Preface
The NATO Advanced Research Workshop “Cyberwar-Netwar: Security in the Information Age”, held in Lisbon in November 2003, was co-directed by Lt.-General António Eduardo Mateus da Silva, President of EuroDefense, Portugal and Professor Alexander Dodonov, Institute for Information Recording, Ukraine. Unfortunately Professor Dodonov was unable to participate in the workshop and his function as co-director was taken over by Professor Serge Azarov, Director of Government and International Relations at LuckyNet, Ukraine.
In God we trust, all the rest we monitor…
Organisational, social and individual performances are becoming ever more dependent on information and information technology and, as such, it is crucial to find security approaches that follow simultaneously technology dependence and the value of its use.
The extraordinary growth of production, treatment, diffusion and circulation of information is the most immediate reflex of the technological dependence, in particular from computers and from the Internet. In spite of being a fairly recent technology, the Internet is already present on a global scale. Its growth has been astonishing. Today, information managed using internet technology (public as well as private) has an extremely important operational impact and therefore the analysis of information security questions in the Internet is of paramount importance. Nevertheless, these security issues do not relate solely to the Internet. For every organisation, from an international financial system to a military organisation, the dependability questions regarding the management and treatment of information using information systems and Internet technology are quite similar.
Today the Internet is entering a new stage which will have a much stronger impact on the daily lives of all kinds of organisations. The next communication paradigm offers an improved access to mobility information, offering people and all organisations that deal with mobile devices the ability to access information whenever and wherever necessary. We really are at the edge of a new technological revolution, based on the ubiquity of information through the use of mobile devices and telecommunications. Furthermore, historical tendencies lead us to believe that the impact both on people and on organisations of this technological wave will be both faster and more powerful than any previous one.
To the individual, information ubiquity results in the necessity to have immediate access to information. The strategic tactic and operational impact in organisations will therefore be incomparably deeper than in previous organisational management change using technology such as total quality management or business process re-engineering.
Mobility turns ubiquitous and real-time information more abundant and available than ever before. In order to fully benefit from these properties and avoid misinterpreting more information, organisations have to learn how to transform information into knowledge. The operational security questions regarding information are even bolder in case of organisational knowledge as the latter becomes available through the use of information technology and making use of the new fundamental property of mobility in real-time. In particular, the operational Armed Forces effectiveness is increasingly dependent on its information systems. This is clear in the case of C412STARWP-Command, Control Communications, Computing Information, Intelligence, Surveillance, Targeting and Reconnaissance Weapons System. The critical nature of these systems and the absolute necessity to prevail over the adversary demand total trustworthiness, opportunity and safety in real-time.
As such, in the context of increasing dependency on the new technological wave which is building an information, communication and knowledge society, it is crucial to find new organisational security approaches. In this regard, in our workshop, we sought to analyse and discuss the following questions:
Part I: Around the World in 80 milliseconds – Which evolution can we foresee for information and communication technology and what will be its value impact at the individual, social and organisational levels?
Part II: Operational Security of Ubiquitous Information – What will be the appropriate operational security approaches for ubiquitous real-time information and how do we deal with increasing information value dependability?
Part III: Strategic Knowledge Security – How can organisations learn in this new context and what kind of security measures apply for the production and availability of strategic knowledge?
The participants represented the academic world and practical research, involving also the administrative, business and military communities. This broad spectrum of theoretical and practical insight ensured a most fruitful and comprehensive discussion during the sessions and during the private debate between the participants.
Having only two main papers per day proved to be a success as it gave the full possibility for the most thorough discussion and space and time for an in-depth debate pointing to future thinking and investigation.
It was the general feeling among the participants that this workshop should not stand alone but should be followed by additional conferences inside the general issues of security in a broad sense in the information age. Suggestions of more permanent cooperation were put forward.
The co-directors would like to thank the NATO Science Committee for funding the Advanced Research Workshop. Above all, thanks go to all the participants for their contribution to this workshop.
The Editors wish to thank Liz Cowan for her assistance in preparing this book.
Fernando Duarte Carvalho, Eduardo Mateus da Silva