July 31, 2018 — Through technological development and the continuously expanding Internet, the challenges of physical distance, borders and time has diminished, enabling new and more efficient business models and concepts. With this technological development, however, follows an increase in global cybercrime, mass surveillance, internet censoring, and espionage. Terror attacks and cybercrime incidents are now forcing policy makers to balance surveillance and privacy through a paradox: While privacy regulations protect individuals’ freedom of speech and safety from persecution, it may also restrain effective crime and terror investigation. In November 2015, the Norwegian Governmental Committee on Digital Vulnerability delivered an Official Norwegian Report (NOU) to the Minister of Justice and Public Security in which the problematic issue of balancing surveillance and privacy was emphasized. The intricate challenge is that in-between surveillance and the privacy lays the personal data—the new gold from a commercial perspective, a resource in the fight against terrorism from a security perspective, and a future threat of human rights from an individual perspective. MORE
|
July 31, 2018 — Cyber weapons have been used to steal billions of dollars of intellectual property, influence elections, manipulate news and damage critical infrastructure. Yet, we think of cyberattacks as only a technology problem, which are handled by smart computer network technicians capable of discovering a breach and developing patches to mitigate the problem. Certainly, technical solutions are a big part of cyber preparedness. But what if cyberattacks combine denial of services in cyberspace with targeted attacks on critical infrastructure, causing massive damage and loss of life in the physical world? MORE
|
July 31, 2018 — Society has become utterly dependent on information systems (IS) to power everyday life. While this seismic shift has taken place, the security of those IS and their consequential information assets has not taken a front seat alongside innovation, resulting in breaches of trust and loss of corporate goodwill. Organizations are struggling to find an effective approach that encompasses not just technical aspects of cybersecurity, but also improves people and processes. This article will define, discuss, and operationalize the technical, semantic, and effectiveness aspects of cybersecurity and their application into the organizational construct. MORE
|
July 31, 2018 — “An Army Marches On Its Stomach,” is a quote attributed to both Napoleon and Frederick the Great. [1] Both men certainly would attest to the veracity of the sentiment—without secure supply lines, no army can survive for very long. This reliance has grown beyond mere food and now encompasses a broad range of materiel from pencils to remotely piloted drones.
By their very nature, military supply chains are a high-value target for thieves, saboteurs, and counterfeiters. Fraudulent materials, particularly those switched out for high-grade defense aerospace technologies, represent a serious risk to military operations. When materials that can’t meet military standards fail in combat situations, it is the warfighter or the innocent bystander who pays the price. MORE
|
July 31, 2018 — Extending the military principle of maneuver into the war-fighting domain of cyberspace, academic and military researchers have produced many theoretical and strategic works, though few have focused on researching the applications and systems that apply this principle. We present a survey of our research in developing new architectures for the enhancement of parallel and distributed applications. Specifically, we discuss our work in applying the military concept of maneuver in the cyberspace domain by creating a set of applications and systems called “maneuverable applications.” Our research investigates resource provisioning, application optimization, and cybersecurity enhancement through the modification, relocation, addition or removal of computing resources. MORE
|
July 31, 2018 — Despite obvious distinctions, parallels exist between 18th century era fortification and the purposes, processes, and implications of pursuing security in an artificial cyber realm of the 21st century. The Revolutionary War era fortification of the Hudson River bottleneck focused upon the West Point area between 1778 and 1781. Differing professional perspectives and factors such as available resources led to disagreement about the defensive concept, and Thaddeus Kosciuszko’s construction of layered defenses strengthened the US position in the region during the latter phases of the war. British failure in a belated overland raid, demonstrating an inability to “brute” the new defenses, led to British interest in leveraging an insider threat (Benedict Arnold), but then as now, insider threats could not automatically guarantee success. MORE
|
July 31, 2018 — A security dilemma is said to exist when one country cannot make itself more secure without making another less secure. [2] Circa 1913, for instance, if a major European country sought security by drafting more men, its neighbors would feel impelled to do likewise to recover their former levels of security. During the Cold War, when deterrence was the only feasible response to threat posed by the other side’s nuclear weapons, any attempt to build more weapons or bring them to a higher state of readiness (for retaliatory purposes only, it would be claimed) would alarm the other side who would feel impelled to do likewise. MORE
|
July 31, 2018 — On December 31, 2015, Chinese officials announced a substantial reorganization of the armed forces. [1] The reforms cut across the entire People’s Liberation Army (PLA),[2] and constitute the most dramatic reorganization of China’s armed forces since the 1950s. [3] President Xi Jinping described the reforms as essential for modernizing the military. [4] and the reorganization affirmed the PLA’s fidelity to the Chinese Communist Party (CCP). [5] The reform also established a new service branch called the Strategic Support Force (SSF) on par with the Army, Navy, Air Force, and Rocket Force. Among its many missions, the SSF secures electromagnetic space and cyberspace. [6] China’s military pundits lauded the SSF as necessary for twenty-first century warfare. [7] For years, the PLA has fielded cyber capabilities at various levels of command, and the SSF elevates control of cyber operations to the highest echelons. [8] Ultimately, the PLA employs cyber forces to ensure cyber sovereignty (wangluo zhuquan) and safeguard the Chinese Dream across all domains. MORE
|
July 31, 2018 — Platforms are becoming a dominant force in business and software architecture. Regardless of where you look across commercial, government, health or military/defense sectors, platforms are increasingly becoming core features of the digital world. They are at the center of digital ecosystems.
When we think platforms today, it is important to realize that there is a business view, a technology view, and an ecosystem view. Evolving from highly specialized and expensive Service Delivery Platforms, today these multi-tenant and multi-role platforms provide reusable sets of building block capabilities designed to accelerate the growth and to sustain multiple digital ecosystems. MORE
|
July 31, 2018 — Although the United States withdrew its last remaining combat forces from Iraq in December 2011, a significant insurgency spanning the territory of Iraq and Syria has evolved under a variety of names including the Islamic State, Islamic State in Syria (ISIS) and the Islamic State in Iraq and the Levant (ISIL)—for this work, we choose to employ the title ISIL. Since ISIL’s break with al-Qaeda in February 2014, it has become the chief standard-bearer of a Salafi jihadist movement set upon forming a trans-regional caliphate. In its activities, ISIL has extended its territorial reach across North Africa and the Arabian Peninsula as well as claiming credit for terror attacks from Belgium to Bangladesh. As much as a movement, ISIL is the contemporary brand for Jihadist insurgency in the Middle East and beyond. MORE
|