All answers to questions should be in your own words. Do not copy the entire text of questions into you answer sheet. This is an essay exam meant to be completed over a period of approximately 5 hours. DO NOT…
Intelligence, information, and other cybery thoughts
If we look at the basic precepts of what we mean by cyber warfare and conflict it is that we create a political effect upon an adversary where they either do something or stop doing something. That word cyber crops…
Motorcycle Monday
Motorcycle Monday
Cyber Forensics of mobile and embedded devices: Midterm Exam
All answers to questions should be in your own words. Do not copy the entire text of questions into you answer sheet. This is an essay exam meant to be completed over a period of approximately 5 hours. It will…
Motorcycle Monday
This gallery contains 1 photo →
2013 DerbyCon Friday Notes
The keynote opened with a we are family theme. I wasn’t quite sure if being welcomed into the family would require taking a name suffix based on a body part. You know something like sam “the thumb”. The chief scientist…
Hackers, crackers, soldiers, sailors, software, hardware, money and fun
In the past few years we have gone from nation-state dominance of the cyber realm, to the idea of non-state actors, and now with the Snowden leaks we are moving back towards realization of state actor preeminence. The rules of…
Purdue and the College of Technology Polytechnic Initiative
I’ve been asked quite a few times what I think about the big plan of the university to transition the College of Technology at Purdue to a Polytechnic Institute. The questions are what happens to the faculty, what happens to…
Motorcycle Monday
This gallery contains 1 photo →
Abstract: Cyber, cyber, cyber, cyber
Like a spy novel starting out, “On a dark and stormy night”, and ending with everybody dead, research into cyber warfare and transnational conflict is filled with over used clichés and the hype of a summer blockbuster movie. The concepts…
Motorcycle Monday
The chaotic dance of anarchy in the data center
I’ve talked in the past about the concept of a short vision horizon. When you’re walking, running, riding a motorcycle, or planning enterprise security the shorter the distance you’re looking the more trouble you might get into. When you are…
One device to rule them all
Motorola quietly killed off the Atrix laptop, entertainment, phone concept that they were building. There are a few reasons they may have had difficulty, but I strongly suggest they were off the mark only a little. The content and communication…
Research Note: Strategic, operational, and tactical cyber intelligence
Some notes on operational level of war as it can be applied to cyber intelligence processes. As a factor in the process of conflict the inteligence gathering process is harder for some to understand in the context of cyber, and…