The new cyber coordinator position (AKA cyber czar) as described is a position with no real authority, lots of responsibility, and minimal resources. In most worldly views this is an abhorrent lack of command and control for the cyber security…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
South by South West (SXSW)
Here is my submission for South by South West! Help a guy out we need all the votes we can get. If you like the idea vote it up!
Cyber warfare: Call in the generals march out the peons
Recently it was brought to my attention that Raytheon was seeking Cyber Warriors in answer to Presidents Obama’s call for cyber security response and change. When you consider that the resulting legislation storm has left us with a host of…
Semper Cyber: A motto for a new military command
It looks like the Department of Defense (DOD) is going to create a cyber warfare command that may have a war fighting capacity. There are issues with creating a single command structure, there are issues with the military trying to…
A cyber warfare infrastructure: The high level architecture
How do you wage cyber warfare? How do you make a world wide reach? What does it look like? What can we count on for results? All of these questions are part of the process of designing and implementing a…
How to wage cyber warfare: Concluding remarks, Part 10
With this ten part series I wanted to get some ideas down and hopefully start some discussion. Over the last few weeks each segment has looked at cyber warfare from a different viewpoint. I’ve been told that my blog posts…
How to wage cyber warfare: Why we do not take cyber seriously, Part 9
There are a lot of arguments over why cyber warfare and cyber terrorism get so little attention. The attention it gets arrives in waves and departs. There is almost a decade swing between being ignored and being the hottest new…
How to wage cyber warfare: The super empowered individual, Part 8
The nation state as an entity is a conglomeration of power and social structure having a history stretching back to the Westphalian peace and treaty. This concept of nations rises out of western tradition that had recognized empires previously but…
Assessing the information onslaught of protests and terrorist attacks via social media
When the terrorist attacks occurred in Mumbai local media was able to report extensively as it occurred. Social media pundits were able to analyze and evaluate the different channels of communication. Social media tools like Twitter with near real time…
How to wage cyber warfare: The relationship between cyber and kinetics, Part 7
There is a certain amount of misunderstanding about the Internet and the global communications grid. On the one hand we have a mythos that has risen stating that the Internet was created to allow communication in the advent of nuclear…
Computers Freedom & Privacy conference at George Washington University
I don’t get invited to cool conferences to speak. I don’t live in Washington D.C. More importantly I’m a relative nobody and that empowers me. I have nothing to lose and I can be forthright in what I say. Heck…
How to wage cyber warfare: Operationalizing the network, Part 6
So, first thing is what do we mean by operationalize? This is a big word for the principle of taking over the adversaries systems. As a key factor to conflict the desired state is to control the ability of the…
How to wage cyber warfare: Reconnaissance and surveillance, Part 5
Reconnaissance is often considered synonymous with footprinting of systems. The idea is to get as much knowledge about the target network as possible. One way of doing that is simple observation. One lesson we can take from the military at…
How to wage cyber warfare: The technology and structure, Part 4
There are some basic components that are needed by any military so that they can succeed. The military force is required to have the appropriate technology to create an advantage and the training to overcome any adversaries corresponding advantage. The…
How to wage cyber warfare: Puzzle pieces, Part 3
Cyber warfare claimed by many is done by none. Most of the stuff identified as cyber warfare and security we see is actually defensive in nature. If we actually secured our computing systems a lot of the risks of damage…