The changes of media and communication theory inherent in the adoption of new technologies is not without some risk. Whether considering the technologically disenfranchised or the possible empowered individual technology has it’s impacts. Perlmutter quickly lays out a case…
Author: Samuel Liles
Air Force to suspend all efforts toward cyber command
Reported today at NextGov.Com The Air Force on Monday suspended all efforts related to development of a program to become the dominant service in cyberspace, according to knowledgeable sources. Top Air Force officials put a halt to all activities related…
Cyber warfare: Russian and Georgian conflict
There has been a lot of hysteria and accusations thrown around in the idea that Russia is engaging in cyber warfare currently with Georgia. There are a lot of reasons to think that cyber warfare is actually occurring. It…
Cyber warfare: Examining the relationships
When considering the doctrinal documents of computer network attack (CNA), and the hierarchical relationship to information warfare there is a likelihood of misunderstanding of the concepts of cyber warfare. It is hard for somebody in academia to get traction with…
Beyond the data network: Looking at connections you might not notice
Short post to posit a what if. “What if” you could analyze the entire network infrastructure of the electric power grid, water grid, the command and control networks (cyber grid) and any other utilities to find logical and geographic connections…
Asymmetric warfare: A research agenda looking at epistemological based or not
Introduction There is an almost injudicious love of science by the military academic community. Within the deep reaches of the Pentagon and the service schools and academies there is an intellectual reach and lust for the trapping of academia. I…
Lessons in writing: Tools, techniques, methods for writing
There are a lot of writing tools, methods, books, and in general help on the Internet. The Online Writing Laboratory at Purdue is linked to by many schools as it so helpful. But, this little post isn’t about that. It…
A response to the DARPA national cyber range BAA
Introduction If you are going to make war you should practice war. No Marine traverses the line of departure without spending quality time at the rifle range. No Army tanker enters the theater of battle without spending time with a…
Air force cyberspace symposia: Loose ends in cyber space
The definition of cyber space came up again as a primary topic at the United States Air Force Cyberspace symposia at Maxwell Air Force Base. The Air University has a strict non attribution policy so all comments that follow are…
Cyberspace a terrain: Weaponization of the global grid
In a discussion with a senior official of the Air Force he made an off hand comment that perhaps the day that an individual non-state actor working independently could use cyber means to injure a nation-state has passed. According to…
Creating appropriate fear and respect within information assurance and security courses
Abstract – The requisite behaviors of fear and respect in dealing with information assurance and security topics building towards a professional or subject matter expert is highly valued. Creating situational and security awareness is an important behavior modification. Specifically the…
The Socratic compass: Giving students directions not answers
I was recently told that there was no place in the world of the academy, in the University, for the Socratic philosophizing of grey haired intellectuals. There is no room in a curriculum filled and brimming with Bloom learning objectives,…
House committee moves to censor and circumscribe representative to constituent communcation
United States Government House of Representative seeks to close, restrict, and disenfranchise the American public access to their representatives. In a move that blatantly exposes the absolute totalitarian nature that American agencies are willing to use in efforts to shut…
On criticism of “Violence: A micro-sociological theory by Randall Collins”
Abstract Randall Collins in “Violence” makes the tragic mistake of relying heavily on S.L.A. Marshall and the many scholars of Marshall. The interviewing technique of S.L.A. Marshall and the evidence he collected was not without criticism or challenge. The soldiers…
What are the tactical and strategic implications of an economic downturn/recession/depression?
If you were a general sitting in the Pentagon it is doubtful you would be concerned about refugees from the largest economic destabilization in recent history, the substantial number of people who are homeless from a foreclosure “market”, and the…