Menú
Inicio
Visitar el Sitio Zona Militar
Foros
Nuevos mensajes
Buscar en los foros
Qué hay de nuevo
Nuevos mensajes
Última actividad
Miembros
Visitantes actuales
Entrar
Registrarse
Novedades
Buscar
Buscar
Buscar sólo en títulos
Por:
Nuevos mensajes
Buscar en los foros
Menú
Entrar
Registrarse
Inicio
Foros
Area Militar General
Temas de Defensa General
Ciberdefensa
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
Estás usando un navegador obsoleto. No se pueden mostrar estos u otros sitios web correctamente.
Se debe actualizar o usar un
navegador alternativo
.
Responder al tema
Mensaje
<blockquote data-quote="yarara" data-source="post: 862461" data-attributes="member: 457"><p><a href="http://www.gwu.edu/~nsarchiv/NSAEBB/.../info_ops_roadmap.pdf" target="_blank">www.gwu.edu/~nsarchiv/NSAEBB/.../info_ops_roadmap.pdf</a></p><p></p><p><a href="http://www.c4i.org/jp3_13.pdf" target="_blank">www.c4i.org/jp3_13.pdf</a></p><p></p><p><a href="http://www.dtic.mil/doctrine/jel/service_pubs/afd2_5.pdf" target="_blank">http://www.dtic.mil/doctrine/jel/service_pubs/afd2_5.pdf</a><span style="color: Silver"></span></p><p><span style="color: Silver"></span></p><p><span style="color: Silver"><span style="font-size: 9px">---------- Post added at 09:03 ---------- Previous post was at 08:57 ----------</span></span></p><p><span style="color: Silver"></span></p><p><span style="color: Silver"></span></p><p></p><p>Ya trate hace 10 años atras .....no te gastes .... </p><p></p><p>Clases , conferencias ,congresos , la mayor parte con mi inversion ... traje los mejores especialistas de afuera ....nadie le dio pelota ... </p><p></p><p>IO /IW en Argentina , es hackear los correos ...... </p><p></p><p><a href="http://www.worktec.com.ar/consetic2005/consecri/curriculum.htm#23" target="_blank">http://www.worktec.com.ar/consetic2005/consecri/curriculum.htm#23</a></p><p></p><p>Busca Marcelo Martinez ..... </p><p></p><p>Saludos<span style="color: Silver"></span></p><p><span style="color: Silver"></span></p><p><span style="color: Silver"><span style="font-size: 9px">---------- Post added at 09:19 ---------- Previous post was at 09:03 ----------</span></span></p><p><span style="color: Silver"></span></p><p><span style="color: Silver"></span>Al los que quieran algunos papers que escribi sobre el tema , si me mandan un mail a </p><p></p><p><a href="mailto:marceuav@gmail.com">marceuav@gmail.com</a> </p><p></p><p>se los mando .... </p><p></p><p></p><p>Algunos papers que escribi : </p><p></p><p>1 . - SUBMARINE FORCE: ENABLERS OF INFORMATION OPERATIONS FROM THE BOTTOM OF THE SEA</p><p></p><p> INTRODUCTION: </p><p></p><p>Information Operations will be one of the major efforts in the conduct of military operations in the full spectrum of the conflict from peace to war. The manned, mobile, combatant platform that can conduct Information Operations is the attack submarine, and its inherent virtues of stealth, mobility, endurance, and power density. These capabilities give unique opportunities for employment in the conduct of IO both offensive and defensive. Most of the Western navies are developing concepts and tools to generate the promise of the attack submarine in the IO arena. </p><p>This study will introduce the basic concept of IO conducted by a submarine force. The study also will provide a methodology to evaluate the IO capabilities of the submarine force and basic tools for simulation of submarine IO. </p><p></p><p>2. Information Operations Analysis Tool</p><p></p><p>IO-AT</p><p>This tool is pointed to compile and to ease access to whole documents regarding to Information Operation Doctrine and showing relationships between the IO documents and the IO field taxonomy.</p><p></p><p>3- INTRODUCTORY NOTE ON THE China’s INFORMATION OPERATIONS / INFORMATION WARFARE DEVELOPMENT</p><p></p><p></p><p>Introduction: This note is not intended to be a study about the China (PLA – Popular Liberation Army) status about IO and IW. The purpose is to introduce in our view, what is the main ideas being elaborated by the PLA in this field, the current effort to develop a sort of doctrine or strategic thinking.