Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the...
Sam
The following graphic at the bottom of this page is a visualization of the impact of cyber...
Much in the same way as I’ve discussed the principle of science fiction informing us about information...
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine...
The week opened up with more discussion about computer incursions in South Korea. It was also interesting...
The following graphic is a method of expressing a few very basic concepts in information assurance and...
The following graphic is a synopsis of the cyber policy statements from the National Security Strategy (2010),...
This week seemed to have some interesting themes. I do think it is interesting that the one...
Recently Jeff Carr wrote a short piece on his blog (Blogspot so no access from DoD) talking...
In trying to answer a question that nobody has I’m working on an analysis of cyber warfare...
The week started pretty much as we would expect with more discussion of the 24k files lost...
The following is purely fictional and speculation and to long to really read. It does not represent...
The week started out kind of interesting with more information about the Department of Energy labs that...