Reference: Big Data, Big Impact – New Possibilities

World Economic Forum

Big Data, Big Impact:
New Possibilities for International Development

Executive Summary

A flood of data is created every day by the interactions of billions of people using computers, GPS devices, cell phones, and medical devices. Many of these interactions occur through the use of mobile devices being used by people in the developing world, people whose needs and habits have been poorly understood until now. Researchers and policymakers are beginning to realise the potential for channelling these torrents of data into actionable information that can be used to identify needs, provide services, and predict and prevent crises for the benefit of low-income populations. Concerted action is needed by governments, development organisations, and companies to ensure that this data helps the individuals and communities who create it.

PDF 10 Pages

Phi Beta Iota:  What is interesting is the absence of any concept of call centers or geospatial plotting.  These people are on to something, but they are approaching it from an Industrial Era mind-set, using the big data to monitor and anticipate rather than to nurture and educate.

DefDog: Cyberwar is the New Yellow Cake

Computer/online security, Corruption, Government, IO Impotency, Law Enforcement, Military, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy
DefDog

The same has been said about the War on Drugs, the War on Terrorism, et al…..and nothing seems to back up the dire rhetoric, but the spending of tax dollars rolls on just the same.

Wired Opinion: Cyberwar Is the New Yellowcake

By

WIRED, 14 February 2012

In last month’s State of the Union address, President Obama called on Congress to pass “legislation that will secure our country from the growing dangers of cyber threats.” The Hill was way ahead of him, with over 50 cybersecurity bills introduced this Congress. This week, both the House and Senate are moving on their versions of consolidated, comprehensive legislation.

The reason cybersecurity legislation is so pressing, proponents say, is that we face an immediate risk of national disaster.

“Today’s cyber criminals have the ability to interrupt life-sustaining services, cause catastrophic economic damage, or severely degrade the networks our defense and intelligence agencies rely on,” Senate Commerce Committee Chairman Jay Rockefeller (D-W.Va.) said at a hearing last week. “Congress needs to act on comprehensive cybersecurity legislation immediately.”

Yet evidence to sustain such dire warnings is conspicuously absent. In many respects, rhetoric about cyber catastrophe resembles threat inflation we saw in the run-up to the Iraq War. And while Congress’ passing of comprehensive cybersecurity legislation wouldn’t lead to war, it could saddle us with an expensive and overreaching cyber-industrial complex.

Continue reading “DefDog: Cyberwar is the New Yellow Cake”

Tom Atlee: Big Breakthrough in Group Process

Advanced Cyber/IO, Civil Society, Collective Intelligence, Cultural Intelligence, Ethics
Tom Atlee

A big breakthrough for all group process folks…

For almost 5 years I've been involved with envisioning and creating a “pattern language” for group process. (A pattern language is a set of design factors to guide people in creating things that are wholesome and life-giving – vibrant communities, effective curricula, engaging software… and great conversations.) That process has now come to fruition.

In 2008 Peggy Holman and I did an all day workshop on “A Pattern Language for Conversations that Matter” to introduce the idea of pattern languages to professionals in the National Coalition for Dialogue and Deliberation (NCDD). That winter, Tree Bressen invited me to a multi-day gathering at her home to actually construct a pattern language on group process. That session began what proved to be a profoundly complex and challenging task facilitated by Tree and her tiny core team of volunteers – all pieced together on a gigantic wiki and Google docs and dozens of meetings. I participated in a few more of their multi-day work sessions over the years, but about a dozen other volunteers did far more work than I did. Last year I wrote a blog post on the project for NCDD – http://ncdd.org/4535 – and a couple of weeks ago wrote a personal blog post – http://post.ly/534Wr – on the transformational potential of pattern languages of all kinds – and why I consider them profoundly important. But the big news now is that the pattern language so many of us labored for so many hours to produce has now been released as a gorgeous card deck.

I can't recommend this resource highly enough for anyone seeking to create high quality conversations of any kind for any purpose. This card deck is THE premier navigational tool for powerful conversations. It goes deeper than methodology and is more practical than theory. It is designed to help us understand what is going on and how to make it better. It offers greater flexibility and power to our practices of dialogue, deliberation, mediation, choice creating, and conversation of all types. It is available electronically FREE for the taking – and only costs $25 if you want a physical printed boxed deck.

And to top it all off – it is beautiful.

So I hereby invite you into a new world of conversational adventure and insight, available to you right now.

Coheartedly,
Tom

GROUP WORKS PATTERN LANGUAGE CARD DECK RELEASED!

Continue reading “Tom Atlee: Big Breakthrough in Group Process”

Journal: Anon 02 on The Craft of Intelligence

Blog Wisdom, Director of National Intelligence et al (IC)

Second Pass

The “tribes” metaphor does little for me.  I humbly suggest you lose it; it is neither explanatory nor usefully evocative (IMHO).

As to who does intelligence for Whole of Government, I submit that the WOG is not a monolith so, to answer your question, there are many forces and factions who provide intelligence to their favorite parts of government: there are industry associations, trade groups, lobbyists, media, academics, and pontificators as well as various organs of the departments and agencies, themselves.  Are many of them “ideologues?” Probably. Some more, some less, some admittedly so.  So what?  None are franchised to break U.S. law to get their information (including CIA et al) but they can pay for it or obtain it thought cunning and deceit (but not impersonating LEO’s, etc.).  CIA et al can keep sources and methods officially secret, but others can rely on confidential informants, shielded sources, lawyer/doctor privilege, and other various privacy categories.  CIA et al can keep products officially secret but others can restrict their intellectual property in various ways.

