Instituto Sagres does lecture on Cyber Intelligence

Instituto Sagres gave the lecture “The Intelligence and Cyber Power”. The event occurred on 19 September 2012 and was part of the Cyber Intelligence Symposium, organized by the Brazilian Army Intelligence School (EsIMEx).

The approach is an analogy with the rise of Air Power and its Theories, as well as Air Forces, from the invention of the balloon, by priest Bartolomeu de Gusmão, to the present day, under the focus of Intelligence for military use. Examines aspects of the emergence of Air Power Theories and as in its early days the air vector was seen only as a tool for Intelligence, without any military value as stated by Marshal Foch in 1910, notably with use only for the (Aerial) Reconnaissance, replacing the cavalry and later seen as a replacement to the high spots on the ground, as the Military Doctrine of the time. In this analogy, we have uncovered a probable metric for chronology of emergent Cyber Power in function of the use of the Fifth Dimension: Cyberspace; until then only seen as a source of Intelligence, without any military value. The author leads the audience to question at what timeline point, in the use of Cyberspace, we would be: at the time of the Duque de Caxias balloons (or American Civil War) or UAV? The speaker brings to reflect the questioning of how far away we are from what could be Cyber Power Theories and Cyber Forces (the next Force among Armed Forces) and how Intelligence has and will have a key role in this evolution.

View the original article here

Proceedings of the SCADA Security Scientific Symposium 2007

Proceedings of the SCADA Security Scientific Symposium 2007The Proceedings are a compilation of eleven technical research papers presented at Digital Bonds 2007 SCADA Security Scientific Symposium (S4). This level of technical detail is new to the SCADA Security community and is desperately needed to speed up progress and get past the FUD.

Table of Contents
SCADA Protocol Implementation Analysis and Vulnerabilities
1. OPC Exposed Part I Interface Implementation Vulnerabilities
2. OPC Exposed Part II Denial of Service Attacks
3. ICCP Exposed: Assessing the Attack Surface of the Utility Stack”
4. Automated Testing of SCADA Protocols

Security Protocols for Control Systems

5. Anonymous, Authenticated Communication for Secure Sharing
of SCADA and Control System Information
6. SCADA Protocol Obfuscation: A Proactive Defense Line in
SCADA Systems
7. N-Secrecy Authentication Response to Graduated Threat Levels in SCADA Network

Calculating Risk
8. A Methodology for Estimating the Mean Time-to-Compromise of a System
9. SCADA Honeynets: How to Build and Analyzing Attacks

Detecting Attacks
10. Identifying Attacks on Control Systems by Scripting Event Aggregation and Correlation

11. Using Model-based Intrusion Detection for SCADA Networks

The complete introduction and abstracts are available at:


Click here to buy from Amazon