Total Pageviews

Wednesday, November 16, 2011

Article - Relevance of Information Warfare Models to Critical Infrastructure Protection

Brett van Niekerk and Manoj S. Maharaj (School of Information Systems and Technology, University of KwaZulu-Natal) recently published in the Scientia Militaria South African Journal of Military Studies (Vol.39, n°2, 2011) the article titled "Relevance of Information Warfare Models to Critical Infrastructure Protection".

Article - The Information Warfare Life Cycle Model

Brett van Niekerk and Manoj S. Maharaj (University of Kwazulu-Natal - South Africa) propose a paper titled "The Information Warfare Life Cycle Model", published in the South African Journal of Information Management, Vol. 13, n°1 (2011).


Information warfare (IW) is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

Tuesday, November 15, 2011

Article - NATO seeks single cyber command

"Will NATO increase its cyber offensive capabilities?" was among the questions asked during the Nov.9 NATO meeting in Brussels.

Article "NATO seeks single cyber command". Nov. 10, 2011

Report - Project 2049 Institute


Mark A. Stokes, Jenny Lin and L.C. Russell Hsiao, from the Project 2049 Institute, publish a new and interesting study titled "The Chinese People's Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure" (Nov.11, 2011).

Dowload the report at:

"This study offers a tentative baseline for assessing the GSD Third Department, affiliated Technical Reconnaissance Bureaus (TRBs), and supporting research and development organizations. An examination of this organization, its role and function would provide a mosaic with which to better evaluate China‘s signal intelligence and cyber-infrastructure. Public information on the Third Department has been limited, with only tentative links drawn between the Third Department and CNE.
The study first examines the Third Department command structure and subordinate research institutes, and then offers an overview of the Third Department‘s 12 operational bureaus. The discussion then focuses on the technical reconnaissance assets under each of the PLA‘s seven MRs, Navy, Air Force, and Second Artillery Force".

Report - To Log or not to log ?

"To log or not to log?"  is the title of a new report from the ENISA about the risks of life-logging applications - Nov. 11, 2011. Download the report at http://www.enisa.europa.eu/act/rm/emerging-and-future-risk/deliverables/life-logging-risk-assessment/

Monday, November 14, 2011

Report - Foreign Spies Stealing Economic Secrets

Report from the Office of the National Counterintelligence Executive. Foreign Spies Stealing US Economic Secrets in Cyberspace. October 2011. 31 pages.

Dowload the report: http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf

Article - Cyberguerre et guerre de l'information: Cuba

Nouvel article "Cyberguerre et guerre de l'information: Cuba" (Daniel Ventre), publié dans le dernier numéro de la revue MISC (n°58), novembre-décembre 2011, pp.58-64. http://ed-diamond.com/produit.php?ref=misc58&id_rubrique=8