When considering the doctrinal documents of computer network attack (CNA), and the hierarchical relationship to information warfare there is a likelihood of misunderstanding of the concepts of cyber warfare. It is hard for somebody in academia to get traction with…
Beyond the data network: Looking at connections you might not notice
Short post to posit a what if. “What if” you could analyze the entire network infrastructure of the electric power grid, water grid, the command and control networks (cyber grid) and any other utilities to find logical and geographic connections…
Our Crumbling Infrastructure: How the Aging of America’s Infrastructure is a Homeland Security Concern
Abstract Americans are an automotive nation. We celebrate our cars and we revel in the freedom of the open road. Much of this car culture is due to our extensive network of interstate highways and bridges that cris-cross the nation…
Asymmetric warfare: A research agenda looking at epistemological based or not
Introduction There is an almost injudicious love of science by the military academic community. Within the deep reaches of the Pentagon and the service schools and academies there is an intellectual reach and lust for the trapping of academia. I…
Lessons in writing: Tools, techniques, methods for writing
There are a lot of writing tools, methods, books, and in general help on the Internet. The Online Writing Laboratory at Purdue is linked to by many schools as it so helpful. But, this little post isn’t about that. It…
A response to the DARPA national cyber range BAA
Introduction If you are going to make war you should practice war. No Marine traverses the line of departure without spending quality time at the rifle range. No Army tanker enters the theater of battle without spending time with a…
Air force cyberspace symposia: Loose ends in cyber space
The definition of cyber space came up again as a primary topic at the United States Air Force Cyberspace symposia at Maxwell Air Force Base. The Air University has a strict non attribution policy so all comments that follow are…
Cyberspace a terrain: Weaponization of the global grid
In a discussion with a senior official of the Air Force he made an off hand comment that perhaps the day that an individual non-state actor working independently could use cyber means to injure a nation-state has passed. According to…
Creating appropriate fear and respect within information assurance and security courses
Abstract – The requisite behaviors of fear and respect in dealing with information assurance and security topics building towards a professional or subject matter expert is highly valued. Creating situational and security awareness is an important behavior modification. Specifically the…
The Socratic compass: Giving students directions not answers
I was recently told that there was no place in the world of the academy, in the University, for the Socratic philosophizing of grey haired intellectuals. There is no room in a curriculum filled and brimming with Bloom learning objectives,…
House committee moves to censor and circumscribe representative to constituent communcation
United States Government House of Representative seeks to close, restrict, and disenfranchise the American public access to their representatives. In a move that blatantly exposes the absolute totalitarian nature that American agencies are willing to use in efforts to shut…
On criticism of “Violence: A micro-sociological theory by Randall Collins”
Abstract Randall Collins in “Violence” makes the tragic mistake of relying heavily on S.L.A. Marshall and the many scholars of Marshall. The interviewing technique of S.L.A. Marshall and the evidence he collected was not without criticism or challenge. The soldiers…
What are the tactical and strategic implications of an economic downturn/recession/depression?
If you were a general sitting in the Pentagon it is doubtful you would be concerned about refugees from the largest economic destabilization in recent history, the substantial number of people who are homeless from a foreclosure “market”, and the…
The Internets meets its match in search of a hitch
So, I’m a reasonable individual. I make fair money, I live a great life, my family is healthy, and my community is filled with good people. I am a socially sophisticated, highly trained, wired, enabled, savvy, powerful, user of the…
Cyber Warfare as Low Intensity Conflict
Click on image to get a larger version.