Panarchy-Not Anarchy-Future of Global Governance

Advanced Cyber/IO, Definitions

Panarchy is “a useful way of thinking about cross-scale dynamics in complex adaptive systems.”  Source

Panarchy, in modern terms, is both an emerging theory of local to global relations spanning all current disciplines (e.g. economics, political science, sociology), and a public intelligence concept that posits non-violent collective intelligence, with access to all true cost information, as the prevailing form of governance from local to global.

Panarchy is strongly associated with the concepts of agility at the individual respondent and collective intelligence (crowd or swarm) levels, the only means of achieving resilience that is inherently stabilizing.

Panarchy is the logicial end-state for Advanced Cyber/Information Operations, ultimately achieving transparency, truth, and trust by connecting dots to dots, dots to minds, and minds to minds, in a seamless sustainable manner.

Panarchy, to be effective, requires feedback loops with integrity (the absence of corruption, data pathologies, or information asymmetries).

Continue reading “Panarchy-Not Anarchy-Future of Global Governance”

Definitions: Data Security

Web Stack

Phi Beta Iota: Data Security is just beginning to emerge as a viable alternative to network security.  We have a very long way to go in this area, and also in relationship and identity authentication and trust assurance.  Having said that, the death of the closed network concept is inevitable.  The US Government is broke, DoD is going to run out of money for Industrial Era waste, and the better concepts that are more agile (e.g. time-based risk management in context of multinational information-sharing and sense-making operations) will rise to the surface.  The secret world will be the last to get it.

See Also:

Robert Garigue at Phi Beta Iota

2011 Cyber-Command or IO 21

Reference: Advanced Cyber-IO (First Cut)


Definitions: Netness & the Autonomous Internet

Autonomous Internet, Definitions


Sheldon Renan:


All things want to be connected — because the more things are connected the better they work. Now the scale and intimacy of connectivity is increasing (accelerating) at a scary rate. We don't see it, but we do sense it. The term “netness” characterizes our new state-of-being as connectivity becomes increasingly ubiquitous, our lives increasingly “entangled.”

Recognizing netness leads to recognizing this simple principle: connectivity is the most important enabler of creating of new value. Forget Moore's Law. It is extending connectivity across and beyond networks that increases knowledge, safety, collaboration and (critical for eCommers) access to new models and markets.

Limit connectivity and you limit opportunity. Connect the unconnected and you hugely improve odds for success. Netness offers a powerful conceptual tool for guiding innovation and governance going forward.”

Learn More:



Open Source Intelligence (OSINT) Starting Point

Definitions, Methods & Process, Tools

2006: BASIC: Open Source Intelligence Familiarization Documents (Original)

Open Source Intelligence (OSINT) leads to Information Operations (IO), which leads to Multinational, Multiagency, Multidisciplinary, Multidomain Information-Sharing and Sense-Making (M4IS2), which leads to Cyber-Command (CYCO6), a mis-nomer, but representing all information in all languages all the time, with every person and every artifact having their own IP address.

All of this–OSINT, IO, M4IS2, CYCO6–is Human Intelligence (HUMINT), not Technical Intelligence (TECHINT).  In the immortal words of Paul Strassman, then Director of Defense Information, “Information Technology makes bad management worse.”  We're there.  Peter Drucker said it in 1998 in Forbes ASAP, Robert Steele said it in 2000 to NSA in Las Vegas, we need to stop focusing on the T and start focusing on the I.  The “I” is about human brains, human minds, human relationships, human understanding.

Practical Do It Yourself (DIY) OSINT

2011 OSINT Discovery Toolkit–Reuser’s Repertorium

2010 Handbook Online for Internet Tools and Resources for Creating Open Source Intelligence (OSINT) by Dr. Ran Hock, Chief Training Officer, Online Strategies, Inc.

