Recommended Reading

SWJ Blog–  (Bunker) Review: Intersections of Crime and Terror and (Sullivan) Spillover/Narcobloqueos in Texas 

A new Texas Department of Public Safety Threat Assessment report states that  criminal cartels are operating in Texas and are the No. 1 threat to the Lone Star State. Narcobloqueos (narco-blockades) are now being seen north of the border.

Eeben Barlow – Failing to Listen 

….Often, the government forces appear to be very well trained in running away

Timothy Thomas – Why China is reading your email

Abu Muqawama (Trombly) – Limits of Proxy Warfare in Syria 

GLORIA Center – (Col. Norvel DeAtkine) Western Influence on Arab Militaries: Pounding Square Pegs into Round Holes 

David Stockman – State-Wrecked: The Corruption of Capitalism in America 

ZeroHedge – List Released With 132 Names Who Pulled Cyprus Deposits Ahead Of “Confiscation Day”

Harvard MagazineThe Humanities, Digitized 

Chicago Boyz (Foster) –RERUN–Author Appreciation: Rose Wilder Lane

From BOYD & BEYOND 2012:

Dr. Chet Richards on the work of  Colonel John Boyd:

 

Page 2 of 2 | Previous page

  1. carl:

    The last paragraph of Sam Liles piece states that the proper way to handle cyber security is to assume that your defenses will be breached and to structure your operation so that you can operate effectively in spite of a breach.  That seems sensible, but it brings something to mind.  If you assume that your system will be breached, shouldn’t you also assume that you cannot predict how badly it will be breached.  And if you cannot know how badly it will be breached, it is prudent to assume that it can totally compromised.  If it can be totally compromised, shouldn’t you design into the system a capability for total reversion to manual control?  I am thinking mainly of things like municipal water systems and the grid.  I know the only manual reversion available for something like a B-2 is to punch out, but the power grid was operated quite well long before computers took over as were muni water systems, canal locks, dams etc.  Someday we will get into a nasty fight with somebody and they will go after infrastructure control systems, and they will get in.  If there is no manual reversion, there will be trouble.  Perhaps with this in mind, it would be prudent to go back 30 or 40 years in technology in some respects, heresy though this may be.