean physical access to a particular kind of classified space. Therefore, the type of access and the type of information might have practical implications for employment in a specific role or even by a particular agency.

Obtaining a clearance involves escalating levels of intrusiveness and obligations on the candidate, which can last a lifetime. The vetting process necessarily involves significant personal imposts, especially on an individual’s privacy. It involves multiple steps, noting that in this context a police check is a step, not a clearance. This is also why specific accountability and whistleblowing mechanisms are instituted for clearance holders, such as the role played by the Office of the Inspector-General of Intelligence and Security in relation to intelligence officials. Furthermore, access to privileged information, per a PV clearance flips the burden of proof from ‘why shouldn’t this person have a clearance’ to (as it says, positively) ‘why should this person have a clearance’.

Clearances have time limits and need to be periodically reviewed and re-adjudicated—in the lingo, ‘revalidated’. PV clearances, for example, are reviewed at least every seven years.

For all their necessity, security clearances are also a significant challenge for organisations. They can complicate engagement of staff, particularly when organisations are trying to develop capabilities quickly.

Access to information isn’t limited only by classification and clearance level. Code words are added to classifications as caveats to further limit access to those who have also been briefed into (and retain) a particular compartment of knowledge—‘sensitive compartmented information’ in US parlance—because they need to know (NTK) that information to perform their duties. As such, a clearance is just the first step in the process of accessing information. Simply having a requisite clearance doesn’t give someone a right to access, or ownership over, classified information. In addition, there are ‘special handling instructions’ (most notably for cabinet materials) and ‘information management markers’ (such as for legally privileged information).

Finally, there is ‘releasability’. Nationality in the 21st century might be a contested concept in op-ed pages or on Twitter, but in the national security arena nationality via citizenship remains inviolable. Releasability controls which nationals can access what information.

This kind of limitation is universal to all governments. It just happens that certain intelligence communities have mature intelligence-sharing regimens, such as the Five Eyes intelligence alliance or NATO, but also bilaterally, that make releasability relevant. Perhaps ironically, releasability markings are an indicator of the regularisation of sharing.

AUSTEO (Australian eyes only) material is limited only to Australian citizens. The lesser used AGAO (Australian government agencies only) extends access to seconded allied personnel. The US government has its own equivalent to AUSTEO—NOFORN (not releasable to foreign nationals).

In addition, there’s the concept of the need-to-know principle itself, which has been challenged in the post-9/11 era and even more recently by rival concepts like ‘responsibility to share’.

There is an important carveout. Security clearances aren’t required for certain officeholders, including members of parliament, ministers, judges, royal commissioners and the governor-general. This reflects their authority, derived from election or appointment. Nonetheless, similar forms of briefings are typically used, not for the purpose of formal access but to inform about sensitivities, appropriate handling or other matters.

So, when a news story identifies something astop secret’, ask whether it’s actually referring to material classified TOP SECRET, which can be accessed only by people with an NV2 or PV security clearance. Or is it just some hitherto unknown piece of juicy gossip or a peccadillo someone is trying to hide?

Accuracy matters, and secrets still matter. Even in a global village, everyone wants to know everyone else’s business.

Gatekeeping the parliamentary intelligence committee won’t make Australia safer

Reports have emerged of a rare stoush over the usually cordially bipartisan Parliamentary Joint Committee on Intelligence and Security (PJCIS). The source of the fracas is the Labor government’s proposal to expand the committee from 11 to 13 members and remove constraints on its composition that have mostly limited its membership to the two major parties. The Liberal Party has strongly opposed these changes.

This is a worrying development for a committee that has largely avoided partisan bickering over the years, but it’s important to remember that it’s not the first time a government has proposed changes to the committee. In fact, since it was first appointed in 1988 by Bob Hawke’s government, the committee—then the Parliamentary Joint Committee on the Australian Security Intelligence Organisation—has continually evolved in name, size and function.

Currently, the PJCIS is one of 67 parliamentary committees of the Australian parliament. Parliamentary committees consist of a group of members or senators appointed by one or both houses of parliament. Like other ‘joint’ committees, the PJCIS consists of members from both chambers.

