Abstract
We talk about how to best protect Australia against cyberterrorist attacks of the type in which the offenders use a computer to attack or in which the offenders attack computers. Our concern is phenomena like Stuxnet and Ransomware, but also any attack that has not yet happened, as for our official records, so say hacking of satellite and use of its allowances to burn people alive to death. We talk about the basics, which could be the advice of FireEye, and we talk about the sophisticated, which could be what is not yet printed. We worry about actions that could be considered part of the intelligence system, so things that demand detailed study of the past and systemic plus organised collection of data in the present. We do not talk about how to deal with Acts of War: Only about how to protect our systems to best so that we do not get those happening via computer or from a computer.