Recommended Reading
SWJ Blog– (Bunker) Review: Intersections of Crime and Terror and (Sullivan) Spillover/Narcobloqueos in Texas
A new Texas Department of Public Safety Threat Assessment report states that criminal cartels are operating in Texas and are the No. 1 threat to the Lone Star State. Narcobloqueos (narco-blockades) are now being seen north of the border.
Eeben Barlow – Failing to Listen
….Often, the government forces appear to be very well trained in running away
Timothy Thomas – Why China is reading your email
Abu Muqawama (Trombly) – Limits of Proxy Warfare in Syria
GLORIA Center – (Col. Norvel DeAtkine) Western Influence on Arab Militaries: Pounding Square Pegs into Round Holes
David Stockman – State-Wrecked: The Corruption of Capitalism in America
ZeroHedge – List Released With 132 Names Who Pulled Cyprus Deposits Ahead Of “Confiscation Day”
Harvard Magazine –The Humanities, Digitized
Chicago Boyz (Foster) –RERUN–Author Appreciation: Rose Wilder Lane
From BOYD & BEYOND 2012:
Dr. Chet Richards on the work of Colonel John Boyd:
Page 2 of 2 | Previous page
carl:
April 4th, 2013 at 2:48 am
The last paragraph of Sam Liles piece states that the proper way to handle cyber security is to assume that your defenses will be breached and to structure your operation so that you can operate effectively in spite of a breach. That seems sensible, but it brings something to mind. If you assume that your system will be breached, shouldn’t you also assume that you cannot predict how badly it will be breached. And if you cannot know how badly it will be breached, it is prudent to assume that it can totally compromised. If it can be totally compromised, shouldn’t you design into the system a capability for total reversion to manual control? I am thinking mainly of things like municipal water systems and the grid. I know the only manual reversion available for something like a B-2 is to punch out, but the power grid was operated quite well long before computers took over as were muni water systems, canal locks, dams etc. Someday we will get into a nasty fight with somebody and they will go after infrastructure control systems, and they will get in. If there is no manual reversion, there will be trouble. Perhaps with this in mind, it would be prudent to go back 30 or 40 years in technology in some respects, heresy though this may be.