The primary role of parliamentary committees is to do work better done by small groups, such as conducting inquiries, hearing witnesses, considering evidence, discussing matters in fine detail, and formulating reasoned conclusions.

A further advantage is that many different committees can operate at one time, which enables many more matters to be dealt with in detail. This also offers the benefits of specialisation.

However, unlike other parliamentary committees, the appointment of the members of the PJCIS is by resolution of the relevant house on the nomination of the prime minister or leader of the government in the Senate.

The PJCIS’s role is limited to overseeing the administration of the national intelligence agencies, addressing matters referred to it by the responsible minister or by a resolution of parliament, and reporting its recommendations.

The committee is unique in that its oversight of Australia’s intelligence agencies makes elevated levels of secrecy crucial to its work.

The 13 committee members under the government’s proposed legislation would comprise four from government ranks, two from each chamber; four from non-government ranks, again, two from each chamber; and five from either chamber. The requirement for a quorum would also increase from six to seven members. The bill doesn’t amend the requirement that the government hold a majority.

The PJCIS is constituted under the Intelligence Services Act 2001, which stipulates: ‘The Committee is to consist of 11 members, 5 of whom must be Senators and 6 of whom must be members of the House of Representatives’.

Crucially, it has been described as a ‘closed shop’ to crossbenchers because the legislation refers to members of ‘recognised political parties’, effectively precluding minor parties and independents. A notable exception was the independent MP Andrew Wilkie’s inclusion from 2010 to 2013 by Julia Gillard’s Labor government.

The proposal aims to allow the PJCIS greater flexibility, especially in covering absences. In its 2021–22 annual report, the committee noted that its workload continued to be at high levels and that it conducted significantly more reviews and bills inquiries than in the previous reporting period.

The PJCIS’s composition no longer reflects the diverse composition of parliament today, and the government’s recommendation would address this.

But in a move that breaks bipartisan support, a dissenting report by the opposition says that the PJCIS’s members should only be from parties of government and that there’s ‘no evidence’ that two extra members would improve parliamentary oversight.

Moreover, it noted that the proposed amendments were not recommended by former director-general of security Dennis Richardson in his 2020 review of the legal framework of the national intelligence community. However, that review did say that ‘the Committee’s composition is, and rightly remains, a matter for the Parliament’.

The PJCIS has had its detractors. Indeed, when the Hawke government first proposed the creation of the committee, the opposition Liberal Party was initially against it.

If the national intelligence community is accountable to the parliament, then it is the parliament’s responsibility to provide robust and effective oversight mechanisms. Extra members with expertise in intelligence could provide greater confidence in the robust function of parliamentary oversight.

All parliamentary committees, including the PJCIS, benefit from a diversity of perspectives and opinions. Indeed, a greater a level of contestability in the committee could lead to positive outcomes.

It is in the Australian public’s interest to ensure the PJCIS operates effectively, and new members will help it do that. Instead of weakening Australia’s national security, the expansion of the PJCIS would strengthen its capacity to serve the national interest.

Bolstering scrutiny of Australia’s intelligence agencies remains a vexed issue

A policy options paper from the National Security College at the Australian National University, titled ‘Improving national security governance’, proposes reforms to hold Australia’s security and intelligence agencies more accountable as we move into an era of heightened strategic complexity and risk.

The paper is a welcome contribution to public discourse at a time when the powers and resourcing vested in Australia’s national intelligence community are greater than ever. It makes astute observations about problematic limitations to the scrutiny and guidance of Australia’s security and intelligence agencies.

One key recommendation is the appointment of an assistant or junior minister for intelligence to work across national security portfolios and support senior ministers and the prime minister ‘on matters relating to national security strategy, managing investment in intelligence capability and reforms to enabling legislation’.

While that idea is commendable at face value, adding yet another layer of executive oversight within the machinery of government to an already immensely complex and crowded oversight structure is problematic. Indeed, if some of the security and intelligence legislation has been described as a ‘dog’s breakfast’, then the current haphazard oversight structure can only be described as a ‘dog’s dinner’. Last year, John Blaxland made a valiant effort to outline the complicated oversight and accountability mechanisms for Australia’s intelligence agencies.

