There are large numbers of people who are all for the new thing called cyber warfare. Whether you are interested in waging cyber warfare for a nation state or are considering a corporate company on company engagement the realities are…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
How to wage cyber warfare: A primer, Part 1
Cyber warfare is fought on a cyber space terrain. The terrain is made up of the communication components of the global spanning information grid. Consider all of the interconnected equipment, components, people, processes, procedures, and other elements that allow for…
Yet another cyber treatise
With the impending release of the 60 day cyber review and myriad conferences to cover cyber security I wish to put a stick in the ground and make a pronouncement about cyber security, information assurance and security and anybody who…
Cybersecurity Act of 2009: A-tisket a-tasket all our eggs in one basket
The blogosphere is alight with discussion over section 18 “Cybersecurity responsibilities and authority” of the draft Cybersecurity Act 2009. The key phrase that has multiple organizations in a dither is located on page 44 and states “…The President… (2) may…
The Cybersecurity Act of 2009: Trying to create order from chaos
The cyber arena is filled with the effluvia of vendor driven agendas and political wrangling for budgetary dollars. As a topic cyber security is especially vulnerable as the waning leadership and expertise is so centralized in so few individuals that…
Battlestar Galactica: A fictional view of cyber warfare and technological conflict
As the television show Battlestar Galactica completes its final season I thought it might be interesting to look back on the opening of the show to those first few episodes. I have discussed in the past how science fiction can…
Into the darkness of cyber warfare
I have been reading extensively about whether cyber warfare exists, whether it is a defensive only engagement, and if it does exist does it actually involve combat. These questions are born upon the back of the military establishment well entrenched…
Thoughts on the Quadrennial Roles and Missions Review report (January 2009)
The Quadrennial roles and mission review report is from the Department of Defense (DOD) to congress and highlights key aspects of the core mission areas and competencies of the military. The documents as written also includes a section on roles and…
Utility processing infrastructure
This is a working paper identifying various technologies, and providing a set of requirements for a research problem. When dealing with Beowulf clusters and other scientific type processing clusters one problem is that they require extensive programming of applications to use…
Maxwells hammer: Ringing up a denial of service against their own users
The United States Air Force shut off the Internet connection for Maxwell Air Force Base, the home of the Air War College. Across the Internet security experts have been applauding this effort as a method of holding the institutions at…
Evil Google: What you don’t know just might hurt you
A common refrain of the uninformed is that I have nothing to hide so therefore I don’t care who peeks through my window. Until the power balance of the country or community changes and when political views are no longer…
Deeper into the terrain: Cyber warfare and cyber space
When considering the terrain of cyber space we have a tendency to make that terrain as limited as possible. Most people equate the Internet to the world wide web. The world wide web though is a much smaller entity than…
Call for Chapters: Information Assurance and security Ethics in Complex Systems: Interdisciplinary Perspectives
Call for Chapters Chapter Proposals Due: February 20, 2009 Information Assurance and security Ethics in Complex Systems: Interdisciplinary Perspectives Melissa Jane Dark, Editor Purdue University To be published by IGI Global http://www.igi-global.com/requests/details.asp?ID=584
From “Yes we can”, to “No you can’t” a president and his Blackberry
The 44th president of the United States while not a technologist is an avid user of technology. Though considered by many to be addictive the reality is a Blackberry represents the open flow of information and is the spirit of…
Generation warfare a cohesive explanatory model
When considering the variable methods of depicting a model it sometimes is not so obvious what will happen when that model is expanded to take on newer and more distinct concepts. I started with a basic two dimensional model that…