Information Warfare Monitor - Activities

Activities

The Information Warfare Monitor engages in three primary activities

Case studies. The Information Warfare Monitor designs and carries out active case study research. These are self-generated activities consistent with the IWM's mission. It employs a rigorous and multidisciplinary approach to all case studies blending qualitative, technical, and quantitative methods. As a general rule, its investigations consist of at least two components:

Field-based investigations. The IWM engages in qualitative research among affected target audiences and employ techniques that include interviews, long-term in situ interaction with partners, and extensive technical data collection involving system monitoring, network reconnaissance, and interrogation. Its field-based teams are supported by senior analysts and regional specialists, including social scientists, computer security professionals, policy experts, and linguists, who provide additional contextual support and substantive back-up.

Technical scouting and laboratory analysis. Data collected in the field is analyzed using a variety of advanced data fusion and visualization methods. Leads developed on the basis of infield activities are pursued through “technical scouting,” including computer network investigations, and the resulting data and analysis is shared with infield teams and partners for verification and for generating additional entry points for follow-on investigations.

Open source trend analysis -- The IWM collects open source information from the press and other sources tracking global trends in cyberspace. These are published on its public website.

Analytical workshops and outreach. The IWM works closely with academia, human rights organizations, and the defense and intelligence community. It publishes reports, and occasionally conducts joint workshops. Its work is independent, and not subject to government classification, Its goal is to encourage vigorous debate around critical policy issues. This includes engaging in ethical and legal considerations of information operations, computer network attacks, and computer network exploitation, including the targeted use of Trojans and malware, denial of service attacks, and content filtering.

Read more about this topic:  Information Warfare Monitor

Famous quotes containing the word activities:

    Love and work are viewed and experienced as totally separate activities motivated by separate needs. Yet, when we think about it, our common sense tells us that our most inspired, creative acts are deeply tied to our need to love and that, when we lack love, we find it difficult to work creatively; that work without love is dead, mechanical, sheer competence without vitality, that love without work grows boring, monotonous, lacks depth and passion.
    Marta Zahaykevich, Ucranian born-U.S. psychitrist. “Critical Perspectives on Adult Women’s Development,” (1980)

    There is, I think, no point in the philosophy of progressive education which is sounder than its emphasis upon the importance of the participation of the learner in the formation of the purposes which direct his activities in the learning process, just as there is no defect in traditional education greater than its failure to secure the active cooperation of the pupil in construction of the purposes involved in his studying.
    John Dewey (1859–1952)

    ...I have never known a “movement” in the theater that did not work direct and serious harm. Indeed, I have sometimes felt that the very people associated with various “uplifting” activities in the theater are people who are astoundingly lacking in idealism.
    Minnie Maddern Fiske (1865–1932)