Phi Beta Iota: STRONG ANGEL was the other major innovation besides CATALYST, Analysis 2000, and MCIA JNID. Below is Round II from STRONG ANGEL, with Round II from M4IS2 soon to be made public, built around SILOBREAKER (actually, Son of SILOBREAKER). We considered forcing visits to the Synergy Strike Force home page, but decided that the richness of the content there needed to be displayed here.
I. Introduction
Welcome to the MESS-KIT wiki: Minimum Essential Software Services for Knowledge and Information Transfer
Users — What skills are needed to use the MESS-KIT
II. Structure
The MESS-KIT system is composed of three basic components — the software package, the virtual environment and the hardware:
a. APPLICATION SOFTWARE PACKAGE: One or more Virtual Machine Instances that package together an operating system with a web server environment and all free-and-open-source/commercial-off-the-shelf software modules. Example: A VMware instance of an Ubuntu Linux installation with a full LAMP web server hosting environment and associated web software.
b. VIRTUAL MACHINE CLIENT SOFTWARE: One Virtual Machine Software Client to package, distribute, and host one or more Application Software Packages and abstract the application software from the host operating system. Examples: VMWare Fusion and Sun VirtualBox.
c. HARDWARE: Hardware on which the Virtual Machine Client Software and Application Software Package will run. The Hardware will include a host operating system. Examples: MacMini running OSX, ASUS eeePC Netbook running eeeBuntu Linux.
Defying a previous veto threat from the White House, the House of Representatives will consider an amendment to bolster intelligence oversight by requiring intelligence agencies to cooperate with the Government Accountability Office when it performs audits that are requested by a congressional committee with jurisdiction over intelligence.
In general, the amendment (pdf) states, “the Director of National Intelligence shall ensure that personnel of the Government Accountability Office designated by the Comptroller General are provided with access to all information in the possession of an element of the intelligence community that the Comptroller General determines is necessary for such personnel to conduct an analysis, evaluation, or investigation of a program or activity of an element of the intelligence community that is requested by one of the congressional intelligence committees.”
The amendment to the FY2011 Defense Authorization Act (HR 5136) was sponsored by Rep. Anna Eshoo (D-CA) and several colleagues.
When a similar amendment was included in the FY2010 Intelligence Authorization Act, which is still pending, it prompted a veto threat from the Obama White House. But the White House opposition was based on an erroneous interpretation of the law, the Acting Comptroller of the GAO told Congress.
Somewhat surprisingly, given the likelihood of a renewed veto threat, the House Democratic leadership ruled that the Eshoo amendment was “in order,” and it will therefore be considered on the House floor, perhaps today or tomorrow.
Back when he was a Congressman in 1987, CIA Director Leon Panetta introduced a bill called the “CIA Accountability Act” (pdf) that would have reinforced GAO oversight over the Central Intelligence Agency.
Can't Fix Stupid
Phi Beta Iota: Tip of the hat to Secrecy News for the above lead story. The secret world is long overdue for GAO oversight, and we have stated in writing before that the first decision by any Director of National Intelligence (DNI) with even a modicum of ethics (we're not holding our breath) should be to create an integrated IG/GAO office and put the entire secret intelligence world under a GAO microscope. It is our judgement that 90% of the contract positions should be eliminated, and at least 50% of the so-called government employee positions, most of which are very highly paid clerical positions, nothing more. The budget should be cut back to $25 billion a year, with the proviso that the other $50 billion remains under the DNI's purview for redirection toward education, research, and a global multinational multiagency multidisciplinary multidomain information sharing and sensemaking (M4IS2) grid focused on creating a prosperous world at peace. Budget intelligence, and the eradication of corruption at all levels by combining true cost intelligence with the exposure of blatantly stupid acquisition decisions, some but not all also corrupt acquisition decisions (most just uninformed), is the single best thing intelligence can do for the government; creating a Smart Nation is the ONLY thing that should be on the next DNI's mind. If Obama is dumb enough to keep John Brennan at the White House, he is assuredly dumb enough to move Jim Clapper or Leon Panetta to the DNI position and lose all hope of ever getting anything serious out of the secret world in the little time he has remaining. No one now serving is capable of serving the public interest–Panetta had a shot, but if he cannot handle CIA he assuredly cannot handle Jim Clapper and the Clapper Harem.
