As part of the experiential learning process students work is posted for comment. The students of the assured systems and design course have completed a document that is a comprehensive look at cyber response and counter measures. Feedback in the comments…
Threats in the Age of Obama: 100 days into a presidency
I wrote a chapter for a book called “Threats in the age of Obama” that was edited by Michael Tanji and there were many superior authors included Dan tdaxp, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek, Christopher Corpora, Shane…
Tech meme: Twitter Users
Twitter users with a bazillion followers are hubs. Twitter users who are retweeted a lot are routers. Twitter users with low follower to following ratios are firewalls. Twitter users who have wildly divergent follower communities are bridges. Twitter users who…
2009 Easter Dinner
Happy Zombie Day!!!!!
Yet another cyber treatise
With the impending release of the 60 day cyber review and myriad conferences to cover cyber security I wish to put a stick in the ground and make a pronouncement about cyber security, information assurance and security and anybody who…
Cybersecurity Act of 2009: A-tisket a-tasket all our eggs in one basket
The blogosphere is alight with discussion over section 18 “Cybersecurity responsibilities and authority” of the draft Cybersecurity Act 2009. The key phrase that has multiple organizations in a dither is located on page 44 and states “…The President… (2) may…
The Cybersecurity Act of 2009: Trying to create order from chaos
The cyber arena is filled with the effluvia of vendor driven agendas and political wrangling for budgetary dollars. As a topic cyber security is especially vulnerable as the waning leadership and expertise is so centralized in so few individuals that…
Battlestar Galactica: A fictional view of cyber warfare and technological conflict
As the television show Battlestar Galactica completes its final season I thought it might be interesting to look back on the opening of the show to those first few episodes. I have discussed in the past how science fiction can…
Into the darkness of cyber warfare
I have been reading extensively about whether cyber warfare exists, whether it is a defensive only engagement, and if it does exist does it actually involve combat. These questions are born upon the back of the military establishment well entrenched…
Thoughts on the Quadrennial Roles and Missions Review report (January 2009)
The Quadrennial roles and mission review report is from the Department of Defense (DOD) to congress and highlights key aspects of the core mission areas and competencies of the military. The documents as written also includes a section on roles and…
Utility processing infrastructure
This is a working paper identifying various technologies, and providing a set of requirements for a research problem. When dealing with Beowulf clusters and other scientific type processing clusters one problem is that they require extensive programming of applications to use…
Maxwells hammer: Ringing up a denial of service against their own users
The United States Air Force shut off the Internet connection for Maxwell Air Force Base, the home of the Air War College. Across the Internet security experts have been applauding this effort as a method of holding the institutions at…
Clausewitz, On War Book 3: A consideration of cyber strategy
Our long dead Prussian friend understood that tactics change with time and technology, and that strategies remain similar even if the metaphors change. When he tells us that strength of will is more to make a change in strategy versus…
University systems at a crossroads: Furloughs and funding of futures and fantasies
As the nation comes to grips with what is likely another great depression. Regardless of categories or quantities it is THE worst recession since the great depression. As the nation attempts to consider the ramifications of double-digit unemployment (I know…
Evil Google: What you don’t know just might hurt you
A common refrain of the uninformed is that I have nothing to hide so therefore I don’t care who peeks through my window. Until the power balance of the country or community changes and when political views are no longer…