I’m in Germany to speak at the Marshall Center tomorrow, and I’m going to be talking about technology and the threats caused by new technologies. I’m talking to the senior executive seminar attendees. The following are some pictures I took…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
There is opinion, fact, and what you’ll likely do
Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the information age has eroded until in 2008 the stock market plunged. The market since then really hasn’t recovered. Sure the points go up…
Draft: Evaluation of incidents in cyber conflict [Graphic]
The following graphic at the bottom of this page is a visualization of the impact of cyber incidents that is a work in progress. There seems to be fairly substantial interest in the contents of my little black book of…
US Department of Defense Cyber Strategies [Graphic]
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine mention cyber so they’ll end up on here too. There are law enforcement strategies that will need to be added like the “Transnational…
[Updated] The cost of securing systems a work in progress
The following graphic is a method of expressing a few very basic concepts in information assurance and security. It is backed up by some statistics but I’m not going to try and justify what is hand drawn. Another project that…
Cyber Dime
The following graphic is a synopsis of the cyber policy statements from the National Security Strategy (2010), The National Defense Strategy (2008), The National Military Strategy (2011), the Department of Defense Strategy for Operating in Cyberspace (2011) and the Department…
Draft: The myth of cyber space as a man made domain
Recently Jeff Carr wrote a short piece on his blog (Blogspot so no access from DoD) talking about why cyber space in the web 3.0 world really is far from the foundations held by the Department of Defense who states…
Draft Example: Cyber warfare researcher matrix
In trying to answer a question that nobody has I’m working on an analysis of cyber warfare researchers and their particular influences and directions for what they are researching. Basically creating a grid with the “y” axis being social(ology) to…
Hanging the head of advanced persistent threat on a pike
If I am a major corporation and I feel I may be a target, or know that I have been a target I want to have some idea about reducing my risk to attacks. The consistent hum and noise of…
Interesting shift in infosec
Early reports on LulzSec cyber attacks are interesting if not surprising. A continuous thread through the media reports if you are looking for the root cause analysis it is poor computing practices by the companies. Now, to be fair this…
From near earth orbit: How to analyze Usama Bin Laden’s Porn Collection
All right so the title is total link bait. The United States seized some number of computers and peripherals from the compound in Pakistan. Those materials will be evaluated and analyzed for intelligence purposes and perhaps used in planning future…
The User #1 Initiative
Having read many cyber security initiatives and reports I thought I might throw a few ideas up against the wall listed in problem and solution format. Consider the following more from the ideologically free position and not looking to sell…
Commentary: The International Strategy for Cyberspace
The following is a critique of the new policy document introduced by the Whitehouse on May 16th. All elements of the attribution policy of this blog/website apply. Though I’m critical of the document in general it is consistent with previous…
Forging the future from the scraps of yesterday and the hopes of tomorrow
It is interesting to me when I see people with grand visions of the future of computing. I enjoy the excitement of some relatively arcane conceptual leap somebody makes regarding technology. I just rarely share that excitement. Most people when…
Information Technology: String to networks
It’s an issue that has plagued information technology discipline for a long time. One part information technology professionals, one part users, one part vendor hegemony the reality is a broken culture and system of getting things done in cyber space.…