To get notices of new blogs via email, click here:

Friday, October 14, 2011

One-year cyber privateering readership analytics

Today is the Morgan Doctrine one-year anniversary. One year. Six days a week. Every single day. This has been a tremendous learning experience for me, exploring the legal and technical implications of…in the fictional words of Iron Man Tony Stark, "…privatizing  world peace." So at this Morgan Doctrine birthday party, I've decided to analyze the top-ten most popular topics and then the top-ten geographical readership areas. First, the most popular topics as judged by readers:

  1. Japan, I have a solution for you and Sony Almost three-times the readership of the number-two blog.
  2. Stuxnet response from Iranian hacker? A most telling theme, given that Stuxnet is a state-sponsored investment in this brave new world of cyberwar.
  3. Privateer analytics: high-reward/high-risk numbers... Obviously, other people are interested in these analytics.
  4. Frank Herbert clearly foresaw our day  This clearly validates my assertion that military science fiction is way ahead of the game. More to the point, Frank Herbert was a good friend and mentor and, if I want to be truly honest, is the person to whom I owe credit for this idea. He certainly deserves that my next book be dedicated to his memory. By now, most of the philosophical questions Frank and I discussed late into the evenings have been answered for him.
  5. Draft 01: The Cyber Privateer Code  I love this! I intended my equivalent of "The Pirate Code" to go through many drafts. So far, this one draft seems to hold water. Quite amazing. Which is why I set up a separate URL domain: www.CyberPrivateer.com to feature THE CODE.
  6. The Perfect Virus principle #14: Stealth  My single biggest breakthrough was forcing myself to coin the 22 principles of The Perfect Virus. And guess what? Today, Stealth is the number-one theme. But wait a year, or two. I predict that Black Box Portability will be the big issue. It certainly is in my novel.
  7. How China/Russia can make (are making?) billions b...  Oh yeah. The "usual suspects."  Russia and China. Read 'em and weep.
  8. Federal judge keeps 1-800CONTACTS from hijacking t...  Now this is really surprising. My analysis of a legal opinion, and I'm not even an attorney. Okay, so I watch a lot of television.
  9. Stuxnet about to cause an "Iranian Chernobyl"  Again, the cyberwar implications of the #2 most-popular topic.
  10. Yahoo email gets an "F" in security  I've had a grudge against Yahoo after getting email from my dead friend, whose Yahoo account got roached. Looks like others have a similar grudge, given Yahoo's market problems. Amen. This is, after all, a reputation economy.


WHERE are the readers? Here's a map and the top-ten demographics:
  1. USA, by ten-to-one over #2
  2. United Kingdom
  3. France
  4. Ukraine
  5. Germany
  6. China
  7. Russia
  8. Canada
  9. India
  10. Netherlands
Several surprises pop up. Why are the UK, France, Ukraine and Germany ahead of China and Russia? What the heck is Ukraine doing so high on the list. And what the heck is Netherlands doing on the list at all? Several "data exhaust" guesses: 
  • Netherlands may be an Anonymous hotbed.
  • Ukraine must be pretty high on the list of cybercriminals.
  • UK and France are governments making big investments in cyberwarfare capabilities.
  • I'm surprised that Canada, India and Netherlands are higher on the list than Israel, with whom I've had some most interesting dialogues. If I were to rank cyberwar capabilities of the developed nations, I'd place Israel right after the United States and ahead of the U.K., France, Germany, Russia, and China.
A year ago I made a commitment to write every single day except Sundays. I achieved that goal. Today marks a change in strategy and tactics. Simply, these posting will become far less frequent. Why? Because I'm going into the next phase of research with some pretty spectacular new tools that have become available to me. Don't worry, they're totally legal tools. But they are top secret and will assist me in finishing my sequel novel. Here's a hint: Black Box Portability is the real Holy Grail of The Perfect Virus. Black Box Portabiity could also be called "infecting an alien architecture." Check it out in the search box to the left. And stay tuned for interesting albeit less-frequent announcements. 


No comments:

Post a Comment

Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?