</p><p></p><p></p><p></p><p>4- IO as a Evolutional Answer in Modern Asymmetric Warfare </p><p></p><p>Technologies Overview</p><p></p><p>Since S-11 events, all tendencies in anti-terrorism points to take control of the situations before they happens; i.e. to prevent any attack occurrence. This means that in most of cases, defenders have to deal with fragmentary information for predict (or to be prepared for) further attacks.</p><p></p><p>The characteristics associated with modern terrorism are such that all previous prediction methods fail because terrorists are evolving to new techniques in the same direction that the worlds go:</p><p></p><p>• Terrorists/asymmetric warrior are better informed than ever since they have access to the same information sources than the victims with the same quality.</p><p>• There is more information and is more complex than ever, setting a battlefield very difficult to be analysed.</p><p></p><p>Communication theories (i.e. Shannon) can help to understand the nature of communications and information attack mode. Modern theories can also help to understand the nature of the information exchange taking into account the aspects regarding to the receiver’s perception; in other words How the receiver will understand this? Hypergame theory, considered as game of games tool capable of deal with fragmentary information, shapes a very useful tool for situations like the above described; specially when threats are constantly evolving and being adapted to new countermeasures. </p><p></p><p>In this report, the modern tendencies to the analysis of complex situations are intended to be explained in the context of modern threats. Also, the relation existing between Hypergame theory, modern terrorism, asymmetric warfare and IW is explained taking into account the Darwinist principles as a characteristic of human group’s behaviour. </p><p></p><p>5. NORDIC INFORMATION OPERATIONS WAR MACHINE</p><p></p><p></p><p>INFORMATION OPERATIONS CAPABILITIES OF NORDIC COUNTRIES</p><p></p><p>Contents </p><p></p><p></p><p>Nordic View of IO </p><p>Analysis for each country </p><p>Specials Skills developed </p><p>Doctrine and Means </p><p>Original developments and planning</p><p>Sources </p><p><span style="color: Silver"></span></p><p><span style="color: Silver"></span></p><p><span style="color: Silver"><span style="font-size: 9px">---------- Post added at 09:24 ---------- Previous post was at 09:19 ----------</span></span></p><p><span style="color: Silver"></span></p><p><span style="color: Silver"></span>Algunas fotos de las clases que di en Beijing a oficiales del Ejercito Rojo en el Centro de Estudios Estrategicos del PLA ..en el 2004 .... </p><p></p><p><img src="http://i96.photobucket.com/albums/l173/yarara/CIMG0019.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p><img src="http://i96.photobucket.com/albums/l173/yarara/CIMG0018.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p></blockquote><p></p>
[QUOTE="yarara, post: 862461, member: 457"] [url]www.gwu.edu/~nsarchiv/NSAEBB/.../info_ops_roadmap.pdf[/url] [url]www.c4i.org/jp3_13.pdf[/url] [url]http://www.dtic.mil/doctrine/jel/service_pubs/afd2_5.pdf[/url][COLOR="Silver"] [SIZE=1]---------- Post added at 09:03 ---------- Previous post was at 08:57 ----------[/SIZE] [/COLOR] Ya trate hace 10 años atras .....no te gastes .... Clases , conferencias ,congresos , la mayor parte con mi inversion ... traje los mejores especialistas de afuera ....nadie le dio pelota ... IO /IW en Argentina , es hackear los correos ...... [url]http://www.worktec.com.ar/consetic2005/consecri/curriculum.htm#23[/url] Busca Marcelo Martinez ..... Saludos[COLOR="Silver"] [SIZE=1]---------- Post added at 09:19 ---------- Previous post was at 09:03 ----------[/SIZE] [/COLOR]Al los que quieran algunos papers que escribi sobre el tema , si me mandan un mail a [email]marceuav@gmail.com[/email] se los mando .... Algunos papers que escribi : 1 . - SUBMARINE FORCE: ENABLERS OF INFORMATION OPERATIONS FROM THE BOTTOM OF THE SEA INTRODUCTION: Information Operations