Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Computer Sciences

Australian Information Warfare and Security Conference

Information Warfare

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Considerations On Deception Techniques Used In Political And Product Marketing, Carlo Kopp Apr 2006

Considerations On Deception Techniques Used In Political And Product Marketing, Carlo Kopp

Australian Information Warfare and Security Conference

This paper explores three deception techniques which are widely used in political and product marketing. These techniques are ‘deception by omission’, ‘deception by saturation’ and the use of ‘deception by spin’. These techniques are newly analysed in the framework of the four canonical strategies of Information Warfare and Shannon’s capacity and entropy theorems, and their respective strengths and weaknesses established. Specific strategies for the defeat of these deception techniques are discussed.


Information Terrorism In The New Security Environment, Ken Webb Apr 2006

Information Terrorism In The New Security Environment, Ken Webb

Australian Information Warfare and Security Conference

Over the years there have been many interpretations of what constitutes Information Terrorism. This paper examines the correlation/relationship between Information Warfare and Terrorism, and describes what is considered to be Information Terrorism now. It achieves this by outlining the threat’s impact, advantage and capability. It then examines the positives that can be derived from such and, based on the literature available on the subject, provides a deduced interpretation of what Information Terrorism is. The paper concludes with remarks supporting the assertion that Information Terrorism is a major dynamic and asymmetric threat contributing to a new national security environment.


An Information Operation Model And Classification Scheme, D T. Shaw, S Cikara Apr 2006

An Information Operation Model And Classification Scheme, D T. Shaw, S Cikara

Australian Information Warfare and Security Conference

Information systems are used in overt and covert conflict and information operations target an opponent’s ability to manage information in support of operations for political, commercial and military advantage. System level attacks are complicated by logistic problems that require resources, command and control. Node level attacks are practical but of limited value. Collocated equipment comprises a temporary node that may be feasibly attacked. Estimation of IW operation merits may founder on the difficulty of predicting the net benefit for the costs. Starting from with Shannon’s model, a simple costbenefit model is discussed. Existing models are extended by an IW attack …