Review (Guest): THE WATCHERS–The Rise of America’s Surveillance State

5 Star, Intelligence (Government/Secret)
Amazon Page

FIVE STARS The People We Pay to Look Over Our Shoulders

By Shane Harris

At this very moment analysts at the National Security Agency some 30 miles north of the White House are monitoring countless flashpoints of data — cellphone calls to “hot” numbers, an e-mail message on a suspicious server, an oddly worded tweet — as they carom around the globe like pinballs in cyberspace.

The snippets of information could conceivably lead them to Anwar al-Awlaki, a fugitive cleric in Yemen whose fiery sermons have inspired violent jihadists. Or to the next would-be underwear bomber. Or, much more likely in the needle-in-a-haystack world of cyber detection, it might lead to nothing at all — at least nothing of any consequence in determining Al Qaeda’s next target.

This is the world of modern eavesdropping, or signals intelligence, as its adherents call it, and for many years it operated in the shadows. “The Puzzle Palace,” the 1983 best seller by James Bamford that remains the benchmark study of the N.S.A., first pulled back the curtain to provide a glint of unwanted sunlight on the place. And the years after the Sept. 11 attacks — a period in which the surveillance agencies’ muscular new role would lead to secret wiretapping programs inside the United States, expansive data-mining operations and more — gave rise to public scrutiny that made the place a veritable greenhouse of exposure.

Continue reading “Review (Guest): THE WATCHERS–The Rise of America’s Surveillance State”

Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101

Analysis, Collaboration Zones, Communities of Practice, Ethics, InfoOps (IO), Key Players, Mobile, Policies, Real Time, Threats

Full Story Online
Full Story Online

COVER STORY: The Cyberwar Plan  It’s not just a defensive game; cyber-security includes attack plans too, and the U.S. has already used some of them successfully.

by Shane Harris Saturday, Nov. 14, 2009

Full Story Online
Full Story Online

14 tech firms form cybersecurity alliance for government Lockheed Martin, top suppliers launch initiative for government market

By Wyatt Kash  Nov 12, 2009

Phi Beta Iota: It is a scam, big time.  The U.S. does not have–outside of our small number of colleagues in Hackers on Planet Earth and the Silicon Valley Hackers/THINK Conference–the brainpower and cummulative skills to fill the Potemkin Center, much less staff a capability with global reach.

Continue reading “Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101”

Worth a Look: The Cato Institute on Intelligence

Worth A Look
CATO on Intelligence List
CATO on Intelligence List

We have not featured “think tanks” on this web site because all of them, with one exception, are ideologically biased and financially-beholden to one of the two parties that monopolize power and exclude both the majority of Americans from an honest electoral process, and the majority of objective experts from the policy and budget dailog.

The CATO Institute appears to be an exception.  Below are a few of their generally dated but still relevant pronouncements on the subject of intelligence as decision support.

Why Spy? The Uses and Misuses of Intelligence Stanley Kober (1996)

Building Leverage in the Long War, Jim Harris (2002)

Intelligence Failures Now and Then, Christopher Preble (2004)

Enemies of Intelligence (Book Review), Justin Logan (2007)

Real Intelligence Failures, Richard W. Rahn (2008)

The Need for Judicial Oversight of Domestic Intelligence Gathering, Timothy Lee (2008)

Mike German on ‘Intelligence’ Reports, Jim Harper (2009)