Author: Sam
Cyber warfare: Examining the relationships
When considering the doctrinal documents of computer network attack (CNA), and the hierarchical relationship to information warfare there is a likelihood of misunderstanding of the [Read More…]
Beyond the data network: Looking at connections you might not notice
Short post to posit a what if. “What if” you could analyze the entire network infrastructure of the electric power grid, water grid, the command [Read More…]
Creating appropriate fear and respect within information assurance and security courses
Abstract – The requisite behaviors of fear and respect in dealing with information assurance and security topics building towards a professional or subject matter expert is [Read More…]
The IED’s of Cyber-warfare
I am concerned that policy and the legislative agenda is making basic assumptions about the relationship of information assurance and security and cyber-warfare that may [Read More…]
Why students of small wars should care about cyber-warfare
We define forms of military conflict sometimes by the terrain on which it is fought. Whether the terrain be land warfare, naval warfare, or air [Read More…]
Hacking Democracy
Have you seen the HBO documentary Hacking Democracy? I watched it on Google Video a few hours ago. I have spent the intervening hours trying [Read More…]