"Only the dead have seen the end of war." —George Santayana [caption id="attachment_3466" align="alignnone" width="120" caption="John Wheeler"][/caption] By John Wheeler
[email protected] Cyber-Exceptionalism in Warfighting “Cyber-Exceptionalism” refers to the set of ways in which American provisions for protection and defense of citizens and property, the police and military protections, differ so…
By D.K. Matai The Climate Research Unit at the University of East Anglia, U.K. (Credit photo: http://www.cru.uea.ac.uk/) Just before the United Nations Framework Convention on Climate Change -- UNFCCC -- took place in Copenhagen in mid-December 2009, experts at the University of East Anglia's world-leading Climatic Research Unit were accused of…
By D.K. Matai [caption id="attachment_5586" align="alignleft" width="200" caption="Secretary of State Hillary Clinton Addresses the U.S.-China Business Council (July 2009)"][/caption] A Growing Confrontation? China appears to be escalating its growing confrontation with the U.S. over Washington's announcement of a $6.4 billion defense deal with Taiwan. Under a 1979 Act of the…
"Only the dead have seen the end of war." George Santayana John Wheeler By John Wheeler
[email protected] Writing Cyber defense into Title 10: Meeting the Challenge Head-on The public debate is increasingly acknowledging that the military must have a distinct and essential role in cyberspace. This realization emphasizes that warfighting is…
By John Wheeler
[email protected] John is writing a weekly column dedicated to the cyberspace domain: he will continue to provide regular insights into how to shape effective con-ops in the cyber domain and craft a Terms of Reference for facing XXIst Century cyber challenges. John has a wide range of…
By D.K. MATAI [caption id="attachment_5387" align="alignleft" width="300" caption="see: David Kravets, China Widens Net Censorship; Google Exile Looms, February 24th, 2010 (credit: www.wired.com)"][/caption] Powerful social media sites like Twitter, Facebook, and YouTube remain blocked in China. China will have to concede defeat much sooner than it realizes in its war against…
By John Wheeler
[email protected] John is starting this week a new weekly column dedicated to the cyberspace domain: he will continue to provide regular insights into how to shape effective con-ops in the cyber domain and craft a Terms of Reference for facing XXIst Century cyber challenges. John has a…
By D.K. Matai [caption id="attachment_5038" align="alignleft" width="400" caption="Sikkim Border Incident (credit: video from Indiatimes.com/click on picture to access video)"][/caption] In the latest sign of rising tensions between the two rival Asian powers, the Indian government has informed the world that computers in the Prime Minister's Office were hacked on December…