First you have to understand that information security simply is not a priority in American society. I think this is not a technical or ideological issue. It is a question of assumption of resources and risks. Using Gartners numbers you’re…
Author: Samuel Liles
TIMN conceptual mapping
This is an early effort to start mapping the relationships of TIMN by David Ronfeldt. This is also my first attempt at crowd sourcing a solution to a problem. T+I+M+N relates to the concepts of how humans organize themselves. I…
Ancient stories of motorcycles past
This is what happens when you ride a KLT1200C on the Playa in Gerlach at high speeds. It takes a little playa home.
LinkedIN profile is toast….
I did away with another social media service. Buh bye LinkedIn. Why? In the what is becoming an old adage, if you aren’t paying for the product you are the product, I couldn’t figure out what LinkedIn was giving me.…
It’s time
to buy a motorcycle again… That’s all
NDU 2012 Fall Convocation
Via livestream we can watch the commencement ceremony at the National Defense University. Major General Martin the President of NDU is the commencement speaker which is kind of different. There usually is a combatant commander who comes to speak. There…
Incoming rounds and short artillery: I’m outta here
In February I wrote a piece here on my blog discussing the current woes of the joint professional military education environment and the pending drastic cuts. I was discussing how it effects me, but there is a much larger set…
Storage, transmission, and processing as basis for cyber forensics
We should call it cyber forensics rather than digital or computer forensics. Why? There are three states we find information in within the current technology paradigm; storage; transmission; or processing. Regardless of the mechanism of storage, transmission or processing a…
The hegemony of bureacracy
Hegemony – the political dominance of one state over another Bureaucracy – An unelected government organization that makes rules, laws, and policy What we have growing in the arena of cyber policy is a hegemonic bureaucracy filled with all of…
Turning out the lights on purpose
Watching the tensions of response and resiliency pulled and prodded by the concepts of conflict and conflagration you might be right to think nobody has a clue what would happen in a war where cyber is a large component. On…
Generations of cyber weapons
The discussion of the concept of cyber warfare weapons jumps between a few threads that make them harder to understand than really is needed. One of the conceptual problems is that there are types or generations of cyber weapons and…
The cyber force matrix
There has been a lot of ink spilled on the idea of nation-state activities in cyber space and much of that discussion has been centered on military activities in the domain. Though interesting this misses the concept that a nation…
Microsoft Surface: Usability and mobility and presentation of tech
I watched the Microsoft Surface introduction with interest. I thought that the idea of the tablet running a full operating system and functionally tied to mobility through the use case rather than relegated to mobility by design would be interesting.…
Different realities and the impacts on policy
Adam Elkus has a great piece on how cyber punk has killed cyber security. I strongly suggest that you read it if you have time. This is a great way to get into some of the interesting pieces of how…
When critical infrastructure is no longer a target then commodity infrastructure suffices
With the current list of critical infrastructures inclusive of electricity generation, telecommunication, water, transportation, and financial services you would think society has identified key risk points. I think that would be false. Though key resources are identified for each of…