"2016 Payment Threats Trends Report", Report by the European Payments Council, 20 March 2017, 41 pages. "The present document aims to provide an insight in the latest developments during the
last years on threats affecting payments, including cybercrime".
eConflicts is a blog written by Daniel Ventre, about cyberconflicts, cyberwar, cybersecurity / cyberdefense, information warfare, cybercrime, political science and international relations
Total Pageviews
Thursday, April 6, 2017
Note de recherche IRSEM sur les Global Commons
"Les Global Commons: retour sur l'itinéraire d'un concept stratégique américain (2009-2011)" par J.L. Samaan, IRSEM, Note de recherche n°35, mars 2017, 7 pages.
US DOD - Request for additional FY 2017 Appropriations
US DOD - Request for additional FY 2017 Appropriations - Budget request - March 16, 2017, 36 pages. In this document, the Department of Defense (DoD) is submitting a request for
additional Fiscal Year (FY) 2017 appropriations. Among several lines, complementary funding is requested for cyber investments: information warfare, cyber security, new C4I (at Naval Computer and Telecommunications Area Master Station Atlantic building in Norfolk,
Virginia), ISR and cyber infrastructure at the Air Force, Weapons system cyber resiliency, Cyber operations
technology, etc.
Chinese Efforts in Quantum Information Science: Drivers, Milestones, and Strategic Implications
"Chinese Efforts in Quantum Information Science: Drivers, Milestones, and Strategic Implications", Testimony for the U.S.-China Economic and Security Review Commission, March 16th, 2017, John Costello.
Matinée nationale d'information Horizon 2020 sur les infrastructures critiques et la sécurité
Matinée nationale d'information Horizon 2020 sur les infrastructures critiques et la sécurité. Paris, 10 mai 2017. Cadre: défi 7 "sociétés sûres", programme Horizon 2020. Programme, inscription...
Séminaire "communication en milieu désorganisé" - ISCC
Le prochain séminaire "communication en milieu désorganisé" aura lieu le mardi 25 avril 2017 (et non le 11 avril comme il avait été initialement annoncé). Il se tiendra de 16 h-18 h à l'ISCC-CNRS / Paris-Sorbonne / UPMC - 20 rue Berbier-du-Mets, 75013 Paris. Le thème de cette séance sera : Risques et catastrophes : enjeux culturels et interculturels.
Le séminaire accueillera Benjamin Pelletier, formateur en management interculturel, maître de conférences honorifique à l'Ecole des Ponts et Chaussées. Auteur de plusieurs récits littéraires, dont le dernier, Toujours plus à l'est, est paru en 2016 aux éditions Picquier.
"Iran Sanctions" by Kenneth Katzman
"Iran Sanctions" by Kenneth Katzman, March 31, 2017, Congressional Research Service, RS20871, 89 pages, Washington. "This report analyzes U.S. and international sanctions against Iran and provides some examples,
based on open sources, of companies and countries that conduct business with Iran".
Concerning "cyber" issues, read:
- "Expanding Internet and Communications Freedoms" (p.30-31)
- "Iranians Sanctioned Under September 29, 2010, Executive Order 13553 on Human Rights Abusers" (p.81)
- "Iranian Entities Sanctioned Under Executive Order 13606 (GHRAVITY)" (p.82)
- "Entities Designated as Human Rights Abusers or Limiting Free Expression Under Executive Order 13628
(Executive Order pursuant to Iran Threat Reduction and Syria Human Rights Act)" (p.83).
3 rd French-Japanese meeting on Cybersecurity
"3 rd French-Japanese meeting on Cybersecurity", 24th - 26th
April 2017,
Tōkyō.
Cyber-Social-Physical Features for Mood Prediction over Online Social Networks
"Cyber-Social-Physical Features for Mood Prediction over Online Social Networks", article by Chaima Dhahri, Kazunori Matsumoto, Keiichiro Hoashi, DEIM Forum 2017, 6 pages.
Abstract : Context-Aware Recommendation Systems (CARS) are more effective when adapting their recommendations to a
specific user preference. Since modal context (mood) has a direct impact on user preferences, we aim at having an accurate mood
prediction to improve recommendation performance. Online social networks (OSNs) have grown rapidly over the last decade.
These social platforms provide the opportunity to gather the distributed online activities for each user. Tracking and aggregating
these data could result in useful insights for user modeling and understanding. In this paper, we built a personalized system that
can predict the upcoming user mood even in days without text-type tweets. We, first, studied the correlation of three types of
features (cyber, social and physical) with a user mood. Then, used these features to train a predictive system. The results suggest
a statistically significant correlation between user mood and his cyber, social and physical activities distributed among different
OSNs which leads to a low RMSE in our predictive system.
Attack Classification Schema for Smart City WSNs
"Attack Classification Schema for Smart City WSNs", article by Victor Garcia-Font, Carles Garrigues and Helena Rifà-Pous, Sensors 2017, 17, 771; doi:10.3390/s17040771,
In this article, the authors propose a schema to classify the evidence left by attacks against smart city WSNs into seven different
attack models.
Friday, March 31, 2017
Donald Trump intends to extend by one year the Executive Order 13694
"President Donald Trump is going to extend by one year the Executive Order 13694", post du blog SecurityAffairs, March 30, 2017
Interpol - "Cybercriminalité"
Interpol - "Cybercriminalité" - 2017 - Brochure de 12 pages.
Dans ce document Interpol distingue deux catégories de criminalité liées aux TIC: la cybercriminalité et la criminalité facilitée par Internet.
On peut y lire également que "jusqu’à présent, la cybercriminalité était
principalement le fait d’individus ou de petits
groupes. Aujourd’hui, INTERPOL constate
l’apparition de réseaux de cybercriminalité
d’une grande complexité qui réunissent, en
temps réel, des individus de tous pays pour
perpétrer des infractions d’une ampleur sans
précédent." Vraiment? Le cybercrime n'est-il pas organisé en gros réseaux d'assez longue date? Ne parlait-on pas du cybercrime organisé russe et chinois il y a dix ans déjà? Les hackers n'ont-ils pas une tradition de coopération internationale depuis bien des années?
Sajda Qureshi "The forgotten awaken: ICT’s evolving role in the roots of mass discontent"
Sajda Qureshi, "The forgotten awaken: ICT’s evolving role in the roots of mass discontent", Information Technology for Development, 2017, Vol.23, n°1, pp.1-17. Full text...
About "key terrain" in cyberspace
Applegate, Scott Douglas, Christopher L. Carpenter, and David C. West. “Searching for Digital
Hilltops: A Doctrinal Approach to Identifying Key Terrain in Cyberspace.” Joint Force Quarterly,
no. 84 (1st Quarter 2017): 18-23.
The proposed definition of "key terrain'" is : "Any locality, or area, the seizure or retention of which affords a marked advantage to either combatant". According to the author of this article, the "key terrain" is different from the notion of "critical asset", defined as "a spacific entity that is of such extraordinary importance that its incapacitation or destruction would have a very serious, debilitating effect on the ability of a nation to continue to function effectively".
Thomas Rid, Hearing on Disinformation: A Primer in Russian Active Measures and Influence Campaigns"
Thomas Rid, Hearing on "Disinformation: A Primer in Russian Active Measures and Influence Campaigns", US Senate, March 30th, 2017.
Prepared Statement of GEN (Ret) Keith B. Alexander on Disinformation: A Primer in Russian Active Measures and Influence Campaigns
Opening speach.
Prepared Statement of GEN (Ret) Keith B. Alexander on Disinformation: A Primer in Russian Active Measures and Influence Campaigns
Opening speach.
Subscribe to:
Posts (Atom)