ICT, WARFARE AND PEACE; FOOD FOR THOUGHT Brian Naudé.

Slides:



Advertisements
Similar presentations
DoD Logistics Human Capital Strategy (HCS) Executive Overview 1 October 2008.
Advertisements

Steps towards E-Government in Syria
An Integrated Approach. Communication ICT Numeracy Working with Others Problem Solving What are Core Skills?
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences Paul Smart, Ali.
T HE ROLE OF GOVERNMENTS AND STAKEHOLDERS IN THE ICT PROMOTION DEVELOPMENT.
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Introduction to Information Operations Attaché Corps- SEP 09
Chapter 1: The Context of SA&D Methods
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Tools for Mainstreaming Gender Gender Analysis Framework and Gender Planning Tools Seminar on Moving to Gender-Based Analysis in Constructing Policy in.
Paul Hanover Science Applications International Corporation (SAIC) CSU Modeling and Simulation Symposium 27 August 2008.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Harmonisation of Standards for Enterprise Integration – an urgent need
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Overview of Strategic Management Concepts Overview of Strategic Management Concepts.
What is H(M)IS?. Purpose of HIS “is to produce relevant information that health system stakeholders can use for making transparent and evidence-based.
Information and communication technology (ICT) capability Australian Curriculum, F10.
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
COURSE OVERVIEW COURSE REQUIREMENTS KNOWLEDGE AND SKILLS STUDENT EXPECTATIONS Global Business.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. The Scope and Challenge of International Marketing Chapter 1.
Business Analysis Debbie Paul Managing Director
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Are Networked and Net- Centric the Same? Dr Terry Moon Head NCW S&T Initiative DSTO 30 March 2006 (NSI)
A Model to Facilitate Effective Blended E-learning within Universities in Developing Countries B. Aguti, R. J. Walters, G. B. Wills Electronics and Computer.
1 Web Commerce Definition Benefits Impacts Other Types of Electronic Commerce.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall Epilogue The Future of Knowledge Management.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
SOCIO-TECHNICAL SYSTEMS APPROACH TO PEACE SUPPORT OPERATIONS Mapule Modise & Louise Leenen.
Urban Infrastructure and Its Protection Responding to the Unexpected Interest Group Report Group Members G. Giuliano (USC), Jose Holguin-Veras (CUNY),
SeungJu Kim I Realism  State is the pre-eminent actor in the international system.  Self-help: state must build up its military power to ensure.
The European Union R&D Landscape The Israel-Europe R&D Directorate For EU FP6 Rehovot, July 2006.
1 The Way Ahead Dr. Ed Smith Boeing Effects-Based Operations: The “how to”
A Military Guide to Terrorism in the Twenty-First Century
Information Warfare Playgrounds to Battlegrounds.
1 An initiative developed in the framework of the START project supported by the European Commission (DG InfSo) START IST SSA.
© Lemyre et al., 2010 Paul Boutette, MA, B. Ed., MBA & Louise Lemyre, Ph.D. Faculty of Social Sciences, McLaughlin Research Chair on Psychosocial Risk,
The Commonwealth Has a “VOICCE” Virginia’s Operational Integration Cyber Center of Excellence.
U.S. ARMY 4632A21 Information Operations and Public Affairs 1 3/1/2007 BNCOC PA Supervisor Course Information Operations.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
INTERNATIONAL OPERATION MANAGEMENT - Introduction - Different perception of Globalization : investment in the other countries, innovations in computer.
The Research Problem and Objectives Lecture 6 1. Organization of this lecture Research Problem & Objectives: Research and Decision/Action Problems Importance.
 managing self managing self  relating to others relating to others  participating and contributing participating and contributing  thinking thinking.
Urban Infrastructure and Its Protection Responding to the Unexpected Interest Group Report.
Generic competencesDescription of the Competence Learning Competence The student  possesses the capability to evaluate and develop one’s own competences.
Social Exclusion in an Information Age Multimedia Training Kit.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
Network Centric Planning ---- Campaign of Experimentation Program of Research IAMWG Dr. David S. Alberts September 2005.
Scotland’s Colleges is a trading name of both the Scottish Further Education Unit and the Association of Scotland’s Colleges Curriculum for Excellence.
1 Regional Integration theory II - Transactionalism I Kim Jae Yeon.
Civil Military Operations and the Fundamentals of Joint Operations.
E-Procurement : Towards Transparency and Efficiency in Public Service Delivery.
Center of Excellence PEACE OPERATIONS COMMAND & CONTROL AND COMMAND & CONTROL AND TRANSITION ISSUES Lt Col (R) John Derick Osman Center of Excellence in.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
Community of Interest Conference 2018
Main Business information systems 2 edition S D M K e y c o n p t s U
Phase Zero Social Media Applications
National Interest & Foreign Policy
No Course Title ECTS 1. International Military Relations 5 ECTS 2.
Presentation transcript:

ICT, WARFARE AND PEACE; FOOD FOR THOUGHT Brian Naudé

© CSIR Scope Information and technology Information warfare defined Comprehension of information warfare Considerations ICT uses (War and Peace) Challenges

© CSIR Information and technology ± 500 BC± 1450± 2000

© CSIR Information warfare defined “If there were a single, obvious definition of information warfare, someone would have already written it down” “The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own” No consensus definition apparent

© CSIR Comprehension of information warfare Information Domain  A-priori knowledge  Information systems  Information  data Physical Domain Cognitive Domain Situation:  Awareness  Understanding  Assessment  Decision making Information & data Individual world view & capabilities Human Perception Alberts et al

© CSIR Considerations Information Generated at a gargantuan rate Multitude of sources No control Technology Vast worldwide communications networks Virtual information space Technology fusion Organisation Many forms and control schemes Cultural base Integration levels ICT influence of structure

© CSIR ICT uses Mass distribution of information to a local or foreign audience Economic disruption of public institutions Executing legal information transactions Construction or disruption of military command and control, administrative and logistic systems Vulnerability of ICT systems

© CSIR Challenges Volume and Availability of Information Limited influence on communities with ICT New ways use information Organisation and Technology Fusion Organisation structure fusion lags that of ICT Economic benefits Leap frog opportunity for developing countries