Information dominance dismantles political influence. Because the influence of deceit has never been able to extinguish the light of Truth.
Cyberstential
The Form of the Cyber Security Honey Pot
When an organization or individual gives up something or provides easy access to an object to an external entity to persuade that party to believe they have accessed everything stored and preserved by the party being investigated or searched. At the same time, the party holding what is desired seeks to continue protecting and concealing […]
Cybernetic Web
Malicious lives are consumed in the web of a spider that crawled across the truth they tried to conceal. Showing evidence of the lives they executed actions to steal. As they wait for the opening of the Seventh Seal, my Lord’s Judgment, he will reveal. As I watch them slowly become this spider’s meal as […]
Open Source Existentialism
I retired from the battlefield because I know it’s what is best for those I care about. I know it is what is spiritually necessary to strive toward forgiveness of those that concealed my children from me. As those that have attempted to conceal the truth continue to do so, they will make the war […]
Restoration of the Organic System after Failure
Accomplishing operational objectives in the face of extreme adversity are not achieved by actions rooted in how we feel, but those that are calculated based upon mission requirements and responsible operational risk management. Attaining strategic supremacy on the battlefield is only achieved with the proper implementation of finite and infinite game theory based on a […]
The Age of Preferential Speech
During the years of the industrial age freedom of speech was a “right” protected by the founding documents of the republic. During the Information Age freedom of speech is a “service” provided in accordance with the terms of service and discretion of the entities that provide us connectivity (public utility), the platforms we distribute our […]
Dangers of Digital Rights Management
Digital Rights Management has been prevalent for over two decades as a way to control access to digital media by content providers. Content distributors provide access to various forms of media via Content Delivery Networks (CDN), which are globally distributed arrays of servers that house consolidated databases of media that they are licensed to distribute […]
Dangers of Digital Rights Management
Digital Rights Management has been prevalent for over two decades as a way to control access to digital media by content providers. Content distributors provide access to various forms of media via Content Delivery Networks (CDN), which are globally distributed arrays of servers that house consolidated databases of media that they are licensed to distribute […]