Handbook: Synergy Strike Force, Dr. Dr. Dave Warner, Round II

About the Idea, Advanced Cyber/IO, Analysis, Analysis, Geospatial, Geospatial, Hacking, Historic Contributions, ICT-IT, info-graphics/data-visualization, InfoOps (IO), Innovation, Maps, Methods & Process, Peace Intelligence, Research resources, Technologies, Tools
 

Dr. Dr. Dave Warner

Phi Beta Iota:  STRONG ANGEL was the other major innovation besides CATALYST, Analysis 2000, and MCIA JNID.  Below is Round II from STRONG ANGEL, with Round II from M4IS2 soon to be made public, built around SILOBREAKER (actually, Son of SILOBREAKER).  We considered forcing visits to the Synergy Strike Force home page, but decided that the richness of the content there needed to be displayed here. 

I. Introduction

Welcome to the MESS-KIT wiki: Minimum Essential Software Services for Knowledge and Information Transfer

II. Structure

The MESS-KIT system is composed of three basic components — the software package, the virtual environment and the hardware:

a. APPLICATION SOFTWARE PACKAGE: One or more Virtual Machine Instances that package together an operating system with a web server environment and all free-and-open-source/commercial-off-the-shelf software modules. Example: A VMware instance of an Ubuntu Linux installation with a full LAMP web server hosting environment and associated web software.

b. VIRTUAL MACHINE CLIENT SOFTWARE: One Virtual Machine Software Client to package, distribute, and host one or more Application Software Packages and abstract the application software from the host operating system. Examples: VMWare Fusion and Sun VirtualBox.

c. HARDWARE: Hardware on which the Virtual Machine Client Software and Application Software Package will run. The Hardware will include a host operating system. Examples: MacMini running OSX, ASUS eeePC Netbook running eeeBuntu Linux.

Continue reading “Handbook: Synergy Strike Force, Dr. Dr. Dave Warner, Round II”

Journal: HOUSE TO CONSIDER GAO AUDITS OF INTELLIGENCE

08 Wild Cards, Collective Intelligence, Government, Peace Intelligence
Full Secrecy News Online

Defying a previous veto threat from the White House, the House of Representatives will consider an amendment to bolster intelligence oversight by requiring intelligence agencies to cooperate with the Government Accountability Office when it performs audits that are requested by a congressional committee with jurisdiction over intelligence.

In general, the amendment (pdf) states, “the Director of National Intelligence shall ensure that personnel of the Government Accountability Office designated by the Comptroller General are provided with access to all information in the possession of an element of the intelligence community that the Comptroller General determines is necessary for such personnel to conduct an analysis, evaluation, or investigation of a program or activity of an element of the intelligence community that is requested by one of the congressional intelligence committees.”

The amendment to the FY2011 Defense Authorization Act (HR 5136) was sponsored by Rep. Anna Eshoo (D-CA) and several colleagues.

When a similar amendment was included in the FY2010 Intelligence Authorization Act, which is still pending, it prompted a veto threat from the Obama White House.  But the White House opposition was based on an erroneous interpretation of the law, the Acting Comptroller of the GAO told Congress.

Somewhat surprisingly, given the likelihood of a renewed veto threat, the House Democratic leadership ruled that the Eshoo amendment was “in order,” and it will therefore be considered on the House floor, perhaps today or tomorrow.

Back when he was a Congressman in 1987, CIA Director Leon Panetta introduced a bill called the “CIA Accountability Act” (pdf) that would have reinforced GAO oversight over the Central Intelligence Agency.

Can't Fix Stupid

Phi Beta Iota:   Tip of the hat to Secrecy News for the above lead story.  The secret world is long overdue for GAO oversight, and we have stated in writing before that the first decision by any Director of National Intelligence (DNI) with even a modicum of ethics (we're not holding our breath) should be to create an integrated IG/GAO office and put the entire secret intelligence world under a GAO microscope.  It is our judgement that 90% of the contract positions should be eliminated, and at least 50% of the so-called government employee positions, most of which are very highly paid clerical positions, nothing more.  The budget should be cut back to $25 billion a year, with the proviso that the other $50 billion remains under the DNI's purview for redirection toward education, research, and a global multinational multiagency multidisciplinary multidomain information sharing and sensemaking (M4IS2) grid focused on creating a prosperous world at peace.  Budget intelligence, and the eradication of corruption at all levels by combining true cost intelligence with the exposure of blatantly stupid acquisition decisions, some but not all also corrupt acquisition decisions (most just uninformed), is the single best thing intelligence can do for the government; creating a Smart Nation is the ONLY thing that should be on the next DNI's mind.  If Obama is dumb enough to keep John Brennan at the White House, he is assuredly dumb enough to move Jim Clapper or Leon Panetta to the DNI position and lose all hope of ever getting anything serious out of the secret world in the little time he has remaining.  No one now serving is capable of serving the public interest–Panetta had a shot, but if he cannot handle CIA he assuredly cannot handle Jim Clapper and the Clapper Harem.

