Cyber warfare claimed by many is done by none. Most of the stuff identified as cyber warfare and security we see is actually defensive in nature. If we actually secured our computing systems a lot of the risks of damage…
Author: Samuel Liles
Tourney of home offices: A minor contribution
I’ve been tagged in the tourney of home offices by my esteemed colleague Shane. This little round robin was set up by the infamous Zenpundit. I thought about cleaning it all up before I snapped some pictures but that wouldn’t…
How to wage cyber warfare: Barriers to entry, Part 2
There are large numbers of people who are all for the new thing called cyber warfare. Whether you are interested in waging cyber warfare for a nation state or are considering a corporate company on company engagement the realities are…
How to wage cyber warfare: A primer, Part 1
Cyber warfare is fought on a cyber space terrain. The terrain is made up of the communication components of the global spanning information grid. Consider all of the interconnected equipment, components, people, processes, procedures, and other elements that allow for…
National Cyber Range Proposal
As part of the experiential learning process students work is posted for comment. Feedback in the comments section is enthusiastically requested. My apologies for requiring users to be logged in the amount of spam was extensive. This particular project was…
Cyber response plan and framework
As part of the experiential learning process students work is posted for comment. The students of the assured systems and design course have completed a document that is a comprehensive look at cyber response and counter measures. Feedback in the comments…
Threats in the Age of Obama: 100 days into a presidency
I wrote a chapter for a book called “Threats in the age of Obama” that was edited by Michael Tanji and there were many superior authors included Dan tdaxp, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek, Christopher Corpora, Shane…
Tech meme: Twitter Users
Twitter users with a bazillion followers are hubs. Twitter users who are retweeted a lot are routers. Twitter users with low follower to following ratios are firewalls. Twitter users who have wildly divergent follower communities are bridges. Twitter users who…
2009 Easter Dinner
Happy Zombie Day!!!!!
Yet another cyber treatise
With the impending release of the 60 day cyber review and myriad conferences to cover cyber security I wish to put a stick in the ground and make a pronouncement about cyber security, information assurance and security and anybody who…
Cybersecurity Act of 2009: A-tisket a-tasket all our eggs in one basket
The blogosphere is alight with discussion over section 18 “Cybersecurity responsibilities and authority” of the draft Cybersecurity Act 2009. The key phrase that has multiple organizations in a dither is located on page 44 and states “…The President… (2) may…
The Cybersecurity Act of 2009: Trying to create order from chaos
The cyber arena is filled with the effluvia of vendor driven agendas and political wrangling for budgetary dollars. As a topic cyber security is especially vulnerable as the waning leadership and expertise is so centralized in so few individuals that…
Battlestar Galactica: A fictional view of cyber warfare and technological conflict
As the television show Battlestar Galactica completes its final season I thought it might be interesting to look back on the opening of the show to those first few episodes. I have discussed in the past how science fiction can…
Into the darkness of cyber warfare
I have been reading extensively about whether cyber warfare exists, whether it is a defensive only engagement, and if it does exist does it actually involve combat. These questions are born upon the back of the military establishment well entrenched…
Thoughts on the Quadrennial Roles and Missions Review report (January 2009)
The Quadrennial roles and mission review report is from the Department of Defense (DOD) to congress and highlights key aspects of the core mission areas and competencies of the military. The documents as written also includes a section on roles and…