Esther Dyson’s “What is in a Domain Name?” reminded me of the excellent and classic paper by Mark R. Horton, “What is a Domain?” written back in 1984. Although old, it is a classic you can share with people who want to start learning more.
bubbles
disconnected

(←)
cybernetics and cyber war
My favorite cyber crime story is still from 1994: “The Technology Secrets of Cocaine Inc.“. Mostly because of this:
The traffickers have the advantages of unlimited funds and no scruples, and they’ve invested billions of dollars to create a technological infrastructure that would be the envy of any Fortune 500 company — and of the law enforcement officials charged with going after the drug barons. “I spent this morning working on the budget,” the head of DEA intelligence, Steve Casteel, said recently. “Do you think they have to worry about that? If they want it, they buy it.”
I’m going through a lot of the current literature on cyber war, cyber crime and how the cyberspace is the new dimension.Strategies and tactics are being published and there are even people who write about regulation of cyber weapons (go figure).
With all this noise generated on the subject from all kinds of people, maybe it is time to make the leap and start thinking about moving from cyber space to cybernetic space. War (and organized crime) is a lot about management (and many aspiring management suits recite “Art of War” seeking enlightenment and higher ground) so it seems natural to me that cybernetic management deserves a chance as a strategic tool.
The Law of Armed Conflict and the Economy – A question
While (according to my understanding) War theroticians have not concluded adequately when a cyber-attack can be answered with the use of kinetic force, especially in the case of non-state actors, a new question emerges:
– When a non-state actor (or even a state one) attacks my Economy, is the use of kinetic (or other) force a justified act of defense?
(χωρίς σχόλιο)
Hunters of Dune
How painfully boring! How totally disrespectful of the original series.
Oh how much I am not buying your excuses (from both of you).
Brian Herbert publish Frank Herbert‘s bare Dune 7 notes if you dare!
Foreseeing the RSA hack?
“Inside Cyberwarfare” which I am reading slowly but steadily, proves to be a prophetic book. Chapter 10 describes a methodology similar to the one that seems to have been used in the RSA hack.
This book continues to amaze me in so many levels.
It is Sysadmin Day today!

Happy SysAdminDay!
Aiming for failure
Thanks to @gtzi the following quote by Herbert Swope came to my attention:
Just like your Postmaster, or your System Administrator, be him either junior or senior. Impossible tasks and system administration go hand-in-hand…

