I’ve included a link to a YouTube video on the vision Microsoft has of the future. Before you go watch it I want you to look at a few specific elements within the video and keep an eye out for…
Author: Samuel Liles
Of this and that the cyberwar lexical conflict
The question almost certainly has to be asked at some point in time. Can a cyberwar topple a nation state? If you say yes you’re a fan boy, and if you say no you’re a skeptic. Regardless of the rickety…
Apple and federated identification issues iCloud/MobileMe/iTunes oh and Chad the Apple Asshat
Apple has a bit of an issue. The implementation of the iTunes portion of the Apple ecosystem occurred prior to the iPhone app store, or the arrival of the .Mac service which later became .Me then iCloud service environment. Whew..…
Diagram: Sony Data Breach (Hypothetical)
More from Sam’s Skunk Worx. The following diagram is a method of discussing the cause and effect relationship of how elements build to a information security breach. I used the Sony Data Breach (sorry Sony) utilizing only open source information…
The domain of land
A pretty simple project I’m working on is concept mapping domains. This is a reductionist effort (so therefore lossy) but it is kind of fun. Some of the basic rules are as follows. It has to be defined by being…
Pseudonymity to technofascism
The current pseudo intellectualism surrounding all things-designated cyber is appalling in the entirety of lack of understanding all things-designated cyber. Intellectualism and discussion of the taxonomical and semantical constructs does not solve the operational needs and currently does not drive…
This week in cyber conflict: September 12th – September 16th
The early part of the week was a little slower than normal with not a lot of traffic being generated. News reports slowed substantially until more information started to be released on the DigiNotar hack details became more obvious. As…
This week in cyber conflict: September 5th – September 9th
Relatively little going on this week other than stories being cleaned up from previous weeks. No hacker conferences going on, and no major conflagrations to report. There are some squeaky articles about planned hacktivism or “major” attacks through cyber means…
Garmisch Germany
I’m in Germany to speak at the Marshall Center tomorrow, and I’m going to be talking about technology and the threats caused by new technologies. I’m talking to the senior executive seminar attendees. The following are some pictures I took…
This week in cyber conflict: August 29th – September 2nd
Leading into the week (over the weekend) there was a bit of a furor over the disclosure of a hacking tool that had an American university address listed. When supposedly the Chinese government yanked the video the hysteria went up.…
This week in cyber conflict: August 22nd – August 26th
The week opened with more information on the Korean attacks. It seems the number of people may have been larger than some earlier reports. Of course, this is actually more about a breach than it is about an actual attack.…
This week in cyber conflict: August 15th – August 19th
With another week of highly dramatic over blown talk in the media about how hackers declared war on BART you’d think the world was coming to an end. Since BART wasn’t brought to it’s knees nor was there a dramatic…
There is opinion, fact, and what you’ll likely do
Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the information age has eroded until in 2008 the stock market plunged. The market since then really hasn’t recovered. Sure the points go up…
Draft: Evaluation of incidents in cyber conflict [Graphic]
The following graphic at the bottom of this page is a visualization of the impact of cyber incidents that is a work in progress. There seems to be fairly substantial interest in the contents of my little black book of…
This week in cyber conflict: August 8th – August 12th
Much in the same way as I’ve discussed the principle of science fiction informing us about information assurance and security it appears a researcher at DefCon talked along a similar thread. I do think rather than Die Hard a better…