An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.
With every sector of the economy, every element of critical infrastructure and every component of government now dependent on IT and software, clearly software has eaten the world.
The United States is currently years behind its rivals in cyberspace, both conceptually and operationally.
Remember the July 2008 Atlantic Article by Nicolas Carr titled “Is Google Making Us Stupid?” Turns out that article was very prescient in its observations that we are relying more and more on Google for our research and less on gained or retained knowledge. As a kid, I used to
Lessons learned from US agents who operate in enemy territory have been captured for years and transformed into a code of conduct popularly known as “Moscow Rules.” Those old rules existed for a reason. Real-world experience proved their effectiveness when agents had to operate in the presence of adversaries. Since
Federal Cyber Security professionals have long considered the “insider threat” as the most insidious, hardest to protect against threat vector. This has always been the toughest form of threat, even before computers were created. Now that every employee in the entire organization must have access to IT the cyber version
“The Federal Bureau of Investigation’s top cyber cop offered a grim appraisal of the nation’s efforts to keep computer hackers from plundering corporate data networks: “We’re not winning,” he said. “ (Source: U.S. Outgunned in Hacker War – WSJ.com.)