Copenhagen, Climategate and Cyber-Espionage: Russians, Chinese or Oil-Interests?

03/15/2010
By D.K. Matai The Climate Research Unit at the University of East Anglia, U.K. (Credit photo: http://www.cru.uea.ac.uk/) Just before the United Nations Framework Convention on Climate Change -- UNFCCC -- took place in Copenhagen in mid-December 2009, experts at the University of East Anglia's world-leading Climatic Research Unit were accused of…

General Nicholson on Using the Ospreys in Afghanistan: “We have done tactical inserts”

03/08/2010
Abstract from an interview conducted with Brigadier General Lawrence D. Nicholson, Commanding General, 2nd Marine Expeditionary Brigade, Afghanistan, on Thursday March 4th, 2010 (Source: DOD News Briefing with Brig. Gen. Nicholson from Afghanistan Thu, 04 Mar 2010 18:50:00 -0600)   Question: General, operational question.  It's Otto Kreisher, working  for Semper…

Is the “Cold War” with China Becoming Serious? Placing the Cyber Conflict in a Strategic Context

03/07/2010
By D.K. Matai [caption id="attachment_5586" align="alignleft" width="200" caption="Secretary of State Hillary Clinton Addresses the U.S.-China Business Council (July 2009)"][/caption] A Growing Confrontation? China appears to be escalating its growing confrontation with the U.S. over Washington's announcement of a $6.4 billion defense deal with Taiwan. Under a 1979 Act of the…

Cyberpoints Weekly: Writing Cyber defense into Title 10

03/07/2010
"Only the dead have seen the end of war." George Santayana John Wheeler By John Wheeler [email protected] Writing Cyber defense into Title 10: Meeting the Challenge Head-on The public debate is increasingly acknowledging that the military must have a distinct and essential role in cyberspace. This realization emphasizes that warfighting is…

Cyberpoints Two:Measuring the Effectiveness of Military Recruiting in Cyber Careers

03/03/2010
By John Wheeler [email protected] John is writing a weekly column dedicated to the cyberspace domain: he will continue to provide regular insights into how to shape effective con-ops in the cyber domain and craft a Terms of Reference for facing XXIst Century cyber challenges. John has a wide range of…