In fact, there’s a real inherent danger that the creation of such a portfolio would raise the risk of politicising oversight. It is by no means clear that collecting all the intelligence agencies under a single minister as proposed would be sufficient to prevent the politicisation of intelligence. Moreover, the political interests of such a minister could inhibit impartial oversight and even increase the risk of sensitive information being leaked. In the Australian case, a one-size-fits-all approach is easier said than done for effective oversight.

What is required is an integrated approach for more exacting standards of objectivity and rigour to bolster the powers and resourcing of the key existing oversight bodies, including the Parliamentary Joint Standing Committee on Intelligence and Security (PJCIS) and the Inspector-General of Intelligence and Security (IGIS). As well, reintroducing the role of a national security adviser, previously performed by Duncan Lewis and Margot McCarthy, could be considered to enhance whole-of-government coordination.

As Australia’s national intelligence community has grown and expanded in size and powers in the past two decades, key oversight and accountability mechanisms have remained comparatively unchanged and legislatively constrained. That necessitates enhanced oversight.

Over the years, current and former parliamentarians—John Faulkner, Russell Trood, Penny Wong, Jenny McAllister and Rex Patrick—have called for the bolstering of the PJCIS’s powers and resourcing. Anthony Bergin and I have also written extensively on the vexed issues pertaining to its effective oversight.

In a recent article, PJCIS chair James Paterson acknowledged that the committee had already recommended it conduct an inquiry after the next election into the provisions of the Intelligence Services Act 2001 that govern its work. According to Paterson: ‘It has not been examined since it was legislated in 2001, and an inquiry would ensure the committee is functioning as efficiently and securely as possible.’

However, the 2019 review of the legal framework of the national intelligence community by Dennis Richardson did examine the Intelligence Services Act 2001. Disappointingly, it concluded that the remit of the PJCIS should not be expanded to include direct oversight of operational activities, past or current. Nor did it recommend any amendment to the composition of the PJCIS for a more flexible membership.

However, the review did endorse the 2017 intelligence review’s recommendation to expand the remit of the PJCIS to request the IGIS to conduct an operational inquiry and report to the PJCIS, the prime minister and the responsible minister. Unfortunately, this was one of the few recommendations of the review dismissed by the government, which asserted that the existing arrangements were appropriately balanced and further PJCIS oversight wasn’t necessary.

The 2017 review also recommended that the resources of the office of the IGIS be increased to ensure that it could effectively oversee the national intelligence community. The government accepted this recommendation and in the 2018–19 budget allocated funds for the IGIS to sustain a full-time office of 55.

However, in its submission to the PJCIS review of agencies’ administration and expenditure for 2019–20, the IGIS noted that ‘delays in the processing of positive vetting security clearances continue to impact on the ability of some agencies, including IGIS, to recruit staff’. As at 30 June 2020, IGIS had 33 staff, well below the recommended 55.

The under-resourcing of an office that plays such a vital role in providing independent, rigorous oversight of, and public assurance about, the intelligence community is unacceptable and further reforms to the vetting process are essential.

The Richardson review noted that ‘the oversight system for the NIC is strong, effective and working well. There is no need for substantial reform of the system.’

It is clear that the ambit of oversight of Australia’s security and intelligence agencies is a complicated and vexed issue and there’s still considerable room for reform, especially to the PJCIS and IGIS.

Bolstering the scrutiny of Australia’s national intelligence community is essential so that the public can trust the oversight. It is in the national interest to ensure more profound rethinking of such oversight measures. Here the policy options paper makes a positive contribution to an important ongoing debate.

Richardson intelligence review much more than an ‘inside job’

When the authors of the 2017 independent intelligence review recommended that a ‘suitably qualified person’ review the legislative framework of Australia’s intelligence community, they probably had in mind someone like Justice Robert Marsden Hope, whose two royal commissions in the 1970s and 1980s laid the foundations of the legislation, structures, oversight arrangements and operational doctrines of the intelligence community for the next 40 years.

Instead of a senior judge with no connection to the intelligence agencies, the government appointed Dennis Richardson, a former head of the Australian Security Intelligence Organisation, with support from a group of lawyers from the Attorney-General’s Department. Some observers expected an ‘inside job’, with recommendations supporting the changes for which some in government, including the agencies, had long been pressing.

