The following is a little thought experiment. It is not meant to answer any questions but to examine capabilities of cyber warfare from a metaphorical position (perhaps open). Using the principles of Schrodinger’s Cat (is the cat alive or dead)…
Information security: The leaky bucket theory of information flows
There is a lot of talk in the federal government about how hard/expensive it is to have good information security. That narrative is also part of the cyber warfare discussion currently seeking rampant funding. When the political machine finds a…
Cyber war myths: Other things nobody cares about
Cyber warfare is just like…. Pick your poison or bias. Heck pick strategic air warfare, pick some nuclear disarmament, get yourself some armor strategies. Talk about the Maginot line like it is actually a meaningful strategy in a networked world.…
Is the Apple eco-system an ethical technology solution
The information technology sphere of solutions is filled with advocates, fans, and outright addicts. Whether the solutions choices are segregated by closed source and open source the debate continues. The lion-share of end-point (laptop, desktop) solution market belongs to Microsoft…
An APA5 Outline (How To)
When writing papers it is sometimes a good idea to know the structure of what you are writing before you start. The American Psychological Association 5th edition is the current requirement for classes on citation and style. There are a…
The curious case of the Chinese Goooogling
When does the act of a nation state take on the specter of war? Consider if you will that at some point a transgression most assuredly has the emotional and physical manifestations of war. The Japanese attack against United States…
Review: Computer Capers by Thomas Whiteside
I’ve wanted for some time to increase the number of book reviews I publish and to get them up a little faster. I’ve been re-reading a bunch of my computer security books and the review for today is Computer Capers:…
Prognostications for 2010: The phoenix of predictions
Back in 2007 I made some pretty significant predictions. I would like to say that making predictions is not nearly as hard as you would think. The way technology is adapted is pretty straight forward. So to recap this is…
North West Indiana: Ice Storm December 2009
Here are some pictures from last night. The snow that fell was soon covered by a half inch of ice. That left areas like the park looking like an ice-rink. To say the footing and driving is treacherous would be…
Cloud Computing: Presentation by students
The students of ITS 470 Large Scale High Performance Systems created a cloud operating system. This presentation will give you a good over view of the topic. I won’t comment on the student with the horrible British accent. I won’t…
Cloud computing: An open source networked operating system
Cloud computing is a developing section of high performance computing. High performance computing includes many facets such as availability, processing, and reliability. In this project the facet of reliability is examined. Increasing the number of machines is one way to…
Cyber warfare: The academic community
The world of academia like any of the communities we have discussed is far from a cohesive mixture of opinions. The balance of the academic world is split between the large research universities, the regional public or private universities, and…
Cyber warfare: The corporate community
What does the corporate world bring to cyber warfare? I asked this question in a conference setting surrounded by military types and to stunned amazement listened to twenty minutes of how the corporate world has no place in cyber warfare.…
Cyber warfare: The intelligence community
It was a dark and stormy night. In the darkness so deep that hearts shrink from fear and apathy. The bright star of hope rose slowly and emblazoned on the star were the letters C-I-A. Oh, wait. That was swamp…
Cyber warfare: The military community
The military has been an active, interested, busy, and pretty much clueless newbie to the art and practice of cyber warfare. Recently I was told, “You don’t know what we don’t know behind the top secret doors of the Pentagon”.…