Total Pageviews

Wednesday, June 7, 2017

"War by other Means", Max Bergmann and Carolyn Kenney

"War by other Means", Max Bergmann and Carolyn Kenney, Report from the Center for American Progress, June 2017, 45 pages. Download the report

Tuesday, June 6, 2017

Daniel Ventre, Cyberguerre et Communication

Daniel Ventre, Cyberguerre et Communication, pp. 147-166, in "Guerre, Armées et Communication", sous la direction d’Eric Letonturier, Les Essentiels d’Hermès, CNRS Editions, 230 pages, Mai 2017


Présentation de l'ouvrage: Propagande, censure et désinformation d’un côté ; devoir de réserve, secret défense et silence dans les rangs de la « grande muette » d’un autre. Faire la guerre semble condamner la communication des armées à de tels extrêmes. Mais qu’en est-il aujourd’hui, avec l’internet et les réseaux sociaux, l’information continue et les lanceurs d’alerte, et une opinion publique de plus en plus sondée et souveraine ? Parallèlement, la surveillance géopolitique électronique, la numérisation du champ de bataille, l’arrivée des drones, robots et soldats augmentés sur les théâtres d’opérations changent aussi la donne.
Reste que la guerre engage toujours et avant tout des relations entre des hommes sur le terrain. Elle est aussi profondément un acte de communication pour être d’abord un dialogue rompu, un affrontement avec l’altérité. Avec, comme horizon, à l’heure de la montée des nationalismes et la multiplication des revendications identitaires, un risque croissant d’incommunication.


Sommaire

  • Présentation générale
  • Guerre et paix : la communication s’engage - Éric Letonturier
  • Phénomènes de communication en zone de combat - André Thiéblemont
  • Les « soldats de l’image » au cœur des enjeux de communication de la Défense française - Bénédicte Chéron
  • L’opinion des Français sur leurs armées - Barbara Jankowski
  • Guerre et information : l’exemple des lanceurs d’alerte - Sébastien Schehr
  • Les militaires dans l’espace public numérique - Michel Sage
  • Le « Killer Robot » est-il l’avenir de l’« Homo Militaris » ? - Didier Danet
  • Cyberguerre et communication - Daniel Ventre
  • L’arme de l’information à l’ère du jihad numérique - FrançoisBernard Huyghe
  • La guerre mise au musée et le tourisme de mémoire - JeanYves Boursier

Tuesday, May 30, 2017

Friday, May 26, 2017

Conférence-débat sur "L'évolution de la criminalité au XXIe siècle". 10 mai 2017

Le 10 mai 2017 a eu lieu à l'EFB (Ecole de formation du barreau de Paris) une conférence-débat sur le thème de "l'évolution de la criminalité au XXI° siècle". J'y ai traité de la dimension "cyber". Maître Joseph Cohen-Sabban, avocat au barreau de Paris, a quant à lui partagé son analyse, tirée de son expérience professionnelle, de ce qui caractérise l'évolution de la criminalité au cours de ces dernières années.  

Tuesday, May 23, 2017

Congrès de la SQSP - Montréal - 17 au 19 mai 2017

Lors du Congrès de la Société Québécoise de Science Politique qui se tenait à Montréal du 17 au 19 mai 2017, s'est tenue une table-ronde intitulée "La géopolitique du cyberespace et de l'Internet: vers un monde plus (in)stable?". La table-ronde était présidée par Hugo Loiseau, Professeur, Université de Sherbrooke et réunissait : 
- Daniel Ventre, CNRS, Laboratoire CESDIP Université Versailles 
- Meryem Marzouki, Lab. LIP6 - CNRS & UPMC Sorbonne Universités 
- Destiny Tchéhouali, Chercheur CEIM-UQÀM, Président ISOC-Québec

Wednesday, May 10, 2017

Statement of Admiral Michael S. Rogers

"Statement of Admiral Michael S. Rogers", Commander, United States Cyber Command, Before the Senate Committee on Armed Services, 9 May 2017, 11 pages. 

Big Data Analytics Techniques for Credit Card Fraud Detection: A Review

"Big Data Analytics Techniques for CreditCard Fraud Detection: A Review", M. Sathyapriya, Dr. V. Thiagarasu, International Journal of Science and Research (IJSR), ISSN (Online): 2319-7064, Index Copernicus Value (2015): 78.96 | Impact Factor (2015): 6.391. 

Review of the Current State of UAV Regulations

"Review of the Current State of UAV Regulations", Claudia Stöcker & alt., Remote Sens. 2017, 9, 459; doi:10.3390/rs9050459, 
"UAVs—unmanned aerial vehicles—facilitate data acquisition at temporal and spatial scales that still remain unachievable for traditional remote sensing platforms. However, current legal frameworks that regulate UAVs present significant barriers to research and development. To highlight the importance, impact, and diversity of UAV regulations, this paper provides an exploratory investigation of UAV regulations on the global scale....http://www.mdpi.com/2072-4292/9/5/459/pdf"

17th Annual Conference of the ESC


  • Submission period opens March 17, 2017
  • Submission closes: 15 June, 2017

Tuesday, May 9, 2017

Gender Policy - Ministry of Defence - Republic of Kenya

Le Ministère de la Défense de la République du Kenya vient de publier un rapport (mai 2017) intitulé "Gender Policy" dans lequel  peut lire : "Technology has enhanced habitability and survivability in combat making it easier for both men and women to engage in operations. The emerging trends in conflict call for complementary roles of men and women for example in cyber warfare, terrorism inter alia. This type of warfare presents opportunities for women through the entire war spectrum". 
Mais le document ne revenant plus par la suite sur les enjeux "cyber", nous ne comprenons pas en quoi hommes et femmes peuvent être complémentaires dans le cyberconflit, ni en quoi ce dernier offre des opportunités particulières aux femmes. 