The New York Times this morning has a particularly lush installment of one of the American media's most favored, reliable, and self-affirming rituals — it's time to mock and pity Those Crazy, Primitive, Irrational, Propagandized Muslims and their Wild Conspiracy Theories, which their reckless media and extremists maliciously disseminate in order to generate unfair and unfounded hostility toward the U.S.:
Conspiracy theory is a national sport in Pakistan, where the main players — the United States, India and Israel — change positions depending on the ebb and flow of history. Since 2001, the United States has taken center stage, looming so large in Pakistan's collective imagination that it sometimes seems to be responsible for everything that goes wrong here. . . . The problem is more than a peculiar domestic phenomenon for Pakistan. It has grown into a narrative of national victimhood that is a nearly impenetrable barrier to any candid discussion of the problems here. In turn, it is one of the principal obstacles for the United States in its effort to build a stronger alliance with a country to which it gives more than a billion dollars a year in aid.
Initially, it's worth asking how these “conspiracy theories” compare to this: from the front page of The New York Times, September 8, 2002:
More than a decade after Saddam Hussein agreed to give up weapons of mass destruction, Iraq has stepped up its quest for nuclear weapons and has embarked on a worldwide hunt for materials to make an atomic bomb, Bush administration officials said today. . . . In the last 14 months, Iraq has sought to buy thousands of specially designed aluminum tubes, which American officials believe were intended as components of centrifuges to enrich uranium. . . . An Iraqi defector said Mr. Hussein had also heightened his efforts to develop new types of chemical weapons. An Iraqi opposition leader also gave American officials a paper from Iranian intelligence indicating that Mr. Hussein has authorized regional commanders to use chemical and biological weapons to put down any Shiite Muslim resistance that might occur if the United States attacks.
From the front page of The Washington Post, April 3, 2003:
Energy-related economic, security, and environmental threats are intensifying the national conversation about how to regain energy leadership and competitiveness, restore jobs and prosperity, and build a secure and climate-safe energy system.
Yet America lacks a comprehensive vision of how a market economy can achieve these transformational goals.
RMI has that vision, and is now building its detailed roadmap, which we call Reinventing Fire™. This strategy will bring together RMI’s 28 years of innovation and engage the world in our most ambitious and important work yet—using whole-system thinking and integrative design to move the U.S. off fossil fuels by 2050, led by business for profit.
Phi Beta Iota: This is righteous good stuff. It does not go far enough. Agriculture & Water as well as Health & Society are other points on the compass that must be addressed coherently and simultaneously. That will not happen without the restoration of integrity (not just of honor but of thinking). We salute the Rocky Mountain Institute for taking the fist viable step in the right direction.
The search term brings up appropriate results, but the fact of the search gives us an opportunity to provide comment.
1) Nothing now being used by governments, and certainly not iBase or Palantir, both aging technologies that do not scale and have too many fat-finger handicaps, fulfills the originial requirements documents crafted in the late 1980's.
2) The ONLY programs that have gotten anywhere close are COPERNICUS plus plus, and SILOBREAKER. However, both of these have been slow to recognize the urgency of integrating–fully integrating–capabilities that address each of the eighteen functionalities. Below is the list of softwares now in use by US Special Operations Command J-23 Open Source Intelligence Branch along with the STRONG ANGEL TOOZL and a couple of other things.
The global standard for multinational information-sharing and sense-making is in the process of being designed, funded, and distributed. If you think you have something relevant to that, generally only open source software will be considered, get in touch with any of the individuals above.
We have eradicated the Malware that snuck in with a comment. It was a two-step process.
1) Delete all comments and then Close Comments.
2) Find the infected file that reactivated itself each time an unsecured computer visited Phi Beta Iota–evidently the robots are resident everywhere.
We should have reacted to Google's warning signals sooner. We could not replicate the issue here and that is why we were slow. In the process of eradicating the malware, Google's interactive help was both essential and easily available.
This was NOT, as some of you have suggested, an attack by the US Government unit that resides at Google. We are satisfied that this was a completely random attack by robot software that found a hole Word Press had not plugged, and nature took its course.
We continue to believe that both Google and the National Security Agency (NSA) should spend more time helping create hardware and software impervious to attack, and if they will not do it, we certainly hope Microsoft will wake up and smell the roses–the first totally reliable cloud-handheld environment is a win-win for all.