Those who feared such an outcome should be pleasantly surprised. The review was completed in December 2019, but the unclassified version and the government’s official response were only released a year later. Richardson and his team have presented the most important and comprehensive review of the entire intelligence system since Hope’s first royal commission in the 1970s, but it has prompted remarkably little public comment.

Commentators in the media and academics in law, public policy and the growing field of intelligence studies may have been daunted by the size, scope and technical complexity of the review. That is disappointing, for the review provides answers to most of the issues that led me to call for the next independent intelligence review to be upgraded to a royal commission.

This article makes some general comments on the tone and overall approach of the Richardson review. A follow-on post will comment briefly on Richardson’s recommendations on electronic interception, on the major changes in the structure of intelligence in recent years, and on oversight mechanisms. There is much more to be said about these and other elements of the review. Lawyers, journalists, practitioners and others should now engage in a wide-ranging discussion about the implications of the Richardson review for the future of this vitally important part of national security policymaking.

First, we should note that Richardson’s career in the public service included appointments not only as head of ASIO but also as head of the Department of Defence, head of the Department of Foreign Affairs and Trade, ambassador in Washington, chief of staff to a prime minister, and deputy secretary of the Department of Immigration and Multicultural Affairs. In short, he has witnessed the agencies and their interactions with senior politicians and officials over many years at close range from diverse perspectives, without being imbued with the ethos of any one department or agency.

Richardson’s degree was in history, not law. His academic mentor, the distinguished historian Neville Meaney, encouraged him to apply for the diplomatic service, where he became one of the celebrated 1969 intake. Like Hope, Richardson bases his review on a detailed knowledge of the history of the intelligence organisations. Again like Hope, he investigates not only the agencies’ legislation and structure, but also their culture.

While not a lawyer, Richardson has taken careful note of submissions from authorities such as the Law Council of Australia, former High Court justice Michael Kirby, barrister Bret Walker and Professor George Williams. Richardson and his team of lawyers frequently quote Hope’s principles. Above all, they understand the importance of establishing the right relationship between the demands of national security and the protection of individual civil liberties.

The overwhelming thrust of the report is to insist that the fundamental principles laid down by Hope are still valid today. Richardson is scathingly critical of attempts by the agencies to dismiss the legal constraints upon them as unnecessary, outdated or unreasonably burdensome. At times his blunt rebukes are reminiscent of those addressed to uniformed servicemen in the 1970s by his only predecessor as head of both Foreign Affairs and Defence, Arthur Tange.

For example, Richardson says that too often ‘Australian agencies look over the fence and want [the powers, functions and geographical remit that] another agency has so that they can do their own thing’, rather than understanding the reasons for the different roles and responsibilities of each agency and seeking ‘cooperation and partnership’.

One agency sought a legislative change on the grounds of ‘administrative burden’, which turned out to be eight-tenths of the time of one full-time employee, in an agency with more than 1,000 staff. Legal requirements should be seen, Richardson insists, not as ‘constraints or barriers to operational effectiveness’ but as ‘the guardians of valuable principles’.

Too many in the agencies, he reports, know the law but not the reasons behind the law. To underline the point, the first of Richardson’s 204 recommendations is that the agencies should ensure that their induction and training programs address ‘the history, background and principles that underpin their legal frameworks’.

Those who argue that the principles laid down by Hope are now outdated most commonly refer to the difficulties of distinguishing between Australians and non-Australians, and between what happens in Australia and what happens abroad, at a time of homegrown terrorists, foreign fighters, dual citizenship and instantaneous worldwide communications. These arguments cut little ice with Richardson, who devotes three closely argued chapters on the need to reaffirm the distinctions between security intelligence and foreign intelligence, between onshore and offshore activities, and between monitoring Australian citizens and non-citizens.

Richardson similarly reasserts the importance of maintaining a clear distinction between the collection and assessment of intelligence, and between intelligence and law enforcement agencies. Some of the implications of these principles will be discussed in my next piece.

On these and other crucial issues, Richardson makes his recommendations against changes to legislation as explicit and prominent as his positive recommendations. If, as is highly likely, the proponents of some changes reiterate their claims in the future, there will be a clear record, in some detail, of why those arguments were robustly rejected in 2019–20.