Journal: Crazy Conspiracy Memes–Theirs & Ours

08 Wild Cards, Cultural Intelligence, Media

 

Chuck Spinney Recommends

Those irrational, misled, conspiratorial Muslims

BY GLENN GREENWALD, Salon, 26 May 2010 

FULL STORY ONLINE

The New York Times this morning has a particularly lush installment of one of the American media's most favored, reliable, and self-affirming rituals — it's time to mock and pity Those Crazy, Primitive, Irrational, Propagandized Muslims and their Wild Conspiracy Theories, which their reckless media and extremists maliciously disseminate in order to generate unfair and unfounded hostility toward the U.S.:
Conspiracy theory is a national sport in Pakistan, where the main players — the United States, India and Israel — change positions depending on the ebb and flow of history. Since 2001, the United States has taken center stage, looming so large in Pakistan's collective imagination that it sometimes seems to be responsible for everything that goes wrong here. . . . The problem is more than a peculiar domestic phenomenon for Pakistan. It has grown into a narrative of national victimhood that is a nearly impenetrable barrier to any candid discussion of the problems here.  In turn, it is one of the principal obstacles for the United States in its effort to build a stronger alliance with a country to which it gives more than a billion dollars a year in aid.

Initially, it's worth asking how these “conspiracy theories” compare to this:  from the front page of The New York Times, September 8, 2002: 

More than a decade after Saddam Hussein agreed to give up weapons of mass destruction, Iraq has stepped up its quest for nuclear weapons and has embarked on a worldwide hunt for materials to make an atomic bomb, Bush administration officials said today. . . . In the last 14 months, Iraq has sought to buy thousands of specially designed aluminum tubes, which American officials believe were intended as components of centrifuges to enrich uranium. . . . An Iraqi defector said Mr. Hussein had also heightened his efforts to develop new types of chemical weapons. An Iraqi opposition leader also gave American officials a paper from Iranian intelligence indicating that Mr. Hussein has authorized regional commanders to use chemical and biological weapons to put down any Shiite Muslim resistance that might occur if the United States attacks.

From the front page of The Washington Post, April 3, 2003:

AND MANY MORE EXAMPLES–A MUST READ ON IGNORANT CORRUPT US MEDIA

Reference: Re-Inventing Fire

08 Wild Cards, Collective Intelligence, Communities of Practice, Earth Intelligence, Ethics, Policies
Full Source Online

Energy-related economic, security, and environmental threats are intensifying the national conversation about how to regain energy leadership and competitiveness, restore jobs and prosperity, and build a secure and climate-safe energy system.

Yet America lacks a comprehensive vision of how a market economy can achieve these transformational goals.

RMI has that vision, and is now building its detailed roadmap, which we call Reinventing Fire™. This strategy will bring together RMI’s 28 years of innovation and engage the world in our most ambitious and important work yet—using whole-system thinking and integrative design to move the U.S. off fossil fuels by 2050, led by business for profit.

Phi Beta Iota:  This is righteous good stuff.  It does not go far enough.  Agriculture & Water as well as Health & Society are other points on the compass that must be addressed coherently and simultaneously.  That will not happen without the restoration of integrity (not just of honor but of thinking).  We salute the Rocky Mountain Institute for taking the fist viable step in the right direction. 

Search: OSINT software

Analysis, Augmented Reality, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Cyberscams, malware, spam, Ethics, Geospatial, InfoOps (IO), International Aid, Key Players, Methods & Process, Policies, Searches, Strategy, Technologies, Threats, Tools, True Cost

The search term brings up appropriate results, but the fact of the search gives us an opportunity to provide comment.

1)  Nothing now being used by governments, and certainly not iBase or Palantir, both aging technologies that do not scale and have too many fat-finger handicaps, fulfills the originial requirements documents crafted in the late 1980's.

