top of page

Australia's Cyber Diplomacy: Ten key points

In 2025, the contribution on Australia by SCI Director, Greg Austin, to a multi-year efort to anlyse global cyber dipmacy was published.


Here are ten short quotes drawn from the chapter:


  • “There are two elements of Australian cyber diplomacy that dominate all else: the Five Eyes agreement… and an extremely close bilateral security alliance with the US.” 

  • “With the terrorist attacks of 11 September 2001, the cyber world for Australia became a much more dangerous place… Australia began to focus on cyber surveillance… in ways that tested civil and political rights.” 

  • “APEC became an early vehicle of Australian cyber diplomacy… on counter‑terrorism, including the strengthening of critical infrastructure protection.” 

  • “In pursuing human security in cyberspace, Australia has been active… but its actions… have varied in consistency and effectiveness… Australia’s actions in the area of international responses to cybercrime have been weak.” 

  • “By 2014, cyber threats to Australia began escalating from espionage to geopolitical confrontation with China and Russia.” 

  • “The emergence of AUKUS in 2021 signalled a sharpening of Australia’s alliance relationships on the cyber front.” 

  • “The single most important characteristic of Australian cyber diplomacy has been the contrast between the professionalism of the… officials… and their relative lack of enthusiasm for the full potential of the globalised information society.” 

  • “No successor [as Prime Minister] … has demonstrated the personal engagement with the information society… that Turnbull did.” 

  • “The security aspects of cyber… policy… are the areas… political leaders identify most strongly with.” 

  • “Australia has a fragmented and incomplete system for evaluating the effectiveness of its cyber policy… initial funding commitments [to evaluation] had been very low.” 


Greg Austin, ‘Australia’, in George Christou, Wilhelm Vosse, Joe Burton and Joachim Koops (eds), The Palgrave Handbook of Cyber Diplomacy, 2025, pp. 613-632

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating

NAVIGATE

  • Social Cyber Institute

JOIN SOCIAL CYBER UPDATE LIST

© 2022 SOCIAL CYBER GROUP

Sign up with your email and we will send you information on the activities of the Social Cyber and Tech Academy and/or the  Social Cyber Institute. Scroll down to select one or both options. Scroll further down for the Captcha button and Submit button. Terms and conditions are adjacent to this form.**

ALL RIGHTS RESERVED

** Terms and Conditions for Signing Up

By submitting this form you consent (according to your selections), to the Social Cyber Institute and/or the Social Cyber and Tech Academy collecting and using your name and email address to send you email updates about our publications, events, research, courses or related activities. 


You can withdraw your consent at any time by clicking “unsubscribe” in our emails or by clicking this email address:  greg,austin@socialcyber.co and pushing send on your email app. If you are located in the EU, UK or EEA, we process your data on the basis of your consent for direct marketing and you have rights to access, correct and delete your personal information, subject to applicable law. For more detail, please see our Privacy Policy.

bottom of page