Synstnes: President Trump og amerikansk romhegemoni Space Force – en sjette forsvarsgren?<img alt="" src="/media/PubImages/IFS%20Insight%2010_2019%20nettversjon%20bilde.jpg" style="BORDER:0px solid;" />Synstnes: President Trump og amerikansk romhegemoni Space Force – en sjette forsvarsgren?Ny teknologi og bruk av verdensrommet står høyt på agendaen under NATOs London-møte denne uken. Ambisjonen er å erklære verdensrommet (space) som et femte operasjonsdomene for alliansen. Det er en tett kobling til USAs romambisjoner, og i denne Insighten ser Hans Morten Synstnes ved Norsk Romsenter nærmere på rasjonale for USAs revitaliserte romorientering fra 2017, opprettelsen av US Space Command i august 2019, og president Trumps ønske om å etablere US Space Force som ny forsvarsgren innen 2025. http://forsvaret.no/ifs/Publikasjoner/ifs-insights-kronologisk-(2010-)/synstnes_trump_space_force_romhegemoni
Concept Paper Series<img alt="" src="/media/PubImages/Concept%20Paper%20Series%20Torgeir%20Haugaard_ingress.jpg" style="BORDER:0px solid;" />Concept Paper Series​The Concept Paper Series is an outlet of applied research addressing problems, needs and challenges in the security, defence and military spheres. http://forsvaret.no/hogskolene/en/research-(2)/publications/concept-paper-series
Norway and NATO. Perspectives from abroad.<img alt="" src="/media/PubImages/NorwegianDefenceMin_FrankBakkeJensen_LTP3.jpg" style="BORDER:0px solid;" />Norway and NATO. Perspectives from abroad.On 16 October 2019, Norwegian Institute for Defence Studies held the last of three seminars on the topic of the Norwegian long term defence plan. http://forsvaret.no/hogskolene/en/events/norway-and-nato-perspectives-from-abroad
Martinsen: EU – en sikkerhetspolitisk dverg<img alt="" src="/media/PubImages/IFS%20Insight%209%202019%201920x840.png" style="BORDER:0px solid;" />Martinsen: EU – en sikkerhetspolitisk dvergSpriket mellom EUs deklarasjoner om egen sikkerhetspolitikk og hva Unionen faktisk får til, er meget stort. Det er derfor ikke noen særlig grunn til optimisme, og stormaktspolitikken som i dag føres av Kina, Russland og USA forverrer situasjonen. http://forsvaret.no/ifs/Publikasjoner/ifs-insights-kronologisk-(2010-)/martinsen_eu_sikkerhetspolitisk_dverg
Power and Economy under Putin and beyond<img alt="" src="/media/PubImages/2020-01-21%20Power%20Elites_ingress.jpg" style="BORDER:0px solid;" />Power and Economy under Putin and beyondLate Putinist Russia faces a dual crisis – economic decline and the succession problem. On the 21 January, the RUSECOPOL project brings together leading international experts to analyze the dynamics of Russian politics. http://forsvaret.no/hogskolene/Arrangementer/russia-power-economy-putin

 Vitenskapelige artikler

 

 

