First you have to understand that information security simply is not a priority in American society. I think this is not a technical or ideological issue. It is a question of assumption of resources and risks. Using Gartners numbers you’re…
Attention Shoppers! We have a lost adult on aisle 9…
I have come to realize in the past few weeks that I really like having a routine. I also like my grocery stores to be part of that routine. And I am a little lost without that routine. While I…
TIMN conceptual mapping
This is an early effort to start mapping the relationships of TIMN by David Ronfeldt. This is also my first attempt at crowd sourcing a solution to a problem. T+I+M+N relates to the concepts of how humans organize themselves. I…
Spaghetti Squash with Fire Roasted Marinara and Zucchini
It has been a while since I have posted. Life has this way of challenging even the best plans. Starting in July, our family did most of our eating out – as in Mom is not cooking, mostly because the…
Ancient stories of motorcycles past
This is what happens when you ride a KLT1200C on the Playa in Gerlach at high speeds. It takes a little playa home.
LinkedIN profile is toast….
I did away with another social media service. Buh bye LinkedIn. Why? In the what is becoming an old adage, if you aren’t paying for the product you are the product, I couldn’t figure out what LinkedIn was giving me.…
It’s time
to buy a motorcycle again… That’s all
NDU 2012 Fall Convocation
Via livestream we can watch the commencement ceremony at the National Defense University. Major General Martin the President of NDU is the commencement speaker which is kind of different. There usually is a combatant commander who comes to speak. There…
Incoming rounds and short artillery: I’m outta here
In February I wrote a piece here on my blog discussing the current woes of the joint professional military education environment and the pending drastic cuts. I was discussing how it effects me, but there is a much larger set…
Storage, transmission, and processing as basis for cyber forensics
We should call it cyber forensics rather than digital or computer forensics. Why? There are three states we find information in within the current technology paradigm; storage; transmission; or processing. Regardless of the mechanism of storage, transmission or processing a…
The hegemony of bureacracy
Hegemony – the political dominance of one state over another Bureaucracy – An unelected government organization that makes rules, laws, and policy What we have growing in the arena of cyber policy is a hegemonic bureaucracy filled with all of…
Turning out the lights on purpose
Watching the tensions of response and resiliency pulled and prodded by the concepts of conflict and conflagration you might be right to think nobody has a clue what would happen in a war where cyber is a large component. On…
Generations of cyber weapons
The discussion of the concept of cyber warfare weapons jumps between a few threads that make them harder to understand than really is needed. One of the conceptual problems is that there are types or generations of cyber weapons and…
The cyber force matrix
There has been a lot of ink spilled on the idea of nation-state activities in cyber space and much of that discussion has been centered on military activities in the domain. Though interesting this misses the concept that a nation…
Banana Bread
I love to cook. My family loves to eat what I cook. I have a tendency to “improve recipes as I go. I often make notes on cookbook pages to document my changes as you can see in the photo.…