Former ASIO and MI6 chiefs talk conflict, coronavirus and foreign interference

‘Grim’ is Duncan Lewis’s terse assessment of the geopolitical outlook and potential for major conflict in the region. But not hopeless, he hastens to add, even though Australia will have to work much harder—diplomatically, economically and strategically—to emerge safely from this period of turbulence.

In conversation with journalist Stan Grant as part of ASPI’s ‘Strategic Vision 2020’ conference series, Sir John Scarlett, a former head of MI6, and Lewis, former head of ASIO, ran through the critical issues facing allied intelligence agencies.

Scarlett agrees with Lewis’s bleak assessment of the likelihood of major conflict, as well as with an observation by Grant that this is not the whole sum of futures challenges for intelligence. As well as the deteriorating geopolitical outlook, agencies are having to grapple with the implications of global economic uncertainty, the ongoing threat of terrorism, the rise of authoritarianism and the impact of climate change.

While the Covid-19 pandemic has often been described as an accelerant of these trends, it could also transform them in ways which are completely opaque to us now, says Lewis.

For example, both former intel chiefs worry about the coronavirus-generated economic crisis stymieing the ability of governments to fund critical climate change measures. Similarly, if governments handle the pandemic poorly, winning public trust for other big and necessary reforms becomes more difficult. ‘My overwhelming worry is the degree to which confidence in government may be undermined when we look back on this’, says Scarlett.

Terrorism, long a preoccupation of intelligence agencies, has been pushed off the front page by Covid and climate change. But it will come roaring back, warns Scarlett. Even though the Islamic State group has been defeated territorially, roughly 18,000 foreign fighters are still active, and the power of IS ideology remains, spreading across Africa and beyond. ‘The idea is infectious’, adds Lewis. ‘It’s a bit like Covid.’

Terror groups of all kinds, including those on the far right, have been quick to take advantage of the fact that more people are online and socially isolated due to the pandemic. Combined with economic uncertainty, these conditions create a perfect climate for online recruitment and radicalisation. ‘The seeds for those things to prosper are in the ground now in our communities and we need to be very, very careful of it’, says Lewis.

This is but one example of the way in which digital technologies create new headaches for intelligence agencies. Another is the surge of foreign interference in liberal democracies, which, for Lewis, is driven by what social media and fake news can do.

On the plus side, the public use of digital technologies and advances in machine learning have vastly increased the datasets intelligence agencies can exploit. Even so, ‘old fashioned human intelligence sources are not going away’, says Scarlett.

Foreign interference looms large for both Australia and the UK, but in different ways. Scarlett says that he’s been impressed with the scope of the Australian response, but, for the UK, the issue of Chinese influence in politics is less well understood. Decisions like banning Huawei from its 5G network were difficult to make because the UK system had been slow to adapt to the new reality of China under Xi Jinping. ‘Just a few years ago we had leaders talking about a golden era in relations [with China].’

The main focus of ‘heated political debate’ is Moscow, says Scarlett, referencing the recent report to the House of Commons on Russian interference in the UK. He notes that the report is ‘very critical of the readiness and capability, and just general awareness, of the government and the intelligence and security community to Russian interference in our economy, decision-making and politics’.

On the issue of the ever-increasing powers of intelligence agencies, Grant asked whether greater surveillance of everyday life and increasing encroachment on human rights and civil liberties is the new normal, citing police raids on Australian journalists last year.

Lewis says he hopes ‘desperately, personally, that it’s not the new normal’ but suspects that technology is in the driver’s seat here. He notes that citizens are more willing to share their data with private corporations than with governments, but concedes it’s an issue of trust as well as a huge legislative challenge.

‘How do you legislate in such a way that intelligence agencies have got the necessary oversight to protect citizens? Because you don’t want to be preying on your citizens. The citizenry has to be protected from its government.’

In the UK, ‘a clear majority across public opinion is supportive of trusting the security and intelligence community’, says Scarlett. He cites legislation like the 2016 Investigatory Powers Act which introduced judicial oversight to the intelligence system as being important in instilling trust, as well an ‘instinct within society—and I may be a bit optimistic here—to be trusting and that we don’t, as a country, have a history of state abuse and dictatorship’.

