Theophillis Goodyear: Reflections on Anarchy versus Open Source

Blog Wisdom, Cultural Intelligence
Theophillis Goodyear

The term anarchy is antithetical to Open Source, because anarchy, by strict definition at least, sees all forms of state organization as structures that need to be eliminated. Open Source, on the other hand, is about spreading control of these systems of organization to the general population, rather than leaving them concentrated in the hands of the few at the top. It's not about eliminating systems of organization. That can have disastrous and unforeseeable social consequences.

And although many anarchists may agree with this basic component of Open Source systems, the term anarchy is a relic that needs to be discarded. It can only confuse things and hold back the Open Source movement from reaching it's ultimate potential. People have been talking about the information age for decades. But the true information age hasn't even arrived yet. It will arrive when it has become commonplace for humans to link their brains through computer systems and thereby increase human intelligence exponentially. The true age of information means intelligence squared.
Prematurely killing “the state” could kill the very systems of organization required to make Open Source a reality. And once open source becomes a reality, what anarchists currently call “the state,” as we know it, will no longer exist anyway. Anarchists need to catch up with the times and stop getting so hung up on worn out terminologies and ideologies. Often the greatest obstacles to human progress are our antiquated intellectual models and habitual mindsets. Just as the founding fathers of America could never have envisioned the complexities and potentials of contemporary society, neither could the original anarchists. Strict constitutionalists often use the ideas of the founding fathers to block reasonable progress. At times it looks to like anarchists are doing the same thing. They need to let go of the past and start looking toward the future.

Reference: Gordon Cook on Technology, Economics & Public Interest – Occupy and the Current Global Downturn

Advanced Cyber/IO, Autonomous Internet
Click on Image to Enlarge

2012-04-13 Cook Report Technology Economy and Public Interest

Phi Beta Iota:  Gordon Cook sets the gold standard for thoughtful integrated observations and analysis of the Internet.  His materials is read by the greatest of pioneers such as Vint Cerf, as well as by those who aspire to be pionoeers, such as those building the Freedom Tower and the Autonomous Internet Roadmap.  Some say data is the new dirt.  Others say data is the new gold.  We say that cyber is the new world mind, in which humans, information, and the connections among them become the World Brain and implement a transparency so strong that it eradicates corruption and ends fraud, waste, and abuse against the many and in favor of the few.

See Also:

Reference: Gordon Cook on Freedom Tower and the Autonomous Internet – Peer to Peer User-Owned Communications and Computing Infrastructure

THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth & Trust

DefDog: The infamous ‘take down the Internet in 30 minutes’ hearing from 1998 — Tens of Billions Later, NSA and OMB Have Not Done Their Jobs, US Cyber is Wide Open and Unsafe at Any Speed + Meta-RECAP

Corruption, Government, IO Impotency, Military
DefDog

This is the famous hearing where Mudge told senators he could K-O the Internet in 30 minutes. It was a wide-ranging discussion, though Mudge's claim is what the media ran with at the time. Watch and ask yourself, as Trustwave's Tom Brennan does on his Facebook page this morning: “14 Years… have we gotten better?”

I think as Tom said, with all the spending, with all the hoopla, we have not achieved any security  (as you and Winn noted in the early 90's).  For everything that has been said, for the government it has turned into another method to rob the citizen blind…..

The infamous ‘take down the Internet in 30 minutes' hearing from 1998

A video has surfaced from 1998, showing some well-known members of the hacker community testifying before the United States Senate Committee on Governmental Affairs.

In this video, recorded on May 19, 1998, you will see Brian Oblivion, Kingpin, Tan, Space Rogue, Weld Pond, Mudge, and Stefan von Neumann.

This is the famous hearing where Mudge told senators he could K-O the Internet in 30 minutes. It was a wide-ranging discussion, though Mudge's claim is what the media ran with at the time. Watch and ask yourself, as Trustwave's Tom Brennan does on his Facebook page this morning: “14 Years… have we gotten better?”

Phi Beta Iota: Winn Schwartau and Peter Black were among the first to warn all of us in 1990. In 1994 the alarm was sounded with a letter and very specific spending recommendations from Jim Anderson, then a top NSA security consultant, Winn Schwartau, Bill Caelli, and Robert Steele.  The letter was ignored.  Today, just short of 20 years later, the US Government remains ignorant, unethical, and ineffective in cyberspace.

See Also:

Continue reading “DefDog: The infamous ‘take down the Internet in 30 minutes' hearing from 1998 — Tens of Billions Later, NSA and OMB Have Not Done Their Jobs, US Cyber is Wide Open and Unsafe at Any Speed + Meta-RECAP”

Reference: Gordon Cook on Freedom Tower and the Autonomous Internet – Peer to Peer User-Owned Communications and Computing Infrastructure

Advanced Cyber/IO, Autonomous Internet
Click on Image to Enlarge

2012-04-13 Cook Report Peer to Peer Freedom Tower

Phi Beta Iota:  This is a hugely important reference work, the first of its kind, and very strongly recommended to all who care about human dignity, human freedom, and human evolution.

