The following are all from the very excellent book on high tech crime written in the late 1970s. I reviewed this book awhile back. Whiteside, Thomas, “Computer Capers: Tales of electronic thievery, embezzlement, and fraud”, Thomas Y. Crowel, New York,…
2014 Iron Butt Association Pizza Party (couple a pics)
This gallery contains 16 photos →
You shouldn’t read this post on Russia and the rest of the world
First off, I am not an expert on Russia or even a political scientist. In the first case, I do not care and in the second, I prefer to be relevant. This treatise is independent of the current conflict other…
Conference Submissions and Presentations made more effective with 10 quick tips
Strongly suggested viewing for students and professionals that are going to be doing presentations. Matthew McCullough walks you through a 10 step program of doing a presentation.
Why should the United States engage in protection of the Ukraine?
I ask the why question a lot. Partly it is because I’m a scientist of sorts, but mostly it is an artifact of having taught strategic assessment at the National Defense University where I had a few processes hammered into…
Cybersecurity and Incident Response Laboratory (CIRL) Proposal
The following is an example of a proposal I wrote to bring enhanced information assurance and security education to the College of Technology. Though the proposal never went forward I thought it might be interesting for others to read. There…
Cyber
Cyber is a technology mediated domain of human and systems interactions. Where: Human <-> Human Human <-> System System <-> System Human being biological entity as sender, receiver, sensor, perceiver. System being a technology as sender, receiver, sensor, perceiver. Why…
Concept map looking at nation state ICT capabilities
This gallery contains 1 photo →
Motorcycle Monday
2/5 Purdue, My Classes Canceled
For courses on Wednesday 2/5 I will NOT be having class. All courses on Purdue campus are cancelled at this point until 1PM. I will NOT be holding office hours today. We will reschedule the laboratory for today. Do the…
Knowledge assessment before coffee
I get asked because I have a degree what I know. I get challenged because I have an advanced degree if it is worthwhile. The first question is an assumption of inventory. The second is a biased question with a…
Prognostication: How to identify the next super power
In my class I told my students this simple test. With each successive significant change in power structure of geo-politics there were associated technologies. I like to think about exploitative technologies rather than destructive, but I digress. My test for…
Uh oh!
This gallery contains 1 photo →
Motorcycle Monday
This gallery contains 1 photo →
Cyber forensics of mobile and embedded devices CNIT 58100 CFM
Course Description: Consumer technologies are rapidly moving forward with items integrating processing, storage, and transmission into their base functionality. The enterprise issues with bring your own device has rapidly expanded requirements on forensics investigators to address a plethora of mobile…