Matt Devost and Winn Schwartau talk discuss what has happened in the information warfare and cyberconflict space over the past twenty years.
To comprehend and cope with our environment we develop mental patterns or concepts of meaning. The purpose of this paper is to sketch out how we destroy and create these patterns to permit us to both shape and be shaped by a changing environment. In this sense, the discussion also
In this brief volume Jenkins takes a detailed look at the General’s putsch, which was a 1961 coup attempt by a group of retired French Generals against President Charles de Gaulle. However, it is not the putsch itself that attracts Jenkins’ analytical attention, but the chaos surrounding the status of
This fascinating story on GigaOm discusses the implications of big data and personal privacy. What was uniquely interesting was this quote from CIA Chief Technology Officer Gus Hunt in describing how your FitBit health tracker collects enough data about how you move to uniquely identify you with 100 percent accuracy.
Thinking about state-sponsored cyber threats over the long term doesn’t come easy to Western strategists. This essay takes a look at at the strategic implications of thinking only in the short-term.
The New York Times revealed today what many experts had already asserted regarding the United States role in the Stuxnet attack. While speculation of U.S. involvement complicated international relations on cyber conflict, an acknowledgement of U.S. involvement in a forum such as the New York Times heralds in a brave
The National Memorial Institute for the Prevention of Terrorism (MIPT) in Oklahoma City focuses on “preventing and deterring terrorism or mitigating its effects.” Since April 2001, MIPT has funded Project Responder, an effort by Hicks & Associates, Inc. and the Terrorism Research Center, Inc., aimed ultimately at improving local, state
The following selections are taken from “Unrestricted Warfare,” a book published in China in February 1999 which proposes tactics for developing countries, in particular China, to compensate for their military inferiority vis-à-vis the United States during a high-tech war. The selections include the table of contents, preface, afterword, and biographical