Search: map of piracy around the world

Searches

Sorry about this not coming up right off.  It's common name is 450-ship Navy, the piracy was added later.

2008 U.S. Naval Power in the 21st Century

TRUE STORY:  OSS did the first Somalia piracy evaluation for CENTCOM J-2P, in 2005.  Years later we were able to ask both Navy Irregular Warfare and US Special Operations Command why they did nothing, and their answer should not have, but did shock us, particularly in being virtually the same answer:

“Not an expensive enough problem.”

We don't make this stuff up.

NIGHTWATCH Extract: Consulate Closed, Window Opens

Uncategorized

Mexico: For the record. The United States closed its consulate in the Mexican border city of Ciudad Juarez on Thursday pending a security review, according to The Associated Press. The US Embassy announced the consulate will “remain closed until the security review is completed.”

Three additional paragraphs from this item deleted, can be seen at link below.

NIGHTWATCH KGS Home

Phi Beta Iota: First off, the threat to US citizens and UN employees is seriously over-stated by regional and organizational security officers who do not know how to do the “craft” of intelligence, and in some cases, who get greedy and hype the threat for political as well as personal motives–in one instance, we have seen a LOW threat hyped all the way to CRITICAL because the high-school graduate who had reached his maximum level of incompetence wanted more people, guns, and armoured cars, ultimately consuming 37% of the international people and budget and 66% of the total manpower (inclusive of local security) of an organization that was supposed to be in the “back office” doing capability building.  Out of control security (and out of control staffing that should have blocked the imbalance) cost that organization a third of its possible productive potential within the donor countries' generous budget allocation.

Secondly, Central America in particular (our definition runs from the southern border of Arizona to Cali, Colombia), is suffering from a vicious cycle in which the oligarchs invest in private security and pay extortion rather than pay taxes.  A study needs to be done.  We believe it will demonstrate to the oligarchs that they are paying three times more than they need to for the same level of security that a properly funded government could provide, at the same time that they are foregoing the social security that their paying of taxes would enable, which in turn would empower the poor to create infinite wealth of their own–redistribution of wealth is neither sufficient nor appropriate.  A regional Open Space Technology conference that includes the cartel leaders could have a revolutionary outcome.

The time has come for regional multinational information-sharing and sense-making centers that address all ten high-level threats to humanity (transnational crime is tenth out of ten) by harmonizing both information-intelligence and how money is spent by ALL eight tribes of intelligence across the twelve core policy areas including security.

Journal: Zionists & Neocons Ramp for War on Iran

04 Inter-State Conflict, 05 Iran, 07 Other Atrocities, 08 Wild Cards, 10 Security, 11 Society
Chuck Spinney Recommends

Neocon Nutballs Ramp Up Campaign

Bomb Iran?

By GARETH PORTER

Reuel Marc Gerecht’s screed in the Weekly Standard seeking to justify an Israeli bombing attack on Iran coincides with the opening of the new Israel lobby campaign marked by the introduction of  House Resolution 1553 expressing full support for such an Israeli attack.

What is important to understand about this campaign is that the aim of Gerecht and of the right-wing government of Benjamin Netanyahu is to support an attack by Israel so that the United States can be drawn into direct, full-scale war with Iran.

FULL STORY AT COUNTERPUNCH

Phi Beta Iota: Daniel Elsberg had it right lecturing to Henry Kissinger, our second most important war criminal after Dick Cheney: these people have become like morons, totally disconnected from reality or the public interest.  For their total game plan, in which they thought they could “roll up” the Middle East, see Review: Endgame–The Blueprint for Victory in the War on Terror.  Gerecht used to be a fairly sensible accomplished Case Officer (C/O).  We speculate they've given him dual citizenship as part of an offer he just could not refuse.  His piece is world-class idiocy.

See Also:

Continue reading “Journal: Zionists & Neocons Ramp for War on Iran”

Google = King of Malware

Computer/online security, Corporations, Cyberscams, malware, spam, Technologies

See the report

New Report Findings from Barracuda Labs: The ‘King Of Malware’ at Midyear 2010, Google

Matt McGee writes on Search Engine Land:

Google has twice as much malware in its search results as Yahoo, Bing, and Twitter combined. That’s one of the findings in the Barracuda Labs 2010 Midyear Security Report, which will be presented tomorrow at the DEFCON 18 hacking conference tomorrow in Las Vegas.

Barracuda Labs says it studied the four search engines for about two months and reviewed more than 25,000 trending topics and almost 5.5 million search results.

The article also includes a pie chart (on page 60 showing malware percentages from Google 69%, Bing 12%, Yahoo 18%, and Twitter 1%) as well as a table showing the percentage of accounts Twitter suspends each month.

[It] was 1.67% for the first half of 2010, with a high of 2.38% in June.

Access the Complete Article, Charts, and Graphs at Search Engine Land

Also see:
+ Barracuda Labs 2010 Midyear Security Report (Free; 83 pages; PDF)
+ Researcher ‘Fingerprints' The Bad Guys Behind The Malware (June 22, 2010)
+ Vulnerabilities in Adobe Acrobat/Reader & MS Word being used to install malware

Event: 10-12 Sept 2010, Berlin, Interdependence Day

02 Diplomacy, 10 Security, Academia, Civil Society, Collective Intelligence, Government, Non-Governmental, Peace Intelligence

Event page

Berlin, Germany 2010

In 2010 Interdependence Day will be celebrated in a dynamic global city and cultural melting pot at the heart of Europe.

