Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Air Force Core Functions
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
InformationInWarfareIW-100 College of Aerospace Doctrine, Research, and Education.
Sensors and location technologies – the front end of ISR
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Force XXI Battle Command Brigade and Below (FBCB2) Communications System
Introduction to Information Operations Attaché Corps- SEP 09
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Information Warfare Psychological Operations Implications for 21 st Century Organizational Leadership Federal Information Systems Security Educator’s Association.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Brian Connett, LCDR, USN US NAVAL ACADEMY
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection,
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Chief Information Officer Group
C4ISR and Information Warfare
CYBER CRIME AND SECURITY TRENDS
IDC Program INFORMATION DOMINANCE CORPS.  BACKGROUND  PURPOSE  STATEGY  MISSION STATEMENT  GOALS  IDC CAREERS  IDC PROFESSIONAL PROFILE  NAVY.
Contribution since August,2008 National MSME Conclave 19 November, 2014 Use of ICT to make MSME more competitive and sustainable Tapan K. Patra Director.
N ational I NFOSEC E ducation and T raining P rogram Educational Solutions for a Safer World http//
INFORMATION WARFARE. What is Information Warfare? “All actions taken to defend the military’s information-based processes, information systems and communications.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Protect critical information with a smart information-based-risk management strategy. Prepared by: Firas Mohamed Taher.
CARICOM. Definition ICT and the environment Sub-Themes Indicators and Rationale CARICOM.
IT Infrastructure for Business
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Babak Akhgar, Simeon Yates & Eleanor Lockley Chapter 1 - Strategy Formation in a Globalized and Networked.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
C4ISR and Information Warfare Naval Weapons Systems.
WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Information Warfare Playgrounds to Battlegrounds.
BAE Systems Small Business Program
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Warfare Communities of the Fleet and Marine Forces
Force Packaging >. Overview  Force Packaging  Process of Force Packaging  Detached Support  Developing Packages.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Civil Military Operations and the Fundamentals of Joint Operations.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
FLTLT Matthew Murphy Growler Transition Office – Air Force Headquarters UNCLASSIFIED.
Ensuring Cyberpeace in a New World Order Dr. Hamadoun Touré Secretary General International Telecommunications Union, Geneva.
Employment Considerations: Considerations at the Outset of Combat
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
What is Cyber Security Cyber War Cyber Power?
Disaster and Emergency Management
“Existing world order is being redefined.” Henry Kissinger Jan 2015
NDIA Targets, UAVs and Range Operations
The University of Adelaide, School of Computer Science
DISN Evolution Mr. Charles Osborn
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
S&T Main Focus Areas Linkages to 2018 NDS
Presentation transcript:

Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011

What is Warfare ? Hostilities, including the use of force, between states, states and non-states, two or more non-states Warfare involves both defence and offense The end-game is political

What is Cyber Warfare? Cyber warfare is warfare in cyberspace or the cyber domain Cyberspace comprises all global digital communities and information processing, storage and transfer infrastructures Cyber warfare activities encompass information in digital or electronic form, supporting IT systems (including both hardware & software), other supporting infrastructure, and the people who rely on, operate and maintain the ICT

Targets in Cyber Warfare Capability and Will to wage and sustain warfare Capability is largely physical but includes the decision cycle Will is largely psychological but capability can play an important role Both apply to military and civilian targets

Information Infrastructures in the Information Society Infrastructures within the cyber domain in and over which information is collected, processed, stored and transported. It includes the information itself and the people who process information & maintain systems. Three relevant information infrastructures *National Information Infrastructure (NII *Global Information Infrastructure (GII) *Defence Information Infrastructure (DII)

Information Infrastructures in the Information Society NII – domestic information infrastructure that enables the critical infrastructures that underpin the functionality of our society e.g. telecommunications, financial services, transport systems, energy, water, media, essential government services. Includes the domestic part of the Internet. GII – global collection of NIIs. Connectivity provides the global Internet. DII – tactical information infrastructures, and those Defence and private sector owned elements of the NII and GII Defence that enable all Defence operational, strategic and support functions.

