This book is a work of fiction looking at the special operations forces working in Northern Vietnam, Cambodia and Laos near the end of the war. The author provides and excellent view into the fictional world of these actors with…
Computers Freedom & Privacy conference at George Washington University
I don’t get invited to cool conferences to speak. I don’t live in Washington D.C. More importantly I’m a relative nobody and that empowers me. I have nothing to lose and I can be forthright in what I say. Heck…
How to wage cyber warfare: Operationalizing the network, Part 6
So, first thing is what do we mean by operationalize? This is a big word for the principle of taking over the adversaries systems. As a key factor to conflict the desired state is to control the ability of the…
Review: Securing SCADA systems by Ronald Krutz
The author Ronald Krutz takes the reader through the various elements of cyber security as it is applied to SCADA systems. Documenting the various protocols and issues in depth the author mentions some very specific threats to cyber security that…
How to wage cyber warfare: Reconnaissance and surveillance, Part 5
Reconnaissance is often considered synonymous with footprinting of systems. The idea is to get as much knowledge about the target network as possible. One way of doing that is simple observation. One lesson we can take from the military at…
Review: Cyberpower and National Security edited by Franklin Kramer et. al.
“Cyberpower and National Security” edited by Fraklin D. Kramer, Stuart H. Starr, and Larry K. Wentz is a deep dive book into the substantive literature and ideas of the interaction between cyberspace, conflict, people, politics, and the diplomacy of deciding…
The 2009 High-density Garden Blog – Week 2
Our first update has lots of new developments! This is one of my favorites parts of growing a garden. We have sprouts, blooms and even a tomato!
The 2009 High-density Garden Blog – Week 1
In the Summer of 2008, we tried something a little different for the garden. We knew we did not want a huge garden, but I wanted a little something. We experimented with three hanging planters for tomatoes. The planters came…
The Web 2.0 Bomb
It slices, dices, mixes, mashes, julienne fries, stirs and when you’re done lights venture capital cash on fire while creating social earthquakes. It is Web 2.0 the term used to describe social media. The new best thing in tech, half…
Spring 2009 Commencement
My address if I was asked to give one to my graduates. Today each graduate steps from the halls of academia into the world around them. Unlike other school commencements many of you have already been living in the world,…
How to wage cyber warfare: The technology and structure, Part 4
There are some basic components that are needed by any military so that they can succeed. The military force is required to have the appropriate technology to create an advantage and the training to overcome any adversaries corresponding advantage. The…
How to wage cyber warfare: Puzzle pieces, Part 3
Cyber warfare claimed by many is done by none. Most of the stuff identified as cyber warfare and security we see is actually defensive in nature. If we actually secured our computing systems a lot of the risks of damage…
Tourney of home offices: A minor contribution
I’ve been tagged in the tourney of home offices by my esteemed colleague Shane. This little round robin was set up by the infamous Zenpundit. I thought about cleaning it all up before I snapped some pictures but that wouldn’t…
How to wage cyber warfare: Barriers to entry, Part 2
There are large numbers of people who are all for the new thing called cyber warfare. Whether you are interested in waging cyber warfare for a nation state or are considering a corporate company on company engagement the realities are…
How to wage cyber warfare: A primer, Part 1
Cyber warfare is fought on a cyber space terrain. The terrain is made up of the communication components of the global spanning information grid. Consider all of the interconnected equipment, components, people, processes, procedures, and other elements that allow for…