So each year I have a set of predictions that I put forward. I started back in 2007, skipped a few years formalizing the process, but did so again last year. This year I have a few counter group think…
The collision of small wars and cyber wars is not a wikileaked Internet
What is cyber warfare? The term sent around the Internet like some kind of rhetorical catch all for computing abuse is nearing on useless. There are concepts that are inclusive of cyber warfare and what it likely means. If we…
Cyber Fugue
There is a desire by a constituency to promote solutions to problems that they are uniquely suited to solving. If asked about how to clean up air pollution a mechanic will likely tell you to tune up your car and…
Suggested Research Study: The resiliency debt
In “The Nine Nations of North America” by Joel Garreau his basic principles for what was in 1981 a radical notion and then became more mainstream was floated on a simple idea. There was no major sociological or political science…
Wikileaks: Admirals in armchairs not realizing they are in fifth generation war
Admiral Mullen (Joint Chiefs of Staff) tweeted “Meant what I said: Mr. Assange & his source might already have on their hands the blood of our troops or that of our Afghan partners.” I have some issues with this comment.…
Herosourcing: Sorcery of the future, malignancy of the present
This quick quip is a simple mark in the sand for a new principle of software development and information technology implementation. Herosourcing unlike outsourcing often is an unintended consequence, but it can be a planned obsolesence practice.
The Handbook of 5GW (Kindle Edition)
I have a chapter in a new book out. The Kindle edition was just released and the print edition will soon be released. With a bevy of top authors and edited by Dan Abbott this book is one of the…
Information theory: Is the light on or off
The following is a little thought experiment. It is not meant to answer any questions but to examine capabilities of cyber warfare from a metaphorical position (perhaps open). Using the principles of Schrodinger’s Cat (is the cat alive or dead)…
Information security: The leaky bucket theory of information flows
There is a lot of talk in the federal government about how hard/expensive it is to have good information security. That narrative is also part of the cyber warfare discussion currently seeking rampant funding. When the political machine finds a…
Cyber war myths: Other things nobody cares about
Cyber warfare is just like…. Pick your poison or bias. Heck pick strategic air warfare, pick some nuclear disarmament, get yourself some armor strategies. Talk about the Maginot line like it is actually a meaningful strategy in a networked world.…
Is the Apple eco-system an ethical technology solution
The information technology sphere of solutions is filled with advocates, fans, and outright addicts. Whether the solutions choices are segregated by closed source and open source the debate continues. The lion-share of end-point (laptop, desktop) solution market belongs to Microsoft…
An APA5 Outline (How To)
When writing papers it is sometimes a good idea to know the structure of what you are writing before you start. The American Psychological Association 5th edition is the current requirement for classes on citation and style. There are a…
The curious case of the Chinese Goooogling
When does the act of a nation state take on the specter of war? Consider if you will that at some point a transgression most assuredly has the emotional and physical manifestations of war. The Japanese attack against United States…
Review: Computer Capers by Thomas Whiteside
I’ve wanted for some time to increase the number of book reviews I publish and to get them up a little faster. I’ve been re-reading a bunch of my computer security books and the review for today is Computer Capers:…
Prognostications for 2010: The phoenix of predictions
Back in 2007 I made some pretty significant predictions. I would like to say that making predictions is not nearly as hard as you would think. The way technology is adapted is pretty straight forward. So to recap this is…