• Home
  • Projects
  • Methods
  • Team
  • More
    • Home
    • Projects
    • Methods
    • Team
  • Home
  • Projects
  • Methods
  • Team

ENGINEERING PRINCIPLES and SCIENTIFIC FUNDAMENTALS

Employed by the Institute in its work and developed by Karl Rauscher

Uniqueness of Principles Employed by the Institute

Because of the uniqueness of the 8i Framework and I.V. Approach described below, the Institute's mastery of cyberspace can be taken to the asymptotic limit.  This mastery results in objectivity not otherwise available, insights not otherwise gleaned, and confidence not justifiable with conventional methods.

The Eight Ingredient (8i) Framework

The complexity of cyberspace confounds.  However the Institute relies on a profound insight that cyberspace consists of a finite number of ingredients - eight.  Take any one away and it does not work; a ninth is unnecessary. Most frameworks offer simplicity as a trade-off for accuracy.  In contrast, the 8i Framework is correlated with reality - as tightly as possible.

Intrinsic Vulnerabilities (I.V.) Approach

The Institute leverages a second profound insight that each ingredient has a finite set of intrinsic vulnerabilities.  Systematic analyses using the 8i Framework and I.V. Approach are truly proactive, in contrast to 99+% of cybersecurity practice, which reacts to threats.  Conventional approaches to cybersecurity are like the reactive responses to 9-11 from September 12 onward. In contrast, 8i and I.V. identify and address "the cockpit door" (the vulnerability) before damage, i.e. "September 10th".  More Effective. Profoundly. 

Application Examples

of the Eight Ingredient (8i) Framework & of the Intrinsic Vulnerability (I.V.) Approach

Ultra-High Reliability Achieved (8i)

  • The first "6 9's" (i.e., 99.9999% availability) for the communications industry was achieved for 40k+ systems deployed worldwide through an early application of the underlying principles of the 8i Framework.  The 8i Framework was a departure from conventional quality management approaches, building upon them, but providing greater control over system performance. [Bell Labs, 1998]


Critical Infrastructure Protection (8i & I.V.)

  • The 8i Framework and I.V. Approach were used as the guiding methodology to develop 750+ Homeland Security Best Practices under the auspices of the U.S. Federal Communications Commission (FCC) Network Reliability & Interoperability Council (NRIC) to protect the Internet and other critical communications infrastructure in the aftermath of the 9-11 terrorist attacks.  [FCC NRIC 2001-05]


National Security Communications (8i & I.V.)

  • The 8i Framework and I.V. Approach were used as the guiding framework to address the national security challenges of Next Generation Networks (NGNs) for U.S. President G.W. Bush's National Security Telecommunications Advisory Committee.  [NSTAC, 2006] 


Emergency Response Communications (8i)

  • The 8i Framework was used as the basis for deploying ad hoc emergency communications for unprecedented advanced search & rescue at 9-11 Ground Zero, for Hurricane Katrina, and other catastrophes, by the Wireless Emergency Response Team.  [WERT, 2001-present] 

Identify High Consequence Concerns (8i & I.V.)

  • The 8i Framework was the basis of the comprehensive analysis that produced 10 Recommendations, all of which were adopted by the European Commission to strengthen European Critical Infrastructure, via the Availability and Robustness of Electronic Communications Infrastructures (ARECI) Report.  [European Commission, 2007]


Safety of the Internet of Things (I.V.)

  • The 8i Framework and I.V. Approach were the means to assess the challenges of the Internet of Things (IoT) in the context of the increasing strained U.S.-China Relationship.  [Atlantic Council, 2019]


Priority International Communications (8i & I.V.)

  • The PIC Report presents precise, I.V.-based, countermeasures that will, if implemented, save lives and property around the world each year.  When catastrophes occur, communications networks are overwhelmed with traffic, and thus priority communications are critical.  [EastWest Institute, 2012]


The Reliability of GUCCI (8i & I.V.)

  • The Reliability of Global Undersea Communications Cable Infrastructure (ROGUCCI) Report made 12 Recommendations to improve the Reliability of the Global Undersea Communications Cable Infrastructure (GUCCI).  [2010]


Copyright © 2025 Institute for CyberStudies - All Rights Reserved.

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept