Introduction If you are going to make war you should practice war. No Marine traverses the line of departure without spending quality time at the rifle range. No Army tanker enters the theater of battle without spending time with a…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Air force cyberspace symposia: Loose ends in cyber space
The definition of cyber space came up again as a primary topic at the United States Air Force Cyberspace symposia at Maxwell Air Force Base. The Air University has a strict non attribution policy so all comments that follow are…
Cyberspace a terrain: Weaponization of the global grid
In a discussion with a senior official of the Air Force he made an off hand comment that perhaps the day that an individual non-state actor working independently could use cyber means to injure a nation-state has passed. According to…
Creating appropriate fear and respect within information assurance and security courses
Abstract – The requisite behaviors of fear and respect in dealing with information assurance and security topics building towards a professional or subject matter expert is highly valued. Creating situational and security awareness is an important behavior modification. Specifically the…
Cyber Warfare as Low Intensity Conflict
Click on image to get a larger version.
All I really want is recurring tasks in iCal…
Seriously. I love my Mac. I am happy with Apple Mail and Address Book. I like the ability to publish calendars in iCal. But no recurring tasks? A little background would be helpful. I have been using PCs since the…
A jailbroken iPhone can be a very powerful weapon in the hands of an attacker: Smart phones can become an attacker’s most camoflashed weapon
Guest blogger Alejandro Chavez looks at the different ways a common popular cell phone can easily be modified to become a hidden method of attacking networks. Mr. Chavez is a student at Purdue University Calumet and we thank him for…
Cyber Warfare: Cyber Warfare and Cyber Terrorism, a growing threat?
Guest blogger Anthony Marszalek discusses in depth some of the concerns with cyber warfare and the ideas on how it exists (if it exists). He also discusses cyber terrorism and tries to make a distinction between the two. Mr. Marszalek…
Is Cyber Terrorism Fact or Fiction?
Guest blogger Aron Okichich Brings up a hot topic to information technology and conflict awareness. As a student at Purdue University Calumet we thank him for allowing us to post his work here. You can download a PDF of his…
America at five (or more) dollars a gallon: Well on our way to a paradigm shift in services and society
Where will America be when gasoline prices continue to rise, and the transportation costs of goods and people become exponentially bigger than expected? North America is roughly twice the size (42 million Km^2) of Europe (10 million Km^2) but has…
What does it means when the military moves from defense to offense on the Internet?
The Internet is both the terrain and the tool in the future of cyber warfare. As we look at the use of the Internet to support hostile actions against government and military targets the classic asymmetric conflict is rising in…
May 21 News on Cyber Warfare (Special: USAF Cyber Command)
Todays news includes information on the new cyber command for the United States Air Force. Over the next month I will be running these as the Air Force Cyber Command comes to fruition. As a side note in the article…
Some thoughts on the idea of “Cyber Range”
To recreate the Internet in a safe and sane environment that could realistically recreate the chaos of the Internet is a big issue. Some of the early design issues: 1) The Internet is inherently dynamic most designed systems are relatively…
The IED’s of Cyber-warfare
I am concerned that policy and the legislative agenda is making basic assumptions about the relationship of information assurance and security and cyber-warfare that may not be accurate. Some of the issues are illuminated when government and corporate information security…
Why students of small wars should care about cyber-warfare
We define forms of military conflict sometimes by the terrain on which it is fought. Whether the terrain be land warfare, naval warfare, or air warfare the terrain determines the scope and strategies. Low intensity conflict can be defined by…