Creating a Smart Nation–and a World Brain–demands the participation of all of the people all of the time.
Phi Beta Iota: We reproduce the excerpt in order to add links to all of the books and individuals mentioned. Tip of the Hat to Reality Sandwich for this offering, and to Evolver Editions (North Atlantic/Random House) for their new Manifesto series in support of human consciousness and planetary synthesis.
Noosphere: The Next Stage in the Evolution of Human Consciousness, A Testimony
To mark the recent passing of José Argüelles, we offer an excerpt from his upcoming book Manifesto for the Noosphere: The Next Stage in the Evolution of Human Consciousness, available from Evolver Editions/North Atlantic Books in October 2011.
We must enlarge our approach to encompass the formation taking place before our eyes … of a particular biological entity such as has never existed on earth-the growth, outside and above the biosphere, of an added planetary layer, an envelope of thinking substance, to which, for the sake of convenience and symmetry, I have given the name of the Noosphere. –Pierre Teilhard de Chardin, The Future of Man
Manifesto for the Noosphere is the result of forty years of study, contemplation, investigation, and synthesis. While the noosphere may be beyond the grasp of conventional science, it is a deep and pervasive intuition that has gripped the minds of scientists, philosophers, poets, and artists since the concept first emerged in 1926. It is an evolutionary concept posited by studies in both biogeochemistry and paleontology. It is a whole-systems paradigm that melds prophecy and analysis of current world trends. It is a perception that the transformation of the biosphere is inevitably leading to a new geological epoch and evolutionary cycle, and it is due to the impact of human thought on the environment that this new era — the Noosphere — is dawning.
It is my pleasure to announce the publication of The Pentagon Labyrinth: 10 Short Essays to Help You Through It. This is a short pamphlet of less than 150 pages and is available at no cost in E-Book PDF format, as well as in hard copy from links on this page as well as here and here. Included in the menu below are download links for a wide variety of supplemental/supporting information (much previously unavailable on the web) describing how notions of combat effectiveness relate to the basic building blocks of people, ideas, and hardware/technology; the nature of strategy; and the dysfunctional character of the Pentagon’s decision making procedures and the supporting role of its accounting shambles.
This pamphlet aims to help both newcomers and seasoned observers learn how to grapple with the problems of national defense. Intended for readers who are frustrated with the superficial nature of the debate on national security, this handbook takes advantage of the insights of ten unique professionals, each with decades of experience in the armed services, the Pentagon bureaucracy, Congress, the intelligence community, military history, journalism and other disciplines. The short but provocative essays will help you to:
- identify the decay – moral, mental and physical – in America’s defenses,
- understand the various “tribes” that run bureaucratic life in the Pentagon,
- appreciate what too many defense journalists are not doing, but should,
- conduct first rate national security oversight instead of second rate theater,
- separate careerists from ethical professionals in senior military and civilian ranks,
- learn to critique strategies, distinguishing the useful from the agenda-driven,
- recognize the pervasive influence of money in defense decision-making,
- unravel the budget games the Pentagon and Congress love to play,
- understand how to sort good weapons from bad – and avoid high cost failures, and
- reform the failed defense procurement system without changing a single law.
The handbook ends with lists of contacts, readings and Web sites carefully selected to facilitate further understanding of the above, and more.
Venessa Miemis. March 16 2010
This weekend I experienced a snowcrash; a moment where the seemingly disparate pieces of information floating in my head came together. A synapse fired, a new connection was made, and I was brought to a new level of consciousness, a new way of seeing the world. In reading this over, it almost sounds obvious, but it took me a while to get here. I hope that by sharing with you, it’ll help you “get it” too. So let me take you on my thinking trail.
Burning Man’s open source cell phone system could help save the world
Solar-powered OpenBTS systems costs pennies a day and operates in the farthest outreaches of Earth.
By Julie Bort, Network World
August 30, 2010 02:47 PM ET
Today I bring you a story that has it all: a solar-powered, low-cost, open source cellular network that’s revolutionizing coverage in underprivileged and off-grid spots. It uses VoIP yet works with existing cell phones. It has pedigreed founders. Best of all, it is part of the sex, drugs and art collectively known as Burning Man. Where do you want me to begin?
“We make GSM look like a wireless access point. We make it that simple,” describes one of the project’s three founders, Glenn Edens.
