Vol. 9, Issue 2 Abstract
Paper 1: Educating and Training Soldiers for Information Operations
Aki-Mauri Huhtinen1, Leigh Armistead2, Corey D. Schou3*
1Finnish National Defence University, Helsinki, Finland
2Goldbelt Hawk LLC, Hampton, Virginia, USA and Informatics Research Institute, Idaho State University
3Informatics Research Institute and National Information Assurance Training and Education Center, Idaho State University, Pocatello, Idaho, USA
*firstname.lastname@example.org Corresponding Author
Abstract: Military Training and Education is evolving because of the growing influence of Information Operations (IO) and Information Warfare (IW). This influence has grown from the tremendous changes in both technology and social issues. Traditional military training has dealt with key elements such as operational concepts of war, doctrine and law; leadership; combat skills; weapons skills; and operating effectively under stress. Yet the technology has changed from stones to cannons to silicon based weapons, while the basic curriculum for soldiers in some cases has not changed for centuries. One might say plus ca change, plus c’est la meme chose but it is more than that. Traditional training and combat skills often do not match the modern battlefield. We must progress beyond the traditional combined arms doctrine. Modern soldiers must not only be traditional warriors; they must be competent in information operations and information warfare. This paper addresses how we are to initiate this integration.
Keywords: Information Warfare, Training, Education, Soldiers, Cyber, Information Operations
Paper 2: Network Operations and Warfare: Employing Effective Paradigms across Different Environments.
C. E. Leming
School of Computer and Information Science
Edith Cowan University, Australia
Abstract: Network Centric approaches feature strongly in the tactics of modern warfare. While the military have refined these paradigms into effective, applicable models, there is a scarcity of resources to assist enterprises employing these models in the commercial sphere. In the battle for information superiority, many competitive enterprises are struggling to adapt military models to achieve information superiority in a competitive business context.
Keywords: Information Superiority, Information Operations, Network Centric Operations, Enterprise.
Paper 3: State, Military and Information Warfare Nexus: A Conceptual Perspective from South Asia
National Management College. Pakistan
Abstract: This paper questions the efficacy of the notion of information warfare (IW) due to implicit militaristic nuances which critically impact on its application as a policy instrument for optimum effects in dynamic sociopolitical spheres. The argument is then contextualized into Indo-Pakistan socio-political environment to ascertain its veracity. Findings reveal structural and functional shortfalls of IW as an operating concept suited only as a warfare device to the detriment of a larger public good. The paper suggests exploiting a vast target audience containing sympathetic constituencies in the two countries through a multi-sphered appeal of soft power guided by argumentative and democratic discourses and the heritage of peace, pluralism, and co-existence.
Keywords: Information warfare, India, Pakistan, socio-political, perceptions, pathological politics, state, military, soft power.
Paper 4: From ABAC to ZBAC: The Evolution of Access Control Models
Alan H. Karp1, Harry Haury2, Michael H. Davis3
1 Virus Safe Computing Group, HP Labs
2 NuParadigm Companies
3 SPAWAR Headquarters,U.S. Navy
Abstract: Several attempts at using the Services Oriented Architecture (SOA) have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the authentication of the requester, have been found to be inflexible, do not scale well, and are difficult to use and upgrade. In this paper we describe how access control models have evolved to solve manageability problems as the systems we used have scaled up in size and as they have become more distributed. We then introduce an approach to access control that solves the problems we see today and show that this approach is a natural extension of previous methods.
Keywords: Access Control, Manageability, Authorization Based Access Control, Transitive Access, Identification Based Access Control, Shared Credentials, Information Warfare, Music, Occult, Propaganda, Technology
Paper 5: Pearl Harbor 2.0: When Cyber-Acts Lead to the Battlefield
W.C. Henry1, J.M. Stange2, E.D. Trias3
1 Air Force Institute of Technology
Abstract: America is under constant attack in cyberspace. Which of these attacks equate to a Pearl Harbor or the terrorists’ acts on September 11? Despite an ever increasing number of attacks, no international policy has adequately established a characterization for what acts constitute an “act of war.” Many issues are left unaddressed that need to begin with a classification of cyber attacks. We present a method of classification and a broad taxonomy using an effects-based approach to examine malevolent cyber-activities that may evoke counteractions. We aim to spur discussions under our framework for more granular international level discussions.
Keywords: Cyberwar, Policy, Pearl Harbor, Act of War, Use of Force