A pretty simple project I’m working on is concept mapping domains. This is a reductionist effort (so...
Sam
The current pseudo intellectualism surrounding all things-designated cyber is appalling in the entirety of lack of understanding...
The early part of the week was a little slower than normal with not a lot of...
I’m in Germany to speak at the Marshall Center tomorrow, and I’m going to be talking about...
Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the...
The following graphic at the bottom of this page is a visualization of the impact of cyber...
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine...
The following graphic is a method of expressing a few very basic concepts in information assurance and...
The following graphic is a synopsis of the cyber policy statements from the National Security Strategy (2010),...
Recently, Jeff Carr wrote a short piece on his blog (Blogspot so no access from DoD) talking...
In trying to answer a question that nobody has I’m working on an analysis of cyber warfare...
The following is purely fictional and speculation and to long to really read. It does not represent...
RAND recently released the Counterinsurgency Scorecard: Afghanistan in early 2011 relative to the insurgencies of the past...