But it can be a mistake for governments and citizens to overstate links between surveillance and coercive powers, according to Scarlett. Pointing to the limitations placed on people’s movement in response to Covid-19, he says ‘the national response and the people’s response was a voluntary one. There was no capability on the part of the authorities to really enforce it.’

On the future of the Five Eyes intelligence relationship, both men are confident that it can withstand current stresses. ‘After three-plus years of the “America first” administration, there is a degree of disorientation amongst America’s allies, within alliances and more generally around the world’, says Scarlett. But at the same time, he adds, ‘I’ve worked very closely with a whole range of US colleagues and senior people in the administration, politics and the security intelligence community, and they’re absolutely rock solid in their commitment to the alliances, to NATO and to the Five Eyes, and to liberal democracy and American leadership internationally’.

All intelligence agencies, stresses Scarlett, ‘have to be, first of all, absolutely clear about what it is that we’re defending. We’re defending our countries as liberal democracies, based on the rule of law. It’s not often explained exactly what a liberal democracy is and what it stands for. But making sure that you’re doing that is essential.’

The making of the Australian intelligence community

The public history of Australia’s intelligence community involves isolated moments of creation by political leaders and long periods of silence behind the secrecy curtain.

The public way stations in the history—in which the agencies were weighed and judged—were when reviews or inquiries lifted the curtain.

Big moments of creation were Prime Minister Ben Chifley’s establishment of the Australian Security Intelligence Organisation in 1949 and Malcolm Turnbull’s raising of the home affairs portfolio in 2017.

For the curtain-ups, see:

Two new books—a political memoir and a biography—give accounts of the politics of creation and the way inquiries have shifted and modelled the intelligence community.

Malcolm Turnbull’s A bigger picture offers a chapter with the title, ‘Matters of trust: reforming intelligence and home affairs’. And Peter Edwards does excellent history and fine biography with Law, politics and intelligence: A life of Robert Hope.

The Turnbull intelligence chapter is a curious five-page effort covering his 2017 announcement of ‘the most significant reform of Australia’s national intelligence and domestic security arrangements—and their oversight—in more than forty years’.

The changes had two separate elements that were brought together at the moment of Turnbull construction: one part was a curtain-up review effort, the other a sweeping act of political creation.

On the same day, Turnbull acted on the meticulous work of the L’Estrange–Merchant review while announcing his own creation (one the review didn’t recommend): the new super-portfolio, home affairs.

’Twas a strange mix, a classic Canberra example of the good and not so good of policymaking.

The Turnbull account of the birth of home affairs is policy framed by personalities and driven by politics. (I refer you to time-tested rules for understanding how politicians navigate Canberra: ‘It’s always personal’ and ‘There’s always a deal’.)

In the Turnbull telling, for many years there’d been a proposal to bring all the ‘domestic national security agencies together in one super-department, modelled on the UK’s Home Office’.

With that dusting of policy, Turnbull turns to the personalities. His predecessor as PM, Tony Abbott, initially supported the home affairs idea after the 2013 election, when it was being pushed by an up-and-coming minister called Scott Morrison. Abbott ‘then backed away from it, perhaps not wanting to give Morrison a bigger platform than he already had’.

In Turnbull’s case, the up-and-comer who’d head the new ministry was Peter Dutton. Other ministers expressed doubts about Dutton’s capacity for the expanded job, Turnbull writes, but the significant warning from colleagues was that ‘Dutton was after my job’.

The warnings ‘turned out to be right’, but Turnbull ‘had credited Dutton with enough common sense and self-awareness to realise that whatever our problems were, he was certainly not the solution’.

Despite the ‘horrified’ reaction of the agencies moving into the mega-portfolio and the political danger of giving Dutton ‘a position of enormous responsibility’, Turnbull created the Department of Home Affairs.

Note that half the chapter on reforming the intelligence community is actually a discussion of personality and political positioning. Turnbull’s verdict is that views may differ on whether he overestimated Dutton’s competence, ‘but certainly I misjudged his character’.

Malcolm Turnbull gave Peter Dutton a wonderful bone; it didn’t prevent the eventual fatal bite on Turnbull’s leadership.

Many Canberra truths are on offer. One is that prime ministers and ministers come and go, but the agencies they create endure and evolve.

