When considering the generation warfare model as a tool of categorizing the types or scopes of conflict a few things are exposed rather rapidly. At ComingAnarchy.Com Younghusband identifies several of the same issues I did in attempting to bring the discussion…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Anti-forensics: Obfuscating the path to forensic examination
What can a user do that will obscure the path to analysis of a computer system so that minimal to no digital information may remain to be examined in a forensically sound method? What are the tools and methods to…
A unified generational warfare theorem: Introduction to basic argument and concepts
The idea of nation state conflict and conflict of ideology becomes a descriptive problem when looking at the scope of history. How best to describe the antecedent conflicts and the methods utilized? A focus of the military establishment has been…
Social networks, events, entities, actors, actions
There is a fairly substantial body of work that looks at the difference between hierarchical organized groups and network organized groups. The relative merits of each argument fall into a few camps. The hierarchical organization allows for direction of action…
Commentary and refutation: CSIS & Securing cyberspace for the 44th presidency
The Center for Strategic and International Studies (CSIS) recently released a report titled “Securing Cyberspace for the 44th Presidency: A report of the CSIS commission on cybersecurity for the 44th presidency”. This report is an in depth look at policy…
Live Render: A Linux live CD based rendering solution
The fall 2008 semester ITS 470 Large Scale High Performance Systems course completed a project to produce a live distribution knoppix CD. Feedback from the public on these projects is highly sought after as the problems are real world. As…
A possible information operations curriculum
I have been working on an information operations graduate/masters degree curriculum using the sections, topics, and strategies found in Information Operations (JP3-13) as a starting point for course titles, and course learning objectives. The expectation is that each course would…
Blog Tank: A National Cyber Security Policy
An idea that “Haft of the Spear” had was to blog tank a policy paper. With a little bit of trickery we’ve moved some of the content over to the Wiki. Check out this link for more information. The idea…
Cyberwarfare or hooliganism: A short consideration of the difference
Media reports have created a meme that any or all conflict that occurs in cyber space is cyber warfare. This is an injurious concept of the conflicts within cyber space. It leads to gross generalizations and political punditry that could…
Cyber Forensics: A partial bibliography
The following is a partial bibliography of topics related to computer or cyber forensics.
From Information operations to cyber warfare and a new terrain
Where in the hierarchy of information operations does cyber warfare belong? What is the definition of information warfare, information operations, and such? In my research into cyber warfare I have found a variety of definitions and almost all of them…
Air Force to suspend all efforts toward cyber command
Reported today at NextGov.Com The Air Force on Monday suspended all efforts related to development of a program to become the dominant service in cyberspace, according to knowledgeable sources. Top Air Force officials put a halt to all activities related…
Cyber warfare: Russian and Georgian conflict
There has been a lot of hysteria and accusations thrown around in the idea that Russia is engaging in cyber warfare currently with Georgia. There are a lot of reasons to think that cyber warfare is actually occurring. It…
Cyber warfare: Examining the relationships
When considering the doctrinal documents of computer network attack (CNA), and the hierarchical relationship to information warfare there is a likelihood of misunderstanding of the concepts of cyber warfare. It is hard for somebody in academia to get traction with…
Beyond the data network: Looking at connections you might not notice
Short post to posit a what if. “What if” you could analyze the entire network infrastructure of the electric power grid, water grid, the command and control networks (cyber grid) and any other utilities to find logical and geographic connections…