I-Sources 08 Mars 2010 08

I-Sources 08 Mars 2010 08

i-sources_08 mars 2010 08 Sélection mensuelle d’articles et de documents sur le renseignement & la sécurité internationale publiée par le actualitÉ du renseignement terrorisme blog / site Pour être informé par courriel de Privatisation du renseignement Prolifération et traFic pdf la parution du et de la sÉcuritÉ d’armes livre prochain numéro : Forces et opérations spéciales criminalitÉ et maFias article video To receive an email guerre de l’inFormation risques internationaux podcast alert on next issues: Cybermenaces conFlits armÉs [email protected] • • • • • • • • • • • • • • • • actualitÉ du renseignement L’image - réflexions doctrinales - cicde Ce document a pour objet de présenter les réflexions doctrinales du domaine image, dont l’horizon d’application correspond au moyen terme. De portée très générale, il propose une harmonisation sémantique, une analyse de la chaîne image ainsi que des orientations aux organismes en charge du développement capacitaire, entendu ici au sens large. L’objectif est d’engager les évolutions jugées nécessaires répondant aux enjeux liés aux mutations de l’environnement et à la place prépondérante que l’image a d’ores et déjà prise au sein des armées. Iran - Pakistan - Yémen - arabie saoudite : le jeu compliqué de la guerre secrète Alain Rodier – Note d’Actualité n° 209, mars 2010 – CF2R Concept exploratoire SA2r PIA 06.102 – surveillance, acquisition d’objectifs, renseignement et reconnaissance Parvenir à constituer cet ensemble complexe exige de disposer d’une vision interarmées partagée, compatible avec celle de nos partenaires. Tel est l’objet du concept exploratoire Surveillance, Acquisition d’objectifs, Renseignement et Reconnaissance - SA2R. Ce document n’entend pas apporter de solutions définitives mais fixe des principes structurants. Il présente une vision française, cohérente avec les concepts ISTAR1ou JISR2 de nos principaux partenaires stratégiques et des perspectives qui seront évaluées à travers des expérimentations3, et du retour d’expérience des opérations. extraterrestrial system sharpens tactical eyes on the ground – SIGNAL Magazine, March 2010 Satellite network provides over-the-horizon voice, data nets to warfighters on the move. Ask any small unit deployed in theater, and troops will say their number one communications challenge is obtaining ready access to reliable, real-time voice and data connectivity. An innovative satellite-based tactical communications system featuring a unique multicast one-to-many architecture is helping warfighters solve that problem, and it works virtually anywhere, including the challenging terrain of Afghanistan. RETOUR AU SOMMAIRE • • • • • • • • • • • • • • • • Privatisation du renseignement & de la s É c u r i t É CRS – department of defense contractors in iraq and afghanistan: Background and analysis Moshe Schwartz, CRS, December 2009 The use of contractors in Iraq and Afghanistan has raised a number of issues for Congress, including (1) what role contractors should play in contingency operations, (2) whether DOD is gathering and analyzing the right data on the use of contractors, (3) what steps DOD is taking to improve contract management and oversight, and (4) the extent to which contractors are included in military doctrine and strategy. This report examines current contractor trends in Iraq and Afghanistan, the steps DOD has taken to improve contractor oversight and management, and the extent to which DOD has incorporated the role of contractors into its doctrine and strategy. The report also reviews steps Congress has taken to exercise oversight over DOD contracting, including contracting issues that have been the focus of hearings and legislation. lend me Your ears: us military turns to contractor linguists – March 2010 The US military has come to rely more and more on contractors to provide linguist services to function effectively in non-English speaking regions. The need for these services is particularly acute in the Middle East and Central Asia where US troops are actively engaged. RETOUR AU SOMMAIRE • 1 i-sources_08 • • • • • • • • • • • • • • • • 08 Forces et o pé r at i o n s s pé c i a l e s saF’s special operations task Force – Aug 09 – Singapore This month’s feature story is on the SAF’s Special Operations Task Force, which looks at some of the capabilities of the new outfit. The news clip segment covers the following stories: 1. SAF Task Group returns from Gulf of Aden 2. Total Defence Awards 2009 3. Launch of 3rd Generation Army Medical Support System 4. MINDEF Volunteers’ Dinner 5. Temasek Seminar 6. Defence Relations