Total Pageviews

Monday, March 26, 2012

Vidéo - Parodie de CDX

Quand les sous-titres d'une parodie de la Guerre des Etoiles sont détournés, cela donne cette vision humoristique des CDX : CDX 2011 Red Cell Chronicles taunt 


Rappelons au passage que le cinéma ne s'est pas peu encore le thème de la cyberguerre à ce jour. Rien à montrer?

La guerre (en exercice) en principe c'est ça:



Aujourd'hui, à l'ère de la cyberguerre l'affrontement (toujours en exercice) serait devenu cela, moins spectaculaire (ambiance potache, café, pizza, boissons gazeuses):


Mais ce serait plus sûrement cela (moitié devant un écran, moitié sur le terrain)



Article - Officials: Cyber Research Needs Innovation, Talent

"Officials: Cyber Research Needs Innovation, Talent", by Cheryl Pellerin, American Forces Press Service. March 21, 2012. http://www.defense.gov/news/newsarticle.aspx?id=67640 

Workshop IWSP12 - Call for Papers

4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace (IWSP’12): 16 August 2012

Call for Papers

The Organising Committee for the Workshop on ICT uses in Warfare and the Safeguarding of Peace 2012 hereby announces the first call for papers. The IWSP’12 is a note-worthy initiative that follows on three previous workshops: London (2007), Pretoria (2008), and Bela-Bela (2010). After the success of the workshops held in South Africa, the Organising Committee will be joining up with the annual ISSA (Information Security for South Africa) conference to provide a unique opportunity to interact with key researchers in the field http://www.infosecsa.co.za/call.html .

Important Dates

2 May 2012 : Paper Submission Deadline
20 June 2012 : Notification of Acceptance
4 July 2012 : Final Paper Submission Deadline
16 August 2012: Workshop

Areas of special interest include, but are not limited to:
Peace support operations
Socio-technical aspects of ICT uses in warfare and peace
ICT uses in war and peace from a military perspective
ICT uses in command and control
Legal, ethical and social issues related to Information Security
Information warfare
Network warfare
Psychological warfare
Strategic information security
Information operations
Critical infrastructure protection
Cyber-terror
Vulnerability assessments
Forensic applications and solutions
Hacking cracking and other technical challenges
Governance and standards
Security Awareness
Social Engineering
Best practices and case studies
Promotion of democratic practices through ICT uses

Contacts:

Email: ifipafrica@csir.co.za Website:
The proceedings of the previous workshop can be viewed at: http://www.csir.co.za/dpss/ifip.html
http://www.iwsp.ukzn.ac.za/

Saturday, March 24, 2012

News - CDX Locked Shields 2012

Le CCDCOE organise du 26 au 28 mars 2012 l'exercice de cyberdéfense "Locked Shields 2012". La "read team" sera principalement composée de volontaires estoniens et finlandais qui devront attaquer 9 "blue teams" réparties en Europe (Suisse, Allemagne, Finlande, Espagne, Italie, Slovaquie, Allemagne/Autriche, Danemark/Norvège, et une équipe de l'OTAN). 

Monday, March 19, 2012

Conférence IHEDN - Cyberdéfense

Colloque "Cyberdéfense. Etat des lieux stratégique, politique, technologique" le 11 avril 2012, 18h30-20h. Ecole Militaire. Paris. Avec Jean-Marie Bockel, ancien ministre, sénateur du Haut-Rhin, chargé par le Sénat d'un rapport sur la cyberdéfense. Suivi d'un débat avec Daniel Ventre (CNRS). Inscription obligatoire auprès de l'IHEDN (ihedn.paris@wanadoo.fr).

Friday, March 16, 2012

Report - Occupying the Information High Ground

A new report is available, titled "Occupying the information High Ground: Chinese capabilities for Computer Network Operations and Cyber Espionage" (Report prepared fir the U.S.- China Economic and Security Review Coommission by Northrop Grumman Corp.) (March 7, 2012. 136 pages).
"The present study is intended to be a detailed follow up and expansion upon a 2009 assessment prepared for the U.S.-China Economic and Security Review Commission of China’s evolving computer network operations capabilities and network intrusion incidents attributed to China. Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests." (p.6)
The Creation of a Chinese "cyber warfare unit": Guangzhou Military Region’s Online Blue Force
Keywords: Information Warfare, Network Warfare, Computer Network Operations, Doctrine, Strategy, Training,

Report - Cybersecurity and US-China Relations

Here is a new report published by the John L.Thornton China Center at Brookings, titled "Cybersecurity and US-China Relations -  网络安全与美中关系" (February 2012). This 52 pages reports has been produced by a working group co-chaired by Kenneth Lieberthal and Peter W.Singer. The hypothesis of the authors is that cybersecurity issues may be a major source of international friction, especially in the US-China relations. Keywords: conflict; cybersecurity, offense, deterrence, China, U.S.