Todays news includes information on the new cyber command for the United States Air Force. Over the next month I will be running these as the Air Force Cyber Command comes to fruition. As a side note in the article…
Author: Samuel Liles
The warrior scholar
I have this fantasy that the warrior scholar elite can happen in my life time. Yes I believe in the elite who are the best because in the realm of conflict failure to be elite carries the badge of vanquished.…
Some thoughts on the idea of “Cyber Range”
To recreate the Internet in a safe and sane environment that could realistically recreate the chaos of the Internet is a big issue. Some of the early design issues: 1) The Internet is inherently dynamic most designed systems are relatively…
Fall 2008 Book Adoptions
This semesters text book adoptions.
ITS 472 Final Project Paper (NMCI)
Students in my ITS 472 Networking Architecture course have completed a network design replicating the Navy Marine Corps Intranet project. The overall goal of this excercise was for the students in about 10 weeks to design an enterprise network solution…
Are students customers or scholars in training?
Part of the problem with considering students as customers rather than students is a difference in perspective between administrative needs and needs of faculty and the discipline. Personally I consider those people in their seats to be students or scholars…
K-12 Education: A university professor takes the future personally
Though as a faculty we represent a diverse and expansive educational background sometimes we miss the point. Whether your educational philosophy is behaviorist or constructivist our mission is to educate the next generation. There is some value in the criticism…
The IED’s of Cyber-warfare
I am concerned that policy and the legislative agenda is making basic assumptions about the relationship of information assurance and security and cyber-warfare that may not be accurate. Some of the issues are illuminated when government and corporate information security…
Why students of small wars should care about cyber-warfare
We define forms of military conflict sometimes by the terrain on which it is fought. Whether the terrain be land warfare, naval warfare, or air warfare the terrain determines the scope and strategies. Low intensity conflict can be defined by…
Today at Purdue University Calumet
Today is a fairly momentous day in my professional life. Today Purdue University voted and awarded me tenure and promotion to associate professor. As a professor at Purdue University Calumet since August 2003 there have been trials and tribulations. Some…
Let users manage their own PC’s? BALDERDASH!
In a recent Infoworld article by Tom Sullivan it is pointed out that companies are investigating or implementing policies and procedures to allow users to manage their own information technology assets. Link to infoworld story This is of course a…
ITS 472: Phase 2 Navy Marine Corps Intranet Project
Here are the links to the presentations: Group 1 Presentation Questions DOCUMENT 6.9 MB Group 2 Presentation DOCUMENT 15.5 MB Click here to go to the final document & presentation link
Twitter at twitter.com/selil
I’ve gone ahead and joined twitter and will be doing updates via Twitter. A few students have asked me why it took so long. Gosh I don’t know know why. So, if you are interested in seeing what I’m up…
What does the military want from the education system?
There are a lot of misconceptions about higher education, secondary education, and primary education. The K-12 system is where I’m going to restrict my comments for this discussion, and especially the public education system. That being said only a little…
Hacking a computer with a microphone
While talking with one of my students tonight I was reminded of this article. How about using a microphone to hack the key of a system? Using acoustic signature to get the encryption key and other information as a passive…