Consider the information technology and security environment. Since 1999 and late 2000 the economic engine of the information age has eroded until in 2008 the stock market plunged. The market since then really hasn’t recovered. Sure the points go up…
The vegetarian recipes experiment
I have been trying out a number of vegetarian recipes from a number of sources. My favorite sources so far are the Whole Foods Market recipes (http://www.wholefoodsmarket.com/recipes/) and Vegan YumYum (http://veganyumyum.com/). I am trying to avoid a heavy reliance on…
Draft: Evaluation of incidents in cyber conflict [Graphic]
The following graphic at the bottom of this page is a visualization of the impact of cyber incidents that is a work in progress. There seems to be fairly substantial interest in the contents of my little black book of…
This week in cyber conflict: August 8th – August 12th
Much in the same way as I’ve discussed the principle of science fiction informing us about information assurance and security it appears a researcher at DefCon talked along a similar thread. I do think rather than Die Hard a better…
US Department of Defense Cyber Strategies [Graphic]
Another work in progress. Starting to track cyber strategies and their hierarchy. Lots of strategies and doctrine mention cyber so they’ll end up on here too. There are law enforcement strategies that will need to be added like the “Transnational…
My Journey to vegetarian
First, this is NOT about cyber warfare and contrary to popular belief the Selil website has never been about just what we do at work. This website is our endeavor to share with others our life. I am currently transitioning…
This week in cyber conflict: August 1st – August 5th
The week opened up with more discussion about computer incursions in South Korea. It was also interesting to see another despot led country to be tied to cyber attacks. The thread of aligning countries like Myanmar to cyber attacks is…
[Updated] The cost of securing systems a work in progress
The following graphic is a method of expressing a few very basic concepts in information assurance and security. It is backed up by some statistics but I’m not going to try and justify what is hand drawn. Another project that…
Cyber Dime
The following graphic is a synopsis of the cyber policy statements from the National Security Strategy (2010), The National Defense Strategy (2008), The National Military Strategy (2011), the Department of Defense Strategy for Operating in Cyberspace (2011) and the Department…
This week in cyber conflict: July 25th – July 29th
This week seemed to have some interesting themes. I do think it is interesting that the one theme that has been missing is on how the federal government looming default has not been considered by the pundits as a cyber…
Draft: The myth of cyber space as a man made domain
Recently Jeff Carr wrote a short piece on his blog (Blogspot so no access from DoD) talking about why cyber space in the web 3.0 world really is far from the foundations held by the Department of Defense who states…
Draft Example: Cyber warfare researcher matrix
In trying to answer a question that nobody has I’m working on an analysis of cyber warfare researchers and their particular influences and directions for what they are researching. Basically creating a grid with the “y” axis being social(ology) to…
This week in cyber conflict: July 18th – July 22nd
The week started pretty much as we would expect with more discussion of the 24k files lost by the Department of Defense as disclosed by the Deputy Secretary Defense William Lynn in the previous week. The loss of classified information…
Fiction: After the debt ceiling
The following is purely fictional and speculation and to long to really read. It does not represent anything other than an attempt to use one pattern to identify a future pattern in a totally different set of situations. That means…