A common refrain of the uninformed is that I have nothing to hide so therefore I don’t care who peeks through my window. Until the power balance of the country or community changes and when political views are no longer…
February 3rd Snow Event (updated)
Lake effect snow has struck Northwest Indiana again. Here in Porter Country we’ve received around six inches of snow since noon (it is now 2PM). As the snow continues to fall it just gets deeper and deeper. We had a…
Deeper into the terrain: Cyber warfare and cyber space
When considering the terrain of cyber space we have a tendency to make that terrain as limited as possible. Most people equate the Internet to the world wide web. The world wide web though is a much smaller entity than…
National Archery Association: Increasing barriers to coaches entry
Ginger Hopwood recently offered to intercede for archery coaches into the continuing roll out of new processes, procedures, and expectations of coaches. This is a response to that kind and warm hearted offer by a respected high level, senior, archery…
Book: Threats in the age of Obama
A new book is out “Threats in the age of Obama” with chapters by many fine writers. The book is a look at the national security implications and issues from some outsiders and former insiders. The book has articles on…
Clausewitz, On War Book 2: The breath of war is the exhaustion of ideas
As I turn Carl Von Clausewitz over in my mind the writing of a long dead Prussian floats forward in time hopefully to inform decision about future conflict. If, as I have said, the concept that tactics and strategy are…
JOAD: Third week of league
Another great day with the kids at JOAD. Bulls eye bombers JOAD is in an interesting position with so many kids and not enough equipment. I can’t remember the last time they had more recurve shooters than they have compound…
Call for Chapters: Information Assurance and security Ethics in Complex Systems: Interdisciplinary Perspectives
Call for Chapters Chapter Proposals Due: February 20, 2009 Information Assurance and security Ethics in Complex Systems: Interdisciplinary Perspectives Melissa Jane Dark, Editor Purdue University To be published by IGI Global http://www.igi-global.com/requests/details.asp?ID=584
Disarray: The National Archery Association
After a long hiatus on writing about archery something for people to think about. I love archery. I believe it is a sport that I will be able to do long into my aged years and more importantly something I…
Clausewitz, On War, Book 1: Into a cavern to find the darkness of cyber space
Can “On War” as a book from the dustbin of history reach out and touch the technologically sophisticated future of modern warfare? Where warfare is moving from monumental armies into a post nuclear age of niggling little conflicts is a…
From “Yes we can”, to “No you can’t” a president and his Blackberry
The 44th president of the United States while not a technologist is an avid user of technology. Though considered by many to be addictive the reality is a Blackberry represents the open flow of information and is the spirit of…
Generation warfare a cohesive explanatory model
When considering the variable methods of depicting a model it sometimes is not so obvious what will happen when that model is expanded to take on newer and more distinct concepts. I started with a basic two dimensional model that…
Gathering dimensions of conflict into a unified model
When considering the generation warfare model as a tool of categorizing the types or scopes of conflict a few things are exposed rather rapidly. At ComingAnarchy.Com Younghusband identifies several of the same issues I did in attempting to bring the discussion…
Anti-forensics: Obfuscating the path to forensic examination
What can a user do that will obscure the path to analysis of a computer system so that minimal to no digital information may remain to be examined in a forensically sound method? What are the tools and methods to…
A unified generational warfare theorem: Introduction to basic argument and concepts
The idea of nation state conflict and conflict of ideology becomes a descriptive problem when looking at the scope of history. How best to describe the antecedent conflicts and the methods utilized? A focus of the military establishment has been…