The technology starts with the “they-said-it-couldn’t-be-done” open source software, OpenBTS. OpenBTS is built on Linux and distributed via the AGPLv3 license. When used with a software-defined radio such as the Universal Software Radio Peripheral (USRP), it presents a GSM air interface (“Um”) to any standard GSM cell phone, with no modification whatsoever required of the phone. It uses open source Asterisk VoIP software as the PBX to connect calls, though it can be used with other soft switches, too. (More stats in a minute that I promise will blow away your inner network engineer.)
Direct to Source (If Still Up); Full Story Back-Up Copy Below This Line
by John Robb of Global Guerrillas
For an open source revolt (here’s some background on “open source insurgency“) to be successfully formed, it needs a plausible promise. A meta issue around which all of the different factions etc. can form (remember, most of the groups and individuals involved in an open source revolt can’t agree on anything but some basic concepts). A generic “day of revolt” doesn’t accomplish that. What could?
Using the multi-million scale No Mas FARC protests as an example and the critical ingredient in the Tunisian protests (extreme corruption that generated an endless wellspring of anger/frustration), a potential “plausible promise” for an Egyptian open source revolt is:
No More Corruption
Not only is a movement opposing corruption something the government will find hard to oppose, it is something every Egyptian deals with on a daily basis. It also has the added benefit of directly harming the entrenched ruling elite, who are likely to become poster children of the very thing the movement is against.
On Need to Know, we do a lot of reporting about the world’s problems. But we’re premiering a new series about people coming up with creative solutions — it’s called “Agents of Change.”
9 minutes — summary
Social entrepreneur challenging conventional wisdom
Samasource–microwork (small digital tasks that can be done on an inexpensive computers).
Building 21st Century assembly line that can break down massive tasks (e.g. updating addresses for Google maps, or translating emergency messages from Creole to English). Won contracts with Google, LinkedIn, Microsoft.
15% premium for socially-conscious companies, AND competitive on cost, quality, and turnaround time.
Small scale digital tasks did not exist before.
Transforming lives, especially women, young men, and refugees. $5 a day is very much better than local norms, and buys an active English-speaking brain with hands able to do quality work.
IMPORTANT: Developing world is out-pacing USA and West generally in extending Internet infrastructure to the poor–centers created, humans come in, also doing viewing (Gorgon Stare, take note!), creating logs of store videos on shopper buying habits, anything that can be noticed and logged by a human–$5 a day.
Phi Beta Iota: We could not, in a million years, have found a better “off-set” to the USAF Gorgon Stare program. This micro-tasking, combining human brains and hands with Internet access, is one of the most profoundly intelligent and socio-economically useful ideas we have seen in our lifetimes (there are 800 of us here). BRAVO.
NOTE 1: HTML versions work, PPT do not
NOTE 2: Cyber/IO is the enabler of all that he envisions.
This is THE toolbox, available in both long and short versions, we recommend you start with the long and then rapidly migrate to the short. Arno is THE “dean” of OSINT for government, and the “dean” of the advanced librarian discovery movement.
We strongly endorse Arno Reuser as an individual, and recommend his training offerings available directly from him. By-pass the external vendor training link at the Repertorium and send him a direct email.
The Core Protocols V. 3.02
(The Core is distributed under the terms of the GNU-PL. For exact terms see http://www.gnu.org/licenses/gpl.txt. The Core is considered as source code under that agreement. You are free to use and distribute this work or any derivations you care to make, provided you also distribute this source document in its entirety, including this paragraph.)
The following Core Protocols are made up of both commitments and protocols.
- The Core Commitments
- Pass (Unpass)
- Check In
- Check Out
- Ask For Help
- Protocol Check
- Intention Check
- Personal Alignment
Tip of the Hat to Pétur Orri Sæmundsen in Iceland.
This is the first and only time we have seen truth & trust properly identified as fundamental to security. The only other related works are those of Dr. Col Max Manwaring, whose edited work, The Search for Security–A U.S. Grand Strategy for the Twenty-First Century makes the point that legitimacy is the core value enabling peace and prosperty; and the Nobel Prize awarded in the 1990’s to the scholar that demonstrated that trust lowers the cost of doing business.
Cyber-space, if it is to contribute to the evolution of humanity, must be imbued with truth & trust. THIS is the core focus of any information security program in support of information operations, NOT “mere” “control” of potential data loss or “defeat” of potential enemies. We sorely miss Robert Garigue–he was illuminating a very righteous path, and to our knowledge, none have stepped forth to fill his shoes.
As Found In:
Original (Web): INFORMATION WARFARE – Developing a Conceptual Framework
Copy (Document): INFORMATION WARFARE – Developing a Conceptual Framework