See Also:

Reference: Gordon Cook on Technology, Economics & Public Interest – Occupy and the Current Global Downturn

THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth & Trust

DefDog: FBI Wants to Advance the Art of Interrogation

IO Impotency
DefDog

Creepy: FBI wants to “advance the science of interrogation”

FBI group looking to develop better ways to interrogate high-profile bad guys

By Layer 8

NetworkWorld, Thu, 04/12/12

From deep in the Department of Creepy today I give this item: The FBI this week put out a call for new research “to advance the science and practice of intelligence interviewing and interrogation.”

The part of the FBI that is requesting the new research isn't out in the public light very often: the High Value Detainee Interrogation Group, which according to the FBI was chartered in 2009 by the National Security Council and includes members of the CIA and Department of Defense, to “deploy the nation's best available interrogation resources against detainees identified as having information regarding terrorist attacks against the United States and its allies.”

The purpose of research requested by the controversial HIG is to advance the science and practice of intelligence interviewing and interrogation, the FBI stated.  The group defined several areas for long-range study that include:

  • Field observations of military and strategic interrogators, intelligence interviewers in order to document strategies, methods and outcomes;
  • Surveys and structured interviews of interrogators, intelligence interviewers and debriefers specified by the Government in order to document what these operational personnel think works and does not work and the development of operationally-based best practices which may be later investigated via laboratory or field studies;
  • Development, testing and evaluation of metrics for assessing the efficacies of interrogations, intelligence interviews and debriefs and of the use of particular interrogation, intelligence interview and debrief strategies and methods;
  • Field quasi-experimental studies to evaluate the efficacy of new evidence-based interrogation, intelligence interview and debrief strategies and methods;
  • Laboratory studies to test and/or discover new interrogation, intelligence interview and debrief methods;
  • Laboratory or field studies to assess the validity of evidence-based interviewing, deception detection, and other relevant principles and/or methods across non-U.S. populations both with and without the use of interpreters;
  • Laboratory or field studies on fundamental psychological processes (to include but not be limited to decision-making, emotion, motivation, memory, persuasion, social identities and social development) as these are relevant to interrogations, intelligence interviews and debriefs;
  • Laboratory or field studies of interpersonal processes (e.g., social influence, persuasion, negotiation, conflict resolution and management), with particular attention to cultural and intercultural issues.

Phi Beta Iota:  Evidently the FBI has not fully absorbed the existing knowledge represented by such stellar ethical interrogators as Col Stu Herrington, USA (Ret).   Technology is not a substitute for thinking.  Research is not a substitute for experience.

 

Event: 16-19 July Las Vegas 2012 International Conference on Internet Computing

Advanced Cyber/IO

2012 International Conference on Internet Computing

Dates: Jul 16 – 19, 2012

Location: Las Vegas, Nevada

 

Topics of interest include, but are not limited to, the following:

  • Social networks
  • Next generation of internet + modeling and analysis
  • Traffic models and statistics
  • Metacomputing
  • Electronic commerce and internet
  • Resource management and location
  • Design and analysis of internet protocols and engineering
  • Web based computing
  • Web mining
  • Network architectures and network computing
  • Network operating systems
  • Quality of service
  • Wide area consistency
  • Internet and emerging technologies
  • Internet security and trust
  • Internet law and compliance
  • Internet and scalability issues
  • Internet delivery and applications
  • Internet telephony
  • Internet based decision support systems
  • Internet and enterprise management
  • Internet applications and appliances
  • Internet banking systems
  • Internet and video technologies
  • Internetworking
  • Denial of service issues
  • Caching algorithms for the internet
  • Grid based computing and internet tools
  • Cooperative applications
  • Tele-medical and other applications
  • Mobile computing and the internet
  • Agents for internet computing
  • The WWW and intranets
  • Digital libraries/digital image collections
  • Languages for distributed programming
  • Web interfaces to databases
  • User-interface/multimedia/video/audio/user interaction
  • The internet and Cloud computing
  • Markup Languages/HTML/XML/VRML/…
  • Java applications on internet
  • Alternative web lifestyles, role-playing, chat, …
  • Server space/web server performance
  • Web monitoring
  • Web documents management
  • Web site design and coordination
  • Other aspects and applications relating to internet-based computing
  • Workshop on Computer Games Design and Development:
    • Managing gaming communities
    • Augmented reality games
    • Game architectures
    • Special-purpose hardware for games
    • Computer games and education
    • Mobile and ubiquitous games
    • Games and the web
    • Making quality game textures
    • Threading technologies for games
    • Assessment of new generation of computer games
    • The impact of art and culture in game design
    • Game theory as it relates to internet
    • Artificial intelligence and computer games
    • Tools for game development on the internet
    • Grid computing and games
    • Massively multiplayer games and issues
    • Social impact of computer games
    • Wavelets technology for games
    • Compression methods for games
    • 3D hardware accelerators for games on the internet
    • Audio-video communication tools for network 3D games
    • Virtual actors
    • Virtual world creation
    • Background sound/music for games
    • Holographic displays and games
    • Computer graphics and virtual reality tools for games
    • Innovative products for game development
    • Interface technologies
    • Case studies

    Event Home Page