Here are some questions I’ve been asked regarding Walking Wounded


Can I order bulk copies at a discount?

Yes.  We offer bulk discounts.  Please contact me for our price list.


Do you ship oversees and to P.O. boxes?

Yes, we’ll ship your package anywhere that can accept deliveries.


Can I see the text that is redacted / edited / blacked-out?

No.  That information is not available.


Who decided what text would be redacted?

I submitted the manuscript to the Secretary of Department of Defense, Secretary of Homeland Security, and Director of National Intelligence. These three collaborated and provided a collective response through the Director of National Intelligence. The redacted text is exactly what these organizations decided could not be published, and they provided no details on their decision.

What does each chapter cover?

Here is a description of each chapter:

    • Chapter 1. The Vision – The U.S. Department of Defense fell in love with technology following the Vietnam War, and this love affair has made them vulnerable.
    • Chapter 2. The Perpetual Struggle – The computer networks and systems in cyberspace are conductors and concentrators of information, and they are fundamentally insecure. This insecurity may be impossible to fix, and enable conflict in cyberspace.
    • Chapter 3. Ground Hogs Day – The results of this insecurity has been thirty-size years of international cyber espionage, crime, and attacks.
    • Chapter 4. The Guardians – The communities solution is a plethora of security tools, but they can’t prevent malicious activities, and often make things worse for defenders.
    • Chapter 5. The Antagonists – Cyber antagonist have tools and techniques to conduct operations, but there are also significant challenges to offensive operations.
    • Chapter 6. Battle in the Shadows – There are numerous ways to track people in cyberspace, but there are even more ways to hide. And the tools that defenders use to make life easier also make it harder to track adversaries in cyberspace.
    • Chapter 7. Geeks in the Wire – Nations, criminals, and hobbyists use the same tools and techniques to discover and take information from victims in cyberspace.
    • Chapter 8. Equities – The biggest challenge in Washington DC is the conflicting priorities between government agencies. The solution has been to give the Intelligence Community the lead, and with that lead comes the budget, personnel, and authority to control information.
    • Chapter 9. Insiders – Our employees, contractors, and commercial vendors represent a serious risk to cyberspace. The government has ignored this threat, and the result was Snowden.
    • Chapter 10. Shadow Boxing – The military is in love with destructive and degrading attacks. However, properties of cyberspace and cyber weapons ensure these weapons will not be used except in specific situations.
    • Chapter 11. Strategies – The U.S. government is enamored with the idea of cyber deterrence. However, this strategy will not work regardless of their desires. There are numerous alternative strategies that nations can use to operate effectively in cyberspace.
    • Chapter 12. The Digital Apocalypse – The media and experts continually discuss attacks against critical civilian infrastructures necessary for modern operations. However, nations are not going to attack these infrastructures except under a very specific situation.
    • Chapter 13. Digital Terrorists – Terrorists take advantage of all of the benefits of cyberspace. Taking actions to prevent terrorist use of cyberspace will eliminate the advantages we all enjoy.
    • Chapter 14. Secrecy – The policies that our government uses to censor information and prevent its disclosure makes us all less secure.
    • Chapter 15. The Great Equalizer – The result of the government policies is to make all of us less secure. We need to fundamentally relook cyberspace and operations in cyberspace.
    • Thought Questions – Questions for each chapter to spur thought (and they make excellent homework assignments).
    • References – Over 270 references and footnotes that clarify and provide links to additional information.
    • Glossary – Definition of terms.