> INTERDEPENDENCE DAY

In a world where global interdependence is not simply an aspiration of idealists, but a brute fact of the forces that bind us together— global warming, financial capital, AIDS, telecommunications, crime, migration, and terrorism—many people still think in narrow, insular terms.

Reality is global, but consciousness too often remains local — constrained by town and nation.

In the year 2000, a small group of scholars, civic and political leaders, and artists from a dozen nations met to design a program that might help raise consciousness around the realities and possibilities of interdependence. Their efforts were given impetus by the tragic events of September 11, 2001, and the group created a project that would:

> Make September 12, the day following the memorial of 9/11, an international celebration of interdependence “Interdependence Day”

> Draw up a “Declaration of Interdependence”, making clear that both liberty and security require cooperation among peoples and nations and can no longer be secured by sovereign nations working unilaterally;

> Develop a Civic Interdependence Curriculum that would make interdependence a central concept in Civics and Social Studies programs in middle and high schools in as many schools around the world as possible.

US, NATO Allies Prepare New Invasion Of Somalia

04 Inter-State Conflict, 05 Civil War, 08 Immigration, 09 Terrorism, 10 Security, 10 Transnational Crime, Military
Source article: GlobalResearch.ca

The 15th biennial African Union summit in Kampala, Uganda ended on July 27 with mixed results regarding support for U.S. and Western European plans to escalate foreign military intervention in nearby Somalia.

The 35 heads of state present at the three-day meeting were reported to have authorized the deployment of 2,000 more African troops to back up the beleaguered Western-backed Transitional Federal Government (TFG) in Mogadishu and to bring the full complement of forces doing so to 8,000, but the new contingent will probably consist solely of troops from Uganda and Burundi, which supply the approximately 6,000 already serving with the African Union Mission in Somalia (AMISOM). Reports of another 2,000 reinforcements from Djibouti and Guinea are problematic and their deployment remains to be seen, not that pressure will not be exerted on those two nations and others from outside the continent.

AMISOM is the successor to the Intergovernmental Authority on Development (IGAD) Peace Support Mission in Somalia (IGASOM) set up in 2005 by the six-member group which includes Djibouti, Ethiopia, Kenya, Somalia, Sudan and Uganda and which also was to have provided 8,000 troops for deployment to Somalia. The 53 members of the African Union except for Uganda and Burundi have been loath to commit military units to intervene in fighting in Somalia, whether against the Islamic Courts Union five years ago or against al-Shabaab insurgents currently.

In late 2006 U.S. Secretary of State Condoleezza Rice met with Ugandan Foreign Minister Sam Kutesa to plan the earlier IGASOM operation and in January of 2007 Uganda pledged its first troops which, along with those included in a reported offer by Nigeria, were to total 8,000.

Three and a half years later, there are only 6,000 foreign troops in Somalia (now under AMISOM, the only difference being the acronym now employed) and all of those from Uganda and Burundi, both nations U.S. military clients and surrogates.

The African Union (AU) initially approved AMISOM on January 19, 2007 and granted it a six-month mandate. In July of 2010 the real prime movers behind the mission, the U.S. and its NATO allies in the European Union, are pushing for an escalation of armed intervention in Somalia with more Western-trained Ugandan troops conducting open combat operations: Changing the mandate from, to use the terms employed to mask military aggression, peacekeeping to peace enforcement.   Continue reading “US, NATO Allies Prepare New Invasion Of Somalia”

Journal: Wikileaks Afghan Collection Assessed

02 Diplomacy, 03 Economy, 04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 08 Wild Cards, 09 Terrorism, 10 Security, Corruption, Government, InfoOps (IO), Intelligence (government), Media, Military, Misinformation & Propaganda

Chuck Spinney Recommends

Below is a good summary of the wikileaks database.  It is also a good example of how the secretive conspiratorial mind, trained in the wilderness of mirrors that is the US intelligence establishment, conjures motivations out of the ether.   The author builds a an inferential case to insinuate the massive leak of intelligence data via the wikileaks website was an orchestrated info-operation aimed at influencing the American polity by building the case for leaving Afghanistan.  Left unsaid, but dangling tantalizingly in the last two paragraphs, is a subtle (and unsubstantiated) suggestion that this leak came from very high levels, perhaps the highest level, of the Obama Administration.  Too clever by a half??????  Chuck

Thousands of reasons to leave

By George Friedman, Asia Times, 29 July 2010

On Sunday, The New York Times and two other newspapers published summaries and excerpts of tens of thousands of documents leaked to a website known as WikiLeaks. The documents comprise a vast array of material concerning the war in Afghanistan. They range from tactical reports from small unit operations to broader strategic analyses of politico-military relations between the United States and Pakistan. It appears to be an extraordinary collection.

Tactical intelligence on firefights is intermingled with reports on confrontations between senior US and Pakistani officials in which lists of Pakistani operatives in Afghanistan are handed over to the Pakistanis. Reports on the use of surface-to-air missiles by militants in Afghanistan are intermingled with reports on the activities of former Pakistani intelligence chief Lieutenant General Hamid Gul, who reportedly continues to liaise with the Afghan Taliban in an informal capacity.

FULL APPRAISAL ONLINE

Related:
Wikileaks Afghanistan files: every IED attack, with co-ordinates