From that reality, turn to Edwards’s account of the royal commissions and inquiries of Robert Hope. More than any other individual, Hope shaped the structures, operations and doctrines of Oz intelligence agencies. Turnbull gave the Hope model a mighty shake, but much from the judge endures.

Hope contributed to a distinct Australian construct you can see expressed in the buildings in Canberra’s parliamentary triangle; here’s a stroll from Parliament House down King’s Avenue, guided by Hope’s spirit.

As with many Oz intelligence practitioners, Edwards stresses the importance of Hope’s separation model—separating assessment from collection and policy.

The tension in the model is between contestability and coordination. Tribalism contends with groupthink. Canberra is a small town with strong tribes, and Edwards comments that the judge from Sydney sometimes underestimated that tribalism.

For a taste of the book, here’s Peter Edwards on Hope’s personality, the origins of his three inquiries, the principles of the Hope model and its future.

Edwards believes Hope’s model is challenged by Turnbull’s act of creation.  That view is given glancing support by Turnbull’s final paragraph on his ‘historic’ changes: ‘[P]ublic sector reforms are a bit like business plans—the mediocre business plan well executed will always beat the brilliant business plan poorly executed.’

To see how well Turnbull’s creation is operating, Edwards says it’s time for another royal commission into Oz intelligence with ‘far-reaching and open-ended terms of reference’. Here are 11 questions Edwards thinks the commission should answer.

And here’s my interview with Peter Edwards on the need for another curtain-up effort on Oz intelligence.

Tag Archive for: Intelligence

Artificial Intelligence, Human-Machine Teaming, and the Future of Intelligence Analysis

In February, ASPI and the Special Competitive Studies Project held a series of workshops on the rise of artificial intelligence (AI) and its impact on the intelligence sector.

The workshops, which followed a multi-day workshop in Canberra in November 2023, brought together experts from across the Australian and US intelligence communities, think tanks and industry to inform future intelligence approaches in both countries.

The project also focuses on how current and emerging AI capabilities can enhance the quality and timeliness of all-source intelligence analysis and how this new technology may change the nature of the intelligence business.

The aim of the workshops is to develop a prioritised list of recommendations for both the Australian and US intelligence communities on how to adopt AI quickly, safely, and effectively.

You can find out more about the project here.

Foreign Territory: Women in International Relations

Danielle Cave was a lead author in a three-year study by the Lowy Institute for International Policy ‘Foreign territory: Women in international relations’ that revealed severe gender imbalances in Australia’s international relations sector – including Australia’s diplomatic, national security and intelligence community, despite the existence of some prominent trailblazers.

“Australia’s international relations sector — the departments and organisations that are responsible for conducting Australia’s international relations — has a severe gender imbalance in its workforce. While there have been notable trailblazers, the pace of change has been slow and uneven across the sector. Few of the most important diplomatic postings have ever been held by a woman. Women do not appear in the sector’s key policy-shaping activities. Significantly fewer women are rising to senior positions in the sector compared with the Australian public sector as a whole, international peers, and the corporate sector. The gender imbalance in the Australian Intelligence Community is particularly pronounced. It is important for the sector to address this imbalance. A more diverse workforce will not only better reflect Australian society, but make full use of the available talent pool. There is substantial evidence from the private sector that gender-balanced workforces are more effective, efficient, and innovative. Until the sector better represents Australian society it fails to use the best available talent to navigate Australia’s place in an increasingly complex world.

The analysis, which was based on a lengthy and complicated process of collecting data from a 20-year period, took place from 2016–2018 and found three stark divides:

  1. A vertical divide: men and women in the international relations sector experience different pathways to seniority, particularly in the intelligence community
  2. A horizontal divide: women are more common in the ‘people’, corporate or ‘softer’ policy side of the house. We were repeatedly told in interviews that senior women are less likely to be running high-profile policy, operational or intelligence-focused branches and divisions
  3. A sharp ‘international’ divide between the sexes. Spending time overseas is an integral part of the career path for many in the international sector, but there is a disconnect between the gender balances in government agencies in Canberra and in their overseas workforces.

Read media coverage of the report in The Sydney Morning HeraldThe Australian Financial ReviewThe Guardian and on ABC The World.