will be one of the major efforts in the conduct of military operations in the full spectrum of the conflict from peace to war. The manned, mobile, combatant platform that can conduct Information Operations is the attack submarine, and its inherent virtues of stealth, mobility, endurance, and power density. These capabilities give unique opportunities for employment in the conduct of IO both offensive and defensive. Most of the Western navies are developing concepts and tools to generate the promise of the attack submarine in the IO arena. This study will introduce the basic concept of IO conducted by a submarine force. The study also will provide a methodology to evaluate the IO capabilities of the submarine force and basic tools for simulation of submarine IO. 2. Information Operations Analysis Tool IO-AT This tool is pointed to compile and to ease access to whole documents regarding to Information Operation Doctrine and showing relationships between the IO documents and the IO field taxonomy. 3- INTRODUCTORY NOTE ON THE China’s INFORMATION OPERATIONS / INFORMATION WARFARE DEVELOPMENT Introduction: This note is not intended to be a study about the China (PLA – Popular Liberation Army) status about IO and IW. The purpose is to introduce in our view, what is the main ideas being elaborated by the PLA in this field, the current effort to develop a sort of doctrine or strategic thinking. 4- IO as a Evolutional Answer in Modern Asymmetric Warfare Technologies Overview Since S-11 events, all tendencies in anti-terrorism points to take control of the situations before they happens; i.e. to prevent any attack occurrence. This means that in most of cases, defenders have to deal with fragmentary information for predict (or to be prepared for) further attacks. The characteristics associated with modern terrorism are such that all previous prediction methods fail because terrorists are evolving to new techniques in the same direction that the worlds go: • Terrorists/asymmetric warrior are better informed than ever since they have access to the same information sources than the victims with the same quality. • There is more information and is more complex than ever, setting a battlefield very difficult to be analysed. Communication theories (i.e. Shannon) can help to understand the nature of communications and information attack mode. Modern theories can also help to understand the nature of the information exchange taking into account the aspects regarding to the receiver’s perception; in other words How the receiver will understand this? Hypergame theory, considered as game of games tool capable of deal with fragmentary information, shapes a very useful tool for situations like the above described; specially when threats are constantly evolving and being adapted to new countermeasures. In this report, the modern tendencies to the analysis of complex situations are intended to be explained in the context of modern threats. Also, the relation existing between Hypergame theory, modern terrorism, asymmetric warfare and IW is explained taking into account the Darwinist principles as a characteristic of human group’s behaviour. 5. NORDIC INFORMATION OPERATIONS WAR MACHINE INFORMATION OPERATIONS CAPABILITIES OF NORDIC COUNTRIES Contents Nordic View of IO Analysis for each country Specials Skills developed Doctrine and Means Original developments and planning Sources [COLOR="Silver"] [SIZE=1]---------- Post added at 09:24 ---------- Previous post was at 09:19 ----------[/SIZE] [/COLOR]Algunas fotos de las clases que di en Beijing a oficiales del Ejercito Rojo en el Centro de Estudios Estrategicos del PLA ..en el 2004 .... [IMG]http://i96.photobucket.com/albums/l173/yarara/CIMG0019.jpg[/IMG] [IMG]http://i96.photobucket.com/albums/l173/yarara/CIMG0018.jpg[/IMG] [/QUOTE]
Insertar citas…
Verificación
Libertador de Argentina
Responder
Inicio
Foros
Area Militar General
Temas de Defensa General
Ciberdefensa
Este sitio usa cookies. Para continuar usando este sitio, se debe aceptar nuestro uso de cookies.
Aceptar
Más información.…
Arriba