Information Infrastructures in the Information Society The DII – Some Characteristics Some 90% of the DII, especially domestic strategic, but also some key operational communications e.g. satellites, are owned by the private sector Many other critical integrated support requirements are provided by the private sector e.g. manufacture of defence equipment, and logistic and maintenance services. It is evident, therefore, that much of Defence capability (e.g. communications, equipment manufacture, logistics and other services) is integrated & interdependent with & provided by the private sector and underpinned by the DII, NII and GII

Information Infrastructures in the Information Society Information Assurance (IA) The functionality of the NII, GII and DII relies on Information Assurance *Availability *Integrity *Confidentiality (where appropriate) *Authentication In wartime, we must defend Information Assurance across the Defence-related cyber domain from attack by adversaries, or other threats. In peacetime, we protect Information Assurance across the NII, GII and DII against exploitation by a potential adversary, and protect also against accident, criminals, cyber vandals, and other threats Our adversary’s Information Assurance is an offensive target for capability and will

Targets in Warfare The NII, GII and DII are defensive and offensive targets in cyber warfare Robust Information Assurance, including cyber security, enhances functionality & capability Enhanced functionality & capability help maintain morale & will Compromised Information Assurance, including cyber security, negatively impacts on functionality & capability, and (especially with targeted psyops) on morale and will

The Networked ADF : C4ISREW The ADF : Force 2030 will be fully networked in terms of combat capability and support functions, all enabled via the cyber domain. The importance of C4ISREW command & control, computers & communications :C2+C2=C4 intelligence, reconnaissance, surveillance : ISR electronic warfare (EW) In the cyber domain ISREW provides situational awareness ISREW contributes to intelligence processing and knowledge ISREW also contributes to decision-making Command and Control(C2) advises decisions and enables manoeuvre Computers and Communications enable all of the above

The Networked ADF : Superiority The networked ADF will enable superiority in information awareness of the operational environment knowledge & decision-making manoeuvre support via supply and logistics

The Decision Cycle & Superiority Observe Action Orient Decide Observe = superior situational awareness of the operational environment Orient = superior knowledge & options about the operational environment Decide = superior decision making of operational action to take against an adversary Action = superior manouvreability to that of the adversary

For the ADF, high quality and robust Information Assurance (IA) across the cyber domain is a critical requirement for superiority Defensive measures to protect IA across the cyber domain (DII, NII and GII) are, therefore, critical. Any compromise of Information Assurance (IA) will have some impact on superiority. The greater the compromise the greater the impact. Offensive measures that target & impact on the IA of an adversary, and thus the functionlity and any potential superiority the adversary, are a priority

Cyber Warfare Targeting What: hardware, software, power supply, people How: destroy, disrupt, deny, degrade, deceive, exploit Means: Kineticexplosive force Malwareviruses, worms, trojans, logic bombs, botnets etc. Hackingexploit for intelligence, insert malware New Weaponsinclude EW, Lasers, HPM, RF, other anti- satellite

Offensive Cyber Warfare Targeting capability through C4ISREW Computers - all processors at all levels: exploit for intelligence, destroy/disrupt/deny hard ware and software Communications – destroy, disrupt and deny some or all key systems in relevant strategic, operational or support areas Surveillance & Reconnaissance – destroy/disrupt/deny access/deceive Intelligence – destroy, disrupt or deceive (corrupt/alter) data, disrupt or deny access Command & Control – destroy/disrupt computers or communications, deny,

Offensive Cyber Warfare Targeting will by psychological means Disruption to society generally – causes frustration, impacts on morale and shapes & influences attitudes, commitment, & can initiate the drive for political change Specific targeting that denies access to electronic media, information via internet, mobile phones, SMS, iPads, etc Exploit all information including social networking systems through internet ( messages, websites, blogs, twitter) SMS, TV, radio etc to project messages and facilitate influence

Advantages of Cyber Warfare It can effectively complement other combat operations – it is not a substitute for these Used pre-emptively, it may avoid other combat operations Very cheap compared to other weapons systems etc, therefore more accessible to less wealthy or technically advanced states and non-states Asymmetrical advantages Access to some targets otherwise not accessible Can place own troops in less danger Less collateral damage than use of conventional kinetic operations But some legal and control considerations

Cyber Warfare is a Must-Have capability for any credible defence force in the 21 st century. Its two key components are A high quality defensive capability A high quality offensive capability The start date has already passed

Questions?