Intelligence

The Developmental History of the Center for Asymmetric Threat Studies (CATS)

Abstract:

This article describes how to develop, adapt, and manage an independent think tank approaching new cross-sectoral forms of national security threats within a government stove-piped system. The Center for Asymmetric Threat Studies at the Swedish Defence University was in a European context a unique hybrid entity that combined academic research with policy relevant recommendations and trusted second opinions to Cabinet departments and agencies. This article explores how to bend stovepipes within a Swedish context in the areas of Counter Terrorism, Intel-ligence Studies, Cyber Security, and Influence Operations.

Intelligence, Surveillance, and Reconnaissance and Electromagnetic Warfare Methods for Cyber Signature Production: A Conceptual Model

Abstract:

The purpose of this paper is to offer a methodology using the already mature signature production capabilities offered within the intelligence and electromagnetic warfare fields to develop a similar capability for cyber operators. Not only will the tools and TTPs assist in target and signature production, but they will also make attribution much easier by capturing the common location, profile, and parametric data necessary to identify and to verify adversary identities. In the information related capability (IRC) disciplines of intelligence, surveillance, and reconnaissance (ISR) and electromagnetic warfare (EW), signature production based on parametric data, adversary tactics, techniques, procedures (TTPs), and methodologies have long been the operational answer to the attribution and targeting malaise. 

Reflexive Control and Cognitive Vulnerability in the 2016 U.S. Presidential Election

Abstract: 

This research seeks to uncover the mechanisms of Russian reflexivecontrol by examining its function during 2016 US presidential elections. Security analysts and US government officialhave asserted that Russia used reflexive control to influencethis election; however, there is little discussion on how this technique cognitively interacted with the American public.

Strategic-Intelligence Analysis: Contributions from an Operational-Design Orientation

Abstract:

To ensure actions are ‘purposeful’—that is, that they achieve the intended outcome— planners rely on sound intelligence to develop courses of action. Intelligence requirements and subsequent collection in support of any planning effort should be informed by an appreciation of what that effort is seeking to achieve and specifications of what should be collected.

Dominating the Attacker: Use of Intelligence and Counterintelligence in Cyberwarfare

ABSTRACT

In the event of cyberwarfare the defender must harden the attacker’s target by secure design, a defined security perimeter, and a suite of tools. Indeed, the defender must be ever alert and ready to react to attack. Over many years, defenders in traditional warfare have learned to predict the style, magnitude and possible outcomes of a physical attack, and how to deceive and confuse an attacker with the objective of changing the outcome. Perhaps the cyberwarfare defender can take a similar approach, by employing intelligence and counterintelligence techniques that are superior to those of the attacker.

Belgium’s Intelligence Community: New Challenges and Opportunities

ABSTRACT

Recently Belgium’s intelligence function has been heavily criticized, predominantly regarding its effectiveness and professionalism. Some voices have even gone as far as to propose abolishment of part of the intelligence community. This paper identifies why efficient intelligence gathering is more than ever a requirement for both the Belgian and European leadership. It reviews Belgium’s intelligence history and studies the roots of its criticisms. Instead of proposing intelligence ‘reform’, it identifies important parameters of how contemporary intelligence should be conducted, and how the intelligence services can adapt within the constraints that apply to them.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com