2009 OSINT Links Directory by Ben Benavides

2004 Special Operations Forces OSINT Handbook (Strawman)

2000-2002 NATO OSINT Handbooks

Strategic Enabling for a Smart Nation Creating a Prosperous World at Peace

Open Source Agency: Executive Access Point

2012 THE OPEN SOURCE EVERYTHING MANIFESTO: Transparency, Truth & Trust

2012 INTELLIGENCE FOR EARTH: Clarity, Diversity, Integrity & Sustainability

2008 COLLECTIVE INTELLIGENCE: Creating a Prosperous World at Peace

See Also:

Search: osint

Search: osint handbook

Search: osint models

Search: The Future of OSINT [is M4IS2-Multinational]

Page: M4IS2

Search: analytic tradecraft

Analysis, Definitions, Ethics, Historic Contributions, IO Sense-Making, Methods & Process
Jack Davis

While the automated search produces the relevant results, Jack Davis is the Sherman Kent of our time and deserves a cleaner quicker result.  Here is the human in the loop distillation of this great man's contributions as they appear on this web site and the two web sites in Sweden where all our stuff is safely preserved.

Who’s Who in Public Intelligence: Jack Davis

Review: Improving CIA Analytic Performance–Four Papers by Jack Davis

2003 Davis (US) Analytic Paradoxes: Can Open Source Intelligence Help?

1997 Davis A Compendium of Analytic Tradecraft Notes

Search: jack davis and his collected memoranda o

See Also:

Search: The Future of OSINT [is M4IS2-Multinational]

Search: osint cycle

Journal: Opinion on the Failure of “The System”

Worth a Look: Book Reviews on Analysis

Review: Assessing the Tradecraft of Intelligence Analysis

Review: Tell Me No Lies: Investigative Journalism That Changed the World

Review: The Landscape of History–How Historians Map the Past (Paperback)

Review: Strategic Intelligence–Windows into a Secret World

2000 PRIMER on Open Sources & Methods

Review: Thinking in Time–The Uses of History for Decision-Makers

1998 Open Source Intelligence: Private Sector Capabiltiies to Support DoD Policy, Acquisition, and Operations

Review: Strategic intelligence for American world policy (Unknown Binding)

Journal: $100 Billion Up in Smoke

Commercial Intelligence, Definitions, Military
David Isenberg

David Isenberg

Author, Shadow Force: Private Security Contractors in Iraq

Posted: October 7, 2010 12:24 PM

A Hundred Billion Dollars Up in Smoke

It is a pity that last week's Senate Armed Services committee hearing on “Department of Defense Efficiencies Initiatives” did not get more coverage, as there were some startling assertions made.

Consider what Sen. Claire McCaskill (D-MO) said. McCaskill, by the way, is more qualified than most members of Congress to talk on the subject of contracting. During her years as a prosecutor she conducted performance audits on state programs. She was named as one of the select senators to sit on the Permanent Subcommittee on Investigations, formerly known as the Truman Committee. In fact, she was a co-sponsor of a major bill that established a modern day Truman Committee called the Wartime Contracting Commission, charged with investigating wasteful, fraudulent and abusive contracts in the wars in Iraq and Afghanistan.

In addition to working to establish a committee to examine wartime contracting, in 2009 she was named chairman of a new subcommittee that investigates contracting abuses throughout the federal government. The Homeland Security and Governmental Affairs Committee (HSGAC) Subcommittee on Contracting Oversight strives to root out government waste by focusing on contracts and the means by which the federal government provides accountability to those contracts.

So when she says the following we should pay attention:

I–I'm a conservative person when it comes to estimating numbers, because of my auditing background. I think it's very conservative to say that we've had $100 billion go up in smoke in Iraq, from bad contracting, that it's not as if there weren't competing people who could have been brought in; it just was easier not to. And so, I urge you to keep us posted on how you're integrating that kind of contracting into the contracting reforms.

Read rest of blog….

Phi Beta Iota: It occurs to us, reading this, that “Deep Corruption” is the equivalent of “Deep Secrecy.”  Deep Corruption is corruption built into the system as legal or “within the bounds of reasonable dishonesty.”  Individuals can claim to be honorable, and believe themselves to be honorable, but in “going along” they are in fact part of Deep Corruption.