Notons par ailleurs que le même ministère vient de publier son Livre Blanc (23 pages, 2017) accordant en tout et pour tout 6 lignes au domaine "cyber": "Information technology, web based communication and use of electronic devices for storage predisposes sensitive Government information to organized cyber attacks which can undermine state security. The Ministry of Defence in collaboration with other stakeholders must develop appropriate capacity and institute measures to safeguard Information systems infrastructure." C'est donc le Ministère de la Défense qui, au Kenya, aura la charge de la cybersécurité de l'infrastructure des systèmes d'information (le texte est imprécis sur ce point: s'agit-il des seules infrastructures de communication militaires, ou bien de celles du pays en général?). 

Tuesday, May 2, 2017

Trump–Modi Agenda for Next Steps in U.S.–India Cybersecurity Cooperation

"Trump–Modi Agenda for Next Steps in U.S.–India Cybersecurity Cooperation", James Jay Carafano & alt., The Heritage Foundation, Issue Brief, No. 4697 | May 1, 2017. Download

Monday, May 1, 2017

Is There a Common Understanding of Dual-Use?: The Case of Cryptography

"Is There a CommonUnderstanding of Dual-Use?:The Case of Cryptography", Veronica Vella, STR Review, Volume 3, Issue 4, Spring 2017, pp. 103-122

The Proliferation of CyberSurveillance Technologies: Challenges and Prospects for Strengthened Export Controls

"The Proliferation of Cyber Surveillance Technologies: Challenges and Prospects for Strengthened Export Controls", Fabian Bohnenberger, STR Review, Volume 3, Issue 4, Spring 2017, pp.81-102

Vacance de poste - OTAN - Cyberdéfense

Concours ouvert: Administrateur/Administratrice (politique de cyberdéfense), Division Défis de sécurité émergents, Section Cyberdéfense, Section Cyberdéfense. Détails du poste

Promoting cyber security: Estonia and Latvia as norm-setters

"Promoting cyber security: Estonia and Latvia as norm-setters", Anna Gromilova, Analele UniversităŃii din Craiova. Istorie, Anul XXII, Nr. 1(31)/2017, Abstract

Friday, April 28, 2017

Hearing on China’s Technological Rise: Challenges to U.S. Innovation and Security

Testimony of Robert D. Atkinson President Information Technology and Innovation Foundation Before the House Committee on Foreign Affairs Subcommittee on Asia and the Pacific, Hearing onChina’s Technological Rise:Challenges to U.S. Innovation and Security, April 26, 2017 Washington, DC, 28 pages

Governing the “Digital Shadows”

"Governing the “Digital Shadows”: Public Policy and Information Communication Technology (ICT) Acquisition and Utilization in Africa. Article by Ebenezer Olatunji Olugbenga, Open Access Library Journal, https://doi.org/10.4236/oalib.1103564, 23 pages

Remarks by OSCE Secretary General Lamberto Zannier

Remarks by OSCE Secretary General Lamberto Zannier, 6th Moscow Conference on International Security, 26 April 2017, 4 pages. 
"The norms and principles that underpinned the international order for decades are being contested. Some tools have become obsolete, and we are struggling to develop policies to address new challenges like cyber-threats. In this regard, we have some measures in place to prevent conflict stemming from cyber-threats, but implementation is lacking."

Thursday, April 27, 2017

Attacks with Exploits: from everyday threats to targeted campaigns - Kaspersky Lab Report

"Attacks with Exploits: from everyday threats to targeted campaigns" - Kaspersky Lab Report, April 2017, 28 pages.
"An ‘exploit’ is a computer program created to take advantage of a security vulnerability in another software program. Exploits provide malicious actors with a way of installing additional malware on a system". According to the conclusions of the report, "in 2016 the number of attacks with exploits increased 24.54%, to 702,026,084 attempts to launch an exploit." but "4,347,966 users were attacked with exploits in 2016 which is 20.85% less than in the previous year."  

The "Smart" Fourth Amendment - by Andrew Guthrie Ferguson

"The "Smart" Fourth Amendment", article by Andrew Guthrie Ferguson, Cornell Law Review, Vol.102, pp.547-632, 2017. "This Article addresses the question of how the Fourth Amendment should protect “smart data.” It exposes the growing danger of sensor surveillance and the weakness of current Fourth Amendment doctrine. The Article then suggests a new theory of “informational curtilage” to protect the data trails emerging from smart devices and reclaims the principle of “informational security” as the organizing framework for a digital Fourth Amendment."  

Cybersecurity: Critical Infrastructure Authoritative Reports and Resources - CRS Report

"Cybersecurity: Critical Infrastructure Authoritative Reports and Resources", by Rita Tehan - CRS Report. April 21, 2017, 43 pages. This document provides a lot of information about critical infrastructures in the U.S (through a sectorial presentation: energy, financial industry, health, telecommunications, transports), and their vulnerabilities to cyber operations (for instance, let's notice that "U.S. critical infrastructure systems experienced a 20% increase in attempted cybersecurity breaches in FY2015, ICS-CERT responded to 295 cybersecurity incidents involving critical infrastructure, compared with 245 in fiscal 2014"). 

Symantec - Internet Security Threat Report. Vol. 22

Symantec - Internet Security Threat Report. Vol. 22, April 2017, 77 pages. 
"The Symantec Global Intelligence Network tracks over 700,000 global adversaries and records events from 98 million attack sensors worldwide. This network monitors threat activities in over 157 countries and territories through a combination of Symantec products, technologies, and services, including Symantec Endpoint Protection™, Symantec DeepSight™ Intelligence, Symantec Managed Security Services™, Norton™ consumer products, and other third-party data sources, generating more than nine trillion rows of security data... "    Download the report.