This book explores Australia’s prospective cyber-warfare requirements and challenges. It describes the current state of planning and thinking within the Australian Defence Force with respect to Network Centric Warfare, and discusses the vulnerabilities that accompany the use by Defence of the National Information Infrastructure (NII), as well as Defence’s responsibility for the protection of the NII. It notes the multitude of agencies concerned in various ways with information security, and argues that mechanisms are required to enhance coordination between them. It also argues that Australia has been laggard with respect to the development of offensive cyber-warfare plans and capabilities. Finally, it proposes the establishment of an Australian Cyber-warfare Centre responsible for the planning and conduct of both the defensive and offensive dimensions of cyber-warfare, for developing doctrine and operational concepts, and for identifying new capability requirements. It argues that the matter is urgent in order to ensure that Australia will have the necessary capabilities for conducting technically and strategically sophisticated cyber-warfare activities by the 2020s. The Foreword has been contributed by Professor Kim C. Beazley, former Minister for Defence (1984–90), who describes it as ‘a timely book which transcends old debates on priorities for the defence of Australia or forward commitments, [and] debates about globalism and regionalism’, and as ‘an invaluable compendium’ to the current process of refining the strategic guidance for Australia’s future defence policies and capabilities.
Author(s): Gary Waters, Desmond Ball & Ian Dudgeon
Year: 2011
Language: English
Pages: 194
Australia and Cyber-warfare......Page 1
Contents......Page 5
Abstract......Page 9
Contributors......Page 11
Acronyms and Abbreviations......Page 13
Foreword by Professor Kim C. Beazley......Page 19
Introduction: Australia and Cyber-warfare......Page 21
Introduction......Page 25
The ADF’S NCW Concept......Page 30
Networks......Page 32
Shared situational awareness......Page 33
Balancing risks and opportunities......Page 34
The NCW Roadmap......Page 35
Defence’s Information Superiority and Support Concept......Page 38
Networking issues......Page 39
The ADF’s capability planning for NCW......Page 40
Maritime......Page 43
Aerospace......Page 44
ISR......Page 45
Coalition......Page 46
Conclusion......Page 47
The value of information......Page 53
Open source information......Page 54
Information Warfare......Page 56
How would an adversary attack us?......Page 59
China’s cyber-attack capability......Page 62
Framework for network defence......Page 64
Cyber-crime......Page 67
Addressing our critical information infrastructure......Page 69
Conclusion......Page 73
The information society......Page 79
The National Information Infrastructure......Page 81
Information Infrastructures: Some key characteristics......Page 82
Bandwidth......Page 83
Ownership and control......Page 84
The Importance of Information Assurance......Page 85
War: targeting the adversary......Page 87
Non-war situations or circumstances short of war......Page 88
Terrorist organisations......Page 89
Criminals......Page 91
Issue Motivated Groups......Page 92
Targeting: objectives......Page 93
Targeting: capabilities required......Page 95
Computer Network Operations (CNO)......Page 97
Targeting: vulnerability and accessibility......Page 98
Accessibility......Page 99
Intelligence......Page 100
Conclusion......Page 101
Balancing information superiority and operational vulnerability......Page 105
Vulnerabilities......Page 106
Balancing security and privacy in information sharing......Page 108
Managing security risk......Page 109
Dangers in getting privacy wrong......Page 110
Cyber-security......Page 112
Critical Infrastructure Protection in Australia......Page 124
Securing the Defence enterprise......Page 129
Trusted information infrastructure......Page 130
Addressing the national requirement......Page 131
Conclusion......Page 132
Introduction......Page 139
The relevant organisations and their coordination......Page 142
Research, planning and preparation......Page 147
Offensive activities......Page 150
Information Warfare and the intelligence process......Page 151
Command issues......Page 152
Rules of engagement, doctrine and operational concepts......Page 154
Capability planning......Page 155
Location of a Cyber-warfare Centre......Page 156
Regional developments......Page 158
Conclusion......Page 162
Bibliography......Page 169
Websites......Page 185
Index......Page 187