Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [144]

By Root 1253 0
(CERT) and the Defense Signals Directorate’s Cyber Security Operation Centre (CSOC) allow for identification of threats and the scale of response to be determined timely and effectively.

* * *

[109] Andrew Davies, “Intelligence, Information Technology and Cyber Programs,” Security Challenges 5, no. 2 (Winter 2009), accessed August 29, 2011, http://www.securitychallenges.org.au/ArticlePDFs/vol5no2Davies.pdf.

[110] Department of Defence, Defending Australia in the Asia-Pacific Century: Force 2030 (Canberra: Commonwealth of Australia, 2009), para. 9.87–88.

[111] Ibid.

[112] “Australia-United Kingdom Ministerial Consultations,” Joint Communiqué, Australian Minister of Foreign Affairs, January 18, 2011, accessed August 29, 2011, http://www.foreignminister.gov.au/releases/2011/kr_mr_110118a.html.

[113] Johanna Morden, “Australian Govt Reveals New Cyberspooks Unit,” FutureGov Asia Pacific, March 14, 2011, accessed August 29, 2011, http://www.futuregov.asia/articles/2011/mar/14/australia-reveals-new-cyberspooks-unit/.

Brazil


In September 2010 the Brazilian Army signed an agreement with Panda Security to assist in the training of the Army’s cyber forces. Panda Security will also use endpoint software to protect 37,500 computers that are organic to the Army’s Military Commands.[114] In addition to Panda Security’s assistance, Brazil has established a Center for Cyber Defense (CDCiber) in Brasilia, with General Jose Carlos dos Santos as commander.[115] CDCiber operates under the President of Brazil’s Cabinet of Institutional Security (GSI), and military officers from Brazil’s armed forces will staff it. Training is provided through coursework at the Military Institute of Engineering in Rio de Janeiro. A war room is under construction, which will provide incident response, malware analysis, and the ability to conduct cyber war games.

* * *

[114] “The Brazilian Army and Panda Security join forces to combat cyber-warfare,” Panda Security Press Center, September 27, 2010, accessed August 29, 2011, http://press.pandasecurity.com/news/the-brazilian-army-and-panda-security-join-forces-to-combat-cyber-warfare/.

[115] Isabel Estrada, “Cyberspace Becomes Newest Battlefield for Brazil’s Armed Forces,” Diálogo, March 8, 2011, accessed August 29, 2011, http://www.dialogo-americas.com/en_GB/articles/rmisa/features/regional_news/2011/08/03/aa-brazil-cyber-warfare.

Canada


In October 2010 the Canadian government formally published its strategy to combat cyber attacks.[116] The strategy is built upon three pillars: securing government systems, partnering to secure vital cyber systems outside the federal government, and helping Canadians to be secure online. The strategy emphasizes that it will strengthen cyber sharing with its intelligence partners—including the United States, United Kingdom, and Australia—as well as work with NATO.

The Canadian Security Intelligence Service is instructed to analyze and investigate domestic and international threats. The Foreign Affairs and International Trade Canada will develop a cyber security foreign policy that will relate to Canada’s involvement abroad. The Department of National Defense and Canadian Forces are instructed to strengthen their capacity to defend their own networks and exchange information with allied militaries.[117] The strategy does not discuss offensive capabilities or the Canadian Cyber Incident Response Center (CCIRC).

According to an October 2010 interview with the director general of National Cyber Security at Public Safety Canada, the CCIRC is the first responder of cyber attacks but does not have the authority to direct response. Instead, the CCIRC acts as a triage of sorts to bring in other agencies to coordinate and determine which agencies have the lead for a response.[118]

* * *

[116] “Canada’s Cyber Security Strategy,” Public Safety Canada, accessed August 29, 2011, http://www.publicsafety.gc.ca/prg/ns/cbr/ccss-scc-eng.aspx.

[117] Ibid.

[118] Chris Thatcher, “Cyber strategy: Defining roles in a federated model,” Vanguard, accessed August

Return Main Page Previous Page Next Page

®Online Book Reader