dod: u.s. needs stealthy airlifter By the 2020s, U.S. special-forces troops will need a stealthy new airlifter to sneak past ever-improving radar and missile systems into «denied areas,» says the Pentagon’s top civilian special operations official. RETOUR AU SOMMAIRE • • • • • • • • • • • • • • • • g uerre de l’in F o r m at i o n effects-Based information Battle in the muslim World – Remy M. Mauduit (Madaoui) One of America’s most difficult challenges in the war on terrorism concerns the information battle now waging in the Islamic world. To mitigate these challenges, we must separate Islam from terrorism in Muslims’ consciousness. Therefore, it is critical that US political, business, cultural, and religious leaders and their spokespeople refrain from framing terrorism in an Islamic religious context. RETOUR AU SOMMAIRE • • • • • • • • • • • • • • • • c Y B e r m e n a c e s Le guide méthodologique eBios EBIOS et MEHARI, les deux méthodes françaises d’analyse des risques, ont récemment été mises à jour dans une version 2010. Elles vont permettre d’évaluer et de traiter les risques relatifs à la sécurité des systèmes d’information. Elles peuvent aussi être utilisées pour mieux communiquer sur la sécurité au sein de l’entreprise, en direction des responsables, dirigeants et partenaires. Ce sont de véritables boîtes à outils de la gestion des risques SSI. La base de connaissances eBios Étude de cas : « archimed » cybersecurity act of 2010 draft - Committee Amendment [Staff Working Draft], March 16, 2010 Directive-type memorandum (dtm) 09-026 - responsible and effective use of internet-based capabilities Deputy Secretary Of Defense This memorandum establishes DoD policy and assigns responsibilities for responsible and effective use of Internet-based capabilities, including social networking services (SNS). This policy recognizes that Internet-based capabilities are integral to operations across the Department of Defense. This DTM is effective immediately; it will be converted to a new DoD issuance within 180 days. Passeport de conseils aux voyageurs Ce guide a été réalisé avec le concours de plusieurs ministères, de grandes entreprises et d’organisations professionnelles. Au format « passeport » pour être facilement consultable lors des missions, il rappelle les menaces et présente une série de précautions à prendre avant, pendant et au retour d’un voyage. L’emploi de téléphones mobiles, d’ordinateurs portables et d’assistants personnels favorise le transport et l’échange de données. Parmi ces informations, certaines peuvent présenter une sensibilité importante, tant pour les entreprises que pour les administrations. Leur perte ou leur vol peut avoir des répercussions importantes sur l’activité des entités concernées. cybercriminals Find new Ways to exploit vulnerabilities – SIGNAL Magazine, March 2010 Focused, sophisticated attacks target specific users, concentrate on social networking sites. Strategic efforts to access top executives’ computers and to steal source code and intellectual property are taking cybercrime beyond simple financial theft. Criminals and foreign organizations are launching more sophisticated and targeted phishing and malware attacks, resulting in more prevalent infiltrations in 2009. Cybercriminals often target social media sites, such as Twitter and Facebook, and use an individual’s personal data to fool friends and colleagues into revealing valuable personal and corporate data. RETOUR AU SOMMAIRE • 2 i-sources_08 08 the comprehensive national cybersecurity initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America’s digital infrastructure. RETOUR AU SOMMAIRE • • • • • • • • • • • • • • • • t e r r o r i s m e Somalia: a new approach – Bronwyn E. Bruton, Council on Foreign Relations Press, March 2010 In this Council Special Report, sponsored by CFR’s Center for Preventive Action, Bronwyn E. Bruton proposes a strategy to combat terrorism and promote development and stability in Somalia. She first outlines the recent political history involving the Transitional Federal Government (TFG) formed in 2004 and its Islamist opponents, chiefly the Shabaab, which has declared allegiance to al-Qaeda. She then analyzes U.S. interests in the country, including counterterrorism, piracy, and humanitarian concerns, as well as the prospect of broader regional instability. Lashkar-e-taiba in Perspective – an evolving threat – New America Foundation, Stephen Tankel – February 2010 This paper is divided into four sections. The first assesses Lashkar’s historical relations with the different actors operating

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us