A new book is out “Threats in the age of Obama” with chapters by many fine writers. The book is a look at the national security implications and issues from some outsiders and former insiders. The book has articles on…
Clausewitz, On War Book 2: The breath of war is the exhaustion of ideas
As I turn Carl Von Clausewitz over in my mind the writing of a long dead Prussian floats forward in time hopefully to inform decision about future conflict. If, as I have said, the concept that tactics and strategy are…
JOAD: Third week of league
Another great day with the kids at JOAD. Bulls eye bombers JOAD is in an interesting position with so many kids and not enough equipment. I can’t remember the last time they had more recurve shooters than they have compound…
Call for Chapters: Information Assurance and security Ethics in Complex Systems: Interdisciplinary Perspectives
Call for Chapters Chapter Proposals Due: February 20, 2009 Information Assurance and security Ethics in Complex Systems: Interdisciplinary Perspectives Melissa Jane Dark, Editor Purdue University To be published by IGI Global http://www.igi-global.com/requests/details.asp?ID=584
Disarray: The National Archery Association
After a long hiatus on writing about archery something for people to think about. I love archery. I believe it is a sport that I will be able to do long into my aged years and more importantly something I…
Clausewitz, On War, Book 1: Into a cavern to find the darkness of cyber space
Can “On War” as a book from the dustbin of history reach out and touch the technologically sophisticated future of modern warfare? Where warfare is moving from monumental armies into a post nuclear age of niggling little conflicts is a…
From “Yes we can”, to “No you can’t” a president and his Blackberry
The 44th president of the United States while not a technologist is an avid user of technology. Though considered by many to be addictive the reality is a Blackberry represents the open flow of information and is the spirit of…
Generation warfare a cohesive explanatory model
When considering the variable methods of depicting a model it sometimes is not so obvious what will happen when that model is expanded to take on newer and more distinct concepts. I started with a basic two dimensional model that…
Gathering dimensions of conflict into a unified model
When considering the generation warfare model as a tool of categorizing the types or scopes of conflict a few things are exposed rather rapidly. At ComingAnarchy.Com Younghusband identifies several of the same issues I did in attempting to bring the discussion…
Anti-forensics: Obfuscating the path to forensic examination
What can a user do that will obscure the path to analysis of a computer system so that minimal to no digital information may remain to be examined in a forensically sound method? What are the tools and methods to…
A unified generational warfare theorem: Introduction to basic argument and concepts
The idea of nation state conflict and conflict of ideology becomes a descriptive problem when looking at the scope of history. How best to describe the antecedent conflicts and the methods utilized? A focus of the military establishment has been…
The government bubble and the short vision horizon
There was the .com bubble; there was the correction due to terrorism. There have been myriad fiascos and financial hooliganism on Wall Street. Some would say this is the eventual end of a super debt cycle started after World War…
Social networks, events, entities, actors, actions
There is a fairly substantial body of work that looks at the difference between hierarchical organized groups and network organized groups. The relative merits of each argument fall into a few camps. The hierarchical organization allows for direction of action…
A round table to bring ideas forward: The Chicagoboyz examine Clausewitz
The Chicagoboyz are hosting the round table I’m looking forward to the adventure of bouncing some ideas off them. For the purposes of the round table I will be posting at Chicagoboys. I will post an abstract here and link to the Chicagoboyz post. The chancellor…
Commentary and refutation: CSIS & Securing cyberspace for the 44th presidency
The Center for Strategic and International Studies (CSIS) recently released a report titled “Securing Cyberspace for the 44th Presidency: A report of the CSIS commission on cybersecurity for the 44th presidency”. This report is an in depth look at policy…