Worth a Look: 1989 All-Source Fusion Analytic Workstation–The Four Requirements Documents

2)  The ONLY programs that have gotten anywhere close are COPERNICUS plus plus, and SILOBREAKER.  However, both of these have been slow to recognize the urgency of integrating–fully integrating–capabilities that address each of the eighteen functionalities.  Below is the list of softwares now in use by US Special Operations Command J-23 Open Source Intelligence Branch along with the STRONG ANGEL TOOZL and a couple of other things.

Memorandum: USSOCOM Software List and STRONG ANGEL TOOZL

See also:

Definitions: M4IS2 (Multinational, Multiagency, Multidisciplinary, Multidomain Information-Sharing & Sense-Making

Search: The Future of OSINT [is M4IS2-Multinational]

Worth a Look: Deep Web Multilingual Federated Search

1988-2009 OSINT-M4IS2 TECHINT Chronology

Worth a Look: Planetary Skin Data Sharing Initiative

Search: meta-tagging humint

Who’s Who in Librarian Intelligence: Arno Reuser

Who’s Who in Public Intelligence: Mats Bjore

Who’s Who in Collective Intelligence: Stephen E. Arnold

Journal: Dr. Dr. Dave Warner Shares…

Event Report CORRECTED LINKS: Responding to Real Time Information, Open Systems and the Obama IT Vision [Google-Microsoft Meld]

Review: The Starfish and the Spider–The Unstoppable Power of Leaderless Organizations

Review: Innovation Happens Elsewhere–Open Source as Business Strategy

Journal: Google, the Cloud, Microsoft, & World Brain

Worth a Look: GeoChat (SMS Plotted on Map)

2006 Yekelo (ZA) Continental Early Warning & Information Sharing: A Military Perspective on Deterring & Resolving Complex Emergencies

1998 Arnold (US) New Trends in Automated Intelligence Gathering Software

The global standard for multinational information-sharing and sense-making is in the process of being designed, funded, and distributed.  If you think you have something relevant to that, generally only open source software will be considered, get in touch with any of the individuals above.

ADMIN: Malware Defeated, Google Helped, Lessons Learned

Collective Intelligence, Computer/online security

We have eradicated the Malware that snuck in with a comment. It was a two-step process.

1) Delete all comments and then Close Comments.

2) Find the infected file that reactivated itself each time an unsecured computer visited Phi Beta Iota–evidently the robots are resident everywhere.

We should have reacted to Google's warning signals sooner. We could not replicate the issue here and that is why we were slow. In the process of eradicating the malware, Google's interactive help was both essential and easily available.

This was NOT, as some of you have suggested, an attack by the US Government unit that resides at Google. We are satisfied that this was a completely random attack by robot software that found a hole Word Press had not plugged, and nature took its course.

We continue to believe that both Google and the National Security Agency (NSA) should spend more time helping create hardware and software impervious to attack, and if they will not do it, we certainly hope Microsoft will wake up and smell the roses–the first totally reliable cloud-handheld environment is a win-win for all.

See also:

Event: 16-18 July 2010 NYC NY The Next Hope

2010: OPINION–America’s Cyber Scam

Journal: Cyber-War, Cyber-Peace, Cyber-Scam

Journal: Government Information Policy & Security Not Favoring the Public

21.3% of Malicious ‘Spam’ Researched by Symantec comes from Shaoxing China (30% China, 21.1% from Romania, US 3rd)

1994 Sounding the Alarm on Cyber-Security

Reference: Invisible Empire New World Order DVD + RECAP

08 Wild Cards, 10 Security, Corruption, Cultural Intelligence, DHS, Director of National Intelligence et al (IC), DoD, Government, InfoOps (IO), Intelligence (government), IO Deeds of War, Methods & Process, Military, Movies, Officers Call, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Strategy, United Nations & NGOs, Waste (materials, food, etc)

Invisible Empire A New World Order Defined Full

2 hours, 14 minutes, 1 second — free online, click on title above

Jason Bermas [creator or Loose Change movie] presents Invisible Empire: A New World Order Defined produced by Alex Jones. The film can be ordered here http://infowars-shop.stores.yahoo.net/inemnewwoord.html or viewed free online (click on title above).

Summary and See Also Below the Line.

Continue reading “Reference: Invisible Empire New World Order DVD + RECAP”