Defining Security: Insights from New Scholarly Research October 31, 2025
Posted by Chris Mark in Uncategorized.Tags: security definition risk management security theory mathematical formulation threat modeling operational security security frameworks conceptual frameworks
add a comment
I just published my latest book on Amazon. This one is called Defining Security; A Hierarchical Framework for Language, Mathematical Formulation, and Security Practice. It explores the definition of security and delves into the complexity of the subject.
“Security practitioners and scholars have struggled for decades to establish precise, universally accepted definitions of fundamental security concepts. This whitepaper examines the definitional challenges facing the security profession, drawing from doctoral and professional research that identified approximately 25 distinct definitions of security among over 200 practitioners. Following Socrates’ priority of definition—that one must first know what a property is before knowing anything else about it—this paper establishes operational definitions for security, risk, threat, vulnerability, asset, and controls. These definitions integrate insights from Manunta’s seminal work on security conceptualization with practical frameworks developed through professional security practice. The paper explores the distinction between denotative and connotative meanings, examines why security professionals often resort to apophatic definitions (defining security by what it is not), and presents mathematical formulations that enable systematic analysis. By establishing definitional clarity, this work provides a foundation for improved communication among security professionals, more rigorous security methodology, and better evaluation of security measures and performance.”
“The War God’s Face has Become Indistinct”- Updated Whitepaper on Unrestricted Warfare October 21, 2025
Posted by Chris Mark in Uncategorized.Tags: Academic Exploitation, china, cold war, Cyberattacks, Unrestricted Warfare, Volt Typhoon
add a comment
I recently updated and republished a paper on Unlimited or Unrestricted Warfare Doctrine against the US. I first wrote on this in 2013 for The Counter Terrorist Magazine and have been keeping the concept updated. Here is a summary…:
“This comprehensive assessment examines the implementation of China’s unrestricted warfare doctrine against the United States from 2020-2025. Developed by PLA Colonels Qiao Liang and Wang Xiangsui following the 1991 Gulf War, unrestricted warfare represents a paradigm shift from conventional military confrontation to asymmetric operations across multiple domains.
This study analyzes documented Chinese operations including: Volt Typhoon’s five-year penetration of critical infrastructure systems; Salt Typhoon’s compromise of nine major U.S. telecommunications companies affecting over one million users; systematic academic infiltration through Confucius Institutes and intellectual property theft costing an estimated $500 billion annually; congressional penetration operations targeting rising political figures and senior officials; and state-level influence campaigns exemplified by the Linda Sun case.
The analysis demonstrates how China employs cyber operations, political influence, academic exploitation, and infrastructure pre-positioning to achieve strategic objectives while avoiding direct military confrontation. Drawing on government reports, intelligence assessments, and primary source materials, this work examines the doctrine’s principles of asymmetry, omnidirectionality, and minimal consumption as manifested in contemporary operations. The study concludes that unrestricted warfare represents a coherent strategic framework specifically designed to neutralize American conventional military advantages by exploiting vulnerabilities in open democratic societies.”
Digital Impersonation on OnlyFans: Is it Possible? October 20, 2025
Posted by Chris Mark in Uncategorized.Tags: ai, artificial-intelligence, authentication, Biometric, blockchain, cybersecurity, Digital Impersonation, News, OnlyFans, technology
add a comment
Recently, I was personally accused of “digitally impersonating” someone to set up an OnlyFans in their name! Let me be clear. #1…I would NEVER do that and #2…it is NOT possible (well..it approaches mathematical impossibility. But, I digress). Because I know this person and I know technology, when it was exposed, I was the easy target…sooooo…. I took the opportunity to actually do a study on OnlyFans authentication architecture! (because I am a cyber nerd) The findings are mind blowing! Outside of financial institutions, OnlyFans has one of the, if not THE, most robust authentication architecture in the industry! Read the entire paper here! Good Job OnlyFans! Of to court we go!!
Here is a summary of the findings…
“This analysis examines OnlyFans’ multi-layered verification system to demonstrate how multiplicative security controls create exponential attack complexity. The platform employs three sequential, mandatory verification layers: document verification (government ID analysis), biometric verification (liveness detection and facial matching), and banking verification (KYC/AML compliance through financial institutions).
Using a multiplicative probability model, the analysis calculates that attackers face dramatically reduced success rates. Unsophisticated attackers have only 0.003% success probability (1 in 33,000 attempts), while even sophisticated attackers using professional forgeries and advanced deepfakes face just 0.21% success rates (1 in 476 attempts). This represents a 452-fold security improvement over single-factor systems.
Banking verification emerges as the critical control, providing a 28.6× security multiplier due to independent organizational oversight, regulatory requirements, and specialized fraud detection infrastructure.” (read the rest here!) I hope you read the article!! It is actually a great read for us nerds!
The Trap of Reactive Abuse: When Victims Become Perpetrators in the Eyes of Others September 20, 2025
Posted by Chris Mark in Uncategorized.Tags: abuse, Chris Mark, gaslighting, male domestic abuse, Mental Health, psychology, reactive abuse, relationships, trauma
add a comment
What is Reactive Abuse?
“Reactive abuse occurs when someone who has been abused begins to defend themselves by responding to abuse with physical and/or verbal attacks, says Alexa Connors, LMSW, a senior therapist at The Dorm, which offers intensive trauma therapy for young adults.”
“Baiting and Harvesting Cycle
Reactive abuse rarely occurs spontaneously but is often the result of deliberate provocation designed to elicit exactly this response. Skilled emotional abusers understand their victims’ triggers and systematically exploit them until the victim “breaks” in ways that can be documented and used against them (Durvasula, 2019; Simon, 2010).
This process, sometimes called “baiting and harvesting,” involves several calculated steps:
Strategic provocation: The abuser identifies the victim’s vulnerabilities, perhaps their love for their children, professional pride, or core values—and systematically attacks these areas. For male victims, this often involves sustained attacks on their masculinity, competence, or worth as partners or fathers (Morgan & Wells, 2016).
Escalation timing: Provocations are often timed to maximize their impact and the likelihood of an explosive response. Research by Bates (2020) found that abusers frequently escalated attacks when their male partners were already stressed from work, health issues, or other life pressures, making emotional regulation more difficult.
Documentation preparation: Many abusers ensure they have witnesses present or recording devices ready when they push their victims to the breaking point. Studies by McCarrick and colleagues (2016) documented cases where female abusers recorded their male partners’ angry responses while carefully editing out their own provocative behavior.
Narrative construction: Once the reactive abuse occurs, it becomes the central focus of the abuser’s story. The months or years of systematic mistreatment that led to the reaction are minimized or omitted entirely, creating a narrative where the victim appears to be the primary aggressor (Cook, 2009).”
If you are someone you know is in an abusive relationship, get help. They can be insidious and you may not realize until you are out. I didn’t.