Our government can use information to inform its own decisions and influence foreign powers and their citizenry, but we are loath to permit our government to use its resources to develop information and “lobby” the U.S. public with that information …although it can use its resources to “educate” the populace …but the line often blurs, one man’s education is another’s unwanted interference: consider information on abortion and contraception, for example.  We can use USG resources to “educate” the Chinese vis a vis contraception, but not to “educate” certain religious institution’s membership.

Continue reading “Journal: Anon 02 on The Craft of Intelligence”

Journal: Anon 01 on The Craft of Intelligence

Blog Wisdom, Director of National Intelligence et al (IC)

Intelligence, as it has existed throughout history, can be described in terms of two related functions:

a) On behalf of the sovereign, obtain relevant and difficult-to-obtain information concerning grave threats.

b) Support the judgment of the sovereign concerning these grave threats.

In Byzantium, for example, the emperor was the sovereign and was perpetually threatened by enemy forces that his forces either could not defeat, or that would be unwise to defeat because doing so would weaken the empire and create opportunities for other enemies.  In this perilous situation the emperor posted soldiers, diplomats, and spies who were expert craftsmen.  They learned languages, developed deep relationships, and detected and understood threats.  Reports streamed to the emperor’s cohesive intelligence staff who pondered the situation and advised him on how to deflect conflict that would otherwise lead to ruin.  Sometimes this required aggressive or preemptory moves and decisions to invest in walls, standing troops, ships, battle plans, and so forth.  But often prudent judgment resulted in deception, compromise, conciliation, bribery, flattery, and so forth.

The functions of intelligence continued in the modern era but take on a very different appearance.  In the US after WW2, the sovereign was technically the people, but in practice was the government.  The grave threats continued to be great political powers, but the battlefield became somewhat more generalized (though no more complicated), requiring judgment on different ways to quell threats.  The nation’s prestige continued to be an important factor, but it could be developed in different ways, such as through developing a reputation for helping all through world regulatory institutions, concepts of human rights, free trace, and such.   Though this was not completely alien to Byzantium which burnished its reputation as a sophisticated culture and magnanimous power that was not threatening to others unless provoked, and that would be beneficial to trade with and ally with against others.

The other shift in the modern era has been in the means of obtaining information.  Through an astonishing array of technology, much more data are obtained, though relevant information can still seem elusive.

Very recently, the situation has shifted in ways that bring traditional assumptions into question, and that create challenges for the craft.  First, the sovereign is looking much more like the people and is event spilling over into a concept of the people beyond the borders.  There is an interest in peaceful global order and the demotion of governments to true stewards of the sovereign.  The people, because of modern communication and reframing of their role, are less compliant and obedient to sovereign representatives.  This combines with a very different appreciation of which threats are grave.  Tsunamis, including of the economic kind, and loss of food, water, and health, are just as real and ruinous as interstate conflict, which in many parts of the world has receded as a threat.  A lot of the information that was difficult to obtain is now not so difficult to obtain, and can be obtained differently.  What is relevant is changing, along with the threat.

The functions of intelligence continue and remain valuable, but it is evident that the terms under which it operates, or could operate, have changed greatly. Yet the institutions that were developed to fulfill the functions have barely recognized that the ground has shifted under them.  There are (five) principal ways that the institutions have not adapted:

1.  Mindless technical collection, producing data but not enough relevant information on the real threats to warrant the expense, especially since the information that would be obtained by these means is, in many ways, available through other means.

2.  Our understanding of the grave threats is not updated.  We direct vast resources against an irritating but relatively unimportant band of thugs, meanwhile the underpinnings of our society are eroding, in part because of our outsized exertions in pursuit of the thugs.

3.  The sovereign is mistaken to be the President.  Vast amounts of relevant information are not made available to the people, in the people’s interest, leading to poor understanding of the situation and poor judgment on the part of the people.

4.  Relevant information is available in the open.  that doesn’t always make it easy to obtain, but it is bypassed simply because the institutions are focused on difficult processes (i.e., secret means).  That is a misunderstanding of the function of intelligence.  Difficult to obtain information is the point, and that information should be obtained directly, which is now often from open sources, and increasingly from volunteer or crowd sources (the people serving themselves) that can be cultivated and organized more effectively at low cost (cell phones, internet, surplus cognition, etc.).

5.  The intelligence institutions have neglected support of judgment.  This is partly due to being disinvited to help shape the sovereign’s judgment, but that is also partly due to mistaking who the sovereign has become.  The people’s judgment is now being poisoned by ideologues who have filled the void.  The situation is not honestly and soberly appreciated.  Societal sense-making suffers due to the failure of the intelligence function and craft to support it.

Reference: Bibliography on The Craft of Intelligence

Articles & Chapters

Bibliography for New Craft of Intelligence

With a 5,000 word limit for each author contributing to the new Routledge Companion to Intelligence Studies (2013), the bibliography, at 2,000 words, cannot be included.  It is posted here for general access.  This bibliography does not address the many books on intelligence that have been reviewed, all of which contain relevant information about the craft of intelligence.  Below is a consolidated list of most but not all books on the larger topic of intelligence as reviewed by Robert David Steele.

Worth a Look: Book Reviews on Intelligence (Most)

At the more strategic levels, books contributing to an understanding of how the new craft of intelligence must meet the needs for decision-support by all stakeholders at all levels through access to all information in all languages all the time, see the links below and the central column within Phi Beta Iota and/or the Index.

Worth a Look: Book Review Lists (Positive)

Worth a Look: Book Review Lists (Negative)