There was a study done recently that came to the conclusion that healthy eating is a privilege...
Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the...
I have been trying out a number of vegetarian recipes from a number of sources. My favorite...
The following graphic at the bottom of this page is a visualization of the impact of cyber...
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine...
First, this is NOT about cyber warfare and contrary to popular belief the Selil website has never...
The following graphic is a method of expressing a few very basic concepts in information assurance and...
The following graphic is a synopsis of the cyber policy statements from the National Security Strategy (2010),...
Recently, Jeff Carr wrote a short piece on his blog (Blogspot so no access from DoD) talking...
In trying to answer a question that nobody has I’m working on an analysis of cyber warfare...
The following is purely fictional and speculation and to long to really read. It does not represent...
RAND recently released the Counterinsurgency Scorecard: Afghanistan in early 2011 relative to the insurgencies of the past...
If I am a major corporation and I feel I may be a target, or know that...