[LINK] Australian Cyber-warfare Book on Attacks from China
Tom Worthington
tom.worthington at tomw.net.au
Sun Jan 24 12:10:15 AEDT 2010
The book "Australia and Cyber-warfare" is very useful for putting the
new Australian Cyber Security Operations Centre (CSOC) into perspective.
The section on "China’s cyber-attack capability" is relevant to Google's
recent allegations of attacks from China:
<http://epress.anu.edu.au/sdsc/cyber_warfare/mobile_devices/ch03s04.html#d0e3630>.
There are very well formatted free web and mobile versions of the book
available online, as well as a print edition:
<http://epress.anu.edu.au/cyber_warfare_citation.html>.
By the way the Australian DoD released some photos of the CSOC, from
which I did some analysis of the centre design. However, I still have
some doubts as to if what was shown to the press and depicted in the
photos is the real CSOC, or just something set up temporarily for PR
purposes:
<http://www.tomw.net.au/blog/2010/01/design-of-cyber-security-operations.html>.
---
Australia and Cyber-warfare
Gary Waters, Desmond Ball and Ian Dudgeon
Canberra Papers on Strategy and Defence No. 168
ISBN 9781921313790 (Print version) $19.95 (GST inclusive)
ISBN 9781921313806 (Online)
Published July 2008
This book explores Australia’s prospective cyber-warfare
requirements and challenges. It describes the current state of planning
and thinking within the Australian Defence Force with respect to Network
Centric Warfare, and discusses the vulnerabilities that accompany the
use by Defence of the National Information Infrastructure (NII), as well
as Defence’s responsibility for the protection of the NII. It notes the
multitude of agencies concerned in various ways with information
security, and argues that mechanisms are required to enhance
coordination between them. It also argues that Australia has been
laggard with respect to the development of offensive cyber-warfare plans
and capabilities. Finally, it proposes the establishment of an
Australian Cyber-warfare Centre responsible for the planning and conduct
of both the defensive and offensive dimensions of cyber-warfare, for
developing doctrine and operational concepts, and for identifying new
capability requirements. It argues that the matter is urgent in order to
ensure that Australia will have the necessary capabilities for
conducting technically and strategically sophisticated cyber-warfare
activities by the 2020s. ...
Table of Contents
Abstract
Contributors
Acronyms and Abbreviations
Foreword by Professor Kim C. Beazley
Chapter 1. Introduction: Australia and Cyber-warfare
Chapter 2. The Australian Defence Force and Network Centric Warfare
Introduction
The ADF’S NCW Concept
Networks
Shared situational awareness
Self-synchronisation
Balancing risks and opportunities
The NCW Roadmap
The human dimension
Accelerating change and innovation
Defence’s Information Superiority and Support Concept
Networking issues
The ADF’s capability planning for NCW
Maritime
Land
Aerospace
ISR
Joint force
Coalition
Conclusion
Chapter 3. Information Warfare—Attack and Defence
Introduction
The value of information
Open source information
Information Warfare
How would an adversary attack us?
China’s cyber-attack capability
What should we do?
Conclusion
Chapter 4. Targeting Information Infrastructures
Introduction
The information society
Information Infrastructures: the NII, GII and DII
The National Information Infrastructure
The Global Information Infrastructure
The Defence Information Infrastructure
Information Infrastructures: Some key characteristics
Components
Connectivity
Bandwidth
Functional interdependence
Ownership and control
The Importance of Information Assurance
Targeting Information Infrastructures: who and why?
Nation-state targeting
Targeting by non-state organisations
Targeting: objectives
Targeting: capabilities required
Psychological operations
Database management
Computer Network Operations (CNO)
Other weapons and methodologies
Media
HUMINT assets
Additional capabilities
Targeting: vulnerability and accessibility
Vulnerabilities
Accessibility
Intelligence
Conclusion
Chapter 5. Protecting Information Infrastructures
Introduction
Balancing information superiority and operational vulnerability
Vulnerabilities
Balancing security and privacy in information sharing
Managing security risk
Managing privacy risk
Dangers in getting privacy wrong
Cyber-security
Critical Infrastructure Protection in Australia
Securing the Defence enterprise
Trusted information infrastructure
Addressing the national requirement
Conclusion
Chapter 6. An Australian Cyber-warfare Centre
Introduction
The relevant organisations and their coordination
Research, planning and preparation
Offensive activities
Information Warfare and the intelligence process
Command issues
A premium on ante-bellum activities
Rules of engagement, doctrine and operational concepts
Capability planning
Location of a Cyber-warfare Centre
Regional developments
Conclusion
Bibliography
Index
---
--
Tom Worthington FACS HLM, TomW Communications Pty Ltd. t: 0419496150
PO Box 13, Belconnen ACT 2617, Australia http://www.tomw.net.au
Adjunct Lecturer, The Australian National University t: 02 61255694
Computer Science http://cs.anu.edu.au/people.php?StaffID=140274
More information about the Link
mailing list