Author Archive | Spencer

Obama Administration justification for use of drones against American Targets

http://www.wired.com/threatlevel/2013/02/legal-basis-killing-americans/ From the article: The paper’s basic contention is that the government has the authority to carry out the extrajudicial killing of an American citizen if ‘an informed, high-level official’ deems him to present a ‘continuing’ threat to the country. This sweeping authority is said to exist even if the threat presented isn’t imminent in […]

Network Use of Force: Defend

Defend: The entity defends its networks by using appropriate prevention controls, technologies and techniques designed to render improbable or impossible an attack by a network assailant. The entity uses a layered defense-in-depth approach to assure that risks to its systems are defended, and that the basic tenets of information security are designed into the network’s […]

Skeuomorphic Analogues

Apple is designing Skeuomorphic applications to help people more intuitively grasp their operating environment. “Skeuomorphism, as it applies to computer software, is the use of ornamental design elements that represent familiar objects in the digital realm. The technique was first implemented by software designers to help ease users into the unfamiliar world of computing. For […]

Traditional Use of Force

Great article from the COPS Office at the US Department of Justice on the use of force. http://www.cops.usdoj.gov/default.asp?item=1374 Some good quotes from the article: The International Association of Chiefs of Police (IACP) in its study, Police Use of Force in America 2001, defined use of force as “The amount of effort required by police to […]

Is Active Defense a use of force?

I keep hearing this term Active Defense.  Its catchy, and it implies a level of activity associated with defense.  But what is it, and is it a use of force? Brandon and I discussed this, and he pointed out that he believed active defense could be distinguished from passive defense, and that it would fall somewhere […]

An application example of the DECEIVE spectrum

http://www.projectnova.org/faq/index.html I’m not endorsing this product, though I think they’ve got an innovative concept. Someone let me know how the product actually works. From the perspective of the Orlando Doctrine, however, the description of the application fits neatly into the Deceive spectrum on the Network Use of Force Continuum. It helps from a detection perspective […]

Powered by WordPress. Designed by Woo Themes