[LINK] Australian Cyber-warfare Book on Attacks from China

Tom Worthington tom.worthington at tomw.net.au
Sun Jan 24 12:10:15 AEDT 2010

The book "Australia and Cyber-warfare" is very useful for putting the
new Australian Cyber Security Operations Centre (CSOC) into perspective.
The section on "China’s cyber-attack capability" is relevant to Google's
recent allegations of attacks from China:

There are very well formatted free web and mobile versions of the book
available online, as well as a print edition:

By the way the Australian DoD released some photos of the CSOC, from 
which I did some analysis of the centre design. However, I still have
some doubts as to if what was shown to the press and depicted in the
photos is the real CSOC, or just something set up temporarily for PR

     Australia and Cyber-warfare

     Gary Waters, Desmond Ball and Ian Dudgeon

     Canberra Papers on Strategy and Defence No. 168

     ISBN 9781921313790 (Print version) $19.95 (GST inclusive)
     ISBN 9781921313806 (Online)
     Published July 2008

     This book explores Australia’s prospective cyber-warfare
requirements and challenges. It describes the current state of planning
and thinking within the Australian Defence Force with respect to Network
Centric Warfare, and discusses the vulnerabilities that accompany the
use by Defence of the National Information Infrastructure (NII), as well
as Defence’s responsibility for the protection of the NII. It notes the
multitude of agencies concerned in various ways with information
security, and argues that mechanisms are required to enhance
coordination between them. It also argues that Australia has been
laggard with respect to the development of offensive cyber-warfare plans
and capabilities. Finally, it proposes the establishment of an
Australian Cyber-warfare Centre responsible for the planning and conduct
of both the defensive and offensive dimensions of cyber-warfare, for
developing doctrine and operational concepts, and for identifying new
capability requirements. It argues that the matter is urgent in order to
ensure that Australia will have the necessary capabilities for
conducting technically and strategically sophisticated cyber-warfare
activities by the 2020s. ...

     Table of Contents

     Acronyms and Abbreviations
     Foreword by Professor Kim C. Beazley
     Chapter 1. Introduction: Australia and Cyber-warfare
     Chapter 2. The Australian Defence Force and Network Centric Warfare

         The ADF’S NCW Concept

             Shared situational awareness
             Balancing risks and opportunities

         The NCW Roadmap

             The human dimension
             Accelerating change and innovation

         Defence’s Information Superiority and Support Concept

             Networking issues

         The ADF’s capability planning for NCW

             Joint force


     Chapter 3. Information Warfare—Attack and Defence

         The value of information
         Open source information
         Information Warfare

             How would an adversary attack us?
             China’s cyber-attack capability
             What should we do?


     Chapter 4. Targeting Information Infrastructures

         The information society
         Information Infrastructures: the NII, GII and DII

             The National Information Infrastructure
             The Global Information Infrastructure
             The Defence Information Infrastructure

         Information Infrastructures: Some key characteristics

             Functional interdependence
             Ownership and control

         The Importance of Information Assurance
         Targeting Information Infrastructures: who and why?

             Nation-state targeting
             Targeting by non-state organisations

         Targeting: objectives
         Targeting: capabilities required

             Psychological operations
             Database management
             Computer Network Operations (CNO)
             Other weapons and methodologies
             HUMINT assets
             Additional capabilities

         Targeting: vulnerability and accessibility



     Chapter 5. Protecting Information Infrastructures

         Balancing information superiority and operational vulnerability


         Balancing security and privacy in information sharing

             Managing security risk
             Managing privacy risk
             Dangers in getting privacy wrong

         Critical Infrastructure Protection in Australia
         Securing the Defence enterprise

             Trusted information infrastructure

         Addressing the national requirement

     Chapter 6. An Australian Cyber-warfare Centre

         The relevant organisations and their coordination
         Research, planning and preparation
         Offensive activities
         Information Warfare and the intelligence process
         Command issues
         A premium on ante-bellum activities
         Rules of engagement, doctrine and operational concepts
         Capability planning
         Location of a Cyber-warfare Centre
         Regional developments


Tom Worthington FACS HLM, TomW Communications Pty Ltd. t: 0419496150
PO Box 13, Belconnen ACT 2617, Australia  http://www.tomw.net.au
Adjunct Lecturer, The Australian National University t: 02 61255694
Computer Science http://cs.anu.edu.au/people.php?StaffID=140274

More information about the Link mailing list