Hagen, Anne Marie. 2019. Towards a Narrative Method: Using Life-Writing in Military Education. Scandinavian Journal of Military Studies 2(1)Hagen, Anne Marie. 2019. Towards a Narrative Method: Using Life-Writing in Military Education. Scandinavian Journal of Military Studies 2(1)<p>​This article begins by considering current English as second language (EL2) teaching in Norwegian professional military education (PME) and reflecting on how reading narrative life-writing texts written by former military personnel supports interdisciplinary learning and contributes to the development of English language skills. It then shows how, by building on this current practice, narrative may be developed into a method of critical reading and communication for junior officers. </p><p>Situating the use of life-writing texts in the context of military interest in narrative in the twenty-first century, and building on insights from life-writing and literacy research, the article argues that the reading of life-writing texts in military EL2 classes should be accompanied by teaching material and reading approaches designed to develop knowledge of narrative structures and techniques and awareness of how the text seeks to affect the reader. It further argues that this knowledge is a transferable skill of use to the military as a flexible communication tool: a narrative method.</p><p>Open access: <a href="https://sjms.nu/articles/10.31374/sjms.7/">https://sjms.nu/articles/10.31374/sjms.7/</a><br><br></p>
Haugom, Lars. 2019. The Turkish Armed Forces and Civil-military Relations in Turkey after the 15 July 2016 Coup Attempt. Scandinavian Journal of Military Studies 2(1)Haugom, Lars. 2019. The Turkish Armed Forces and Civil-military Relations in Turkey after the 15 July 2016 Coup Attempt. Scandinavian Journal of Military Studies 2(1)<p>​This article places the 15 July coup attempt in Turkey into a wider context by examining the historical role of the Turkish military in politics, developments in civil-military relations since the turn of the millennium, and finally the implications of the recent coup attempt for relations between the military, the government, and society. It is argued that under Turkey’s new “strong” presidential system civilian political control and oversight of the armed forces will be strengthened, but there will not be any civilian democratic control and oversight as we usually understand this concept.</p><p><br>Open access: <a href="https://sjms.nu/articles/10.31374/sjms.14/" target="_blank">https://sjms.nu/articles/10.31374/sjms.14/</a><br></p>
Karressand, Martin, Stefan Axelsson and Geir Olav Dyrkolbotn. 2019. Using NTFS cluster allocation behavior to find the location of user data. Digital Investigation, vol. 29Karressand, Martin, Stefan Axelsson and Geir Olav Dyrkolbotn. 2019. Using NTFS cluster allocation behavior to find the location of user data. Digital Investigation, vol. 29Digital forensics is heavily affected by the large and increasing amount of data to be processed. To solve the problem there is ongoing research to find more efficient carving algorithms, use parallel processing in the cloud, and reduce the amount of data by filtering uninteresting files.<div><br>Our approach builds on the principle of searching where it is more probable to find what you are looking for. We therefore have empirically studied the behavior of the cluster allocation algorithm(s) in the New Technology File System (NTFS) to see where new data is actually placed on disk. The experiment consisted of randomly writing, increasing, reducing and deleting files in 32 newly installed Windows 7, 8, 8.1 and 10 virtual computers using VirtualBox. The result show that data are (as expected) more frequently allocated closer to the middle of the disk. Hence that area should be getting higher attention during a digital forensic investigation of a NTFS formatted hard disk.</div><div><br>Knowledge of the probable position of user data can be used by a forensic investigator to prioritize relevant areas in storage media, without the need for a working file system. It can also be used to increase the efficiency of hash-based carving by dynamically changing the sampling frequency. Our findings also contributes to the digital forensics processes in general, which can now be focused on the interesting regions on storage devices, increasing the probability of getting relevant results faster.<br><br><p><a href="https://www.sciencedirect.com/science/article/pii/S1742287619301690">​https://www.sciencedirect.com/science/article/pii/S1742287619301690</a><br></p></div>
Bækken, Håvard. 2019. The Return to Patriotic Education in Post-Soviet Russia: How, When, and Why the Russian Military Engaged in Civilian Nation Building. Journal of Soviet and Post-Soviet Politics and Society 5(1)Bækken, Håvard. 2019. The Return to Patriotic Education in Post-Soviet Russia: How, When, and Why the Russian Military Engaged in Civilian Nation Building. Journal of Soviet and Post-Soviet Politics and Society 5(1)<p>​This article examines the military origins of the Russian State Program of Patriotic Education. It documents how the policy was incubated within the Ministry of Defense and had found much of its form and content before Vladimir Putin became Russia’s president. </p><p>To a degree often forgotten, patriotic education was shaped by circumstances of crisis and social destabilization. In response to failed nation building and rising concerns over youth behavior, military values and aesthetics were taken up as a means to cure social ills and moral vices and to counter the influx of western values. </p><p>The military actors involved sought not only to increase the prestige of military service. Equally important was the fact that patriotic education served as a form of social outreach, based on a traditionalist worldview. Soviet and Russian soldiers were seen as important role models for the young, and the Armed Forces as a bearer of historical continuity and “Russianness.” </p><p>Thus, already before Putin’s presidency, the regime invited the military into the heart of civilian affairs, presenting military traditionalism with a stronghold within the domain of official nation building. Under Putin, too, patriotic education policies continue to bear the strong imprint of their origins in crisis and failed nation building in the 1990s.<br></p><p>To buy from Ibidem Verlag: <a href="https://www.ibidem.eu/en/zeitschriften/journal-of-soviet-and-post-soviet-politics-and-society/journal-of-soviet-and-post-soviet-politics-and-society-15580.html">https://www.ibidem.eu/en/zeitschriften/journal-of-soviet-and-post-soviet-politics-and-society/journal-of-soviet-and-post-soviet-politics-and-society-15580.html</a><br></p>
