• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Max Bender@maxwbender

Max Bender

@maxwbender

A Functioning Society

February 15, 2021

I am blogging everyday (or nearly everyday) on The Daily Drucker: 366 Days of Insight and Motivation for Getting the Right Things Done.

The action point asks what the emerging government in Iraq has to do to become legitimate and what must the government do to create status and function for Iraqis. The book was written in 2004, so we can probably go look now to see what happened.

In 2005 the Federal Government of Iraq was formed. The executive branch includes a President and a Council of Ministers. The legislative branch has Council of Representatives and a Federation Council. The judicial branch contains a Higher Judicial Council, Supreme Court, and Central Criminal Court. It seems Iraq has taken on a similar government to the United States and other democratic countries.

The government being formed is one thing. A functional society is another. After the overthrow of the government there were a lot of people with agendas who entered the country and began a guerilla war. Two books I’ve recently read are Black Hearts by Jim Frederick and Team of Teams by General Stanley McChrystal. Black Hearts documents some of the problems and issues starting in 2005. Team of Teams on the other hand highlights the adjustments the fighting forces had to make to deal with the guerilla fighting.

← Daily Stoic(s) The Smoke And Dust Of Myth →

Latest PoDCASTS

Featured
Apr 14, 2026
Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Apr 14, 2026
Apr 14, 2026
Apr 7, 2026
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Apr 7, 2026
Apr 7, 2026
Mar 31, 2026
[RERELEASE] What is a SIEM?
Mar 31, 2026
Mar 31, 2026
Mar 24, 2026
[RERELEASE] What is threat modeling?
Mar 24, 2026
Mar 24, 2026
Mar 17, 2026
[RERELEASE] What is cryptography?
Mar 17, 2026
Mar 17, 2026
Mar 10, 2026
[RERELEASE] What is a Chief Information Security Officer (CISO)
Mar 10, 2026
Mar 10, 2026
Mar 3, 2026
Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Mar 3, 2026
Mar 3, 2026
Feb 24, 2026
Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Feb 24, 2026
Feb 24, 2026
Feb 17, 2026
What are the AI Vulnerabilities We Need to Worry About
Feb 17, 2026
Feb 17, 2026
Feb 10, 2026
[RERELEASE] How to make time for a home lab
Feb 10, 2026
Feb 10, 2026

Powered by Squarespace