Guest blogger Alejandro Chavez looks at the different ways a common popular cell phone can easily be modified to become a hidden method of attacking networks. Mr. Chavez is a student at Purdue University Calumet and we thank him for…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Cyber Warfare: Cyber Warfare and Cyber Terrorism, a growing threat?
Guest blogger Anthony Marszalek discusses in depth some of the concerns with cyber warfare and the ideas on how it exists (if it exists). He also discusses cyber terrorism and tries to make a distinction between the two. Mr. Marszalek…
Is Cyber Terrorism Fact or Fiction?
Guest blogger Aron Okichich Brings up a hot topic to information technology and conflict awareness. As a student at Purdue University Calumet we thank him for allowing us to post his work here. You can download a PDF of his…
America at five (or more) dollars a gallon: Well on our way to a paradigm shift in services and society
Where will America be when gasoline prices continue to rise, and the transportation costs of goods and people become exponentially bigger than expected? North America is roughly twice the size (42 million Km^2) of Europe (10 million Km^2) but has…
What does it means when the military moves from defense to offense on the Internet?
The Internet is both the terrain and the tool in the future of cyber warfare. As we look at the use of the Internet to support hostile actions against government and military targets the classic asymmetric conflict is rising in…
May 21 News on Cyber Warfare (Special: USAF Cyber Command)
Todays news includes information on the new cyber command for the United States Air Force. Over the next month I will be running these as the Air Force Cyber Command comes to fruition. As a side note in the article…
Some thoughts on the idea of “Cyber Range”
To recreate the Internet in a safe and sane environment that could realistically recreate the chaos of the Internet is a big issue. Some of the early design issues: 1) The Internet is inherently dynamic most designed systems are relatively…
The IED’s of Cyber-warfare
I am concerned that policy and the legislative agenda is making basic assumptions about the relationship of information assurance and security and cyber-warfare that may not be accurate. Some of the issues are illuminated when government and corporate information security…
Why students of small wars should care about cyber-warfare
We define forms of military conflict sometimes by the terrain on which it is fought. Whether the terrain be land warfare, naval warfare, or air warfare the terrain determines the scope and strategies. Low intensity conflict can be defined by…
Let users manage their own PC’s? BALDERDASH!
In a recent Infoworld article by Tom Sullivan it is pointed out that companies are investigating or implementing policies and procedures to allow users to manage their own information technology assets. Link to infoworld story This is of course a…
ITS 472: Phase 2 Navy Marine Corps Intranet Project
Here are the links to the presentations: Group 1 Presentation Questions DOCUMENT 6.9 MB Group 2 Presentation DOCUMENT 15.5 MB Click here to go to the final document & presentation link
Hacking a computer with a microphone
While talking with one of my students tonight I was reminded of this article. How about using a microphone to hack the key of a system? Using acoustic signature to get the encryption key and other information as a passive…
The Air Force is moving ahead with work on the cyber command
The Air Force is moving ahead with work on the cyber command (LINK). Air Force moving ahead with Cyber Command The Air Force is moving ahead on establishing its new Cyber Command, searching for permanent facilities and planning meetings to…
Future technology
The Army has embarked on a 200 billion dollar project to increase the technology that it uses and has some interesting implications. When we talk about security we often talk about defense in depth. In computers it is a series…
A mild rebuttal to John Robb’s open source warfare
“The US military is on the slow path to the realization that nation-building — from reconstruction to other forms of traditional COIN dogma that serve to return legitimacy to the government — doesn’t work. Politics and populations in our new…