Why Criminal Hackers Must Not Be Rewarded Part 1: The Fruit of the Poisoned Tree
By M. E. Kabay, 11/30/2009
In 1995, I participated in a debate with distinguished security expert Robert D. Steele, a vigorous proponent of open-source intelligence. We discussed the advisability of hiring criminal hackers. Perhaps readers will find the polemic I published back then of interest today. I’m sure it will provoke vitriolic comments from the criminal hacker community.
The Ushahidi Engine is a platform that allows anyone to gather distributed data via SMS, email or web and visualize it on a map or timeline. Our goal is to create the simplest way of aggregating information from the public for use in crisis response.
This is a huge development, one that could lead to a more rapid creation of the World Brain with embedded EarthGame as a means of connecting all human minds with all information in all languages all the time.
See our briefing given in Denmark to think about how this might apply to the global harmonization of gifts from the one billion rich to needs of the five billion poor at the household and item level.
NIGHTWATCH Special Report: October in Afghanistan 27 November 2009
Taliban and other anti-government fighters have begun to go to winter quarters, in Pakistan or in Afghanistan. The fighting will drop somewhat during the winter, but in the core provinces of the Pashtun south, weather is not a factor.
Based on Taliban public statements, their attacks will remain focused on disruption of the overland truck lifeline for Afghan and NATO forces, mainly by using improvised bombs. In the face of renewed NATO resolve, the Taliban also will wait for the next opportunity to attempt to take power.
Taliban cannot defeat NATO forces, but NATO forces cannot defeat Taliban, especially without combat air support. The government in Kabul cannot survive without NATO forces, but by this time next year the Afghan forces will need more logistics and air support rather than combat soldiers, if the US and European NATO trainers are competent.
Phi Beta Iota: The incoherent insanity of BOTH the left and the right, of both those in power and those without power, is cresting. While the Obama Administration does everything it can to emulate and extend the Constitutional violations of the Cheney-Bush regime, the far right is losing its mind completely. Below are two items, just a taste of what happens when gerbils learn to read and write.
It seems that Palin– the attractive, outdoors-loving “hockey mom”-is popular solely because of her personality, not any specific policy positions. Notes columnist Steve Chapman “Who needs policy? In her world – and the world of legions of conservatives who revere her – the persona is the policy. Palin is beloved because she’s (supposedly) just like ordinary people, which (supposedly) gives her a profound understanding of their needs.” When dissecting political cults of personality, it would seem that Palin has become the Republicans’ Obama–handsome, charming and a human comfort blanket for partisans.
The future of Open Source Intelligence (OSINT) is Multinational, Multifunctional, Multidisciplinary, Multidomain Information-Sharing & Sense-Making (M4IS2).
The following, subject to the approval of Executive and Congressional leadership, are suggested hueristics (rules of thumb):
Rule 1: All Open Source Information (OSIF) goes directly to the high side (multinational top secret) the instant it is received at any level by any civilian or military element responsive to global OSINT grid. This includes all of the contextual agency and mission specific information from the civilian elements previously stove-piped or disgarded, not only within the US, but ultimately within all 90+ participating nations.
Rule 2: In return for Rule 1, the US IC agrees that the Department of State (and within DoD, Civil Affairs) is the proponent outside the wire, and the sharing of all OSIF originating outside the US IC is at the discretion of State/Civil Affairs without secret world caveat or constraint. OSIF collected by US IC elements is NOT included in this warrant.
Phi Beta Iota: “Too Big to Fail” is industrial era idiocy. REALITY tells us that the more complex a system gets, the more it DEMANDS self-healing from the bottom-up. Feedback loops at all levels, each with their integrity intact. What all of the headlines above have in common is precisely the opposite: degraded feedback loops lacking integrity.