Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine mention cyber so they’ll end up on here too. There are law enforcement strategies that will need to be added like the “Transnational…
Author: Samuel Liles
This week in cyber conflict: August 1st – August 5th
The week opened up with more discussion about computer incursions in South Korea. It was also interesting to see another despot led country to be tied to cyber attacks. The thread of aligning countries like Myanmar to cyber attacks is…
[Updated] The cost of securing systems a work in progress
The following graphic is a method of expressing a few very basic concepts in information assurance and security. It is backed up by some statistics but I’m not going to try and justify what is hand drawn. Another project that…
Cyber Dime
The following graphic is a synopsis of the cyber policy statements from the National Security Strategy (2010), The National Defense Strategy (2008), The National Military Strategy (2011), the Department of Defense Strategy for Operating in Cyberspace (2011) and the Department…
This week in cyber conflict: July 25th – July 29th
This week seemed to have some interesting themes. I do think it is interesting that the one theme that has been missing is on how the federal government looming default has not been considered by the pundits as a cyber…
Draft: The myth of cyber space as a man made domain
Recently Jeff Carr wrote a short piece on his blog (Blogspot so no access from DoD) talking about why cyber space in the web 3.0 world really is far from the foundations held by the Department of Defense who states…
Draft Example: Cyber warfare researcher matrix
In trying to answer a question that nobody has I’m working on an analysis of cyber warfare researchers and their particular influences and directions for what they are researching. Basically creating a grid with the “y” axis being social(ology) to…
This week in cyber conflict: July 18th – July 22nd
The week started pretty much as we would expect with more discussion of the 24k files lost by the Department of Defense as disclosed by the Deputy Secretary Defense William Lynn in the previous week. The loss of classified information…
Fiction: After the debt ceiling
The following is purely fictional and speculation and to long to really read. It does not represent anything other than an attempt to use one pattern to identify a future pattern in a totally different set of situations. That means…
First Summer 2011 (Virginia) Run
Suunto Please Help Little Girls
This week in cyber conflict: July 11th – July 15th
The week started out kind of interesting with more information about the Department of Energy labs that had to be shut down. Though the hysteria surrounding the attack continues to refer to the “sophisticated” nature of the “cyber attack” it…
This week in cyber conflict: July 4th – July 8th
Coming out of the weekend the big news was the attacks on the various department of energy laboratory environments. At first blush it appeared and was reported as a significant advanced persistent threat event. Now I’m not exactly sure what…
This week in cyber conflict: June 27th – July 1st
The silliness of what has become a near catastrophic destruction of the term war has continued through out the weekend of June 25th/26th. The term cyber warfare was tossed around with abandon by the main stream media. The possible disbandment…
Commentary: RAND Counterinsurgency Scorecard
RAND recently released the Counterinsurgency Scorecard: Afghanistan in early 2011 relative to the insurgencies of the past 30 years. I read this with considerable interest as the topic (insurgency) and methodology (Delphi study) interest me greatly. The use of experts…