A Systemic View of Surprise Attacks: Why It Matters

Abstract:

This paper examines the concept of a Surprise Attack from a systemic perspective. It looks at the approaches that can be assumed about the system when using intelligence methods to explore the environment of the system at hand. Assuming all system models are a creation of humans who often try to ascertain is that they are real, it is important that the implied complexity in terms of the system’s elements and the relationships between them are considered. The amount of reliability in the concepts that make up the system model as well as the desired outputs are also important. The boundary of the system showing the element in the system and those that are outside are also critical. A caveat is introduced to show that reality is chaos and probably no boundary around physical and conceptual system entities will truly capture everything that is relevant, so will ultimately fail in terms of surprises. The argument continues with the examination of the Known/Unknown elements within an intelligence problem, further confounding the elimination of surprise in the system. A final point adding to the production of the intelligence product is Cognitive Rigidity. Here, the use of imagination rather than just deduction of established facts and cognitive assumptions could better prepare an organization for a surprise attack.


AUTHORS

Photo of William (Bill) Hutchinson

Security Research Institute Edith Cowan University 
Perth, Australia.

Professor Bill Hutchinson was Foundation IBM Chair in Information Security at Edith Cowan University in Western Australia. He was Director of SECAU (Security Research Centre) and was coordinator of the Information Operations and Security programmes. From 2000 to 2010, he was the Chief Editor and founder of the Journal of Information Warfare.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com