Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels...
Cyber Conflict
State on State conflict using a variety of assets within and outside of cyberspace to create specific effects as a form of projection of power.
Lots of snark talk from the military types out there. I understand it, but don’t have to...
There are no absolutes including the absence of absolutes. As such any discussion of adversary sophistication is...
Abstract: The United States military is currently one of the most powerful forces on the face of...
There are three forms of attribution: 1) Political attribution based on the actors motives and goals. 2)...
I am concerned about how this discussion has evolved, and it is influenced heavily by political and...
I’ve been watching the response to Adam Elkus recitation of issues of blogging on grand strategy. I...
Introduction There exists an area of undiscovered value within the intersection of information assurance and security, standardized...
After DefCon this year and CarShark last year I don’t know if there is any interest in...
If we look at the basic precepts of what we mean by cyber warfare and conflict it...
In the past few years we have gone from nation-state dominance of the cyber realm, to the...
ICCWS 2014 is an opportunity for academics, practitioners and consultants from around the world who are involved...
Where I get interviewed by the Loopcast! Data, Forensics, and the Use of Cyberweapons | The...
There is a reason the first mass media movie on cyber warfare has the computer WOPR playing...
These are some articles I’ve written on the topic. Liles, S., “ A unified generational warfare model”,...