Dyrkolbotn, Geir Olav and Sergii Banin. 2019. Correlating High- and Low-Level Features: Increased Understanding of Malware Classification. Lecture Notes in Computer Science, vol. 11689Dyrkolbotn, Geir Olav and Sergii Banin. 2019. Correlating High- and Low-Level Features: Increased Understanding of Malware Classification. Lecture Notes in Computer Science, vol. 11689<p>​<span style="background-color:transparent;color:#333333;font-family:georgia, serif;font-size:17px;">Malware brings constant threats to the services and facilities used by modern society. In order to perform and improve anti-malware defense, there is a need for methods that are capable of malware categorization. </span><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">As malware grouped into categories according to its functionality, dynamic malware analysis is a reliable source of features that are useful for malware classification. </span></p><p><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">Different types of dynamic features are described in literature [</span><span class="CitationRef" style="font-size:17px;font-family:"source sans pro", helvetica, arial, sans-serif;background-color:transparent;color:#333333;box-sizing:border-box;display:inline-block;"><a title="View reference" role="button" aria-expanded="false" aria-controls="popup-references" href="https://link.springer.com/chapter/10.1007/978-3-030-26834-3_9#CR5" style="background-color:transparent;box-sizing:border-box;color:#004aa7;padding:0px 1.7px;">5</a></span><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">, </span><span class="CitationRef" style="font-size:17px;font-family:"source sans pro", helvetica, arial, sans-serif;background-color:transparent;color:#333333;box-sizing:border-box;display:inline-block;"><a title="View reference" role="button" aria-expanded="false" aria-controls="popup-references" href="https://link.springer.com/chapter/10.1007/978-3-030-26834-3_9#CR6" style="background-color:transparent;box-sizing:border-box;color:#004aa7;padding:0px 1.7px;">6</a></span><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">, </span><span class="CitationRef" style="font-size:17px;font-family:"source sans pro", helvetica, arial, sans-serif;background-color:transparent;color:#333333;box-sizing:border-box;display:inline-block;"><a title="View reference" role="button" aria-expanded="false" aria-controls="popup-references" href="https://link.springer.com/chapter/10.1007/978-3-030-26834-3_9#CR13" style="background-color:transparent;box-sizing:border-box;color:#004aa7;padding:0px 1.7px;">13</a></span><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">]. These features can be divided into two main groups: high-level features (API calls, File activity, Network activity, etc.) and low-level features (memory access patterns, high-performance counters, etc). </span></p><p><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">Low-level features bring special interest for malware analysts: regardless of the anti-detection mechanisms used by malware, it is impossible to avoid execution on hardware. As hardware-based security solutions are constantly developed by hardware manufacturers and prototyped by researchers, research on low-level features used for malware analysis is a promising topic. The biggest problem with low-level features is that they don’t bring much information to a human analyst. </span></p><p><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">In this paper, we analyze potential correlation between the low- and high-level features used for malware classification. In particular, we analyze n-grams of memory access operations found in [</span><span class="CitationRef" style="font-size:17px;font-family:"source sans pro", helvetica, arial, sans-serif;background-color:transparent;color:#333333;box-sizing:border-box;display:inline-block;"><a title="View reference" role="button" aria-expanded="false" aria-controls="popup-references" href="https://link.springer.com/chapter/10.1007/978-3-030-26834-3_9#CR6" style="background-color:transparent;box-sizing:border-box;color:#004aa7;padding:0px 1.7px;">6</a></span><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">] and try to find their relationship with n-grams of API calls. We also compare performance of API calls and memory access n-grams on the same dataset as used in [</span><span class="CitationRef" style="font-size:17px;font-family:"source sans pro", helvetica, arial, sans-serif;background-color:transparent;color:#333333;box-sizing:border-box;display:inline-block;"><a title="View reference" role="button" aria-expanded="false" aria-controls="popup-references" href="https://link.springer.com/chapter/10.1007/978-3-030-26834-3_9#CR6" style="background-color:transparent;box-sizing:border-box;color:#004aa7;padding:0px 1.7px;">6</a></span><span style="font-size:17px;font-family:georgia, serif;background-color:transparent;color:#333333;">]. In the end, we analyze their combined performance for malware classification and explain findings in the correlation between high- and low-level features.</span></p><p><span style="background-color:transparent;color:#333333;font-family:georgia, serif;font-size:17px;">To download from Springer (behind paywall): <a href="https://link.springer.com/chapter/10.1007/978-3-030-26834-3_9">https://link.springer.com/chapter/10.1007%2F978-3-030-26834-3_9</a></span></p>

 Kommende aktiviteter ved FHS

 

 

Power and Economy under Putin and beyondPower and Economy under Putin and beyond1/21/2020 8:00:00 AM1/21/2020 1:30:00 PM2020-01-21T13:30:00Z2020-01-21T08:00:00ZKonferanseOslohttp://forsvaret.no/hogskolene/Arrangementer/russia-power-economy-putin
Luftmaktseminaret 2020Luftmaktseminaret 20202/4/2020 11:00:00 AM2/6/2020 11:00:00 AM2020-02-06T11:00:00Z2020-02-04T11:00:00ZKonferanseTrondheim, Luftkrigsskolenhttp://forsvaret.no/hogskolene/Arrangementer/luftmaktseminaret-2020

​​​