2016-12-06 By Michael W. Wynne Summary When the large scale computers became the rage of the space race, Univac, then Sperry Univac, and Burroughs reigned large on the scene. Within these companies there almost always was contention as they wrung out 'bugs' in the system. Hardware designers blamed the software…
2016-12-01 By Michael W. Wynne, 21st Secretary of the Air Force Summary It is time to wake up the liability lawyers and truly drive change in the Cyber Security Field. Corporations that are paying weekly or monthly protection money, are really stuck in a belief system that is naive. Its…
2016-11-20 By Michael W. Wynne, 21st Secretary of the Air Force Summary: Academics have known since 1934 that Turing computers were and remain inherently vulnerable to hacking as Godel and Keene Mathematically proved, and confidently expressed that proof in the years following. The times were different; and computers were just…
2016-10-13 By Todd Miller The Department of Defense (DoD) is ambitiously building a Cyber Security force to fulfill its Cyber Strategy. It is a high priority given the network dependence of our defense and national infrastructure and the growth and severity of cyber attacks. “Hunter,” an intelligence analyst with the…
2015-02-23 By Ed Timperlake and Robbin Laird The Naval Academy Motto is; Ex Scientia Tridens –Through Knowledge Sea Power, and that captures the vision for a 21st century Cyber Operations Major being developed at the US Naval Academy. In preparing the U.S. Navy for 21st Century Warfare, the U.S. Naval…
2015-02-13 Cyber is often confused with computer and information security. But it is really about cyber operations and within the context of rapidly evolving concepts of operations, as digital systems become dominant players in the evolution of war fighting capabilities. Our visit to CVN-78 highlighted the centrality of C2 and…
2014-06-30 Recently CrowdStrike released a report on recent Chinese cyber espionage activities. Monday, June 9, 2014, CrowdStrike publicly released a report on a group called Putter Panda, a cyber espionage actor that conducts operations from Shanghai, China, likely on behalf of the Chinese People’s Liberation Army (PLA) 3rd Department 12th Bureau…
2013-07-13 By General Jean-Patrick Gaviard, former French Air Defence and Air Operations Commander. The use of chemical weapons by the forces of Bashar al-Assad has been recently confirmed by the U.S., British and French authorities. The "red line" that the leaders of these three countries had clearly set has been…